conspiracy files

This commit is contained in:
Nate Hammer 2023-02-20 12:57:43 -05:00
parent f4a9ac36ef
commit b3a546f80c
461 changed files with 326806 additions and 0 deletions

366
txt_files/666_ibm.txt Normal file
View File

@ -0,0 +1,366 @@
I scanned this excerpt in from the book, "The Delicate Balance" ,
written by John Zajac. 1989-1990 . ISBN Number 0-910311-57-9 .
** Begin Excerpt **
Automation
----------
To understand how 666 relates to this discussion, one needs to explore
technology. One pertinent contributor to this technology is the
International Business Machines Corporation. IBM developed a laser method
of information transfer that has now become universally accepted. Lasers are
used for many different applications in society today, such as measuring
distances, detecting structural flaws, determining straightness, and so
forth. You can see the IBM system at your local supermarket quickly reading
prices and controlling inventory as it prints out a list of all purchased
items. Since checkers no longer have to punch keys on a register, check-out
time and errors are reduced. This system also provides the shopper with an
itemized receipt. That receipt information is stored in a central computer,
which keeps inventory and indicates what products the store should order, as
well as which products should no longer be carried.
But the use of automation is going considerably further. In fact, in Fresno,
California, one of eight regional test cities, a new computer system called
Behavior Scan gives shoppers a bar code card that is read at each purchase.
The computer then keeps a detailed list of all purchases made by a family,
including brands and quantity of each product. This same computer is also
attached to the user's home television set to monitor what is being watched.
It then selects commercials to be shown to that customer to affect his
specific buying habits. While most customers claim that they are not
affected by these commercials, the advertising companies have spent a lot of
money on research proving otherwise. Is this the start of a more modern
version of George Orwell's "1984," the complete control depicted in Vance
Packard's 'The Hidden Persuaders' ? Certainly, computers are powerful and
indispensable tools. Thanks to computers, paychecks are deposited
automatically into checking and savings accounts at predefined rates while
many bills and loans are automatically paid on time every month. The system
works so well that many institutions give a discount on loans and insurance
payments if automatic payment is used (they are more confident that they
will be paid and on time). This can convenientiy save time, postage, and
worry. The world is positioned to facilitate the ever growing requirements
for increased automation and convenience.
The convenience of computers is everywhere. Even a simple inexpensive $3
watch contains a computer. No longer does it merely tell time; it also can
add and subtract, keep time in three different zones, give the day and the
date, and beep at predetermined intervals. Computerized voices in fancy cars
warn you if you have not fastened your seat belt, that your oil is low, or
that you are almost out of fuel. The proliferation of computers has created
a strong dependence on them, for real need and pure convenience. The average
American's name is accessed 35 times a day by computer, and this is only the
beginning as we become plugged into the ever-growing system.
Our credit card system is also very convenient. Carrying cash is unnecessary
and sometimes useless, for example, when renting a car or cashing a check.
With a credit card, transactions are easier, and banks are now able (and
more then willing), to deduct payment of your credit card bill automatically
from your main account.
In fact, paper money soon may become a thing af the past for three reasons:
1. The government is concerned about the advances being made in color
xerographic technology. Advanced copy machines will soon be able to produce
counterfeit bills that are indistinguishable from government issues. The
FBI reported that up to 20 percent of people having access to advanced color
copiers will produce some counterfeit bills.
2. The successful introduction of the Smart Card in France and U.S. test
cities such as Washington, D.C., and Norfolk, Virginia, may render cash
obsolete. This Smart Card, manufactured by Motorola and Toshiba carries a
complete history of the user, including a physical description and health
record. The card allows direct payment to the seller by instantaneously
deducting the purchase amount and any service charges directly from the
cardholder's account. Thus, not only is the seller paid immediately but,
also, the card companies save millions of dollars by eliminating bad
payments and personal bankruptcy debts. Reducing credit card fraud should
also save card companies large sums of money. For example, MasterCard could
save $25 million annually by eliminating fraudulent cards. By the end of
1990, 20 million fraud-resistant cards will be in use in France. Seventeen
other countries have agreed to a standard card for all bank machines. Visa,
Eurocheque, Eurocard and MasterCard have already agreed to a method to make
their cards, systems, and money access interchangeable. Thus, by eliminating
checks and voluntary payments, the credit card industry would save 3.2
billion dollars per year.
3. The Federal Government is paying close attention to methods for taxing
the $300 billion underground economy in the United States. Unreported income
costs the U.S. Treasury $90 billion per year. If cash were eliminated,
computers could keep track of all income.
Evidence that cards may soon replace cash (and checks) was provided by Arco
service stations and Lucky supermarkets, which announced in September 1986
that their pumps and check-out stands now accept automatic teller bank
cards. With this system, payment is deducted electronically from the user's
bank account before the user received his purchase. Within one month, 6,400
service stations and supermarkets in 23 states were fitted with the system.
The gentlemen who came up with the laser reader in supermarkets for IBM
also invented the means of placing the same kind of bar code beneath living
tissue in one-billionth of a second. This marking is totally invisible to
the naked eye, and it can be read only by a certain type of laser. The
writing and reading is totally harmless and painless. The inventor
demonstrated this system in 1979 by marking salmon as they swam downstream.
The fish were totally unaware of the process as the laser burned a code into
their flesh. The computer then keeps track of the codes. Years later, these
fish will be detected by the same system as they swim back upstream and are
forced through fish ladders and chutes. *
Just as impressive is what Walter Wriston, the chairman of CitiCorp did in
1983. He passed a rule within the bank that was later withdrawn as a result
of public outcry. His rule stated that unless you were a depositor of $5,000
or more, you were not entitled to a teller. This meant that the vast
majority of depositors would have to stand in line outside the bank and
"talk" to machines. This was an economic move, of course, because banks have
had some problems of late. But its message was that people would no longer
talk to people. If banks could establish such a policy, then they could make
the minimum deposit higher and higher. Finally everything for everyone would
be done by machines. The concern is that we are reaching a highly automated
state, which if followed to the next logical step might have profound
impacts on how we rate life.
Even more startling was an "off the cuff"' statement made by an other
chairman of an eastern megabank: He announced that a method is in place that
can imprint in human hands a silicon chip the size of the head of a pin.
That chip will include not only the person's identification number, Social
Security number, name and birthplace, but also his criminal background,
educational level financial worth in the community, and his political
affiliations.
* Such a system is currently manufactured by Taymar, Inc., Westminster, CO
The U.S. Agriculture Department uses the product for cattle. Will it be
used for people in the future?
With such a system, the minute someone walked through the door of the bank,
he would be sensed and the bank would know who he was, where he came from,
what he did, and how much he was worth. All this would occur before a person
could reach the counter.
Now this was one step further than even progressive thinkers envisioned.
There had been discussions about placing codes on the hand to be used as
identification marks, like fingerprints, similar to package bar codes in
supermarkets. With such a system you would not need cash or a validated
check or even a Smart Card. You could put your hand through a laser and be
read by the computer. The store would automatically deduct the amount of the
purchase from your account. The method would be efficient in terms of cost,
speed, thoroughness, and elimination of bad checks. * But the price of all
this automation is individual independence from nameless bureaucrats looking
over your shoulder and approving (allowing) every transaction.
The amount of control would be unprecedented: however, the government would
immediately know how to put this control to use. People would no longer be
able to cheat the government because every time anyone had any money, the
government would know about it. The government could collect taxes each time
you spent your money, and, thus, there would be no more filing on April
15th. It also means that advanced printing and photocopying machines could
not be used for counterfeiting. Even a law breaker who traded with stolen
goods would have his purchase and sale traced by computer as he tried to
move or "spend" funds. The government would monitor every transaction,
knowing precisely everyone's location, actions, and worth. Instant
evaluations, approval or disapproval, and tax deductions on every individual
would be made.
* Such systems are not in the distant future. Six thousand people in Sweden
have accepted a mark on their right hands in a test of a totally cashless
society. Tests also have been conducted in Japan and the Dominican Republic
in Latin America.
Small wonder that the government likes this idea.
Governments have always liked control. They would like to control
everything, even the areas they say they do not want to control, such as
business, transportation, education, religion, entertainment, and other
governments. If this sounds the least bit exaggerated just look at our
government's actions regarding the restrictions of business concerning tax
credit, labor laws, advertising, antitrust, and corporate subsidies. Even in
deregulation, transportation requires licensing, registration, inspection,
subsidies, price controls, flight approval, and government flight
controllers. Although there may be talk of eliminating the Federal
Department of Education there is no attempt to reduce control of school
curriculum, subsidies, and even school lunches. Most universities are
dependent on federal aid and research grants.
The government controls religion by granting tax exemption to "desired
religions" and by making it illegal to pray in school. The government
exercises control of entertainment by licensing and or censoring television,
radio, movies, and books. The Federal Government also seeks to control other
governments by rewarding or threatening them with trade concessions,
military or econonic aid, sanctions, or war. The highest people in
government, it would seem, want the government to have total control of
everything.
In Orwell's 1984, the government "took over," and everyone was controlled by
"Big Brother." In reality, government may take over, not through control of
transportation and censorship, but through the economy, the lending
institutions, and every financial transaction. Is it too far-fetched to
imagine that you may have to take a mark on your hand to be able to buy and
sell and exist in a modern society? The technology exists. The chairman of
the megabank was asked what it would take to motivate people to put little
pieces of silicon under their skin. He answered, "a major catastrophe." He
knew people would not do it voluntarily.
Of course if there was a financial or national emergency (catastrophe), the
government would exercise unprecedented control, and compliance of citizens
would be anything but voluntary.
Central Computing
-----------------
As mentioned earlier, the impact of computers on society has been enormous.
However, their likely future role may be overwhelming. As powerful as
computers are, their effectiveness is greatly multiplied when they can
communicate with other computers. For example, missile launch command
computers talk to U.S. Weather Bureau computers to update the possible
flight paths of thousands of Minuteman missiles every hour. Thus, to enhance
a system's capabilities, computers need to talk to computers. To sort out
the enormous amount of cross-references, a central computer is needed.
The central computer for America is in Texas, and the international computer
that ties all the national central computers together is situated in
Brussels, Belgium. The Brussels computer is housed in a 13 story building,
the first three floors of which are occupied totally by this system's
hardware. Because of its size. the Brussels computer is referred to
affectionately as "the Beast."
This immense computer has enough capacity to store every detail about the
lives of every human being on Earth, the information contained in the
Library of Congress, and every book ever printed. Having operated for years,
it stores a growing volume of information as additional countries tie into
it ever more heavily. This allows international banking, interstate banking,
and quick credit references. Money can be moved from New York to California
or London in minutes. If a deposit is made in a bank other than where the
check was drawn, banks usually impose a 5 to 10-day holding period.
Actually, this practice is just a means for banks to increase their "float"
and thus to increase their profits, since the money is transferred within
one day. What happens to the money for the other days? The bank uses it to
float shorter loans by which the bank earns interest. Banks typically wait
longer to issue credit because they want to use the money for as many days
as possible.
Daily manipulation of funds by banks is common. Many banks are forced to
move their funds around the globe with the sun to have their reserves where
they are needed-in the banks that are open. Even the CIA likes the
capability of the central computer because it can check on personnel
mobility, foreign trading, and all financial transactions.
Many advanced computers are available with many designations, but one is
especially interesting. NCR produced a six-core memory computer with 60
bytes per word in conjunction with six bits to the character. It is named
and advertised as the 6-60-6 which defines the size and shape of the
computer. The only way this can be pronounced is six sixty-six (666). In
computer language, 666 has a unique significance.
A computer is an information retrieval system, and all of its information is
stored as numbers. A computer's memory cell has only two states-on and off,
or mathematically 1 and 0. Thus, every number must be represented in 1's and
0's. We use a decimal system based on 10; thus, it has 10 symbols: 0, 1, 2,
3, 4, 5, 6, 7, 8, and 9. Computers use a binary system using two symbols (0
and 1). To manage large numbers, computers use a binary coded decimal system
(BCD) which consists of groups of four digits, to make up all numbers. By
comparing the groups of number listed below one can find each system's
equivalent symbol. Thus, 0011, 0111, 0101 in the binary coded decimal system
is equal to our decimal system number 1,375.
Decimal System Binary System
0 - 0000
1 - 0001
2 - 0010
3 - 0011
4 - 0100
5 - 0101
6 - 0110
7 - 0111
8 - 1000
9 - 1001
(For various reasons, some computers use Base 8 (0-7) and therefore do not
use the last two symbols shown.)
As shown in the BCD system, the number 6 is represented by 0110. This is
unique because 0110 written backwards or upside-down is still 0110. The
only other number in the BCD system with the same property is its complement
1001, or 9. (However, not every computer counts past 7.) This consistency is
the same in every country in the world, unaffected by language because every
computer speaks the same language of "1's" and "0's." Thus, 0110,0110,0110
is 666 universally.
In the Book of Revelation; John said that 666 is the mark of the beast. This
number also represents the universal consistency of the computers that will
be required to control the world's finances and thus the world's people.
When John wrote 1,900 years ago, he did not know anything about the binary
number system, computers, or why computers would require binary coded
decimals. Yet, he stated emphatically that the mark of the beast is 666.
Is this to say that the endtime beast is merely a building located in
Belgium? No! The Brussels computer is no more the beast than a general is
an army. The significance is that computerization for financial dominance is
the financial beast. The beast is a false god and the worship of that false
god. Worship means "worth respect." A false god does not have to assume the
figure of a man: It is the physical representation of that which controls,
that which is worshipped. So, if people worship the "$" symbol too much for
what it can acquire, influence, or accomplish, then that can qualify it as
the false god. The Brussels computer is only the figurehead of a vast,
soon-to-be indispensable financial network that will control all financial
transactions and thus all business and people.
He who controls the system controls all. What is feared by some is that
whoever is in control wiil demand that all take the code (mark) on their
hand to be able to buy and sell. Money, credit cards, and checkbooks would
be totally eliminated. Everything would be done through the government,
through the computer, giving the government total control. The greatest fear
is that when receiving the mark, you also may be forced to pledge allegiance
to your flag and (as in the days of kings) to your ruler, but in this case
the world leader would be the Antichrist. Of course, to have allegiance with
the Antichrist is to make a pact with the Devil. If you think that this
unified system is very far away, then you have missed some intriguing news
items.
As you probably are aware, the government has been talking about a national
identification number for some time. It is supposed to make record keeping
easier and to provide a means of crosschecking. It will help find deserting
husbands who owe child support as well as locate tax evaders. Most people
anticipate that the Social Security number will play a part in this national
identification code.
The government's system for identification uses 18 digits, the last nine of
which are the Social Security number. Virtually every citizen in the country
over the age of 1 will be forced to have a Social Security number. At
present, a Social Security number is necessary to have a job or a
savings/checking account. Starting 1990, every child over one year old must
have a Sociai Security number to qualify as a dependent on tax returns.
Preceding this 9-digit Social Security number are 3 digits corresponding to
one's telephone area code. Obviously, the whole world is tied by phone; even
barren deserts with no inhabitants have area codes. In front of these
numbers is a country code; for America it is 110. From this single
universally consistent number, the government will instantly know a person's
country, region, and identity. Does that seem logical so far? But that
accounts for only 15 digits, and the system is based on 18. The missing
3-digit code specifes that you are in the system: 666.
All computerized companies are going to 18-digit identification codes.
According to the report '666 Is Here,' Sears Roebuck is going on this system
and is committed to changing over all its credit cards. J.C. Penney's is
reported to be switching over, as well as New York Telephone. The U.S.
Government used to prefix all the serial numbers of everything it owned with
the code 451. But that also is changing; the dog tags on every soldier in
America are to be converted to 666.
Is that enough to concern you? The point is that 666 is a significant and
important part of what the future is going to hold. The Bible prophesied it.
Nostradamus explained it, and we are presently at the very edge of seeing it
become enacted. Rumors abound about people receiving checks with these
marks, governments admit they need better financial control, and the
chairman of one of the largest banks says, "It's ready; we just need a major
catastrophe."
** End Excerpt **


164
txt_files/9dims.txt Normal file
View File

@ -0,0 +1,164 @@
Title: The Proven existance of 9 dimensional planes
Intro: In order to understand these files, one must assume the following is
completely true. If not assumed, one will be completely lost in the text of
the following files. You may laugh if you wish, but if you want to understand
the theory you must make compensations on your part. Ok, on with the file...
Volume I: Defining the 9 planes
Written by: Starmaster and Locust
1st dimensional plane: This plane consists of only the single dimension
of length. It is not advised to try to envision this dimension for it may
cause insanity, seriously.
2nd dimensional plane: This plane consists of both length and width. It
is not adviable to envision this either. The first and second planes are
not the same as the fourth dimension and are uncomprehendable except by
entities "living" in that plane of thought and sight.
3rd dimensional plane: This is the plane of depth. This one is easily
imagined by 4th dimensional entities, because they are so close to it, and
had just passed out of it.
4th dimensional plane: This is the plane that the entities that we call
beings "live" on. It consists of the forward movement of time. It is the one
we are on right now.
The cross-over: This is a place where the 4th dimensional entities make their
way into the 5th and above. It is often refered to as death, yet it is only a
cross-over point. At this point, all knowledge of the 4th and below
dimensions is lost.
5th dimensional plane: This plane consists of the backwards movement of
time. Although considered impossible by 4th dimensional entities, those
entities are only thinking in the 4th dimensional phase. Remember everything
else from here on out is done in metaphysical thinking.
6th dimensional plane: This is the plane of clairvoyance. Remember, all of
this you must assume, or no comprehension of the later explanations
will be understood. Not much is known about this plane, except you "inhabit"
the sense of clairvoyance.
7th dimensional plane: This is the plane of telekinesis. This is even less
understood than the plane of clairvoyance, yet it does exist. This
often thought of as "supernatural", when in fact it a real thing.
8th dimensional plane: This is the plane of perception. It is the highest any
entity can evolve to. It consists of all the planes from five and up.
9th dimensional plane: God. Refered to by many, but understood by few. All
cultures and beings, be it from our world or others, have this vision. God
created all life, so all life lives by him.
These are the explanations of all the dimensional planes. Dimensional planes
are achieved by the evolution of the mind/soul/entity, which are all the
same thing. Evolution is a continual learning process. As we evolve we
understand more, yet raise more questions. This theory is to help those
understand the answers to many questions concerning God and the
"supernatural". One thing is assumed. We are not the only lifeforms in this
universe. All lifeforms were created by God, and will evolve through the
process God laid forth unto us. The universe is infinitely large, which
shows God's power is also infinitely large.
-----------------------------------------------------------------------------
Volume II: Explanation of the Planes and their signifigance to the supernatural
Intro: This is the second part to the previous file on the proven existance of
9 dimensional planes. As stated in the last phile, one must assume all things
true in order to understand and comprehend the intensity of this phile. This
one will deal with the questions brought about by the theory itself.
One thing must be understood in this file. All the entities, in all the
dimensional planes, co-exist with one another in this one universe. There is
but one universe, in which all entities live in. There are no "outside"
universes. Everything co-exists in this one universe.
Explanation of "Insane Persons":
An insane person is thought of as a person without the ability to think clearly
and comprehend things on a 4th dimensional basis. They are not "insane". That
is a term 4th dimensional entities give to those entities which are not on the
the same thought plane that the other entities are on. Every plane is just a
level of thought process. In the past file I stated that evolution is a
continuing process of learning. The "insane" persons of a 4th dimensional
community are not on the same thought plane we consider ourselves on.
Explanation of "supernatural" powers
This deals with the idea of persons who are able to channel their psychic
powers to do physical things. This also deals with fortune tellers and People
who can see the future, i.e. Nostradameus. These occurances are also explained
by the thought level that these entities are on. They are actually 6th or 7th
dimensional beings stuck in a 4th deminsional body. Because 99.8% of the
population of the 4th dimension only thinks in 4 dimensions, they are often
considered "supernatural", "witches", "prophets", ect. You then will ask, if I
came up with this, how come I can't bend spoons with a thought. The answer is
simple. I am now just discovering this phenomenon. I have an upbringing of this
not really happening, but being a science-fiction thing. The people who do know
how to do these things have been concentrating all their lives to use this
"super" power givin to them by God. If everone thought on the 8th dimension,
there would be no use for a God. It is all a process of learning and
comprehending.
Explanation of "Ghosts, Spirits, and Poltergeists"
This is about the simplest thing to explain. As I stated above, all entities
co-exist in the same universe, for there is only one, which is infinite.
Sometimes, 4th dimensional beings see things they aren't "supposed" to see.
People are brought up with the idea ghosts are science-fiction, when in fact
they are a real thing. Sometimes these entities are accidently crossed back for
a few seconds, years, or minutes.
Explanation of Heaven or the Kingdom of God
This is fairly easily comprehended, if one thinks beyond the 4th dimension. It
is but the enternity at the other side of the cross-over. What do you think the
"light at the end of the tunnel" is? It is the "other side" or 5th dimension.
People lose their physical bodies and are "able to fly" around. This also
explains the angels 4th dimensional beings continually say are immortal.
Explanation of Immortality
Immortality is an easily comprehendable concept, if one thinks of a positive
charge and a negative charge. When thrown together, they cancel each other out.
This is the same priciple when you combine forward and reverse time together.
After you make the cross-over, your mind adapts to backwards time, yet when
backwards time collides with forward time it cancels it out. Therefore the
state of immortality is reached.
The one constant
There is but one constant in all the dimensions. Plank's constant is only
valuable in 4th dimensional science and so is the speed of light. There is only
one constant in all of the 9 dimensions. It is the emotions. No one can explain
emotions except this phile. Emotions are the only constant of the co-existant
universe. Think about it. Why do you think the "ghosts" are happy, sad, angry,
ect., ect., when you see them. It is because of the power and intensity of the
emotional constant. When emotions of the 5th and above dimensional entities
gains great intensity, it then is transfered to all other dimensions.
That about does it for this file. That pretty much explains everything that I
can think of dealing with the unexplainable. If you can think of any more,
leave mail on Centre of Eternity for Starmaster (#75). I will ponder for the
answer, until I can get a suitable one using this theory. None will be turned
away. Who knows, maybe I'll get enough quetions to write another phile. Slatez
dudes.
Greets to all metaphysical thinkers. This should answer some of your questions.
-------------------------------------------------------------------------------
Call Centre of Eternity-(615)552-5747/ 40 megs on-line/ 12/2400 baud.
HQ of The Esoteric Society and Toxic Shock
Call Ripco-(312)528-5020/ 12-9600 baud/ 60+ megs on-line
-------------------------------------------------------------------------------

511
txt_files/a-z-cons.txt Normal file
View File

@ -0,0 +1,511 @@
The A-Z of Conspiracy
As everyone knows, we are never allowed to know who is really
controlling our lives/the country/the world. But is this knowledge a
dangerous thing? To clear up this question beyond reasonable doubt
Life provides a comprehensive guide to the theoretical corridors and
sinister back offices in which true power (and general paranoia) may
(or may not) lie
02/12/95
THE GUARDIAN
Conspiracy theories are the will-o'-the-wisps of the modern
world. They provide an alternative history to the authorised
version of events, a coherent demonology in a godless, devil-less
age.
Conspiracy theories fill a human need. They make some sense of
the cruel narrative that is the 20th century. They turn the random
violence of a lone madman into an act of orchestrated malice. In
this way the loss of a figure like Kennedy becomes somehow more
comprehensible. To be angry is more bearable than to be uncertain.
This soothing function can be at odds with truth, however.
Alternative conspiracist history is as flawed as the `authorised'
version. Worse, a conspiracist view can suppress awkward pieces of
information by toying with the notion that events have been covered
up by the authorities to suit their own ends: encounters with alien
space ships, the real makers of the Lockerbie bomb and the truth
about Rudolf Hess have all been hidden from the public but the
higher officers of the state are in the know.
Some of the conspiracy theories which date from earlier this
century have more ignoble, murkier origins. Anti-semites were
behind the Protocols of the Elders of Zion, the Jewish Conspiracy
and countless others. Their modern equivalents are put about by
neo-Nazi cliques. Again, these conspiracy theories have a human
function. Failure in life is more bearable if `the truth' is that
the Jews/the blacks/the Illuminati have conspired against you, it
allows you to ignore the fact that you are a spotty social
inadequate with bad breath and too-tight lederhosen.
The conspiracy theorist is the bane of the working journalist.
The need for some sliver of evidence to support assertions is
secondary to the spell of the theory: that, for the conspiracy
theorist, is its charm. This difficulty is compounded by the fact
that not all conspiracy theories are untrue. Those in power across
the world do prefer to keep embarrassing truths secret; they do
cover up; they do, from time to time, kill people who get in the
way.
True or not, a rattling good conspiracy theory requires the
following qualities:
1 it must be difficult, better still, impossible, to understand
at first glance.
2 it must contain a spaghetti-heap of leads, all of which cannot
be followed up. There must always be one more lead left to chase.
3 The story should speak to a `wider' truth about our society,
through a series of disconnected or unconnected or unfalsifiable
propositions.
4 There should be no easy way of verifying it.
The theories below demonstrate all of these qualities to a
greater or lesser degree. To savour our A-Z properly, we suggest
readers mull over it with deadpan credulousness in the small hours
of the morning listening to the theme music from The X-Files and
drinking black coffee.
A IS FOR ALIEN ENCOUNTERS that are being covered up by the
authorities. Perhaps the best-documented close encounter of the
third kind took place on 27 December 1980, when airmen at two RAF
stations in East Anglia witnessed something extraordinary. First
radar operators at RAF Watton in Norfolk picked up an oddity on
their screens. Then RAF Phantom pilots reported seeing intense
bright lights in the sky. Former radar operator Mal Scurrah said:
`As the Phantoms got close the hovering object shot upwards at
phenomenal speed " monitored at more than 1,000 mph.' Later, airmen
stationed at RAF Woodbridge in Suffolk investigated a mystery fire
in Rendlesham Forest. Sergeant Jim Penniston witnessed the
encounter with airman John Burroughs. Penniston said: `The air was
filled with electricity and we saw an object about the size of a
tank. It was triangular, moulded of black glass and had symbols on
it. Suddenly it shot off faster than any aircraft I have ever
observed.' The next day the object returned. Base commander Lt Col
Charles Halt saw the flying saucer himself: `I couldn't believe
what I was seeing. It looked like the rising sun with a black
pulsating centre. It appeared to be dripping molten metal.' Hall
acted coolly, taping and photographing the object engineered by `an
intelligence which didn't originate on Earth'. His tape and film
were confiscated by visiting US defence officials. Former British
Chief of Defence Staff Lord Hill-Norton has claimed: `Someone is
sitting on information that should be in the public domain.'
Believability: 9/10 (Possible explanation: what the airmen saw may
not have been a UFO, but a prototype of the Stealth bomber, which
has a black triangular shape, a strange radar print and was, in
1980, ultra-secret. Project Aurora, a new ultra-ultra-secret
Pentagon Black Budget reconnaissance aircraft, is probably
responsible for all subsequent UFO sightings.)
B IS FOR THE BILDERBERG GROUP, which organises semi-secret
annual three-day meetings of the European-Atlantic great and good
from the worlds of business, diplomacy and politics. The first
meetings were organised in 1954 by eminence grise Joseph Retinger,
the then secretary general of the newly fledged, CIA-funded
European Movement. Karl Otto Pohl, then president of Deutsche
Bundesbank, David Rockefeller, Lord Carrington and Governor Bill
Clinton of Arkansaswere among recent delegates. Denis Healey was at
that first meeting and, having retired, discusses Bilderberg in his
autobiography, The Time Of My Life. Bilderberg is one of the
transnational groups suspected by the European-American far Right
of being part of the secret elite power structure. Even the
Financial Times column `Lombard' has noted: `If the Bilderberg
group is not a conspiracy of some sort, it is conducted in such a
way as to give a remarkably good imitation of one.' Believability:
8/10
C IS FOR CEAUSESCU, who was tried and executed on Christmas Day
to hush up the complicity of Romania's new leaders in his crimes.
The videotape of the Christmas Day show trial of Nicolae and Elena
Ceausescu is an absorbing spectacle. Time and again, Ceausescu and
his wife turn on their interrogators and accuse them of knowing the
answers to the questions they have posed. Prosecutor: `What do you
know about the Securitate?' Elena: `They are sitting across from us
here.' The old witch was right, of course, because sitting in the
courtroom were secret police chiefs like Colonel Magureanu, who had
been party to the attack on civilians in Timisoara which had
triggered the revolution. He was later promoted by the leader of
the conspirators, Ion Iliescu " a former Ceausescu crony " to head
the renamed secret police, the `Romanian Information Service'.
Iliescu became and remains president, the tainted hero of a tainted
revolution.
Believability: 10/10
D IS FOR `DEEP THROAT', the mole in the Nixon administration
guiding the Washington Post journalists, Woodward and Bernstein, to
the Watergate story. `Throat' remains unidentified. In his book
Hidden Agenda (1984) Jim Hougan nominated both Nixon's chief of
staff, Alexander Haig, and National Security Agency boss, Admiral
Bobby Ray Inman, as candidates; Colodny and Gettlin also fingered
Haig in their book Silent Coup (1991). Barbara Newman, for Channel
4's Dispatches, came up with the head of the FBI field office in
Washington, the late Bob Kunkle. He was allegedly leaking for the
FBI, which was disgruntled by the Nixon cover-up.
Believability: 10/10 (Cynics suspect `Deep Throat' was merely a
dramatic device or a ploy to keep newspaper lawyers quiet.)
E IS FOR ELECTRICITY PYLONS, which fry our brains. A number of
protesters have complained that electro-magnetic waves in overhead
electricity pylons have led to depression, headaches, mental and
physical ill-health. No government ministry has placed much
credence on these complaints. The epidemiology of environmental
effect is notoriously hard to prove, but all good conspiracists
believe there is no smoke without a secret ray.
Believability: 7/10
F IS FOR FREEMASONS, who club together to better themselves in
the world. The majority of active freemasons have sworn not to
divulge the secrets of the craft, on pain of having their tongues
`cut out by the root and buried in the sand below low-water mark'.
Other masons who have tried to break ranks have come to sticky
ends, like `God's Banker' Roberto Calvi, found hanging from
Blackfriars Bridge in 1982. So it is hard to determine just how
much influence is wielded by the grown men who like to dress in
black suits, wear aprons, bare their breasts and roll up their
trouser legs. Not very much, say some sceptics, who suspect that
the masons have more control over, say, haberdashery in
Herefordshire than the British state. But freemasons still hold
some sway in the corridors of power. The Rt Hon the Lord Templeman
and Rt Hon Lord Justice Balcombe, both freemasons, are two of the
most senior judges in the land; junior Foreign Office minister Tony
Baldry, former Tory MP David Trippier and back bench MPs Sir Peter
Emery and Sir Gerard Vaughan are all on the square.
Many police officers, too, remain true to their masonic oaths of
secrecy. In 1993 at a Police Federation conference a motion urging
police officers to reveal membership of the masonic brotherhood was
debated. An officer from Merseyside said it did not matter if
officers `wore a goatskin or rolled up their trouser leg'. Another
said that freemasonry was `not all mumbo-jumbo'.
A third police officer, mocking the calls for more openness
about freemasonry in the ranks, put a paper bag over his head.
Finally a member of the Metropolitan branch came to the rostrum to
announce the vote. `I'm not telling,' he said to laughter. `It's a
secret.' The opponents of freemasonry lost the vote.
Believability: 8/10
G IS FOR THE GEMSTONE FILE, the conspiracy theory which first
surfaced in 1975. Originally a precis by American journalist
Stephania Caruana of allegations made in letters by American
chemist Bruce Roberts, now deceased, Gemstone attributes much of
post-war America's ills to the power of Aristotle Onassis, who had
the Kennedys and Dr King assassinated, seized the Howard Hughes
empire, did a deal with the Mafia, etc. The subject of a couple of
book-length studies to date, Gemstone has appeared in five or six
different versions, each one containing new material. Most striking
is the `Kiwi Gemstone' in which specifically New Zealand incidents
have been embedded in the original American narrative. Authorless,
floating round the world in samizdat form, Gemstone is a perfect,
small-scale disinformation vehicle for anyone who cares to use it.
Believability: 0/10
H IS FOR HESS, locked up in Spandau prison because he knew all
about the secret 1941 negotiations between Britain and Nazi
Germany. Rudolf Hess's flight in May 1941 remains one of the most
bizarre episodes of the Second World War. Lord James
Douglas-Hamilton, son of the Duke of Hamilton, the Scottish
landowner to whom Hess presented his plans, said: `Hess's proposals
consisted of a limited peace deal under which Germany would have
allowed Britain a free hand in her empire in return for Britain
allowing Germany a free hand in Europe and Russia. His so-called
peace plans would have meant the enslavement of Europe.' Hess was
arrested, tried to commit suicide, went mad, was sentenced to life
imprisonment and, at the age of 93, hanged himself in Spandau
prison. Or not, as the case may be.
One theory has it that the Churchill government, in a hideously
clever propaganda campaign against the Nazis, ran a double, `Hess
Two'. Evidence supporting the double theory emerged when a Dutch TV
journalist, Karel Hille, disclosed that he had got the Most Secret
file on Hess via an unnamed British historian who had been given it
by the late MI6 spymaster Sir Maurice Oldfield. Oldfield had,
allegedly, stolen the file from the MI6 archive. That the man,
`Hess Two', who killed himself in prison was not the real Hess is
backed by Hugh Thomas, a Welsh surgeon, who, in the early 1970s,
was consultant to the British Military Hospital in West Berlin.
Thomas examined `Hess Two' and found him to lack the scars the real
Hess should have had after a wound he received in 1917. MI6 had
`Hess Two' hanged because they didn't want the truth to come out.
Then the killers burnt the evidence, including an electrical flex,
with which he was murdered.
Believability: 5/10 (Hess was mad. His 1917 wound was
pea-sized.)
I IS FOR THE ILLUMINATI, the secret society controlling all the
other secret societies. An 18th-century masonic splinter group
begun by Adam Weishaupt, the Illimunati were said to be the hidden
force behind the French Revolution. After the First World War they
were re-launched into the English-speaking world by one Nesta
Webster who credited them with organising the Russian October
Revolution too. In 1921 the Spectator described Weishaupt as a
`Prussian with criminal instincts and lunatic perversions . . .
{who} shunted continental freemasonry on to Antinomian and
revolutionary lines.' In the demonology of the Anglo-American far
Right, the Illuminati largely replaced the Jews as the spider at
the centre of the web. These theories were brilliantly parodied in
the Illuminatus! trilogy (1976) by Robert Anton Wilson and Robert
Shea.
Believability: 0/10
J IS FOR JAMES JESUS ANGLETON, the orchid-growing,
poetry-writing, paranoid head of CIA counter intelligence
throughout much of the Cold War. Angleton believed the CIA and all
other spy networks to be so much gorgonzola, riddled with KGB
moles. In his search for these moles Angleton paralysed large
chunks of the CIA for years at a stretch and blighted the careers
of many senior officers.
It was Angleton who insisted in the 1960s that MI5 investigate
Harold Wilson, a task taken up enthusiastically by Peter Wright and
his circle in MI5. Angleton's overarching idiocy was to believe the
KGB defector Golitsyn, who claimed that the friction between the
Soviet Union and Mao's China in the late 1960s was a fake to
deceive the West. Despite the collapse of the Soviet Union,
Golitsyn remains convinced that it is all a black propaganda ploy.
However, the confession of top CIA man Aldrich Ames that he was a
KGB mole have proved some of Angleton's fears correct.
Believability: 6/10
K IS FOR KENNEDY, killed by almost anyone you care to mention.
According to Captain James T Kirk of the Starship Enterprise, the
`first rule of assassination is kill the assassins'. The killing of
Lee Harvey Oswald by Jack Ruby set a hare running that has never
stopped. Instead of Oswald's courtroom confession or denial of
guilt providing some explanation of the killing of the president,
the assassination of the assassin let conjecture reign.
So many had a hand in his murder it is too tedious to name them
all. Oliver Stone argued in his film JFK that Lyndon Baines Johnson
was the man behind the conspiracy. The KGB, the Mafia, the Cubans,
the FBI and the masons are all contenders. Perhaps the best JFK
conspiracy theory is that he is, after all, still alive, but kept a
permanent prisoner by the National Security Council.
Believability: 1/10
L IS FOR LOCKERBIE. On 21 December 1988, 270 people were
murdered when Pan Am 103 exploded over Scotland.
Six years later no one has been convicted of the crime, although
investigators on both sides of the Atlantic have consistently
pointed the finger at two Libyan intelligence officers who they
believe planted the bomb on a plane from Malta before it was
transferred at Frankfurt on to the fatal flight. UN sanctions are
enforced against Tripoli until Colonel Gadaffi agrees to hand over
the two for trial.
Others are not convinced by the official line. Tales of
suitcases of heroin recovered at the crash site by mysterious
American intelligence officers point to a joint CIA/Drug
Enforcement Administration operation that was fatally compromised
by Syrian and Iranian-backed Palestinian terrorists. American
spooks were running `controlled' deliveries of Lebanese heroin
through Frankfurt airport in return for information about the
whereabouts of the hostages in Beirut. The terrorists were aware of
this and switched the dope-filled Samsonite case with one
containing the bomb. Among those killed were Matthew Gannon, the
CIA's deputy head of station in Beirut, and Major Charles McKee, a
Defence Intelligence Agency officer allegedly in charge of a
hostage rescue team. Some students of the tragedy have gone so far
as to suggest that McKee was flying home to blow the whistle,
disgusted that deals were being struck with dope dealers in order
to gain intelligence on the kidnap victims.
Believability: 8/10
M IS FOR DAVID MELLOR, got at by Mossad after his
pro-Palestinian outburst in 1988 on the West Bank. The Israelis
were out to topple Mellor after he became the most prominent critic
in the British Government of their conduct in the Occupied
Territories.
First, they managed to secure his removal as junior Foreign
Office minister, threatening to stop passing on intelligence
information about the hostages in Beirut unless Mellor was moved.
Second, they arranged for the clandestine phone-tapping
operation which led to the highly embarrassing `toe-sucking'
allegations.
The result: Mellor was forced to quit the Cabinet.
Believability: 5/10
N IS FOR NOSTRADAMUS, the 16th- century psychic seer who
predicted Napoleon, Hitler and the killing of John Kennedy. The
seer's muddily-written quatrains have spawned more than 200 books,
a propaganda war between the Nazis and the Allies during the Second
World War, a movie, an American TV spin-off show, Monopoly-style
board games, a virtual reality game and even a watch, which ticks
down the seconds from 1 January 1995 to the millennium.
Whitstable housewife Valerie Hewitt, author of Nostradamus: His
Key To The Centuries (Heinemann, 1994), predicts that Prince
Charles will be crowned this year. `It will be something sudden
that will affect the Queen, an illness " whether it is political or
genuine it doesn't matter. And Diana will be offered the chance to
become Queen. But Charles's reign will be short and William could
be king before he's 18.' In 1993 she predicted that George Bush
would stay as president.
Rival Nostradamus buff John Hogue is more apocalyptic. He plumps
for nuclear disaster or terrorism in 1996, World War III before the
millennium and Aids " `a very great plague . . . with a great scab'
" and the ozone hole killing off two-thirds of the world population.
He quotes the prophet's vision of the future: `So many {die}
that no one will know the true owners of fields and houses. The
weeds in the city streets will rise higher than the knees, and
there shall be a total desolation of the clergy.' Believability:
0/10 (The verses of Nostradamus clearly refer to events and places
in the 16th century. For example, nowhere does he mention `Hitler',
only `Hister', the contemporary name for the Lower Danube.)
P IS FOR PROMIS SOFTWARE, stolen from a Washington law firm. In
1982 a Washington DC computer firm, Inslaw, developed a programme
called Promis (Prosecutors' Management Information System) which it
supplied to the US Justice Department for $10 million. A year
later, Justice stopped all payments and Inslaw went bankrupt. A
ruling in 1987 at a bankruptcy court concluded that the Justice
Department `took, converted and stole Promis software through
trickery, fraud and deceit', which is a little embarrassing for the
department charged with upholding the rule of law.
So far, so what? It is only when people started to probe into
why Justice had acted in such a way that it gets interesting,
prompting one investigator to claim that the case `was a lot
dirtier for the department than Watergate had been, both in its
breadth and depth'.
It turns out that (allegedly) the men behind the theft of the
software were all Reagan appointees who helped engineer the 1980
`October Surprise', whereby the Republicans struck a deal with the
Iranians not to release American Embassy hostages from Tehran until
after Reagan was safely in the White House. The software was then
sold on to foreign intelligence agencies across the globe, (a) to
generate revenue for covert operations not authorised by Congress;
and (b) to make it easier for US operatives to hack into the
software.
The story was chased by US freelance Danny Casolaro. A year
after making himself known to the Inslaw people he was found dead
in a motel room in West Virginia. The official verdict was suicide,
but Elliott Richardson, the Attorney General under Nixon, hired by
Inslaw to investigate the case, concluded: `It's hard to come up
with any reason for Casolaro's death other than he was deliberately
murdered because he was so close to uncovering sinister elements in
what he called `the Octopus'.' Believability: 7/10
Q IS FOR CARROLL QUIGLEY, the granddaddy of all modern American
conspiracists. Quigley's 1,340-page volume Tragedy And Hope "
History Of The World In Our Time (1966) included a dozen pages on
the existence of a hitherto unknown secret society, run by Alfred,
Lord Milner, Lloyd George's Chef de Cabinet, funded by Cecil
Rhodes's estate. The group, said Quigley, who claimed to have
access to its papers, organised the Round Table groups in the
Commonwealth, the Royal Institute For International Affairs in
London and its counterpart in the US betwen the wars.
For far-Right groups such as the John Birch Society these pages
were proof, from an `insider', of the great conspiracy they had
always suspected. Not the communists, not the Jews, not even the
Illuminati, but the Perpetual Hidden Government " the PHG!
Quigley's revelations are behind much of the recent talk of One
Worlders and New World Orders and are part of Republican
presidential hopeful Pat Robertson's world view. Among Quigley's
students at Georgetown University was Bill Clinton, and the
conspiracists got quite excited when President Clinton referred to
the impact Quigley made on him in his inauguration speech.
Believability: 4/10
R IS FOR JAMES RUSBRIDGER, killed and framed as a sex pervert by
MI5. Rusbridger was a tremendous irritant to the security services.
His letters to newspapers poured scorn on the Official Secrets Act;
his books, such as The Intelligence Game, cast doubt on the
official version of events. But where Rusbridger, aged 65 at the
time of his death, really annoyed the spooks was when he unearthed
Britain's code-cracking secrets, in particular the story that the
British had cracked Japanese naval codes in advance of the attack
on Pearl Harbour.
He was bright, hale and hearty for his age when he was
discovered in February 1994 at his home, dressed in a green
protective suit for use in nuclear, biological or chemical warfare,
green overalls, a black plastic mackintosh and thick rubber gloves.
His face was covered by a gas mask and he was also wearing a
sou'wester. His body was suspended from two ropes, attached to
shackles fastened to a piece of wood across the open loft hatch,
and was surrounded by pictures of men and mainly black women in
bondage. Consultant pathologist Dr Yasai Sivathondan said he died
from asphyxia due to hanging `in keeping with a form of sexual
strangulation'.
His death occasioned a piece by Sunday Times reporter James
Adams, whose own books boast of contacts with British intelligence.
Adams quoted senior intelligence officials as saying Rusbridger
never had any connection with any branch of British intelligence:
"His death was as much a fantasy as his life,' said one source . .
. Rusbridger's interest in intelligence seems to have coincided
with his conviction for theft in 1977.' Such an extensive
posthumous demolition job by intelligence officials would perhaps
only be merited by someone who had been a serious thorn in their
side.
Believability: 7/10
S IS FOR THE SUICIDES OF THE SCIENTISTS WHO WORKED FOR MARCONI.
In 1988 a host of brilliant researchers working for the defence
giant killed themselves in a variety of ways: one drove his
petrol-laden car into a disused Little Chef, another jumped off the
Clifton suspension bridge, a third electrocuted himself.
The deaths appeared to be a case of life imitating art " in this
case, an episode of the 1960s Avengers series which features a
number of brilliant scientists killing themselves. The first
problem is that there was no linkage between the deaths. Second,
suicide is 10 times more common than murder in Britain. Third, men
kill themselves more violently than women. Fourth, scientists are
more ingenious than the rest of the population, so one would expect
them to kill themselves violently and bizarrely. Fifth, the defence
business employs huge numbers of scientists, and Marconi is a big
employer.
When the numbers are crunched, there is no statistical
aberration in the number of suicides by Marconi scientists. It is
too good a story for a newspaper to kill, however.
Believability: 0/10
U IS FOR THE UNIFIED CONSPIRACY THEORY, or the Grand Unified
Conspiracy Theory, which knits all the other conspiracy theories
into a coherent tapestry.
Believability: 1/10
V IS FOR VATICAN, which knocks off the popes it doesn't like.
The markedly short reign of John Paul I has given rise to this
particular crock of conjecture.
Old men can die quite quickly, even if they are popes. However,
rumours persist in the Vatican than John Paul I was going to clean
out the Augean stables of the pontiff's finances and expose the
scandalous links between the Mafia, the freemasons and senior
cardinals in the Roman Catholic Church.
Believability: 2/10
W IS FOR COLIN WALLACE, who was forced to resign from the
Ministry of Defence in 1975 when he leaked information about a
covert MI5 operation, `Clockwork Orange'. Wallace, an Ulsterman,
claimed he had been involved in the operation, which had been
designed to destabilise paramilitary organisations in the Province
through disinformation. Wallace alleged that the scope of the
operation had been extended to include mainland politicians viewed
as `politically soft or leftist', a list which included Harold
Wilson, Edward Heath and Jeremy Thorpe. Wallace claims it was in
his remit to discredit these `targets' using unfounded smear
stories about sexual impropriety.
He also alleged, in a memo to army chiefs, that a Belfast boys'
home named Kincora was being used as a homosexual trap for
intelligence gathering against prominent Unionist politicians. In
1990 an inquiry conducted by James Calcutt QC found Wallace's
dismissal to be unsafe and ordered the Ministry to award him
pounds 30,000 in compensation. The inquiry was not, however,
empowered to make any judgment on Wallace's allegations.
Believability: 7/10
X IS FOR MR X, the third man who allegedly went to bed with two
senior Conservative politicians, now in the Cabinet, all at the
same time. This is a conspiracy theory never to be told.
Believability: 10/10
Y IS FOR YAKUZA, the Japanese mafia who run the world. The
Yakuza are the world's richest and most powerful gangsters. They
control many of the big-name Japanese corporations that now have
huge leverage in the major western economies. Nothing can be done
to loosen the grip of the Yakuza on the world economy.
Believability: 8/10
Z IS FOR THE ZAGREB OPERATION, when the NKVD inducted Robert
Maxwell as a Soviet double agent. Maxwell was never clear about how
he escaped from Nazi-occupied Germany. In fact, he was given secret
passage through Nazi-allied Croatia by Communist partisans, then
loyal to the Soviet Union, in return for a lifetime as a spy.
While passing through Zagreb Maxwell was recruited by an officer
of the NKVD " the forerunner to the KGB " and was told to travel to
Britain and ingratiate himself with the British Establishment.
Maxwell did brilliantly, becoming first a war hero then a respected
publisher. The NKVD and KGB helped Maxwell out from time to time,
smoothing his path in arranging deals with Eastern Bloc scientific
publishers and the like. Maxwell prospered.
It was only in 1991 that the Israeli secret service, Mossad,
came across the truth when they bought up a senior KGB archivist
who sold them the Operation Zagreb file. Maxwell " who Mossad
thought had been working for them " was terminated by a crack unit
of Israeli frogmen.
Believability: 6/10

345
txt_files/africa.txt Normal file
View File

@ -0,0 +1,345 @@
WHO Murdered Africa
The Greatest Murder Mystery of all Time
There is no question mark after the title of this article because
the title is not a question. It's a declarative statement. WHO, the
World Health Organization, murdered Africa with the AIDS virus. Thats
a provocative statement, isn't it?
The answers to this little mystery, Murder on the WHO Express will
be quite clear to you by the end of this report. You will also
understand why the other suspects, the homosexuals, the green monkey
and the Haitians, were only pawns in this virocidal attack on the
non-Communist world.
If you believe the government propaganda that AIDS is hard to catch
then you are going to die even sooner than the rest of us. The common
cold is a virus. Have you ever had a cold? How did you catch it?
You don't really know, do you? If the cold virus was fatal, How many
people would be left in the world?
Yellow fever is a virus. You catch it from mosquito bites. Malaria
is a parasite also carried by mosquitoes. It is many times larger than
the AIDS virus ( like comparing a pinhead to a moose head ) yet the
mosquito easily carries this large organism to man.
The tuberculosis germ, also larger than that AIDS virus, can be
transmitted by formites ( inanimate objects such as towels ). The
AIDS virus can live for as long as 10 days on a dry plate. You can't
understand this murder mystery unless you learn a little virology.
Many viruses grow in animals and many grow in humans, but most of
the viruses that affect animals don't affect humans. There are exceptions,
of course, such as yellow fever and small pox.
There are some viruses in animals that can cause very lethal cancer
in those animals, but do not affect man or other animals. The Bovine
Leukemia Virus ( BLV ), for example, is lethal to cows but not humans.
There is also another virus that occurs in sheep called Sheep Visna Virus
which is also non-reactive in man. These Deadly viruses are " Retro -
Viruses ", meaning that they can change the genetic composition of the
cells that they enter.
The World Health Organization, in published articles, called for
scientists to work these deadly agents and attempt to make a hybrid
virus that would be deadly to humans. " An attempt should be made to
see if viruses can in fact exert selective effects on immune function.
The possibility should be looked into that the immune response to the
virus itself maybe impaired if the infecting virus damages, more or
less selectively, the cell responding to the virus."
Thats AIDS. What the WHO is saying in plain english is " Let's cook
up a virus that selectively destroys the T-Cell system of man, an
acquired immune deficiency. Why would anyone want to do this? If you
destroy the T-Cell system of man then you destroy man. Is it even
remotely possible that the WHO would want to develop a virus that would
wipe out the human race?
If there new creation worked, the WHO stated, then many terrible
and fatal infectious viruses could be made even more terrible and more
malignant. Does this strike you as being a peculiar goal for a health
organization?
Sometimes Americans believe in conspiracies and sometimes the don't.
Was there a conspiracy to kill President Kennedy? Twenty five years later
the debate still continues, and people keep changing there minds. One day
it's yes and the next it's no - depending upon what was served for lunch,
or how the stock market did the day before.
But it doesn't take a bad lunch to see an amazing concatenation of
events involving Russian and Chinesse communist nationals, The WHO, The
National Cancer Institute, and the AIDS epidemic.
But what about the green monkey? Some of the best virologist in the
world and many of those directly involved in AIDS research, such as
Robert Gallo and Luc Montagnier, have said that the green monkey may be
the culprit. You know the story: A green monkey bit a native on the ass
and, bam - AIDS all over central Africa.
There is a fatal flaw here. It is very strange. Because Gallo,
Montagnier and these other virologist know that the AIDS virus doesn't
occur naturally in monkeys. In fact it doesn't occur naturally in any
animal.
AIDS started practically simultaneously in the United States, Haiti,
Brazil, and Central Africa. ( Was the green monkey a jet pilot? )
Examination for the gene structure of the green monkey cells prove that
it is not genetically possible to transfer the AIDS virus from monkeys
to man by natural means.
Because of the artificial nature of the AIDS virus it will not easily
transfer from man to man unless it has become very concentrated in the
body fluids through repeated injections from person to person, such as
drug addicts, and through high multiple partner sexual activity such as
takes place in Africa and among homosexuals. After repeated transfer it
can become a " natural " infection for man, which it has.
Dr. Theodore Strecker's research of the literature indicates that
the National Cancer Institute ( NCI ) in collaboration with the WHO,
made the AIDS virus in there laboratories at Fort Detrick ( now NCI ).
They combined the deadly retro-viruses Bovine-Leukemia Virus and Sheep
Visna Virus, and injected them into human tissue cultures. The result
was the AIDS virus, the first human retro-virus known to man and now
believed to be 100% fatal to those infected.
The momentous plague that we now face was anticipated by the National
Academy of Sciences (NAS) in 1974 when they recommended that "Scientists
throughout the world join with the members of this committee in voluntarily
deferring experiments linking animal viruses". What the NAS is saying in
carefully guarded english is: "For God's sake. Stop this madness!" The
green monkey is off the hook. How about the Communists?
Communist are in the process of conducting germ warfare from Fort
Detrick, Maryland against the free world, expecially the United States,
even using foreign communist agents within the US Army's germ warfare
unit euphamistically called the Army Infectious Disease Unit.
You don't believe it? Carlton Gajdusek, an NIH bigshot at Detrick
admits it. " IN THE FACILITY I HAVE A BUILDING WHERE MORE GOOD AND
LOYAL COMMUNIST SCIENTISTS FROM THE USSR AND MAINLAND CHINA WORK, WITH
FULL PASSKEYS TO ALL THE LABORATORIES, THAN THERE ARE AMERICAN. EVEN THE
ARMY'S INFECTIOUS DISEASE UNIT IS LOADED WITH FOREIGN WORKERS NOT ALWAYS
FRIENDLY NATIONALS."
Can you imagine that? A UN-WHO communist trogan horse in our
biological warfare center with the full blessing of the US government?
The creation of the AIDS virus by the WHO was not just a diabolical
scientific exercise that got out of hand. It was a cold-blooded
successful attempt to create a killer virus which was then used in a
successful experiment in Africa. So successful in fact that most of
Central Africa may be wiped out, 75,000,000 dead within 3-5 years.
It was not an accident, it was deliberate. In the Federation
Proceedings of the United States in 1972, WHO said : " In relation
to the immune response a number of useful experimental approaches can
be visualized ". They suggested a neat way to do this would be to put
their new killer virus ( AIDS ) into a vaccination program, sit back and
observe the results. " This would be particularly informative in
sibships," they said. That is, give AIDS to brothers and sisters and
see if they die, who dies first, and of what, just like rats in a
laboratory.
They used the smallpox vaccine for their vehicle and the geographical
sites chosen in 1972 were Ugunda and other African sites, Haiti, Brazil
and Japan. The present and recent past of AIDS epidemiology coincides
with these geographical areas.
Dr. Strecker points out that even if the African green monkey could
transmit AIDS to humans, the present known amount of infection in Africa
makes it statistically impossible for a single episode, such as a monkey
biting someone, to have brought this epidemic to this point. The doubling
time of the number of people infected, about every 14 months, when
correlated with the first known cases, and the present known number of
cases, prove beyond a doubt that a large number of people had to be
infected at the same time. Starting in 1972 with the first case from our
mythical monkey, and doubling the number of infected from that single
source every 14 months you get only a few thousand cases. From 1972 to
1987 is 15 years or 180 months. If it takes 14 months to double the number
of cases then there would have been 13 doublings. 1 then 2 then 4 then 8..
etc...In 15 years, from a single source of infection there would be about
8000 cases in Africa, not 75 million. We are approaching World War II
mortality statistics here - without a shot being fired.
Dr. Theodore A. Strecker is the courageous doctor who has unraveled
this conundrum, the greatest murder mystery of all time. He should get
the Nobel Prize but he'll be lucky not to get "suicided." ( "Prominent
California doctor ties his hands behind his back, hangs himself, and
jumps from 20th floor. There was no evidence of foul play." )
Strecker was employed as a consultant to work on a health proposal
for Security Pacific Bank. He was to estimate the cost of their health
care for the future. Should they form an HMO was the major issue. After
investigating the current medical market he advised against the HMO because
he found that the AIDS epidemic in all probability bankrupt the nation's
medical system.
He became fascinated with all the scientific anomalies concerning AIDS
that kept cropping up. Why did the " experts " keep talking about
green monkeys and homosexuals being the culprits when it was obvious that
the AIDS virus was a man-made virus? Why did they say it was a homosexual
and drug-user disease when in Africa it was obviously a heterosexual
disease? If the green monkey did it then why did AIDS explode practically
simultaneously in Africa, Haiti, Brazil, Japan, and the United States?
Why, when it was proposed to the National Institute of Health that the
AIDS virus was a combination of two bovine or sheep viruses cultured in
human cells in a laboratory, did they say it was " bad science " when
thats exactly what occurred?
As early as 1970 the WHO was growing these deadly animal viruses in
human tissue cultures. Cedric Mims, in 1981, said in a published article
that there was a bovive virus contaminating the culture media of th WHO.
Was this an accident or a "non-accident"? If it was an accident then why
did the WHO continue to use the vaccine?
This viral and genetic death bomb, AIDS, was finally produced in 1974.
It was given to monkeys and they died of pneumocystis carni which is
typical of AIDS.
Dr. R. J. Biggar said in Lancet ( a Brittish journal ) that the AIDS
agent could not have developed de novo. That means in plain english that
it didn't come out of thin air. AIDS was engineered in a laboratory by
virologists. It couldn't engineer itself. As Dr. Stricker so colorfully
puts it: " If a person has no arms or legs and shows up at a party in a
tuxedo, how did he get dressed? Somebody dressed him. "
There are 9000 to the 4th power possible AIDS viruses. ( There are
9000 base pairs on the geneome. ) So the fun has just begun. Some will
cause brain rot similar to the sheep virus, some leukemia-like diseases
from the cow viruses, and some that won't do anything. So the virus will
be constantly changing and trying out new esoteric disease on hapless
man. We're only the beginning
Because of the trillions of possible genetic combinations there will
never be a vaccine. Even if they could develop a vaccine they would
un-doubtfully give us something equally as bad as they did with the Polio
vaccine ( cancer of the brain ), the Swine Flu vaccine ( a Polio-like
disease ), the Smallpox vaccine (AIDS), and the Hepatitis vaccine (AIDS).
There are precedents. This is not the first time the virologists have
brought us disaster. SV-40 virus from monkey cell cultures contaminated
Polio cultures. Most people in there 40's are now carrying the virus
through contaminated Polio innoculations given in the early 60's. It is
known to cause brain cancer which explains the increase in this disease
that we have seen in the past 10 years.
This is the origin of the green monkey theory. The Polio vaccine was
grown on green monkey kidney cells. 64 million Americans were vaccinated
with SV-40 contaminated vaccine in the 60's. An increase in cancer of the
brain, possibly Multiple Sclerosis, and God only knows what else is the
tragic result. The delay between vaccination and the onset of cancer
with this virus is as long as 20-30 years. 1965 + 20 = 1985. Get the
picture?
The final piece of the puzzle is how AIDS devastated the homosexual
population in the United States. It wasn't from Smalpox vaccination as
in Africa because we don't do that any more. There is no Smallpox in the
United States and so vaccination was discontinued. Although some AIDS has
been brought to the United States from Haiti by homosexuals, It would not
be enough to explain the explosion of AIDS that occurred simultaneously
with the African and Haitian epidemics.
The AIDS virus didn't exist in the United States before 1978. You can
check back in any hospital and no stored blood samples can be found
anywhere that exhibit the AIDS virus before that date. What happened in
1978 and beyond to cause AIDS to burst upon the scene and devastate the
homosexual section of our population? It was the introduction of the
Hepatitis B vaccine which exhibits the exact same epidemiology of AIDS.
A Doctor W. Schmunger, born in Poland and educated in Russia, came
to this country in 1969. Schmunger's immigration to the U.S. was
probably the most fatefull immigration in our history. He, by un-explained
process, became the head of one of the New York City blood bank. ( How
does a Russian trained doctor become the head of one of the largest blood
banks in the world? Doesn't that strike you as peculiar? )
He set up the rules for the Hepatitis vaccine studies. Only males
between the ages of 20 and 40 , who were not monogamous, were allowed to
participate in this study. Can you think of any reason for insisting that
all expermentees be promiscuous? Maybe you don't believe in the Communist
conspiracy theory but give me some other logical explanation. Schmunger
is now dead and his diabolical secret went with him.
The Centers for Disease Control reported in 1981 that 4% of those
receiving the Hepatitis vaccine were AIDS infected. In 1984 they admitted
to 60%. Now they refuse to give out the figures at all because they don't
want to admit that 100% of the Hepatitis vaccine receivers are AIDS
infected. Where is the data on the Hepatitis vaccine studied? FDA? CDC?
No, the U.S. Department of Justice has buried it where you will never see
it.
What has the government told us about AIDS?
* It's a homosexual disease-----------------------WRONG
* It's related to anal intercourse only-----------WRONG
* Only a small % of those testing positive
for AIDS would get the disease------------------WRONG
* It came from the African green monkey-----------WRONG
* It came from cytomegalovirus--------------------WRONG
* It was due to popping amyl nitrate with sex-----WRONG
* It was started 400 years ago by the Portugese---WRONG
* You cant get it from insects--------------------WRONG
* The virus can't live outside the body-----------WRONG
The head of the Human Leukemia Research Group at Harvard is a
veterinarian. Dr. O. W. Judd, International Agency for Research on Cancer,
the agency that requested the production of the virus in the first place,
is also a veterinarian. The Leukemia research he is conducting is being
done under the auspices of a school of veterinary medicine. Now, there is
nothing wrong with being a vet but, as we have pointed out, the AIDS virus
is a human virus. You can't test these viruses in animals and you can't
test leukemias in them either. It doesn't work. So why would your
government give Judd, a veterinarian, 8.5 million dollars to study
leukemia in a veterinary college? As long as we are being used as
experimental animals maybe it is appropriate.
The London Times should be congratulated for uncovering the smallpox-
AIDS connection. But there expose was very misleading. The article states
that the African AIDS epidemic was caused by the smallpox vaccine
"triggering" the AIDS in those vaccinated. Dr. Robert Gallo, who has been
mixed up in some very strange scientific snafus, supports this theory.
Whether the infection of 75 million Africians was deliberate or
accidental can be debated, but there is no room for debate whether the
smallpox shots "awakened the unsuspecting virus infection." There is
absolutely no scientific evidence that this laboratory-engineered virus
was present in Africa before the WHO descended upon these hapless people
in 1967 with their deadly AIDS-laced vaccine. The AIDS virus didn't come
from Africa, it came from Fort Detrick, Maryland, U.S.A.
The situation is extremely desperate and the medical profession is
too frightened and cowed (as usual) to take any action. Dr. Strecker
attempted to mobilize the doctors through some of the most respected
medical journals in the world. The prestigious Annals of Internal Medicine
said that his material "appears to be entirely concerned with maters of
virology" and so try some other publication.
In his letter to The Annals, Strecker said, "If correct human
experimental procedures had been followed we would not find half of the
world stumbling off on the wrong path to the cure for AIDS with the other
half of the world covering up the origination of the dammed disease. It
appears to me that your Annals of Internal Medicine is participating in
the greatest fraud ever perpetrated."
I guess they didn't like that so Stricker submitted his sensational
and mind-boggling letter with all of the proper documentation to the
British journal, Lancet. Their reply : " Thank you for that interesting
letter on AIDS. I am sorry to have to report that we will not be able to
publish it. We have no criticism" but their letter section was " over
crowded with submissions ".
They're too crowded to announce the end of western civilization and
possibly all mandkind? Doesn't seem reasonable. What can we do? The first
thing that should be done is to close down all laboratories in this
country that are dealing with these deadly retro-viruses. Then we must
sort out the insane, irresponsible and traitorous scientists involved
in these experiments and try them for murder. Then maybe, just ,maybe, we
can re-populate and re-civilize the world.
William Campbell Douglass, M.D.
P.O. Box 38 Lakemont, GA 30552


240
txt_files/afu.boo Normal file
View File

@ -0,0 +1,240 @@
From: tjw@vms.cis.pitt.edu (TJ Wood)
Subject: The AFU Book List
> There's a book named "Why Clocks Run Clockwise and other Imponderables"
> by David Feldman.
BOOKS?!?! Did you mention BOOKS, son!?! Why didn't ya say so sooner!
I haven't published this in quite some time.
Terry "Books R Us" Wood
-----------------------------------------------------------------------------
Here's the OFFICIAL AFU BOOK LIST -- Suggested Reading for when your
news feed is down.
If you can't find anything of interest on this list, you should probably
be reading alt.sex or rec.arts.cooking.
If you know of a "good book" that isn't on this list, send it to me and
maybe (just maybe) it will end up on this list :-) (You know how PICKY
I am). Seriously, I'm always on the look out for books to read, so send
'em in.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
RECENT ADDITIONS TO THE A.F.U COLLECTION:
----------------------------------------------------------------------
Cannibalism and the Common Law: The Story of the Tragic Last Voyage of the
Mignonette and the Strange Legal Proceedings to Which it Gave Rise
by A.W. Brian Simpson, published by the University of Chicago Press, 1984.
This book is a great source of information about cannibalism in the
Victorian age and covers not only the case of the Mignonette, but also
the Alferd Packer trial and various other celebrated cases of "you are
what you eat." Although Mr. Simpson has a lot of fun with his subject,
this book is obviously well researched and includes a nice bibliography.
An excellent reference when debunking cannibalism ULs.
----------------------------------------------------------------------
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
The Vanishing Hitchhiker Jan Harold Brunvand
The Choking Doberman Jan Harold Brunvand
The Mexican Pet Jan Harold Brunvand
Curses! Broiled Again! Jan Harold Brunvand
If you haven't read these, you can't be appointed an honorary TERRY.
----------------------------------------------------------------------
The Straight Dope Cecil Adams
More of the Straight Dope Cecil Adams
----------------------------------------------------------------------
"The Official Handbook of Practical Jokes", - Peter Vanderlinden
publ Signet, $3.50, ISBN 0-451-15873-3
"The Second Official Handbook of Practical Jokes" - Peter Vanderlinden
publ Signet, $3.50, ISBN 0-451-16924-7 illustrated (Lord help us)
Both books rated "It's the least he deserves" by 4 out of 5 AFU readers.
Note: These 2 books SHOULD BE PURCHASED (don't wimp out and go to the
public library and GET THEM FOR FREE) as Peter needs the money.
----------------------------------------------------------------------
Rumor! Hal Morgan and Kerry Tucker
More Rumor! Hal Morgan and Kerry Tucker
----------------------------------------------------------------------
Big Secrets William Poundstone
Bigger Secrets William Poundstone
----------------------------------------------------------------------
The Dictionary of Misinformation Tom Burnam
More Misinformation Tom Burnam
----------------------------------------------------------------------
Books by David Feldman:
Why Do Clocks Run Clockwise? Who put the butter in butterfly?
Why do dogs have wet noses? How to win at just about everything
When Do Fish Sleep? Imponderables
Do Penguines have knees?
These are short subject books -- a couple of paragraphs are
devoted to each subject. Some like that format -- some don't.
----------------------------------------------------------------------
Books by David Michael Feldman:
"Birth control in Jewish law"
This book deals with marital relations and contraception. What
does it have to do with AFU? Your guess is a good as mine, but
it came up in the computer search for "David Feldman". It could
have been him, so it must be true. Or something like that.
----------------------------------------------------------------------
The Day that lightning chased the housewife and other mysteries of science
edited by Julia Leigh and David Savold
----------------------------------------------------------------------
The "Uncle John's Bathroom Readers" series (3 volumes) - Bathroom Reader
Institute, Inc.
----------------------------------------------------------------------
Piled Higher and Deeper: The Folklore of Campus Life Simon J. Bronner
Little Rock, Ark.: August House, 1990.
----------------------------------------------------------------------
Best of the Journal of Irreproducible Results
----------------------------------------------------------------------
Eccentric Lives and Pecular Notions (??? It was put out in 1990 by Bantam)
----------------------------------------------------------------------
Fads and Fallacies in the Name of Science - Martin Gardner 1952/1957
----------------------------------------------------------------------
The Devouring Fungus (Tales of the Computer Age) - Karla Jennings
----------------------------------------------------------------------
Bare-Faced Messiah - Russel Miller
(It's about L. Ron Hubbard NOT Grizzly Adams)
----------------------------------------------------------------------
The Journal of the Institute for Hacks TomFoolery & Pranks at MIT -
Brian M Leibowitz
----------------------------------------------------------------------
Mrs. Byrnes' Dictionary of Unusual, Obscure and Obsolete Words - ???
----------------------------------------------------------------------
Dictionary of Historical Slang - Eric Partridge
----------------------------------------------------------------------
High School - David Owen
David pretends to be a High School Student at the age of 27.
----------------------------------------------------------------------
Anomalies and Curiosities Of Medicine - Gould, George M. 1848-1922.
----------------------------------------------------------------------
Monkey On A Stick: Murder, Madness and the Hare Krishnas - John Hubner
and Lindsey Gruson. With a title like this, you'll get no sleep at night.
----------------------------------------------------------------------
Our Marvelous Native Tougue: The Live and Times of the English Language -
Robert Clairborne (Author of The Birth of Writing). Probably some college
student somewhere is suffering with the book as a text and here I am
recommending it as "lite" reading.
----------------------------------------------------------------------
You Know What They Say - Alfie Kohn.
Not quite an urban legend book, but should appeal to the same crowd.
Recommended for skeptics in general.
----------------------------------------------------------------------
Any current almanac, for those "factual" ULs
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
MAYBE RECOMMENDED:
Extraordinary Origins of Everyday Things"
(Terrys say "it seems okay, but it's kind of boring")
----------------------------------------------------------------------
Any issue of the WEEKLY WORLD NEWS (although issues with JFK or UFOs on
them are usually better than ones with farmers and 25 Ft grasshoppers)
----------------------------------------------------------------------
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
NOT RECOMMENDED:
Book Of Answers - New York Public Library Research Service.
TERRYs don't like it. It's boring, but it also says that the capital
of Turkey is Istanbul. JUST about everybody knows it's Ankara.
Anyway, a dumb mistake. (So there). TERRYs can be downright cruel.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
Myself and the following READERS of A.F.U are to blame for this list:
----------------------------------------------------------------------
"twcaps@dante.lbl.GOV" 30-MAY-1991
"Peter.Vanderlinden@Eng.Sun.COM" 30-MAY-1991
"AXM22@PSUVM.PSU.EDU" 30-MAY-1991
"wichers@husc.harvard.EDU" 31-MAY-1991
"bls@robin.svl.cdc.COM" 31-MAY-1991
"jsl@unix.cis.pitt.edu" 3-JUN-1991
"daniel@psych.toronto.edu" 3-JUN-1991
"cook@rpi.EDU" 4-JUN-1991
"cmdglv@pmvax.weeg.uiowa.EDU" 22-JUL-1991
----------------------------------------------------------------------

1371
txt_files/afu.faq Normal file

File diff suppressed because it is too large Load Diff

76
txt_files/afu_flam.for Normal file
View File

@ -0,0 +1,76 @@
STANDARD AFU REPLY FORM
To :_________________________
>From:_________________________
I have read your recent post concerning________________________________.
I regret that due to severe time constraints I am unable to respond to
your posting directly. However, I would like to advise you that I
believe that your posting:
__contains the moronic phrase:
____"It could have happened so it must be true"
____"Can you prove it did not happen?"
____"Prodigy is stealing my data!"
____"Port Out Starboard Home"
____"A poor dieing boy named Craig is..."
____"How many pull tabs does it take to..."
____"Furrfu!"
__violates commonly-accepted ____.signature size
net standards concerning: ____posting to subjects not of general interest
____editing of quoted material
____posting of copyrighted material
____posting several ULs as one GIANT UL
__contains an unacceptable ____logic
number of errors in: ____fact
____spelling/grammar
__is based on stereotypes of: ____race, ethnic, national origin
____gender differences
____sexual orientation / preferences
____regionalisms
____employer and/or school affiliations
____religious affiliation/non-affiliation
__is uninteresting because it ____has no UL content
____contains hackneyed expressions
____contains outright stupidities
____is inherently self-contradictory
____reflects inadequate intellectual
development or maturity
____reiterates points made better by others
____is a gratuitous attack on an obvious
provocateur
__reflects serious mis- ____the basic functioning of AFU
understandings concerning: ____the basic purposes of the INTERNET
____snuff films and/or Satanism
____the Weakly World News and other tabloids
____basic human nature
____the basic nature of computers
____other's interest in your thoughts
__is an unjustified, unprovoked and thoughtless response to my previous
posting, which was careful, moderate and well-reasoned.
<insert 4 LINE signature here>
PS: You are ____A St*p*d F*ck*ng B*st*rd
____not a TERRY
-----------------------------------------------------------------------------
Courtesy of Terry "Just another corporate stooge for Prodigy" Wood
-----------------------------------------------------------------------------
INTERNET: tjw+@pitt.edu BITNET: TJW@PITTVMS
"Laugh while you can, Monkey Boy!" - Lord "John" Warfin
"There can be only one!" - The Highlander
"There should have been only one. I want my money back!" - Terry

174
txt_files/afu_surv.gui Normal file
View File

@ -0,0 +1,174 @@
From: twcaps@tennyson.lbl.gov (Terry Chan)
Subject: AFU Survival Guide
Summary: Excellent Introduction to Posting on AFU
The following is a repost of Antony Cooper's excellent guide to
posting on AFU. Suggested reading.
Terry "But don't believe everything you read" Chan
---------------------------------------------------------------------------
AFU SURVIVAL GUIDE
27 February 1993
A brief guide that should enable newbies with something to contribute,
to do so without being flamed into submission.
**********************************************************************
* First, the usual DISCLAIMER: *
* ============================ *
* While this survival guide might taste like chicken, it does not *
* contain any rat's meat whatsoever. Also, it is such a turkey that *
* if you leave it out in the rain, it will die. It was not written *
* by Churchill or Disraeli (or was that Gladstone?), and Craig *
* Shergold does not want an excellent collection of survival guides. *
* The survival guide does not freeze, whether or not the Twinkie has *
* been boiled, and it does not cost two-fifty. It is not the script *
* of a snuff film about a CIA plot to transmit AIDS from humans to *
* monkeys, nor do gerbils have 100 words for it, and it will not *
* dissolve in Coke. Finally, the survival guide's pussy has not been *
* tickled on TV, nor has it been found drugged, disguised and hidden *
* in the lyrics of a Disney record played backwards. Film at 11. *
* *
* A FOAF has claimed that an impeccable source has assured them that *
* there are absolutely no in-jokes in this survival guide, and that *
* it is hilariously funny. *
* *
* While it would be nice if the CSIR had a passionate interest in *
* AFU, nothing contained herein reflects their opinion or position *
* on anything. I hope that the contents of this guide will ensure *
* your survival here, but I could be completely wrong. *
* Antony Cooper (acooper@nuustak.csir.co.za) *
**********************************************************************
It is essential that you understand Usenet's netiquette before you
post anything here. This probably sounds like trite and boring advice,
but while you might survive sending a botched and messy posting to
some newsgroups, you will not survive that easily here. There are
many postings made to several newsgroups that explain netiquette,
especially the groups news.announce.newusers, news.newusers.questions
and news.answers, which include regular postings such as "Answers to
frequently asked questions about Usenet" and "Emily Postnews answers
your questions on netiquette". Believe it or not (a possible motto
for this group), but reading these informative postings actually
help ......
Read the FAQ! While it might be a bloody long document, and while your
attention span might be measured in seconds (making the reading of the
FAQ a difficult and tedious process), there is a lot of very
interesting information contained therein. It is also a good guide as
to what you should not post.
Don't post in your first five minutes of gaining access to the
newsgroup. While you might know something about the subject under
discussion, you don't know what was said about the subject yesterday,
or the day before, or last week, or last month. For example, thanks to
about a hundred Americans who responded to a Canadian query about the
slogan "54 40 or fight", I now know about the dispute over the western
reaches of the USA/Canada boundary - but unfortunately, the responses
included about 20 disparate versions of the story. There are a few of
us here who have been reading this group for a while, at least since
last year, and it is amazing how often the same thread comes up over
and over. Of course, this is why there is a FAQ.
Remember, there are many thousands of people who will read what you
post, and quite a few of them will have encyclopaedias, dictionaries
and other reference works near at hand. While such books or CD-ROMs do
occasionally contain errors, you need to have reliable references to
dispute them.
Read the FAQ and watch your netiquette.
Watch your grammar and spelling. Poor grammar and poor spelling has
been known to make many posts ambiguous, if not actually
unintelligible. I always have a dictionary close at hand when working
on my computer, and while it will not eliminate every error that I
might make, it will at least reduce the frequency of my errors. It
also helps me understand those obtuse and ornate posts by the
imitators of John Fowles.
To understand some of the in-jokes here, you must know all about the
Star Trek series in great detail, though of course, you must not
actually be a fan of Star Trek, otherwise you might take this news
group (and others) far too seriously. Now, I don't catch all of the
Star Trek jokes because I dimly recall seeing only one or two episodes
of it (it was a sort-of rip off of the Star Wars movies, wasn't it?),
but such is life.
Speaking of which, don't panic if you do not catch all the jokes the
first time you read them - and don't post here asking for them to be
explained. After all, while you might think that you have been reading
news groups for a long time, you will probably be reading them for
years and years to come (that is, of course, if the Death of the Net
is not imminent), so let each joke reveal itself to you in the due
course of time. That way, you can savour each new revelation, and you
will have lots of things to look forward to in the years to come (or
are you one of those people who only play adventure games when you
have been told all the secrets on how to win?).
For example, certain terms are common here. You might be tempted to
enquire after the meaning of words such as the following:
Furrfu
FOAF
AFU
ObUL
T
Kibo
FAQ
While you might or might not be flamed for such a query, the responses
that you will elicit might not be as informative as you might have
anticipated. However, hidden in them might be the answer you desire
(These are also what are known as "in jokes"). Rather, let some other
newbie post the query, and you can chuckle at the responses they
receive (while you silently note the answers to your queries).
Relax, think about what you are posting, and rather describe the story
you wish to relate as a rumour rather than gospel fact, if indeed it
is. Try to make your posting interesting, informative and/or witty
(OK, so this posting fails those criteria). Don't adopt an inflexible
attitude on the story, otherwise your errors will be treated with
minimal kindness. Don't flame, unless you really know what you are
doing - even the net.deities have been known to misread a post and
flame in error. Try to keep the invectives under control.
Like similar newsgroups, this newsgroup is a bit of a clique with
its own culture, in-jokes and net.deities (are there any sociologists
out there studying life in a news group?), but it is always looking
for new participants to contribute new and interesting threads. So,
once you feel that you have caught the vibe of this group, trust your
instincts (if they are trustworthy), and contribute a great maiden
posting. If you are a bit nervous, you could always try it out on a
net.deity near you.
If you think you have an interesting variation on an urban legend
already noted in the FAQ, please feel free to share, subject to
the considerations mentioned above.
Don't brag about being the first newbie who has been diligent enough
to have studied the FAQ, the netiquette documents, the survival guide,
and the postings to this news group for months before posting - you
are not.
Some of the net.deities in this group might feel that this survival
guide is inappropriate as it will reduce the number of careless
newbies who post garbage without thinking, and hence some of them
might feel that it will take the fun out of this news group. However,
there is no danger of that as no one takes seriously advice proffered
on news groups, least of all advice on how to post. After all, its
worth what they pay for it.
[I don't worry about it. All the more reason to flame people when
they do end up posting garbage without thinking. - tc]
Happy AFUing!
Antony
--
Antony Cooper | Voice: +27 12 841 4121
acooper@nuustak.csir.co.za | Fax: +27 12 841 3037
INFOTEK, CSIR, Box 395, Pretoria, 0001, South Africa | ICBM: 25 45S 28 16E
[Posted with very minor tweaks by Terry Chan on 27 February 1993. First
edition posted 6 February 1993 by Antony Cooper.]

930
txt_files/aids-2.txt Normal file
View File

@ -0,0 +1,930 @@
The following articles are extracted from New Dawn magazine,
Volume No. 1 & 2. (C) Copyright April 1992. Subscription rates are
as follows: $30 for 12 issues, $5 sample; Foreign US$40 & US$7.
New Dawn, GPO Box 3126FF, Melbourne, 3001, Australia.
Shocking Revelations on AIDS Research by Our North American
Correspondent
Dr. Abdul Alim Muhammad, national spokesman for Minister Louis
Farrakhan and the Nation of Islam, dropped a bombshell on the
nation's capital at a mass rally held at All Souls Unitarian
Church on September 8. Although the event had been planned for
some time to celebrate the 10th anniversary of the Washington,
D.C. ministry of Dr. Muhammad, he turned the event into a report
on his recent fact-finding mission to the African nation of Kenya.
Dr. Muhammad startled the standing-room-only audience when he
announced that a research team working out of the Kenyan Medical
Research Institute, led by the Harvard-trained immunologist Dr.
David Koech, had made dramatic advances in the treatment of AIDS.
Dr. Muhammad also charged that the U.S. government was leading a
major effort by the international medical establishment to
suppress this groundbreaking research.
Among those who packed the church to hear Dr. Muhammad speak on
the theme "Can We Survive Genocide," were clergy from several
denominations along the East Coast, civil rights leaders,
community activists, leaders of the Nation of Islam, elected
officials and political leaders from Maryland, Virginia, and the
District of Columbia, and hundreds of ordinary citizens. The
introduction of Washington's former Mayor Marion Barry - the man
on whom the Bush administration spent millions to remove him from
office - brought the house to its feet in an extended ovation.
A Policy of Genocide
In his remarks, Dr. Muhammad quoted extensively from a 1985
article authored by Lyndon LaRouche, "The Looming Extinction of
the 'White Race'". In that piece, LaRouche documents that the
imperial policies intrinsic to oligarchism have set into motion
the self-destruction of the population levels and economies of
those "white" nations that have complicitly tolerated oligarchical
policies - most specifically the United States and Great Britain.
LaRouche states that since what the oligarchs call the "Great
White Race" is dying out at an accelerating rate, and threatening
the supremacy of the Anglo-American financial establishment, we
witness a fanatically Malthusian commitment to a policy of
genocide directed against people of colour; a genocide consciously
implemented through the conditionalities policies of the
International Monetary Fund (IMF).
"That," Dr. Muhammad charged, "is one of the reasons they've got
him locked up; because he's got the guts to tell the truth."
Dr. Muhammad went on to present extensive evidence that the policy
of deliberate genocide is fully operational. He described the
CIA's support for the cause of population control during George
Bush's tenure as Director of Central Intelligence, and reported
the contents of National Security Memorandum 200, written during
the Ford administration, which advised that the preservation of
U.S. political and commercial interests "will require that the
President and Secretary of State treat the subject of population
growth control in the third world as a matter of paramount
importance...." To the amazement of the audience, Muhammad
identified the authors of the internal memo as Henry Kissinger and
Gen. Brent Scowcroft, now Bush's national security adviser. (See
The New Dawn Vol.1 No.1, May, 1991)
Dr. Muhammad used the case of Brazil, which has the second largest
black population in the world, to prove that the memorandum was
being implemented. "Today in Brazil, 40% of the women of
childbearing age have been surgically sterilized with funds
provided by the USAID," he said, "and 90% of those sterilized
women are black."
He insisted that this genocide was the real agenda of Bush's New
World Order; that it not only motivated the invasion of Panama and
the kidnapping of Gen. Manuel Noriega, but also the continuing
murder of the nation of Iraq. He told the audience that these were
just the opening battles in the war of the advanced sector nations
of the North against the developing nations of the South. Dr.
Muhammad denounced George Bush as a wicked man who cherished his
membership in the satanic secret society Skull and Bones. He
reminded the audience that the "skull and bones" was also the
emblem on the flag flown by the slave traders who raided Africa,
as well as of the latter day pirates.
AIDS and 'population control'
Given the Anglo-American establishment's commitment to mass
murder, the effort to suppress the promising research of Dr. Koech
and his colleagues should come as no surprise to anyone, the
Nation of Islam leader said. In fact, he contended, there is
substantial evidence to indicate that AIDS was developed as a
race-specific population control measure. Dr. Muhammad ridiculed
the theory that AIDS originated when the virus made a species jump
from the African green monkey to the African population. "We lived
with the green monkey for thousands of years and never had any
problems. The green monkey isn't our enemy. The IMF is."
Dr. Muhammad, who is a trained surgeon, said he traveled to Kenya
to see for himself what the alpha interferon derivative, which
goes under the trade name Kemron, was really all about. Dr.
Muhammad reported that he interviewed the research team in their
laboratory, was permitted to review their data, and to examine
AIDS patients currently undergoing treatment with Kemron and with
a new, more advanced form of Kemron, the drug Immunex, which
contains a greater number of alpha interferon components than the
original drug. Dr. Muhammad stressed that although the new drug
was only a treatment and not a cure for the deadly HIV virus, he
was tremendously hopeful and encouraged by the dramatic
improvement in the condition of those undergoing treatment.
Dr. Muhammad introduced Dr. Barbara Justice, a well-known New York
City-based cancer surgeon who has sent 54 AIDS patients to Kenya
for treatment over the past year. Dr. Justice reported that 97% of
her patients showed marked improvement within weeks of beginning
treatment, and that most were able to regain some degree of
normalcy in their ability to function.
It has been almost impossible for anyone outside of Kenya
administering Kemron on an experimental basis in the to assess the
work of the Kenyan team, which has been treatment of AIDS since
1989, since it has been systematically blacked out of the
scientific literature. Dr. Koech was to present his data, first at
the International AIDS Conference in the United States in 1987,
and then again at the 1991 AIDS Conference in Italy. On both
occasions, his invitation was inexplicably withdrawn.
Last year, Dr. Koech decided to take his data directly to the U.S.
medical community, and an extensive U.S. lecture tour was planned.
That tour was abruptly cancelled when the State Department refused
to issue Dr. Koech the necessary permission to enter the United
States.
This is certainly not the first time that important AIDS research
has been suppressed. Quite the contrary, it is part of a
continuing criminal pattern of lies and cover-up. The importance
of a rapid evaluation of Dr. Koech's work with Kemron and Immunex
is obvious. Currently, the only treatment available to AIDS
victims is the drug AZT; however, AZT therapy is prohibitively
expensive and carries with it extremely destructive side effects,
especially with prolonged use. Additionally, a recent study
conducted by the U.S. Army showed that, for unexplained reasons,
AZT therapy is not only largely ineffective in the treatment of
blacks, but that, in fact, AZT seems to aggravate symptoms in an
alarming number of black patients.
Kenya's President Daniel Arap Moi clearly finds the Koech team's
findings to be convincing. He recently announced that his
government was building a factory to allow the mass production of
alpha interferon.**
======================================================================
AIDS - Man-Made Holocaust
The fact that AIDS is a man-made virus created in U.S.
laboratories has been covered up
By JASON JEFFREY
"America should withdraw from the Mediterranean, Europe and all
foreign bases and it should save that money to create jobs for 12
million unemployed Americans, and contribute towards the
elimination of the diseases it manufactured like AIDS which was
produced by the CIA at its laboratories and tested on American
prisoners who took the virus with them to the outside world when
released from prison and then it spread throughout the world."
- Muammar Al-Qadhafi speaking at the International Conference for
Peace in the Mediterranean, 4-6 May, 1990.
On July 4, 1984, the Indian daily Patriot published a
horrifying report that the disease AIDS was believed to
have originated from a virus created in the laboratories
at the U.S. germ warfare research institute at Fort
Detrick, Maryland. The editor explained that the
information had come from a well-known American scientist
and anthropologist who expressed the fear that India might
face a danger from the disease in the near future. The
American had to remain anonymous. He was obviously in
danger for having disclosed so deadly a secret. At that
time, when the full horror of the incurable disease was
not known Patriot reported that the World Health
Organisation believed AIDS posed the gravest threat to the
entire population of the world. More on the World Health
Organisation later. The British Sunday Express, 26
October, 1986, with banner headlines, and an "exclusive"
label, announced "AIDS made in lab. shock." The front-page
story said that the virus was created during laboratory
experiments which "went disastrously wrong." It added that
a massive cover-up had kept the secret from the world. The
Sunday Express quoted a British expert, Dr. John Seale,
who first reported his conclusion that the virus was
man-made last August, 1986, in the Royal Society of
Medicine Journal. He said that his report was met with a
"deadly silence" from the medical profession, and that
made him very suspicious. The editor of the Journal
agreed, according to Dr. Seale, that "it sounded like a
conspiracy of silence." The second expert quoted by the
Sunday Express, was Prof. Jacob Segal, retired Director of
the Institute of Biology in Berlin. It said, "our
investigators have revealed that two U.S. Embassy
officials made a two-hour visit to Prof. Segal at his home
two weeks ago questioning him about what he knows, what he
thinks, where he got his information, and what he intends
doing with his report." The Professor told the reporters,
"one said he was a historian, and the other said he was a
political consul. But I am positive they were from the
CIA, and that they were deeply concerned that the cover-up
over the origin of AIDS was going to be exposed." I told
them I had known that in the mid-70s experiments were
being carried out at Fort Detrick, where the U.S. Army
Medical Research Command has its headquarters, on
volunteer long-term prisoners who were promised their
freedom after the tests. Almost certainly the scientists
were unaware of the extent of their terrible creation -
the AIDS virus.
WHO Involvement?
The third expert quoted in the Sunday Express was Dr.
Robert Strecker, an internist and gastroentarologist from
Glendale, California, who stated "it must have been
genetically engineered." Strecker believes, after years of
exhaustive research, that the AIDS virus is indeed
man-made. Strecker has alleged that AIDS was engineered at
the request of the World Health Organisation and other
scientific groups who, according to Strecker, injected the
disease during preventative vaccines. WHO, he says, along
with the International Agency for Research on Cancer and
The National Institute on Health, requested the production
of a virus that would attack the immune system's T-cells.
AIDS, he says, is a hybrid of two animal viruses - bovine
leukemia (found in cattle) and a sheep brain virus called
visna. This new virus was given as vaccinations in Haiti,
Brazil, Africa and the Caribbean by WHO in a 13-year
campaign against smallpox in Third World nations, reports
indicate. Strecker, in his 97-minute videotape, "The
Strecker Memorandum," cites specific documentation
supporting theories that AIDS is a result of that direct
request. For example, from Volume 47 of Bulletin of the
World Health Organisation (1972), page 259: "The effects
of virus infection of different cell types (e.g.,
Macrophages, T and B lymphocytes) should be studied in
greater detail with morphological changes perhaps serving
as an indication of functional alteration..." "The
possibility should also be looked into that the immune
response to the virus may itself be impaired if the
infecting virus damages more or less selectively the cells
responding to the viral antigens..." In fact, a May 11,
1987 frontpage article in the London Times, headlined
"Smallpox Vaccine Triggered AIDS Virus," said WHO was
investigating new evidence suggesting that "immunization
from the smallpox vaccine Vaccinia awakened the
unsuspected, dormant human immuno defense virus infection
(HIV)." Vaccinia was the actual vaccine given as smallpox
deterrents during the WHO project. Were the AIDS
infections intentional, accidental or coincidence?
According to Strecker in his "Memorandum," a key part of
the actual study "was to be the time relationship between
infection and antigen administration," which suggests WHO
officials - and other agencies who were directly dependent
on the United States government for research grants - had
to have known. The denials were not long in coming. But
the British Sunday Telegraph exposed itself. It said the
story (the Sunday Express article) was invented by the
Russians "to smear the Americans," and recalled that it
had appeared in the Soviet journal, Literary Gazette. It
said this paper based its report on the Patriot - and that
the Patriot report did not exist! Professor Segal
describes as "ludicrous and scientifically incredible" the
theory that the virus came from African green monkeys. One
thing is certain: the controversy surrounding the AIDS
virus will not die.
A Weapon Against Black People?
Zear Miles, a Black industrial engineer, who has studied
the AIDS virus and its origins for about six years has
stated that he has proof from various documentation and
letters from other AIDS researchers to prove that the
virus was made in an American military lab as a means to
suppress Blacks. In his document entitled "Rape Africa",
Miles researched the origin of the AIDS virus from 1952,
when the federal government had enough blood types and
characteristics of every nationality in the world up to
the King Alfred plan which called for the extinction of
Blacks in national security emergencies. Miles learned
that through National Security Council Memorandum 46,
dated 1978, which called for a possible way to gauge and
control the impact of the growing Black movement, the
government was researching possible ways to suppress Black
hostility toward the authorities. Later called the King
Alfred plan, the scheme called for the extinction of
Blacks by the year 2000 with an AIDS-like virus. Miles
said he also gauged the increasing number of AIDS cases in
which the number of Black contractors have gone up
significantly compared with Whites, citing that the AIDS
virus attacked a Black person's immune system and
destroyed it in six weeks as opposed to a White person's
time of six months.
The Evidence
What is the evidence available to the layman. First, the
initial cases were reported in New York and there is no
dispute that Fort Detrick was working on immunological
defence against infection. The British Guardian reported
on October 27, 1986, that in 1969 evidence was given to a
Washington Appropriation Committee that "within the next
five or ten years it would probably be possible to make a
new infective micro-organism which would differ from any
known disease causing organism. Most important, that it
might be refractory to the immunological and therapeutic
properties on which we depend to maintain our relative
freedom from infectious disease." "Refractory" means,
according to the Oxford Dictionary, "not yielding to
treatment." AIDS answers precisely to that description.
On September 24, 1986, the Daily Telegraph reported from
Washington, "Enough of a debilitating virus to infect the
whole world, disappeared from an American germwarfare
laboratory five years ago, and has never been traced, an
environment group claimed yesterday in a Washington Court
action aimed at halting biological weapons research." In
1968, the J.D. Bernal Peace Library organised a conference
on the dangers of biological warfare research. Ritchie
Calder said then that among the weapons being stockpiled
were some designed to bring about genetic changes. He said
the "doomsday bug was under wraps" and that there was a
conspiracy of silence about germ weapons because the
implications were so frightening." He told the British
Daily Mirror after his address that "somewhere in the
world a germ is being cultured to which we would have no
natural resistance and to which there would be no sure
defence." A precise description of AIDS. The British
Observer, on June 30, 1968, quoted from an article in the
Journal of General Microbiology by W.D. Lawton of Fort
Detrick, and R.C. Morris and T.W. Burrows of the British
microbiological research station at Porton. One paragraph
said, "By engineering the genetics of individual strains,
microbiologists aim to produce a single strain containing
the most deadly combination of properties." Again, a
description of AIDS. The article says that at that time
Porton, according to the government, was concerned only
with defence applications of research, but Fort Detrick
was only committed to developing microbiological weapons
for offence. The Japanese carried out germ warfare
research in occupied China during the war. Some of these
criminals were captured by the Soviets and duly tried and
sentenced. Others were given immunity by the Americans and
taken to work at Fort Detrick. In 1969, after the AIDS
virus was loose, negotiations began on a Convention
banning biological weapons, and it came into force in
1972. In its first review conference in 1980, it was
reported that 80 countries had ratified. But there is no
provision in the Convention to ban research or for
verification. Nichola Sims, who has written a book on
biological disarmament, wrote recently, "the failure of
the Convention to impose any restrictions even on
'offensive' biological warfare research, has been
frequently criticised." And she refers to popular fears
that a "super germ breakthrough in the means of waging
biological or toxin warfare is just around the corner and
may induce the possessor of such a germ to break out of
the Convention." She quotes Dr. Robert K. Mikulak of the
U.S. Arms Control and Disarmament Agency for the statement
that "there is no justification for classified military
research on the question in any country." But so far there
is no inspection or verification. A much more recent
accusation against the United States for the manufacturing
of the AIDS virus comes from the Libyan UN Ambassador, Mr.
Ali Ahmed Elhouderi. On January 9, 1992, at a press
conference, he stated that the AIDS virus was produced in
a laboratory probably as a weapon. He said, "We think it
is man-made and it was done in laboratories. And it was
not, as suggested, coming from monkeys in Africa." He also
suggested that the virus had been manufactured at the time
of the Vietnam War. These statements fit perfectly into
place as research would have been carried out at that time
at Fort Detrick for offensive purposes against the North
Vietnamese.
AIDS Was Man-Made
On all the circumstantial evidence, the layman will almost
certainly reject the idea that the escape of the man-made
AIDS virus was the result of a disastrous error during
innocent civilian research. We can assuredly conclude that
it was the result of germ warfare research, and the finger
of guilt points to the United States. The scientists
could not have visualised that they would let loose a
so-far incurable disease that may and possibly will wipe
out millions, particularly in the Third World, where the
majority of the world's population lives. Never was the
need greater for the nations to drop their differences and
to concentrate all their skill and resources in a
world-wide battle against this terrible threat, and to end
the horror of germ warfare research.**
======================================================================
The Mystery of Skull Valley
By NIKOLAI FILIPPOV
Because of an error made by an airman testing a new germ weapon, a
deadly virus attacks the population of a small town in highland
Utah, USA. An incurable disease begins to kill people like a
plague epidemic. In an attempt to cover up the traces of their
crime, the military authorities artificially cause a landslide
that buries the town and doom chance survivors to lifelong
isolation.
This is the plot of Vector, a novel by Henry Sutton, an
American author. This book is based on dramatic events
during which the victims were fortunately not people but
animals. March 14-20, 1968 was a black week for American
farmers grazing sheep in the remote pasturelands of
semi-desert Skull Valley, Utah. About 6,500 sheep died
there in those seven days under mysterious circumstances.
Even more of a mystery was that people, cattle and other
animals in the area were unscathed. Everybody - farmers,
residents of Utah, journalists - felt certain that the
accident was linked to the US Army chemical and
bacteriological testing ground in Dugway with an area of
several thousand square kilometres in the vicinity of
Skull Valley. Indeed, at that very time the thousands of
Dugway employees were carrying out large scale experiments
in preparation for further escalation of the chemical war
and the start of a germ war in Vietnam. For a whole year
the Defence Department emphatically denied that animals in
Skull Valley were being affected by the chemical or
biological agents disseminated in the atmosphere during
the test. In an attempt at a cover-up, experts at the
proving ground advanced hypotheses which must have seemed
untenable even to laymen about the sheep having been
killed by poisonous plants or a natural epizootic.
However, an inquiry by Utah authorities in collaboration
with veterinarians and health experts compelled the
Pentagon to admit its responsibility for the death of the
sheep. Even so, no one at Dugway was punished. The blame
for a terrible crime posing a real threat to people's
health due to a gross violation of safety standards in
conducting tests was placed on an unfortunate accident.
According to the official version formulated under the
direction of the U.S. military authorities, a test of
TMU-28/B spray tanks with nerve agent VX, was carried out
at Dugway on March 13, 1968. The gas was dispersed from an
F-4E jet bomber by means of two spray tanks with a total
capacity of 1,200 litres. The bomber flew at an altitude
of 40 to 45 m. During the test something went wrong with
one of the tanks (or so the version ran), and besides, the
direction of the wind varied, with the result that part of
the nerve gas was carried beyond the proving ground. A
cloud of aerosol VX allegedly contaminated pasturelands on
an area of 400-500 sq. km. Skull Valley was not the only
area where sheep died, for a cloud of aerosol VX reached
Res Valley, killing sheep 70 km away from where the poison
gas had been released. Anyone who has read publications
dealing with the accident in Skull Valley and Res Valley
is bound to detect a contradiction between the military
authorities' version and the facts. The Pentagon has yet
to explain why a whole year passed before it made up its
mind about what chemical or biological agent caused the
death of the sheep outside Dugway. If the Dugway test had
to do only with VX, then that gas was the only cause of
the sheep's death and this could have been stated at once.
There is reason to presume that over a short period
experiments were carried out at Dugway involving a whole
range of poison gases and biological agents. But it is
logical to suppose that even in such a contingency experts
should know well the properties and casualty effects of
the test materials. And this implies that researchers must
have had no difficulty in ascertaining the nature of the
agent which killed so many sheep. The official story of
the experiment of March 13, 1968, says that the wind
carried beyond Dugway, in the form of vapours and highly
dispersed aerosol, a mere nine kg, or 0.8 per cent, of the
total amount of VX gas to be dispersed. Field chemical
control cannot ensure such a degree of accuracy. But the
authors of the version needed to cite some figure in order
to make people believe that the sheep had been killed by a
nerve gas. At the same time, the Pentagon wanted to
conceal from the public the real danger posed by chemical
weapon tests in the atmosphere to residents of Utah and so
it withheld information about the actual amount of gas
released over Skull Valley. The Pentagon officials
suggested that the contamination level in the Skull Valley
pastureland where deaths occurred among sheep averaged a
mere 0.02 gram per hectare. Let us note by way of
comparison that to kill humans, it would be necessary
according to U.S. data available to disseminate from one
to three kilograms of VX per hectare of target, or 100
thousand times more than the contamination level in Skull
Valley given in the official version. Reports said that in
a flock totalling 2,800 sheep, 2,500 or 90 per cent, were
killed. No such effect is possible where the VX
contamination level is 0.02 gram per hectare. A
publication put out by the Dugway proving ground said that
during the test on March 13, 1968, the greatest distance
at which VX drops spilled on the ground had been 5.4 km
and not 70 km, as the official version would have it. The
Pentagon's information on one and the same fact varies
from document to document and from period to period.
Surely this shows that the version is false. A
contaminated cloud spreading wide in the atmosphere only
retains vapours and minute particles of aerosol which do
not settle on the ground and can be inhaled. It follows
that had such a cloud really floated over Skull Valley, it
would have caused inhalational casualties in other animals
as well, including cattle and horses, but no such thing
happened, according to documentary evidence. In the early
days after the accident, before the hypothesis about VX
was advanced, doubts were expressed even by Brig. Gen.
William Stone. He rightly asked why the gas had only
killed sheep without affecting people. There were also
other moot points. Why were the diseased sheep shot dead?
Why was no attempt made to save them by evacuating them to
an uncontaminated area or by treating them with atropine
or other antidotes? Marr Fawcett, a veterinarian of Utah,
refused to believe that the sheep had been poisoned with
VX, for in that case many of them could, in his opinion,
have been saved by means of antidotes. Dr. Kent Van
Kampen, a veterinary pathologist in Utah, said in April
1968, shortly after the accident, that as early as March
17, 1968, the supposition that the sheep had been hit by a
chemical poison affecting the nervous system could have
been refuted without difficulty since all symptoms of such
poisoning were lacking. The death of an animal poisoned
with a nerve gas such as VX is accompanied by spasms and
paresis of muscles in the limbs. Yet judging by what sheep
herders said in the early days of the inquiry into the
accident, dying sheep had shown no signs of spasms. True,
later on someone saw to it that a videotape recording
allegedly illustrating the Skull Valley accident was
projected widely. The tape showed the death of a single
sheep shaking with spasms as a group of civilians looked
on. One year after the accident, Kent Van Kampen and Marr
Fawcett contributed in collaboration with other experts of
Utah an article to the Journal of the American Veterinary
Medical Association setting out the causes and
circumstances of the sheep's death in Skull Valley, their
version tallying with the Pentagon's. There was a footnote
saying that in writing their article, the authors had
enjoyed expert assistance (it is easy enough to guess what
kind of assistance) in particular from Dr. Mortimer
Rothenberg, the science director at Dugway, and Dr.
Bernard MacNamara of Edgewood Arsenal, the chief U.S. Army
centre for the development of chemical and germ weapons.
We might as well note at this point that shortly after the
sheep's death in Skull Valley Dr. Rothenberg, trying to
exonerate Dugway from blame for the accident, declared
that the symptoms displayed by the sheep had nothing
whatever in common with those of nerve gas poisoning. And
so, it took the Pentagon a year to invent an explanation
for the sheep's death and make the civilian experts
mentioned above present its version as their own, thereby
striking a bargain with their conscience. The videotape
which showed a sheep's death from VX was intended to serve
the same purpose. But the forgery was too crude for
knowledgeable people to mistake it for the truth. They
realised at once that the "documentary" showed a sheep
injected with a nerve gas by means of a syringe, that is,
in the same way as this is done in demonstrating the
effect of nerve gases on animals. They deduced this from
the absence of any other living or dead sheep on the
screen as well as from the presence of people wearing no
gas masks or protective clothes, whereas safety
regulations forbid anyone to enter without taking these
precautions in an area contaminated by VX to a degree
killing livestock. There is no such ban where a poison gas
is injected into the body of an animal outside a
contaminated area. A further fact worthy of note is that
the worker's teams which buried the dead sheep had no gas
masks on, judging by other videotapes and various
photographs. This is permissible only when the nature of
an agent which has caused the death of animals is known
for certain. Furthermore, it is necessary to note that the
agent used was completely harmless to humans. This detail,
like the others cited above, indicates that the sheep in
Skull Valley were killed by something other than nerve
gas. The death of livestock so far away from the testing
ground, as in the case of Skull Valley, could only be
caused by a biological agent. Experts could establish
without difficulty that nine litres of biological agent is
enough to generate a pathogenic aerosol cloud five km
long, two km deep and 100 m high. One litre of aerosol
cloud could contain several hundred units of pathogen.
Such a cloud can sail many dozens of kilometres without
losing its casualty effects. Consideration of the death
rate of biological agents during the drift of aerosol
particles in the atmosphere makes no difference as far as
the main conclusion is concerned. Poison gas tests
according to regulations in force at Dugway are generally
conducted in the morning to ensure that enough daylight
remains for collecting data on the results of tests and
cleaning the test site. The dissemination of VX on March
13, 1968, is alleged to have been carried out one hour
before sunset. Evening experiments are particularly
typical in the case of biological agents, for researchers
are careful to preclude the disastrous impact of sunrays
on pathogens. The year 1968, when the Skull Valley
accident occurred, has gone down in history as the peak of
U.S. chemical warfare in Vietnam, Laos and Kampuchea. In
thelate 1960s, the Pentagon worked at a frantic pace to
develop new chemical and germ weapons. A report by the
House Committee on Science and Astronautics said that in
the years preceding the accident, the Pentagon had been
engaged in a vast programme for germ weapon testing. The
tests were conducted at several military testing grounds,
on ocean islands, in the Panama Canal zone, Alaska, New
York City and San Diego as well as on airfields, in
subways and on highways. The Dugway test made on March 13,
1968, or somewhat earlier could be one of those tests. It
is reasonable to suppose that during that test use was
made of biological agents based on a virus selectively
killing sheep without doing any harm to humans. It could
be visna, a virus which has been intensively studied since
the late 1950s in several research centres, including Fort
Dettrick, Maryland, then the main U.S. centre for the
development of germ weapons. No visna-caused diseases have
been recorded among humans. This virus hardly affects
cattle, horses or other animals. Its properties in this
respect coincide entirely with those of the agent
responsible for the Skull Valley accident in 1968. Visna
affects the central nervous system of sheep, robbing their
body of immunity. The symptoms are progressive weakness,
shortness of breath, a wobbly gait, sagging withers and a
drooping head. The end affect is paresis and paralysis of
the skeletal muscles and then death. Similar symptoms were
registered in sheep affected with the Skull Valley
disease. The disease caused by visna is incurable. This
explains why the epidemiological service of Utah did the
right thing by deciding to slaughter the diseased sheep.
No antidotes could have helped the animals in the least
and were not used, either. If during the March 1968 tests
at Dugway visna was used as a simultant modelling the
properties of germ weapons, it is clear why the men who
buried the dead sheep used no gas masks or protective
clothes, since visna is harmless to man. And this invites
another conclusion: at that time, the nature of the agent
which affected the sheep was known to at least a small
group of people in charge of removing the effects of the
accident. The establishment of investigation committees
was merely designed to conceal the real objectives and
tasks of the Dugway experiments from the public. The
mystery of those criminal experiments has begun to come to
light in recent years. Competent scientists consider that
visna was used in the United States for genetic
engineering work which resulted in creating HIV, a
chimeric virus causing an incurable infectious disease of
man known as AIDS. Research into HIV at the molecular
level has shown that 60 per cent of its genome is
identical with that of visna and the rest is a built-in
nucleotide sequence isolated from the genome of another
retrovirus, HLTV-I. HIV, or the pathogen of AIDS, was
designed in U.S. genetic engineering laboratories on
instruction from the Pentagon. The purpose of this virus
is to augment the U.S. germ (biological) warfare potential
by acquiring a capability for depriving an enemy
population of vitally important immunity at the threshold
of a major or local armed conflict. The conclusion about
the complicity of the U.S. military authorities in the
appearance of AIDS, the new dangerous disease which
affects humans, is shared by John Seale of Britain, Jacob
Segal of Germany, Robert Strecker of the United States and
other noted scientists and experts who have carefully
analysed available scientific data. [See New Dawn Vol.2,
No.1] For the time being, they have discounted the events
and facts connected with the Skull Valley accident.
Nevertheless, they have come to the unanimous conclusion
that in designing HIV visna was made use of. Dr. Seale has
said that a scientist who wanted to evolve a virus capable
of destroying man's immunity system and provoking a
disease similar to AIDS would have to resort to visna.
The "patent" for inventing HIV should be issued to the
United States because it was there that the virus was
developed and also because Americans were the first
victims of AIDS. The disease, which broke out in New York,
was carried to other big cities in the United States and
then to other countries and continents. Its virus was
transmitted by infected Americans serving at overseas
military bases. Besides, AIDS was contracted in the United
States by Australian and European tourists vacationing
there. HIV spread to Middle East and other Arab countries
which imported blood from donors stricken with AIDS. In
October 1986, John Seale quoted during an interview with
the Guardian an extract from a report prepared by the
Pentagon in 1969. It said that in the next five to ten
years an infective micro-organism might be evolved that
would differ substantially from all pathogens known so
far. Its most important property, the report said, would
consist in attacking the immune system and internal organs
on which the ability of the human body to resist
infectious diseases depends. Consequently, the AIDS
pathogen was deliberately created and development was
planned and funded. The test at Dugway which killed so
many sheep in Skull Valley turned out to be part of the
Pentagon's programme for designing a new biological agent,
the AIDS pathogen.**
======================================================================
AIDS: As Biological & Psychological Warfare
By WAVES FOREST
It is hard to imagine that a cure for AIDS would be withheld for
economic reasons alone. Could there be some other motive?
Despite repeated denials from Defense Department
officials, allegations persist that AIDS is a genetically
altered virus, which has been deliberately released to
wipe out homosexuals and/or non-whites in the U.S. and
reduce populations in Third World countries. At first
glance it seems like the epitome of paranoia to accuse the
military of conspiring to exterminate citizens of their
own country, and even some of their own troops. However,
the vast majority of military personnel could be
completely unaware of such a plot in their midst, while a
relative handful of traitors in key positions could
conduct it under cover of classified operations. And the
circumstantial evidence is actually quite compelling, that
the AIDS virus was artificially engineered, and planted in
several different locations at about the same time through
vaccination programs, and possibly blood bank
contamination. At a House Appropriations hearing in 1969,
the Defense Department's Biological Warfare (BW) division
requested funds to develop through gene-splicing a new
disease that would both resist and break down a victim's
immune system. "Within the next 5 to 10 years it would
probably be possible to make a new infective
micro-organism which would differ in certain important
respects from any known disease-causing organisms. Most
important of these is that it might be refractory to the
immunological and therapeutic processes upon which we
depend to maintain our relative freedom from infectious
disease." (See A Higher Form of Killing: The Secret Story
of Chemical and Biological Warfare by R. Harris and J.
Paxman, p.266, Hill and Wang, pubs.) The funds were
approved. AIDS appeared within the requested time frame,
and has the exact characteristics specified. In 1972, the
World Health Organisation published a similar proposal:
"An attempt should be made to ascertain whether viruses
can in fact exert selective effects on immune function,
e.g. by... affecting T cell function as opposed to B cell
function. The possibility should also be looked into that
the immune response to the virus itself may be impaired if
the infecting virus damages more or less selectively the
cells responding to the viral antigens." (Bulletin of the
W.H.O., vol. 47, p.257-274.) This is a clinical
description of the function of the AIDS virus. The
incidence of AIDS infections in Africa coincides exactly
with the locations of the massive W.H.O. smallpox
vaccination program in the mid-1970's (London Times, May
11, 1987). Some 14,000 Haitians then on UN secondment to
Central Africa were also vaccinated in this campaign.
Personnel actually conducting the vaccinations may have
been completely unaware that the vaccine was anything
other than what they were told. A striking feature of
AIDS is that it is ethno-selective. The rate of infection
is twice as high among Blacks, Latinos and Native
Americans as among whites, with death coming two to three
times as swiftly. And over 80% of the children with AIDS
and 90% of infants born with it are among these
minorities. "Ethnic weapons" that would strike certain
racial groups more heavily than others have been a
longstanding U.S. Army BW objective. (Harris and Paxman,
p.265) Under the current U.S. administration biological
warfare research spending has increased 500 percent,
primarily in the area of genetic engineering of new
disease organisms. The "discovery" of the AIDS virus
(HTLV3) was announced by Dr. Robert Gallo at the National
Cancer Institute, which is on the grounds of Fort Detrick,
Maryland, a primary U.S. Army biological warfare research
facility. Actually, the AIDS virus looks and acts much
more like a cross between a bovine leukemia virus and a
sheep visna (brain-rot) virus, cultured in a human cell
culture, than any virus of the HTLV3 group. The closest
thing in this case to a "smoking test tube" so far is the
AIDS virus itself. If it was possible for such a
monstrosity to occur naturally it would have done so ages
ago and decimated mankind at that time. Some other life
form would presently be in control of this planet
(assuming that is not already the case). The Hepatitis B
vaccine study in 1978 appears to have been the initial
means of planting the infection in New York City. The test
protocol specified non-monogamous males only, and
homosexuals received a different vaccine from
heterosexuals. At least 25-50% of the first reported New
York AIDS cases in 1981 had received the Hepatitis B test
vaccine in 1978. By 1984, 64% of the vaccine recipients
had AIDS, and the figures on the current infection rate
for the participants of that study are held by the U.S.
State Department of Justice, and "unavailable." The AIDS
epidemic emerged full-blown in the three U.S. cities with
"organised gay communities" before being reported
elsewhere, including Haiti or Africa, so it is
epidemiologically impossible for either of those countries
to be the origin point for the U.S. infections. Another
indication AIDS had multiple origin points is that the
14-month doubling time of the disease cannot nearly
account for the current number of cases if we assume only
a small number of initial infections starting in the late
1970s. Before dismissing the possibility that a U.S. Army
BW facility would participate in genocide, bear in mind
that hundreds of top Nazis were imported into key
positions in the U.S. military-intelligence establishment
following WWII. U.S. military priorities were then
reorientated from defeating Nazis to "defeating" communism
at any cost, and strengthening military control of
economic and foreign policy decisions. (See Project
Paperclip by Clarence Lasby, Atheneum 214, NY, and Gehlen:
Spy of the Century by E.H. Cookridge, Random House.)
There's no proof those Nazis ever gave up their longterm
goals of conquest and genocide, just because they changed
countries. Fascism was and is an international phenomenon.
It's not as if this was a total reversal of previous U.S.
military policy, however. Hitler claimed to have gotten
his inspiration for the "final solution" from the
extermination of Native Americans in the U.S. For that
matter the first example of germ warfare in the U.S. was
in 1763 when some of the European colonists gave friendly
Indians a number of blankets that had been infected with
smallpox, causing many deaths. One indication of the
actual U.S. military priorities regarding BW was the
importation of the entire Japanese germ warfare unit
(#731) following WW II. These people killed over 3,000
POWs, including many Americans, in a variety of grisly
experiments, yet they were granted complete amnesty and
given American military positions in exchange for sharing
their research findings with their U.S. Army counterparts.
Consider also the callous attitude displayed by top
military officials toward veterans suffering from the
after-effects of exposure to Agent Orange and radiation
from nuclear weapons tests. In fact, since the end of WW
II over 200 experimental BW tests have been conducted on
civilians and military personnel in the U.S. One example
was the test spraying from Sept. 20-26, 1950 of bacillus
globigi and syraceus maracezens over 117 square miles of
the San Francisco area, causing pneumonia-like infections
in many of the residents. The family of one elderly man
who died in the test sued the government, but lost. To
this day, syraceus is a leading cause of death among the
elderly in the San Francisco area. Another case was the
joint Army-CIA BW test in 1955, still classified, in which
an undisclosed bacteria was released in the Tampa Bay
region of Florida, causing a dramatic increase in whooping
cough infections, including twelve deaths. A third example
was the July 7-10, 1966 release of bacteria throughout the
New York subway system, conducted by the U.S. Army's
Special Operations Division. Due to the vast number of
people exposed it would be virtually impossible to
identify, let alone prove, the specific health problems
resulting directly from this test. Despite the loyalty of
the vast majority of U.S. military personnel toward their
country, there are clearly some military officials who
have very different intentions, and they occupy high
enough positions to impose their priorities on military
programs and get away with it, so far. The first detailed
charges regarding AIDS as a BW weapon were published in
the Patriot newspaper in New Delhi, India, on July 4,
1984. It is hard to say where the investigations of this
story in the Indian press might have led, if they had not
been sidetracked by two major domestic disasters shortly
thereafter: the assassination of Indira Gandhi on Oct. 31
and the Bhopal Union Carbide plant "accident" that killed
several thousand and injured over 200,000 on Dec. 3.
Apparently, homosexuals were an initial target in the U.S.
because their sexual practices would help in the rapid
spread of the disease, and because it was correctly
assumed that very few non-homosexual citizens would pay
much attention during the early years of the epidemic.
Also, the stigma of a "homosexual disease" would interfere
with rational analysis and discussion of AIDS. Bear in
mind that homosexuals were among the first to be
exterminated in Nazi Germany, before Jews and other
minorities, so fewer citizens would object. The details
of precisely how the AIDS virus was synthesized, mass
cultured, and spread by incorporating it into vaccination
programs are available but fairly intricate. Evil is hard
to confront, especially on the preposterous scale we have
here. If you acknowledge the presence of those who think
their only hope for survival is to kill off two thirds of
all the other kinds, and their ability to manage it, you
then pretty much have to do something about it.
Abridged from Now What #1.**
======================================================================
Immunex
The North American-based Nation of Islam (NOI) led by Minister
Louis Farrakhan launched an offensive in its battle against the
deadly "man-made" AIDS virus during its recent Saviours' Day
weekend. The following report is courtesy of The Final Call.
From the rostrum of Christ Universal Temple here, the
Honorable Louis Farrakhan announced that the NOI has
acquired exclusive distribution rights to the AIDS
fighting drug Immunex, an oral alpha-interferon treatment
developed in Kenya. "I just got a call from our chief of
staff 3 minutes before I came on the rostrum," Minister
Farrakhan said, regarding the confirmation of the Immunex
agreement that came from Leonard Muhammad in Kenya. "The
Nation of Islam is announcing to you that we have the
exclusive distribution rights of Immunex throughout the
United States of America. "As of this day," he continued,
"Min. Alim will still teach, but he is now the Minister of
Health and Human Services for the Nation of Islam." Dr.
Alim told the cheering audience that the war against AIDS
is being won but total victory will not come "until we
deal with those responsible for making the AIDS virus."
Since the early 1970s under the Nixon administration, he
said, the official policy of this government has been to
commit genocide against non-white people around the earth.
That policy continues under the administration of
President George Bush, he said. Dr. Muhammad and former
Final Call Editor-in-Chief Abdul Wali Muhammad were sent
to Kenya by Minister Farrakhan last year on a fact-finding
tour regarding the drug Kemron. While there, the NOI
representatives learned about Immunex. Both drugs have
shown remarkable effects in relieving AIDS symptoms, but
the drugs have received very little media coverage in the
U.S. "We would like FDA approval," said Min. Farrakhan,
"however we can't wait. We will take any risk, bear any
burden to free our people of a man-made disease designed
to kill us all." The Minister added that the drug will be
offered to all who need it "regardless of race, creed or
colour."**

838
txt_files/aids-war.txt Normal file
View File

@ -0,0 +1,838 @@
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150
August 16, 1990
AIDSPLOT.ASC
AIDS as a Weapon of War
by Dr. William Campbell Douglas, M.D.
Introduction & Comments by Jim Shults
INTRODUCTION AND COMMENTS
I must admit I am just a little gun shy of doing this
particular article. The reason is pretty obvious. Who in hell is
going to plead guilty to inventing the AIDS virus. Do I think it
was invented? Absolutely and without a doubt.
Firstly, where in hell has it been during the last 5000 years?
Why haven't we had exposure to it sooner, like in the last 50 years?
All of a sudden certain countries and entire continents are
coming down with the AIDS virus and no organization, body, group, or
whatever you care to call it has even a clue to the real source, and
it sure as hell isn't some monkey in Africa, that's for sure.
Over the last twenty years the genetic scientists have been
having a filed day inventing all kinds of new "life." Some have
even been granted patents for their creatures, which are usually
various types of bacteria, etc.
One patent was granted for the invention, or more accurately
put, creation, of a type of bacteria that eats oil, handy for oil
spills I guess. Now do you think for even a second that a virus
like the AIDS virus couldn't be created with all the genetic
engineering that is going on around the world?
There are certain types of bacteria that are living in test
tubes in labs around the world that if released would cause the end
of mankind in less than a year.
The real question is why we allow these bozos to play in labs,
making all kinds of new and artificial life in the first place. It
is going to backfire, in fact the author already feels it has,
through the deliberate release of the HIV (human immunodeficiency
virus); that's what AIDS is really called.
Something extraordinary happened last June (88'), in fact it
was so extraordinary that nothing like it has ever happened before.
The Surgeon General of the United States had mailed to every
mail box and address in the United States a brochure attempting to
explain AIDS, its danger, myths and means of transmission. The
Page 1
absolutely amazing thing about this was that it was done at
all.
Think of this for a minute: the U.S. Government mailed this
information to every address in America. That in itself should tell
all of us something that the media has somehow missed -- that this
is a population-destroying virus.
That really means that we all are in shit city, race fans, and
the Government know it. It is significant that they did the
mailing, and that should be very significant to anyone who knows
how our government works and what kind of very real panic those
who really know are experiencing.
When something like this brochure is made available as it was,
you can be very sure that the boys at the top, including the
scientific folks, are up against something they may not beat before
it has a very real chance of destroying at least half of mankind!
In fact, the fastest time even guessed at, for some kind of
beginning cure for some types of AIDS is at least five years and
that's thought to be impossible by medical people.
The author comes up with a very plausible scenario for how
rapidly AIDS has been distributed. (We are not blaming the
World Health Organization. In the author's scenario he simply
indicates that the WHO was used by others.)
Let's face it, we are in very real trouble. There are several
types of new AIDS viruses and more to be discovered, and who is to
say how the new ones, not yet mutated, will spread -- a sneeze
perhaps?
Our government and others around the world are not telling us
the truth about this stuff in order to protect our poor little dumb
minds. I suspect that if we know the truth, an enormous citizen
effort could be martialed worldwide which would probably shut down
the arms race for the time being.
Again, at the bottom line, we are in big trouble and "they"
know it....Many scientists predict we will lose half the world's
population (including U.S.) by the year 2000.
-- Jim Shults
Page 2
ABOUT THE AUTHOR
William Campbell Douglass, M.D.
Age: 62
Education: BS, University of Rochester, New York;
MD, University of Miami School of
Medicine; Graduate, U.S. Navy School of
Aviation and Space Medicine
Career: U.S. Navy, 7 years -- Flight Surgeon.
In practice for over 25 years. Former
state president, Florida, American
College of Emergency Physicians.
Former Editor of the Journal of the
Sarasota County Medical Society.
Consulting Editor, Health Freedom News.
On Board of Governors of the National
Health Federation. Regular speaker at
the National Health Federation meetings
around the United States. Appears
regularly on radio and television
programs on health.
Doctor of the
Year: National Health Federation, 1985.
Dr. Douglass has studied in England with Dr. Katharina Dalton,
discoverer of the premenstrual syndrome. He was one of the
first doctors in the United States to diagnose and treat PMS.
He opened his PMS Clinic in 1981.
Page 3
AIDS as a Weapon of War
William Campbell Douglass, M.D.
The great powers renounced chemical and biological warfare 20
years ago -- but kept right on experimenting. The germ warfare
experiments on Seventh Day Adventist soldiers,
1) the Tuskeegee syphilis experiments on prisoners,
2) the San Francisco Bay attack by the U.S. Army using
serratia marcescens bacteria,
3) the New York City subway germ attack
4 and many other experiments on humans, largely unknown to
the victims, continue in the free world.
In Novosybirsk, at the Ivanofsky Institute and other Soviet
centers of biological warfare, you can be sure that similar
diabolical experiments on humans continue at a frantic pace.
The Soviet press, always masters of the half truth, accused
the U.S. Army of having engineered the AIDS virus in the biological
warfare laboratories at Fort Detrick, Maryland.
This was a clever psy-war ploy which, for a while anyway,
neutralized those of us who were saying essentially the same thing,
that the AIDS virus was probably created through recombinant genetic
engineering (the rearranging of genes between two or more species of
plants or animal) and/or serial passage: the growing of a virus in
a series of generations of tissue culture cells or live animals,
thus adapting the virus to a new species, using human tissue culture
cells in the top security labs at Fort Detrick.
People started accusing us of spreading the communist line, not
a comfortable position for a dedicated anti-communist like myself.
What the Soviet propagandists didn't say was that their agents
had been working in our top security biological warfare laboratories
for over 20 years.
In a burst of brotherly love they were invited in by President
Nixon. The astounded communist scientists from Russia, the Eastern
Bloc and Communist china, who had been trying to penetrate this
vital security area for 40 years, quickly accepted.
They have been snickering in their beakers ever since, while
they prepare for our demise.
"It's no secret that they are there," Dr. Carlton Gajdusek,
Nobel Prize winner, a top official at the Fort Detrick Army
laboratory in Maryland, said in Onmi Magazine (March 1986): "In
the facility I have a building where more good and loyal communist
scientists from the USSR and mainland China work, with full passkeys
to all the laboratories, than there are American. Even the Army's
infectious disease unit is loaded with foreign workers who are not
always friendly nationals."
This answer to an interview question refers to the high number
of Soviet bloc scientists in this U.S. facility who act as
Page 4
inspectors to ensure that we are not producing bacteriological
weapons in violation of treaties with the Soviets.
You can't put it more plainly than that. Even the Trojans
weren't that stupid: at least they didn't KNOW the Trojan horse
was full of soldiers.
When it became obvious to the Communist press that we were
getting the truth out about who was running things at Fort Detrick,
they completely reversed themselves and said it was all a mistake.
Everything was just fine at Fort Detrick.
To understand the enormity of our betrayal you must know about
the origin of the AIDS virus. The virologists of the world, the
sorcerers who brought us this ghastly plague, have a united front in
denying that the virus was laboratory-made from known, lethal animal
viruses.
The scientific party line is that a monkey in Africa with AIDS
bit a native on the butt. The native then went to town and gave it
to a prostitute who gave it to the local banker who gave it to his
wife and three girlfriends and what!
50 to 75 million people became infected with AIDS in Africa and
throughout the world. This is an entirely preposterous story, and
it is preposterous because:
1. The green velvet monkey of Africa doesn't get human AIDS. You
can't reproduce the disease in monkeys even by injecting AIDS
virus directly into them.
2. After injecting the virus into monkeys, you can't transmit it
to other monkeys, much less to humans.
3. Genetically, AIDS (HIV-1) is not even close to the monkey form
of immunodeficiency virus.
[Ed. Note: For references on the three items above,
see: Seale, Dr. John J.,
Royal Society of Medicine, Sept. 1987,
Seale, Dr. John J.,
The Origin of AIDS -- International
Conference on AIDS, Cairo, March 1988.]
4. AIDS started not in the villages but in the cities of Africa,
where there are no wild monkeys.
5. The doubling time of AIDS infection being about 12 months, one
monkey biting one native and then spreading the disease would
have taken 20 years to reach a million cases. Seventy-five
million Africans became infected practically simultaneously.
At the same time, the disease became rampant in the U.S.,
Haiti and Brazil.
It is obvious that one monkey couldn't have done that (or one
homosexual, either). There had to be some sort of simultaneous
seeding process.
The only worldwide simultaneous seeding going on at the same
time was the smallpox vaccine program of the World Health
Organization (the WHO).
Page 5
The early epidemiology of the AIDS pandemic fits the smallpox
vaccination project of the WHO -- AND NOTHING ELSE -- with the
exception of the U.S., which we will examine subsequently.)
The AIDS virus was created in a laboratory by combining lethal
animal "retroviruses" in human cancer (HeLA) cell cultures. These
viruses have never before caused infection in man.
The "species barrier" has always been nature's way of keeping a
deadly virus from wiping out the entire animal kingdom, including
man. The myxoma virus of rabbits, for example, wiped out the rabbit
population of Europe, but man and other animals were not affected.
The sheep visna virus completely decimated the flocks of
Iceland, but no other animal was affected.
The virologists deny that the AIDS virus, HIV-1, is of animal
origin. I am sure that you see the paradox here. Aren't monkeys
animals?
They are also united in saying that it's not possible for the
virus to have been engineered in a laboratory. If it didn't come
from other animals and it didn't come from a laboratory, and they
now admit privately that the monkey couldn't have done it, then it
must have come out of thin air. That's a theological position and
hence beyond argument. It's certainly not scientific.
These scientists who have created this monstrous problem in
their sorcerer's retrovirology laboratories are constantly caught in
their own lies.
The line goes: "The AIDS virus could not have been engineered
in a laboratory because the technology wasn't available until
recently."
Icelandic scientists combined the sheep visna virus with human
tissue cells over 20 years ago. The technology has been refined in
recent years, but the basic process has been actively used in labs
all over the world for long before the AIDS virus made its dramatic
appearance.
But the scientists hold fast in their denial of culpability.
Professor William Jarrett said, when asked about the possibility of
AIDS arising from animal retroviruses, "That is like someone saying
babies come out of cabbages."5
Dr. Robert Gallo said that people who claim AIDS was
manufactured artificially are "either insane or communists."6
Dr. Luis Montagnier, the discoverer of the AIDS virus, said,
"In 1970 there was not enough knowledge in genetic engineering to
make such a virus starting from already existing viruses."7 (See
Icelandic experiments mentioned above.)
This tower of lies must eventually fall of its own weight.
Then what? Where do we look for a solution? Certainly not from
the people who caused the disaster.
But where? -- the Pentagon? The Pentagon is supporting
Page 6
research on biological warfare in over 100 federal and private
laboratories, including those at many prominent universities.8 Yet,
Neil Levitt, who worked for 17 years at the Army Infectious Disease
Institute, says, "It's a joke...there's no defense against these
kinds of organisms. And if you can't defend against something, then
why are we pouring more and more money in it? There's something
else going on that we don't know about."9
Some joke.
A short virology lesson will help you understand that AIDS is
indeed an animal virus and that it was laboratory-made as a weapon
of biological warfare against the free world.
A basic rule of virology is that if two viruses have the same
shape, design and size, then they are almost certainly the same
virus (a very simple and easy to understand rule).10
For example, this virus:
-----------
|==| ||| |
-----------
... a virus of bacteria (bugs have diseases, too), doesn't look
anything like this virus:
___________
/ \
/ ~~~~~~~ \
\ /
\___________/
... a virus of ticks that's transmitted to pigs, or this virus:
__________
____/ ~~~~ \
/ ______/
\________/
... which is found in horses.
The AIDS virus, which "couldn't have come from animal
viruses" is almost certainly a recombinant virus from fusing a
cattle virus, bovine leukemia virus:
=
*
=* *=
=* ++++ *=
=* *=
*
=
Page 7
...with sheep visna virus:
*
* *
* ==== *
* *
*
You combine the two in human tissue culture cells and you get bovine
visna virus:
=
*
=* *=
=* ==== *=
=* *=
*
=
... A VIRUS THAT HERETOFORE DID NOT EXIST -- a product of man,
engineered in a laboratory.
Now, if you isolate the AIDS virus from an infected human, it
looks like this:
=
*
=* *=
=* ==== *=
=* *=
*
=
It doesn't look like this (the tick virus):
__________
____/ ~~~~ \
/ ______/
\________/
... or this (the cattle virus):
=
*
=* *=
=* ++++ *=
=* *=
*
=
Page 8
It looks like THIS:
=
*
=* *=
=* ==== *=
=* *=
*
=
... the recombinant virus from cattle and sheep AND ITS CALLED
AIDS. You don't have to be a genius to understand this. Any
properly instructed 10-year-old can understand it ....
But, some alert reader will say, we don't give smallpox
vaccinations in the U.S., so how do you explain the simultaneous
outbreak of AIDS in Africa, Brazil and Haiti, where they did indeed
give the vaccine, and in the U.S., where they didn't give the
vaccine?
Simple. The homosexual community was used as a large group of
experimental animals through the hepatitis-B program. It didn't
take many infected homosexuals among the I.V. drug users to quickly
spread the disease among a large percentage of the addicts due to
the near certainly of infection through direct intravenous insertion
of the virus.
To understand the seeding of AIDS among homosexuals (and
eventually to the rest of us through bisexuals unless drastic action
is taken), you must know about a character with the strange name of
Wolf Szmuness. His life story will seem bizarre to you unless, like
me, you have a conspiratorial turn of mind.
Dr. Szmuness was a Polish Jew who supposedly ended up in a
Siberian labor camp during World War II. But after the war he
somehow became a privileged person, was sent to medical school in
Tomsk, Russia, and married a Russian woman. Hardly typical
treatment of an enemy of the Soviet state [under Stalin.
Szmuness' biographer said that Wolf was always reluctant to
discuss "those dark years in Siberia." Maybe he wasn't in Siberia.
If he [actually] was, he certainly wasn't shoveling salt.
In 1959 the Soviet government "allowed" him to practice in
Poland in a public health capacity. Standard policy in all
Communist countries is never to allow all members of a family to
travel out of the country to the West at the same time.
This eliminates 98 percent of all defection attempts. I have
physician friends in Hungary, for example. He can go to a meeting
anywhere in the world if she stays home. She can go if he stays
home. They can both go if the children are left at home. But in
1969, the entire Szmuness family was allowed by communist Poland to
go to a medical meeting in Italy. At that time they "defected" and
moved to New York City.
WITH NO AMERICAN CREDENTIALS WHATSOEVER, he immediately got a
Page 9
job as a "lab technician" at the New York City Blood Center. Within
a very few years this Polish immigrant was GIVEN HIS OWN LAB, a
separate department of epidemiology was created for him at the blood
bank and he, like the chrysalis turning into a butterfly, changed
into a FULL PROFESSOR OF EPIDEMIOLOGY AT THE COLUMBIA MEDICAL
SCHOOL!
In six years this "lab tech" became a full professor AND THEN
WENT BACK TO MOSCOW for a scientific presentation and was received
as a dignitary, not a defector.
We tell you this amazing story because in retrospect it is
obvious that Wolf Szmuness was a carefully groomed ... agent,
planted here after years of preparation, to instigate biological
warfare against the American people.
Szmuness, with the full cooperation and financial support of
the U.S. Center for Disease Control and the National Institutes of
Health,11 masterminded the hepatitis-B vaccine experimental program
used on homosexual men.
He insisted that only young, promiscuous homosexuals be allowed
to participate in the experiment. The experiment started in New
York at the blood bank in November 1978.
THE EXPERIMENTAL VACCINE WAS PRODUCED in a government
supervised laboratory.12 The study was completed in October 1979.
Within 10 years, most of these young men would be dead or dying from
AIDS.
In 1980 the program was expanded to major cities all across the
U.S. In the fall of 1980 the first AIDS case was reported in San
Francisco. Eight years later most of the homosexuals in San
Francisco are infected, dead or dying.
Szmuness did not live to see the fruition of this larger
experiment. He died of cancer in 1982.
In 1986 Dr. Cladd Stevens, one of Szmuness's collaborators,
penned an astonishing report that did not make your local newspaper.
She reported that the majority of the homosexuals in the
experimental program were infected with the AIDS virus.13 The AIDS-
laced vaccine, through the bridge of bisexual men, now infects as
many as three million Americans. Mission accomplished.
AIDS was not the first germ warfare attack against Americans.
In the early '60s, millions of unsuspecting Americans took
either Salk injected polio vaccine or the live Sabin polio vaccine,
which was taken by mouth.
BOTH WERE LACED WITH S.V.-40, A CANCER-CAUSING MONKEY VIRUS.14
With an incubation period of 20 years, we are only now seeing
the grim results of this bio-attack against Americans, largely in
the form of brain tumors and leukemia.
Page 10
Salk didn't like the Sabin vaccine and Sabin didn't like the
Salk vaccine. I think they are both right. It is interesting to
note that polio was rapidly disappearing WITHOUT a vaccine (J. Trop.
Pediat, env. Child. Health 21, 11) ....
Our Soviet enemies not only instigated the AIDS epidemic
through clandestine agents within our government, but they now
control, through the World Health Organization, the AIDS policies of
the free world.
You are probably not aware that the international AIDS
prevention program of the World Health Organization (WHO) is run by
the Soviets.
You don't believe it? Call WHO and ask them who is in charge
in Europe. If you want to save your nickel I'll tell you. He's a
Russian named Bysencho and he operates out of Copenhagen....
The Soviets control the response to AIDS of the entire free
world at many levels, including the top. Dr. Sergei Litvinov,
the coordinator of all task forces on AIDS at the WHO, is a high
official in the Soviet Ministry of Health. Allegedly Litvinov
gave out the order to our scientists and medical organizations in
the western world not to discuss the real cause of the epidemic.
At a secret meeting (information supplied the author from a
confidential source) between the editors of Lancet, the highly
respected British medical publication, and a group of the leading
retrovirologists of the world, it was decided not to publish any
academic discussion about the possible artificial creation of the
AIDS virus in a laboratory.
They particularly agreed not to make any mention of world-
renowned biologist Isaac Farlane Bernet's published remarks that
molecular biology may get out of hand like atomic physics and be
used for evil purposes and "practical applications of molecular
biology to cancer research might be sinister."
Other medical journals such as Science and JAMA have
lockstepped with Lancet and put all references to the man-made
origins of AIDS down the memory hole.
Did Comrade Litvinov have a little talk with the
retrovirologists? They, of course, wouldn't need any encouragement
from the Soviet [WHO] bosses to attempt a little coverup of their
own heinous crime, but Lancet, the British Medical Journal, and the
New England Journal of Medicine are another matter.
It took some powerful and sinister forces indeed to get these
respected publications to cover up the crime of the millennium.
The notable exception to this appalling censorship of mass
murder is Professor Harding Rains, Editor of the Journal of the
Royal Society of Medicine. Rains refers to "a conspiracy of
silence" covering the allegation that AIDS was man-made. I hope
Dr. Rains is watching his backside.
Dr. Zhores Medvedev, unlike Bysencho and Litvinov, supposedly
is a Russian exile. Medvedev operates out of London at the National
Page 11
Institute for Medical Research. He's a senior research scientist
who continues to communicate freely with his supposed enemies in the
Soviet biowarfare laboratories, but we lack the space to catalog all
the details [here].
Medvedev is spreading the disinformation that AIDS is rampant
in Russia due to the escape of the virus from a laboratory, a sort
of biological Chernobyl.
This tends to divert suspicion away from Litvinov, Szmuness and
the other reds that President Nixon allowed to penetrate our
biological warfare laboratories at Fort Detrick, Maryland.
Having the Soviets "control" the spread of AIDS in the West has
let to some interesting paradoxes. Our masters in the U.S. tell us
that there shall be absolutely no restrictions on travel between
various parts of the non-Communist world by persons who test
positive for AIDS.
Surgeon General C.E. Koop supports this Soviet policy of
biological suicide. (Are those the instructions he received when he
made his trip to Moscow, where the WHO has set up its main AIDS
research center?)
But, our Soviet masters in the WHO tell us, this open policy of
international travel does not apply to the communist bloc of
nations. If you or I were to visit Moscow and tested positive for
the AIDS virus, POW! -- out on the next plane!
If they stay clean through their immigration policies and we
die because of the immigration policies imposed on us through the
U.N.-controlled World "Health" Organization, who needs atomic bombs
for world conquest?
Cuba, Dr. John Seale informs me, has a strict asylum system for
the AIDS-infected. When their troops come back from "liberating"
Africans, they are tested as they get off the boat.
If tested positive the soldier goes directly to hell --
euphemistically called a sanitarium. He can visit his family
occasionally, but only in the presence of a commissar called a
"health official (no hanky-panky).
Unless the West gets its act together and closes down the U.N.
genocide division called the WHO, freedom and decency will disappear
from planet Earth for a thousand years. But the problem goes much
deeper.
How do you close down the U.S. government laboratories such as
the Centers for Disease Control (CDC), the National Institute of
Health (NIH) and the Fort Detrick bio-warfare lab when the
perpetrators of the crime are in control at all levels?
I don't know the answer. *****
_________________________
Page 12
1 Project Whitecoat, to be published in Health Freedom News,
P.O. Box 688, Monrovia CA 91016/Subscription $20.00 per year.
2 Bad Blood, J.H. Jones, MacMillan, NY, 1982.
3 Common Cause Magazine, Jan./Feb. 1988.
4 First aids Report, March/April 1988.
5 Private communication, John Seale, M.D., 1988
6 Ibid.
7 First International Conference on the Global Impact of aids,
London, March 8-10, 1988.
8 New Scientist, London, 5/19/88.
9 Science News, 133:100, 2/13/88.
10 Joklik, Virology, 2nd edition, pp. 36 ff.
11 AIDS and the Doctors of Death, Cantwell, Aries Rising Press,
Los Angeles,p.76.
12 Ibid.
13 Ibid.
14 Salk/Sabin s.v.-40 Proc. Nat'l Acad. Sci., vol. 77, #8,
p. 4861, and Atlantic Monthly, 2/76.
--------------------------------------------------------------------
If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
Sciences address as listed on the first page. Thank you for your
consideration, interest and support.
Jerry W. Decker.........Ron Barker...........Chuck Henderson
Vangard Sciences/KeelyNet
--------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 484-3189
--------------------------------------------------------------------

247
txt_files/aids.us.made Normal file
View File

@ -0,0 +1,247 @@
AIDS: a U.S.-made monster?
------------------------------------------------------------
PREFACE
In an extensive article in the Summer-Autumn 1990 issue of "Top Secret", Prof
J. Segal and Dr. L. Segal outline their theory that AIDS is a man-made disease,
originating at Pentagon bacteriological warfare labs at Fort Detrick, Maryland.
Top Secret is the international edition of the German magazine Geheim and is
considered by many to be a sister publication to the American Covert Action
Information Bulletin (CAIB). In fact, Top Secret carries the Naming Names
column, which CAIB is prevented from doing by the American government, and
which names CIA agents in different locations in the world. The article, named
"AIDS: US-Made Monster" and subtitled "AIDS - its Nature and its Origins," is
lengthy, has a lot of professional terminology and is dotted with footnotes.
The following is my humble attempt to encapsulate its highlights. It is
recommended that all interested read the original, which is available at some
bookstores, or can be ordered for $3.50 from:
Top Secret/Geheim Magazine P.O.Box 270324 5000 Koln 1 Germany
AIDS FACTS
"The fatal weakening of the immune system which has given AIDS its name
(Acquired Immuno-Deficiency Syndrome)," write the Segals, "has been traced back
to a destruction or a functional failure of the T4-lymphocytes, also called
'helper cells`, which play a regulatory role in the production of antibodies in
the immune system." In the course of the illness, the number of functional T4-
cells is reduced greatly so that new anti-bodies cannot be produced and the
defenseless patient remains exposed to a range of infections that under other
circumstances would have been harmless. Most AIDS patients die from
opportunistic infections rather than from the AIDS virus itself.
The initial infection is characterized by diarrhea, erysipelas and intermittent
fever. An apparent recovery follows after 2-3 weeks, and in many cases the
patient remains without symptoms and functions normally for years. Occasionally
a swelling of the lymph glands, which does not affect the patient's well-being,
can be observed.
After several years, the pre-AIDS stage, known as ARC (Aids- Related Complex)
sets in. This stage includes disorders in the digestive tract, kidneys and
lungs. In most cases it develops into full-blown AIDS in about a year, at which
point opportunistic illnesses occur. Parallel to this syndrome, disorders in
various organ systems occur, the most severe in the brain, the symptoms of
which range from motoric disorders to severe dementia and death.
This set of symptoms, say the Segals, is identical in every detail with the
Visna sickness which occurs in sheep, mainly in Iceland. (Visna means tiredness
in Icelandic). However, the visna virus is not pathogenic for human beings.
The Segals note that despite the fact that AIDS is transmitted only through
sexual intercourse, blood transfusions and non- sterile hypodermic needles, the
infection has spread dramatically. During the first few years after its
discovery, the number of AIDS patients doubled every six months, and is still
doubling every 12 months now though numerous measures have been taken against
it. Based on these figures, it is estimated that in the US, which had 120,000
cases of AIDS at the end of 1988, 900,000 people will have AIDS or will have
died of it by the end of 1991. It is also estimated that the number of people
infected is at least ten times the number of those suffering from an acute case
of AIDS. That in the year 1995 there will be between 10-14 million cases of
AIDS and an additional 100 million people infected, 80 percent of them in the
US, while a possible vaccination will not be available before 1995 by the most
optimistic estimates. Even when such vaccination becomes available, it will not
help those already infected. These and following figures have been reached at
by several different mainstream sources, such as the US Surgeon General and the
Chief of the medical services of the US Army.
Say the Segals: "AIDS does not merely bring certain dangers with it; it is
clearly a programmed catastrophe for the human race, whose magnitude is
comparable only with that of a nuclear war." They later explain what they mean
by "programmed," showing that the virus was produced by humans, namely Dr.
Robert Gallo of the Bethesda Cancer Research Center in Maryland. When
proceeding to prove their claims, the Segals are careful to note that: "We have
given preference to the investigative results of highly renowned laboratories,
whose objective contents cannot be doubted. We must emphasize, in this
connection, that we do not know of any findings that have been published in
professional journals that contradict our hypotheses."
DISCOVERING AIDS
The first KNOWN cases of AIDS occurred in New York in 1979. The first
DESCRIBED cases were in California in 1979. The virus was isolated in Paris in
May 1983, taken from a French homosexual who had returned home ill from a trip
to the East Coast of the US. One year later, Robert Gallo and his co-workers at
the Bethesda Cancer Research Center published their discovery of the same
virus, which is cytotoxic, i.e poisonous to cells.
Shortly after publishing his discovery, Gallo stated to newspapers that the
virus had developed by a natural process from the Human Adult Leukemia virus,
HTLV-1, which he had previously discovered. However, this claim was not
published in professional publications, and soon after, Alizon and Montagnier,
two researchers of the Pasteur Institute in Paris published charts of HTLV-1
and HIV, showing that the viruses had basically different structures. They also
declared categorically that they knew of no natural process by which one of
these two forms could have evolved into the other.
According to the professional "science" magazine, the fall 1984 annual meeting
of the American Association for the Advancement of Science (AAAS), was almost
entirely devoted to the question of: to what extent new pathogenic agents could
be produced via human manipulation of genes. According to the Segals, AIDS was
practically the sole topic of discussion.
THE AIDS VIRUS
The Segals discuss the findings of Gonda et al, who compared the HIV, visna
and other closely-related viruses and found that the visna virus is the most
similar to HIV. The two were, in fact, 60% identical in 1986. According to
findings of the Hahn group, the mutation rate of the HIV virus was about a
million times higher than that of similar viruses, and that on the average a
10% alteration took place every two years. That would mean that in 1984, the
difference between HIV and visna would have been only 30%, in 1982- 20%, 10% in
1980 and zero in 1978. "This means," say the Segals, "that at this time visna
viruses changed into HIV, receiving at the same time the ability to become
parasites in human T4-cells and the high genetic instability that is not known
in other retroviruses. This is also consistent with the fact that the first
cases of AIDS appeared about one year later, in the spring of 1979."
"In his comparison of the genomes of visna and HIV," add the Segals, "Coffin
hit upon a remarkable feature. The env (envelope) area of the HIV genome, which
encodes the envelope proteins which help the virus to attach itself to the host
cell, is about 300 nucleotides longer than the same area in visna. This
behavior suggests that an additional piece has been inserted into the genomes
of the visna virus, a piece that alters the envelope proteins and enables them
to bind themselves to the T4-receptors. BUT THIS SECTION BEHAVES LIKE A
BIOLOGICALLY ALIEN BODY, which does not match the rest of the system
biochemically. (emphasis mine)
The above mentioned work by Gonda et al shows that the HIV virus has a section
of about 300 nucleotides, which does not exist in the visna virus. That length
corresponds with what Coffin described. That section is particularly unstable,
which indicates that it is an alien object. According to the Segals, it
"originates in an HTLV-1 genome, (discovered by Gallo-ED) for the likelihood of
an accidental occurrence in HIV of a genome sequence 60% identical with a
section of the HTLV-1 that is 300 nucleotides in length is zero." Since the
visna virus is incapable of attaching itself to human T4 receptors, it must
have been the transfer of the HTLV-1 genome section which gave visna the
capability to do so. In other words, the addition of HTLV-1 to visna made the
HIV virus. In addition, the high mutation rate of the HIV genome has been
explained by another scientific team, Chandra et al, by the fact that it is "a
combination of two genome parts which are alien to each other BY ARTIFICIAL
MEANS rather than by a natural process of evolution, because this process would
have immediately eliminated, through natural selection, systems that are so
replete with disorders."
"These are the facts of the case," say the Segals. "HIV is essentially a visna
virus which carries an additional protein monomer of HTLV-1 that has an epitope
capable of bonding with T4 receptors. Neither Alizon and Montagnier nor any
other biologist know of any natural mechanism that would make it possible for
the epitope to be transferred from HTLV-1 to the visna virus. For this reason
we can come to only one conclusion: that this gene combination arose by
artificial means, through gene manipulation."
"THE CONSTRUCTION OF HIV"
"The construction of a recombinant virus by means of gene manipulation is
extraordinarily expensive, and it requires a large number of highly qualified
personnel, complicated equipment and expensive high security laboratories.
Moreover, the product would have no commercial value. Who, then," ask the
Segals, "would have provided the resources for a type of research that was
aimed solely at the production of a new disease that would be deadly to human
beings?"
The English sociologist Allistair Hay (as well as Paxman et al in "A Higher
Form of Killing"-ED), published a document whose authenticity has been
confirmed by the US Congress, showing that a representative of the Pentagon
requested in 1969 additional funding for biological warfare research. The
intention was to create, within the next ten years, a new virus that would
not be susceptible to the immune system, so that the afflicted patient would
not be able to develop any defense against it. Ten years later, in the spring
of 1979, the first cases of AIDS appeared in New York.
"Thus began a phase of frantic experimentation," say the Segals.
One group was working on trying to cause animal pathogens to adapt themselves
to life in human beings. This was done under the cover of searching for a cure
for cancer. The race was won by Gallo, who described his findings in 1975. A
year later, Gallo described gene manipulations he was conducting. In 1980 he
published his discovery of HTLV.
In the fall of 1977, a P4 (highest security category of laboratory, in which
human pathogens are subjected to genetic manipulations) laboratory was
officially opened in building 550 of Fort Detrick, MD, the Pentagon's main
biological warfare research center. "In an article in 'Der Spiegel`, Prof.
Mollings point out that this type of gene manipulation was still extremely
difficult in 1977. One would have had to have a genius as great as Robert Gallo
for this purpose, note the Segals."
Lo and behold. In a supposed compliance with the international accord banning
the research, production and storage of biological weapons, part of Fort
Detrick was "demilitarized" and the virus section renamed the "Frederick
Cancer Research Facility". It was put under the direction of the Cancer
Research Institute in neighboring Bethesda, whose director was no other than
Robert Gallo. This happened in 1975, the year Gallo discovered HTLV.
Explaining how the virus escaped, the Segals note that in the US, biological
agents are traditionally tested on prisoners who are incarcerated for long
periods, and who are promised freedom if they survive the test. However, the
initial HIV infection symptoms are mild and followed by a seemingly healthy
patient.
"Those who conducted the research must have concluded that the new virus
was...not so virulent that it could be considered for military use, and the
test patients, who had seemingly recovered, were given their freedom. Most of
the patients were professional criminals and New York City, which is
relatively close, offered them a suitable milieu. Moreover, the patients were
exclusively men, many of them having a history of homosexuality and drug abuse,
as is often the case in American prisons. 1111
It is understandable why AIDS broke out precisely in 1979, precisely among men
and among drug users, and precisely in New York City," assert the Segals. They
go on to explain that whereas in cases of infection by means of sexual contact,
incubation periods are two years and more, while in cases of massive infection
via blood transfusions, as must have been the case with prisoners, incubation
periods are shorter than a year. "Thus, if the new virus was ready at the
beginning of 1978 and if the experiments began without too much delay, then
the first cases of full- blown AIDS in 1979 were exactly the result that
could have been expected."
In the next three lengthy chapters, the Segals examine other theories,
"legends" as they call them, of the origins of AIDS. Dissecting each claim,
they show that they have no scientific standing, providing also the findings
of other scientists. They also bring up the arguments of scientists and
popular writers who have been at the task of discounting them as "conspiracy
theorists" and show these writers' shortcomings. Interested readers will have
to read the original article to follow those debates. I will only quote two
more paragraphs:
"We often heard the argument that experiments with human volunteers are part of
a barbaric past, and that they would be impossible in the US today... We wish
to present one single document whose authenticity is beyond doubt. An
investigative commission of the US House of Representatives presented in
October 1986 a final report concerning the Manhattan Project. According to this
document, between 1945 and 1975 at least 695 American citizens were exposed
to dangerous doses of radioactivity. Some of them were prisoners who had
volunteered, but they also included residents of old-age homes, inmates of
insane asylums, handicapped people in nursing homes, and even normal patients
in public hospitals; most of them were subjected to these experiments without
their permission. Thus the 'barbaric past` is not really a thing of the past."
"It is remarkable that most of these experiments were carried out in university
institutes and federal hospitals, all of which are named in the report.
Nonetheless, these facts remained secret until 1984, and even then a
Congressional committee that was equipped with all the necessary
authorization needed two years in order to bring these facts to life. We are
often asked how the work on the AIDS virus could have been kept secret. Now,
experiments performed on a few dozen prisoners in a laboratory that is
subject to military security can be far more easily kept secret than could
be the Manhattan Project."

208
txt_files/aids02.txt Normal file
View File

@ -0,0 +1,208 @@
Title : AIDS: The Facts
Source : American Red Cross
AIDS:
Spread Facts
Not Fear
What Is AIDS?
Acquired immune deficiency syndrome (AIDS) is a serious condition that affects
the body's ability to fight infection. A disgnosis of AIDS is made when a
person develops a life-threatening illness not usually found in a person with a
normal ability to fight infection. The two diseases most often found in AIDS
patients are a lung infection called Pneumocystis carinii pneumonia and a rare
form of cancer called Kaposi's sarcoma. It is these diseases, not the AIDS
virus itself, that can lead to death. To date, more than 50 percent of the
persons with AIDS have died.
What Causes AIDS?
Researchers have discovered the cause of AIDS - a virus that is called either
HTLV-III or LAV. This virus changes the structure of the cell it attacks.
Infection with the virus can lead to AIDS or to a less severe condition known
as AIDS-related complex (ARC). Some of those persons infected with the virus
will develop symptoms of AIDS or ARC. Other people who carry the virus may
remain in apparent good health. These carriers can transmit the virus during
sexual contact, or an infected mother can transmit the virus to her infant
before, during, or after birth (probably through breast milk).
Who Gets AIDS?
Since 1981, the Centers for Disease Control has been collecting information
on AIDS. Approximately 95 percent of the persons with AIDS belong to one of the
following groups:
* Sexually active homosexual or bisexual men (73 percent)
* Present or past abusers of intravenous drugs (17 percent)
* Patients who have had transfusions with blood or blood products (2 percent)
* Persons with hemophilia or other coagulation disorders (1 percent)
* Heterosexuals who have had sexual contact with someone with AIDS, or at risk
for AIDS (1 percent)
* Infants born to infected mothers (1 percent)
Approximately 5 percent of persons with AIDS do not fall into any of these
groups, but researchers believe that they came in contact with the virus in
similar ways. Some died before complete histories could be taken, while others
refused to provide any personal information.
What Are the Symptoms?
Most individuals infected with the AIDS virus have no symptoms and feel well.
Some develop symptoms that may include -
* Fever, including "night sweats."
* Weight loss for no apparent reason.
* Swollen lymph glands in the neck, underarm, or groin area.
* Fatigue or tiredness.
* Diarrhea.
* White spots or unusual blemishes in the mouth.
These symptoms are also symptoms of many other illnesses. They may be symptoms
of AIDS if they are unexplained by other illness. Anyone with these symptoms
for more than two weeks should see a doctor.
How is the AIDS Virus Spread?
The AIDS virus is spread by sexual contact, needle sharing, or rarely through
transfused blood or its components. Multiple sexual partners, either homosexual
or heterosexual, and sharing needles by drug users increase the risk of
infection with the virus.
Is the AIDS Virus Spread Through Casual Contact?
No. Casual contact with AIDS patients or people who carry the virus does NOT
place others at risk for getting AIDS. The AIDS virus is NOT spread by-
* Casual contact, such as hugging or hand shaking with an AIDS patient or a
person carrying the virus.
* Use of bathroom facilities, such as toilets, sinks, or bathtubs. Use of
swimming pools.
* Sneezing, coughing, or spitting.
* Dishes, utensils, or food handled by a person with AIDS.
The AIDS virus is not spread through normal daily contact at work, in school,
or at home. No cases have been found where the virus has been transmitted by
casual contact with AIDS patients in the home, workplace, or health care
setting. This statement is based in part, on studies of more than 300
households where people with AIDS were present. Not a single case of AIDS or
transmission of the virus was found except from sexual contacts or from
infected mothers to their infants. Many of those tested were children who had
shared bottles, beds, toothbrushes, and eating utensils with infected brothers
and sisters.
Is There a Test for AIDS?
There is an AIDS virus antibody test that detects antibodies to the AIDS virus
that causes the disease. The body produces antibodies that try to get rid of
bacteria, viruses, or anything else that is not supposed to be in the blood
stream. The test tells if someone has been infected with the AIDS virus. Most
people with AIDS have a positive test and some people with a positive test
will develop AIDS. The test does not tell who will develop AIDS.
What Does a Positive Test Mean?
It means that a person has been infected with the AIDS virus. It is estimated
that more than one million Americans have been infected by the AIDS virus. Some
of these people will develop AIDS. Others who have the virus may stay well,
without any symptoms, but can transmit the virus to others.
Why Do We Have a Test?
The test was first used in blood donation centers to prevent the AIDS virus
from getting into the blood supply. We have always used tests to make the
blood supply as safe as possible. For example, all blood is tested for the
hepatitis B virus. This is to make sure that the person does not get hepatitis
B.
Is the Blood Supply Safe?
YES. The blood supply is well protected from the AIDS virus. People who may be
at risk of having AIDS are told that they should not donate blood. For example,
men who have had sex with another male since 1977 are told not to donate blood.
Also, the test is used to screen all donated blood and plasma for signs of the
virus that causes AIDS.
Can I Get AIDS by Donating Blood?
NO. All of the needles, syringes, tubing, and containers used by blood donation
centers are sterile and are used only once and thrown away, so there is no
chance of infection.
Is the Test Available to the Public?
YES. The test is available at a variety of test sites in most states. It is
also available through private doctors and clinics. Information about where to
get the test is available from state or local health departments, sexually
transmitted disease clinics, doctor's offices, and community blood services.
Anyone planning to take the test should get advice before the test and
understand what the results may indicate. It is important to have counseling
after the test.
How Can I Protect Myself From AIDS?
* Do not have sexual contact with AIDS patients, with members of the risk
groups, or with people who test positive for the AIDS virus. If you do, use
a condom and avoid sexual practices such as anal intercourse that may injure
tissue.
* Do not use IV drugs. If you do, do not share needles. Do not have sex with
people who use IV drugs.
* Women who are sex partners of risk group members or who use IV drugs should
consider the risk to their babies before pregnancy. These women should have
an HTLV-III antibody test before they become pregnant. If the become pregnant
they should have a test during pregnancy.
* Do not have sex with multiple partners, including prostitutes (who may also
be IV drug abusers). The more partners you have, the greater your chances of
contracting AIDS.
What Should I Do if I Have a Positive Test?
* Have a regular medical checkup and get counseling.
* Do not donate blood, sperm, or organs.
* Do not share drugs with others, and avoid exchanging bodily fluids during
sexual activity (a condom should be used). Avoid oral-genital contact and
intimate kissing.
* Do not share toothbrushes. razors, or anything that could be contaminated
with blood.
* Consider postponing pregnancy.
Further information about AIDS can be obtained from your Red Cross chapter,
local or state health department, other community agencies, or the Public
Health Service Hotline. The hotline number is 1-800-342-AIDS. Atlanta Area
callers should dial 329-1290.
______________________________________________________________________________
Developed in cooperation with the Washington Business Group on Health, based
upon Public Health Service/U.S. Department of Health and Human Services
pamphlet "Facts About AIDS"
Funding provided by the American Council of Life Insurance and the Health
Insurance Association of America.
______________________________________________________________________________
AIDS-1 Rev. May 1986

262
txt_files/aidsconsp.txt Normal file
View File

@ -0,0 +1,262 @@
:::::::::::::::::::::::::::::::::::::::::
:: AIDS: A U.S.- Made Monster? ::
:::::::::::::::::::::::::::::::::::::::::
:: PREFACE ::
In an extensive article in the Summer-Autumn 1990 issue of "Top Secret", Prof
J. Segal and Dr. L. Segal outline their theory that AIDS is a man-made disease,
originating at Pentagon bacteriological warfare labs at Fort Detrick, Maryland.
Top Secret is the international edition of the German magazine Geheim and is
considered by many to be a sister publication to the American Covert Action
Information Bulletin (CAIB). In fact, Top Secret carries the Naming Names
column, which CAIB is prevented from doing by the American government, and
which names CIA agents in different locations in the world. The article, named
"AIDS: US-Made Monster" and subtitled "AIDS - its Nature and its Origins," is
lengthy, has a lot of professional terminology and is dotted with footnotes.
The following is my humble attempt to encapsulate its highlights. It is
recommended that all interested read the original, which is available at some
bookstores, or can be ordered for $3.50 from:
Top Secret/Geheim Magazine P.O.Box 270324 5000 Koln 1 Germany
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
:: AIDS FACTS ::
"The fatal weakening of the immune system which has given AIDS its name
(Acquired Immuno-Deficiency Syndrome)," write the Segals, "has been traced back
to a destruction or a functional failure of the T4-lymphocytes, also called
'helper cells`, which play a regulatory role in the production of antibodies in
the immune system." In the course of the illness, the number of functional T4-
cells is reduced greatly so that new anti-bodies cannot be produced and the
defenseless patient remains exposed to a range of infections that under other
circumstances would have been harmless. Most AIDS patients die from
opportunistic infections rather than from the AIDS virus itself.
The initial infection is characterized by diarrhea, erysipelas and intermittent
fever. An apparent recovery follows after 2-3 weeks, and in many cases the
patient remains without symptoms and functions normally for years. Occasionally
a swelling of the lymph glands, which does not affect the patient's well-being,
can be observed.
After several years, the pre-AIDS stage, known as ARC (Aids- Related Complex)
sets in. This stage includes disorders in the digestive tract, kidneys and
lungs. In most cases it develops into full-blown AIDS in about a year, at which
point opportunistic illnesses occur. Parallel to this syndrome, disorders in
various organ systems occur, the most severe in the brain, the symptoms of
which range from motoric disorders to severe dementia and death.
This set of symptoms, say the Segals, is identical in every detail with the
Visna sickness which occurs in sheep, mainly in Iceland. (Visna means tiredness
in Icelandic). However, the visna virus is not pathogenic for human beings.
The Segals note that despite the fact that AIDS is transmitted only through
sexual intercourse, blood transfusions and non- sterile hypodermic needles, the
infection has spread dramatically. During the first few years after its
discovery, the number of AIDS patients doubled every six months, and is still
doubling every 12 months now though numerous measures have been taken against
it. Based on these figures, it is estimated that in the US, which had 120,000
cases of AIDS at the end of 1988, 900,000 people will have AIDS or will have
died of it by the end of 1991. It is also estimated that the number of people
infected is at least ten times the number of those suffering from an acute case
of AIDS. That in the year 1995 there will be between 10-14 million cases of
AIDS and an additional 100 million people infected, 80 percent of them in the
US, while a possible vaccination will not be available before 1995 by the most
optimistic estimates. Even when such vaccination becomes available, it will not
help those already infected. These and following figures have been reached at
by several different mainstream sources, such as the US Surgeon General and the
Chief of the medical services of the US Army.
Say the Segals: "AIDS does not merely bring certain dangers with it; it is
clearly a programmed catastrophe for the human race, whose magnitude is
comparable only with that of a nuclear war." They later explain what they mean
by "programmed," showing that the virus was produced by humans, namely Dr.
Robert Gallo of the Bethesda Cancer Research Center in Maryland. When
proceeding to prove their claims, the Segals are careful to note that: "We have
given preference to the investigative results of highly renowned laboratories,
whose objective contents cannot be doubted. We must emphasize, in this
connection, that we do not know of any findings that have been published in
professional journals that contradict our hypotheses."
:: DISCOVERING AIDS ::
The first KNOWN cases of AIDS occurred in New York in 1979. The first
DESCRIBED cases were in California in 1979. The virus was isolated in Paris in
May 1983, taken from a French homosexual who had returned home ill from a trip
to the East Coast of the US. One year later, Robert Gallo and his co-workers at
the Bethesda Cancer Research Center published their discovery of the same
virus, which is cytotoxic, i.e poisonous to cells.
Shortly after publishing his discovery, Gallo stated to newspapers that the
virus had developed by a natural process from the Human Adult Leukemia virus,
HTLV-1, which he had previously discovered. However, this claim was not
published in professional publications, and soon after, Alizon and Montagnier,
two researchers of the Pasteur Institute in Paris published charts of HTLV-1
and HIV, showing that the viruses had basically different structures. They also
declared categorically that they knew of no natural process by which one of
these two forms could have evolved into the other.
According to the professional "science" magazine, the fall 1984 annual meeting
of the American Association for the Advancement of Science (AAAS), was almost
entirely devoted to the question of: to what extent new pathogenic agents could
be produced via human manipulation of genes. According to the Segals, AIDS was
practically the sole topic of discussion.
:: THE AIDS VIRUS ::
The Segals discuss the findings of Gonda et al, who compared the HIV, visna
and other closely-related viruses and found that the visna virus is the most
similar to HIV. The two were, in fact, 60% identical in 1986. According to
findings of the Hahn group, the mutation rate of the HIV virus was about a
million times higher than that of similar viruses, and that on the average a
10% alteration took place every two years. That would mean that in 1984, the
difference between HIV and visna would have been only 30%, in 1982- 20%, 10% in
1980 and zero in 1978. "This means," say the Segals, "that at this time visna
viruses changed into HIV, receiving at the same time the ability to become
parasites in human T4-cells and the high genetic instability that is not known
in other retroviruses. This is also consistent with the fact that the first
cases of AIDS appeared about one year later, in the spring of 1979."
"In his comparison of the genomes of visna and HIV," add the Segals, "Coffin
hit upon a remarkable feature. The env (envelope) area of the HIV genome, which
encodes the envelope proteins which help the virus to attach itself to the host
cell, is about 300 nucleotides longer than the same area in visna. This
behavior suggests that an additional piece has been inserted into the genomes
of the visna virus, a piece that alters the envelope proteins and enables them
to bind themselves to the T4-receptors. BUT THIS SECTION BEHAVES LIKE A
BIOLOGICALLY ALIEN BODY, which does not match the rest of the system
biochemically. (emphasis mine)
The above mentioned work by Gonda et al shows that the HIV virus has a section
of about 300 nucleotides, which does not exist in the visna virus. That length
corresponds with what Coffin described. That section is particularly unstable,
which indicates that it is an alien object. According to the Segals, it
"originates in an HTLV-1 genome, (discovered by Gallo-ED) for the likelihood of
an accidental occurrence in HIV of a genome sequence 60% identical with a
section of the HTLV-1 that is 300 nucleotides in length is zero." Since the
visna virus is incapable of attaching itself to human T4 receptors, it must
have been the transfer of the HTLV-1 genome section which gave visna the
capability to do so. In other words, the addition of HTLV-1 to visna made the
HIV virus. In addition, the high mutation rate of the HIV genome has been
explained by another scientific team, Chandra et al, by the fact that it is "a
combination of two genome parts which are alien to each other BY ARTIFICIAL
MEANS rather than by a natural process of evolution, because this process would
have immediately eliminated, through natural selection, systems that are so
replete with disorders."
"These are the facts of the case," say the Segals. "HIV is essentially a visna
virus which carries an additional protein monomer of HTLV-1 that has an epitope
capable of bonding with T4 receptors. Neither Alizon and Montagnier nor any
other biologist know of any natural mechanism that would make it possible for
the epitope to be transferred from HTLV-1 to the visna virus. For this reason
we can come to only one conclusion: that this gene combination arose by
artificial means, through gene manipulation."
:: THE CONSTRUCTION OF HIV ::
"The construction of a recombinant virus by means of gene manipulation is
extraordinarily expensive, and it requires a large number of highly qualified
personnel, complicated equipment and expensive high security laboratories.
Moreover, the product would have no commercial value. Who, then," ask the
Segals, "would have provided the resources for a type of research that was
aimed solely at the production of a new disease that would be deadly to human
beings?"
The English sociologist Allistair Hay (as well as Paxman et al in "A Higher
Form of Killing"-ED), published a document whose authenticity has been
confirmed by the US Congress, showing that a representative of the Pentagon
requested in 1969 additional funding for biological warfare research. The
intention was to create, within the next ten years, a new virus that would
not be susceptible to the immune system, so that the afflicted patient would
not be able to develop any defense against it. Ten years later, in the spring
of 1979, the first cases of AIDS appeared in New York.
"Thus began a phase of frantic experimentation," say the Segals.
One group was working on trying to cause animal pathogens to adapt themselves
to life in human beings. This was done under the cover of searching for a cure
for cancer. The race was won by Gallo, who described his findings in 1975. A
year later, Gallo described gene manipulations he was conducting. In 1980 he
published his discovery of HTLV.
In the fall of 1977, a P4 (highest security category of laboratory, in which
human pathogens are subjected to genetic manipulations) laboratory was
officially opened in building 550 of Fort Detrick, MD, the Pentagon's main
biological warfare research center. "In an article in 'Der Spiegel`, Prof.
Mollings point out that this type of gene manipulation was still extremely
difficult in 1977. One would have had to have a genius as great as Robert Gallo
for this purpose, note the Segals."
Lo and behold. In a supposed compliance with the international accord banning
the research, production and storage of biological weapons, part of Fort
Detrick was "demilitarized" and the virus section renamed the "Frederick
Cancer Research Facility". It was put under the direction of the Cancer
Research Institute in neighboring Bethesda, whose director was no other than
Robert Gallo. This happened in 1975, the year Gallo discovered HTLV.
Explaining how the virus escaped, the Segals note that in the US, biological
agents are traditionally tested on prisoners who are incarcerated for long
periods, and who are promised freedom if they survive the test. However, the
initial HIV infection symptoms are mild and followed by a seemingly healthy
patient.
"Those who conducted the research must have concluded that the new virus
was...not so virulent that it could be considered for military use, and the
test patients, who had seemingly recovered, were given their freedom. Most of
the patients were professional criminals and New York City, which is
relatively close, offered them a suitable milieu. Moreover, the patients were
exclusively men, many of them having a history of homosexuality and drug abuse,
as is often the case in American prisons. 1111
It is understandable why AIDS broke out precisely in 1979, precisely among men
and among drug users, and precisely in New York City," assert the Segals. They
go on to explain that whereas in cases of infection by means of sexual contact,
incubation periods are two years and more, while in cases of massive infection
via blood transfusions, as must have been the case with prisoners, incubation
periods are shorter than a year. "Thus, if the new virus was ready at the
beginning of 1978 and if the experiments began without too much delay, then
the first cases of full- blown AIDS in 1979 were exactly the result that
could have been expected."
In the next three lengthy chapters, the Segals examine other theories,
"legends" as they call them, of the origins of AIDS. Dissecting each claim,
they show that they have no scientific standing, providing also the findings
of other scientists. They also bring up the arguments of scientists and
popular writers who have been at the task of discounting them as "conspiracy
theorists" and show these writers' shortcomings. Interested readers will have
to read the original article to follow those debates. I will only quote two
more paragraphs:
"We often heard the argument that experiments with human volunteers are part of
a barbaric past, and that they would be impossible in the US today... We wish
to present one single document whose authenticity is beyond doubt. An
investigative commission of the US House of Representatives presented in
October 1986 a final report concerning the Manhattan Project. According to this
document, between 1945 and 1975 at least 695 American citizens were exposed
to dangerous doses of radioactivity. Some of them were prisoners who had
volunteered, but they also included residents of old-age homes, inmates of
insane asylums, handicapped people in nursing homes, and even normal patients
in public hospitals; most of them were subjected to these experiments without
their permission. Thus the 'barbaric past` is not really a thing of the past."
"It is remarkable that most of these experiments were carried out in university
institutes and federal hospitals, all of which are named in the report.
Nonetheless, these facts remained secret until 1984, and even then a
Congressional committee that was equipped with all the necessary
authorization needed two years in order to bring these facts to life. We are
often asked how the work on the AIDS virus could have been kept secret. Now,
experiments performed on a few dozen prisoners in a laboratory that is
subject to military security can be far more easily kept secret than could
be the Manhattan Project."
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Black Crawling Systems @ V0iD Information Archives
( 6 1 7 ) 4 8 2 - 6 3 5 6

342
txt_files/air-rail.txt Normal file
View File

@ -0,0 +1,342 @@
Info pulled from the Usenet. Air (atmosphere) Railway Systems.
Today and Yesterday
-------------------------
The ultimate responsibility for this thread :-) belongs to George
Medhurst (1759-1827), of England. During a period of a few years
about 1810, he invented three distinct forms of air-propelled
transport. None of them was implemented during his lifetime;
but all of them saw use eventually, reaching their greatest extent
in the reverse order of their original invention.
Medhurst's first method involved moving air through a tube a few
inches in diameter, pushing a capsule along it; this simple idea
was the pneumatic dispatch tube. Next he realized that if the same
system was built much larger, it could carry passengers (or freight
items larger than letters); it was natural to run the vehicle on
tracks, and so this became known since the vehicle would be large
enough to require tracks, this became known as a pneumatic railway.
But would anyone actually want to ride along mile after mile inside
an opaque pipe? Not likely. So he then thought of having only a
piston moving within the pipe, somehow dragging along a vehicle
outside it. He proposed several versions of this idea; in most of
them the vehicle ran on rails, so this became known as an atmospheric
railway (though a distinction between that term and the pneumatic
railway was not always observed). The key feature of all versions
of the system was a longitudinal valve: some sort of flexible flap
running the length of the pipe, which would be held closed by air
pressure except when the piston was actually passing. Medhurst
did try to raise capital to implement this system, but failed.
Now, while the first operable steam locomotive was built about 1804,
steam-powered trains did not see regular use for passengers for some
25 years after that. It was in the 1830's and 1840's that the steam
railway was shown to be practical in both engineering and financial
senses.
But the same technical developments that made possible the practical
steam railway also made the atmospheric railway, if not certainly
practical, at least worth a try. And it offered the prospect of
considerable advantages. Since the trains wouldn't have to carry
their prime mover, they would be lighter; therefore the track could
be built cheaper, and the trains' performance would be better.
The trains wouldn't trail smoke wherever they went (and into the
passenger cars in particular), and they would also be quiet.
And if one section of the route was hilly and required more motive
power, all that were needed would be more or larger pumping stations
along that section; no need to add extra locomotives. In short,
very much the same advantages that electricity gave a few decades
later. (Plus one more: a derailed train would tend to be kept near
the track by the pipe and piston.)
The success of the 1830's railways gave rise to the Railway Mania
of the 1840's, when interest in railway shares reached absurd levels.
In that climate the proposers of atmospheric lines could find the
backing they needed, and four atmospheric lines opened in a period
of about 3 years. In order of opening, these were:
* The Dublin & Kingstown, from Kingstown to Dalkey in Ireland,
1.5 miles long; operated 1844-54.
* The London & Croydon, from Croydon to Forest Hill in London,
England, 5 miles, then extended to New Cross for a total
of 7.5 miles; operated 1846-47.
* The Paris a St-Germain, from Bois de Vezinet to St-Germain
in Paris, France, 1.4 miles long; operated 1847-60.
* The South Devon, from Exeter to Teignmouth in Devonshire,
England, 15 miles, then extended to Newton (now Newton Abbot),
20 miles altogether; operated 1847-48.
I note in passing that while I (as a fan of his) might like Isambard
Kingdom Brunel to have invented the atmospheric system used on the
South Devon, it is wrong to say that he did so. He did choose it
and actively promoted it (well, "actively" is redundant with Brunel).
It was actually developed by Samuel Clegg and Joseph and Jacob Samuda.
Both of the longer, if shorter-lived, English lines used atmospheric
propulsion in both directions of travel, whereas the French and Irish
lines were built on hills and their trains simply returned downhill
by gravity. Since all were single-track lines, the one-way system
simplified the valves needed to let the pistons in and out of the
pipes at their ends (possibly while traveling at speed).
All four lines were converted to ordinary steam railways in the end,
and for the next 130 years the atmospheric system appeared dead.
For one thing, steam locomotive technology had too much of a head
start in development over the atmospheric system; steam railways
might have delays due to engine failure but they never had to shut
down for 6 weeks while a new design of longitudinal valve was
installed along the entire length of the route!
(The valve involved metal and leather parts and a greasy or waxy
sealant "composition". Although stories were told about rats
eating the composition, and this probably did happen sometimes,
it wasn't really a serious thing; the biggest problems in fact
were freezing and deterioration of the leather, and corrosion
of the metal parts.)
Also, the atmospheric system was inflexible, in that if the power
requirements for a section of route were greater than estimated,
very little could be done short of splitting the section and adding
a whole new pumping station. (All the lines used vacuum rather
than positive pressure in the pipes, which limited the pressure
differential to about 0.9 atmosphere in practice; but the valve
designs were marginal anyway and likely wouldn't have stood up
to greater pressures if they could have been used.)
What today might be seen as the most serious disadvantage of all,
the requirement for long interruptions of the motive power at
junctions, was not so noticeable in those days. If the train
didn't have enough speed to coast across the gap, well, the
third-class passengers could always get out and push, or maybe
there would be a horse conveniently at hand. At some stations
a small auxiliary pipe was used to advance the train from the
platform to the start of the main pipe.
There were many other proposals in those days for atmospheric
lines, but in view of these early failures, none of them were
ever built as atmospheric railways. The next atmospheric railway
to open actually appeared in 1990!
While the atmospheric railways were vanishing, the first
pneumatic dispatch tubes were beginning to appear; I'll get
into that later. But from that start, the pneumatic railway
idea began to return also. At first these were designed for
freight. Engineers J. Latimer Clark and T. W. Rammell formed
the Pneumatic Despatch Company, which built a demonstration tube
above ground in Battersea in 1861. This line successfully carried
loads up to 3 tons... and even a few passengers, lying down in
the vehicles in the 30-inch tunnel! The pressure used was up
to 0.025 atmosphere, and speeds up to 40 mph were reached.
The Post Office became interested in the system and had several
tunnels built for it. They were used from 1863 to 1874, though
interrupted for a time by the financial crisis of 1866.
(At this point they decided that the system didn't gain enough time
to be worth the cost, not to mention the risk of a vehicle becoming
stuck in the tube. In the 1920's, when electricity was available,
they returned a driverless trains system, using tunnels of similar
size to the old pneumatic tubes. This is the Post Office "tube"
Railway, which continues in use to this day. Such systems also
exist in Switzerland, which had it first, and in West Germany.)
Meanwhile, while these lines were moving the mail from the streets
of London to tunnels underneath, the first underground railways
were doing the same with passenger traffic. The first section of
the Metropolitan Railway (from Farringdon, now Farringdon Street,
to Paddington station) opened in 1863. It was promptly followed
by extensions, as well as competition in the form of the Metro-
politan District Railway, a subsidiary that got away. (Their
routes in central London today form the London Underground's
Metropolitan, District, Circle, and Hammersmith & City Lines.)
Now there was no thought of operating the Metropolitan with
anything but steam locomotives, despite the line being mostly
in tunnel. Sir John Fowler, who later co-designed the Forth Bridge,
did have the idea of a steam locomotive where the heat from the fire
would be retained in a cylinder of bricks, and therefore the fire
could be put out when traveling in the tunnels. One example of
this design, later called Fowler's Ghost, was tried in 1862.
It was thermodynamically absurd: as C. Hamilton Ellis put it,
"the trouble was that her boiler not only refrained from producing
smoke, it produced very little steam either".
In the end both the Met and the District were worked with condensing
steam locomotives: these emitted smoke as usual, but their exhaust
steam, while running in tunnels, was directed back into the water
tanks and condensed. The tanks were drained at the end of the run
and refilled with cold water.
So people were not only willing to travel in what amounted to an
opaque tube after all, but in one filled with smoke at that!
Why not one *without* smoke? And so the pneumatic railway was
now tried; but it never got past the demonstration stage.
The longest line to carry passengers was opened at the Crystal
Palace in London in 1864. It used a tunnel about 9 by 10 feet,
1800 feet long. The driving fan was 22 feet across, generating
about 0.01 atmosphere of pressure -- the larger the tube, the
lower the pressure you need. The vehicle was a full-size broad
gauge railway car ringed with bristles; it carried 35 passengers.
The trip took 50 seconds, thus averaging about 25 mph. Another,
smaller demonstration line was built at a fair in the US in 1867
by Alfred Ely Beach.
Beach then formed the Beach Pneumatic Transit Company, which
obtained permission to build a freight-carrying pneumatic line
under Broadway in New York. But what he actually opened in 1870
was a passenger-carrying pneumatic subway, the only one to
actually operate under a city street. It was only 312 feet long,
from Warren Street to Murray Street. The tunnel was 9 feet in
diameter, and was worked by a single car with a capacity of
18 passengers.
Beach tried but failed to get permission to extend the line.
It closed after a few months, and New York did not get a subway
again until 1904, when the first Interborough Rapid Transit route
was opened (from City Hall station along the present Lexington
Avenue, 42nd Street shuttle, and 7th Avenue lines to, um, initially
somewhere around 120th Street). This route was electric and so
have been all its successors.
Beach's tunnel had been almost forgotten when the crews
constructing the new subway broke into it in 1912.
In London, a pneumatic underground line was started *with* permission,
but construction was never completed. This was the Waterloo and
Whitehall Railway, which planned to connect Waterloo station to Great
Scotland Yard, 1/2 mile away, with a 12'9" diameter tunnel passing
under the Thames. Considering that the Thames Tunnel project of
Sir Marc Brunel and Isambard Kingdom Brunel -- now now part of
the Underground's East London Line -- had faced massive technical
and financial difficulties before its long-delayed completion only
about 20 years previously, this was no mean undertaking.
The Waterloo & Whitehall was halted by the financial crisis of 1866;
and it was never revived. The tunnel had been started from the
Great Scotland Yard end, and had just reached the river; work on
the underwater section was beginning. There were other proposals
for passenger-carrying pneumatic lines, but none saw construction
in that form. (At least one, under the Mersey at Liverpool, England,
was eventually opened as an ordinary railway.)
The next type of underground line to open in London was the Tower
Subway, which also passed under the Thames. It was a short route,
just under the river, worked by a small cable car. It opened in
1870 and was short-lived. (The tunnel served as a footway for a
while after that, then was taken over for pipes. The Thames Tunnel,
conversely, had been used first as a footway, then converted to
railway use.)
After this time, electric railways began to become practical.
The next underground line to open was the City & South London,
now part of the Underground's Northern Line. Its first section
(from Stockwell to a now disused terminus at King William Street,
replaced by the present Bank station) opened in 1890. It used
the new deep-level tube tunnels, with more limited ventilation
than on the Metropolitan Railway, so steam was out of the question
in any case. The original plan was for cable haulage, but instead
the new electric locomotives were tried and the line has always
been operated electrically. The line was first built with 10'2"
diameter tunnels, forcing use of rather small cars. (The cars
also had only tiny windows, on the grounds that there was nothing
to see -- so they got the nickname of "padded cells".)
All of the later lines in London, opened from 1900 onwards, were
built on the same general pattern as the C&SL, with deep-level
tubes and electric traction -- first by locomotives and then by
multiple-unit trains. The other tube lines vary from 11'6" to
12-foot diameter tunnels, and the C&SL was enlarged in the 1920's
to match. This is still rather small compared to most other
subways in the world, and is the reason for the distinctive
shape of the tube trains.
With the success of the electric lines, the Metropolitan and
District faced the loss of traffic, and they too were converted
to elecricity -- at least for the underground sections in central
London in 1905. The first line of the present New York subway
system opened in 1904 and this, too, has always used electricity.
(This was the original Interborough Rapid Transit route, from City
Hall station along the present Lexington Avenue, 42nd Street shuttle,
and 7th Avenue lines to, um, somewhere around 120th Street). Beach's
tunnel had been almost forgotten when the crews constructing the
new subway broke into it in 1912.
Meanwhile, the humble original concept of the pneumatic dispatch tube
continued to develop. The first of them, 1.5 inches in diameter,
had been built in 1853 by J. Latimer Clark; it connected the
Electrical and [sic] International Telegraph Company's office in
Telegraph Street, London, with their branch 675 feet away at the
Stock Exchange.
The key invention was J. W. Willmott's double sluice valve of 1870,
which allowed rapid dispatching of successive capsules. It was also
possible, as had been done on the pneumatic railways, to use both
positive pressure (on the order of 1 atmosphere) and vacuum, to
drive the capsules both ways from a single pumping station. The
tubes became quite common; many miles were built in various European
and North American cities. By 1886 London had over 34 miles of them
for the Post Office's telegraph service alone. In the Paris system
a person could pay a fee for a message to be sent specifically by
the tube.
They were also used within large buildings, and some survive in
use to this day.
Finally, in 1990, the Brazilian company Sur Coester stunned the
world by opening at a fair in Djakarta, Indonesia, a demonstration
line of their Aeromovel system. This is nothing more nor less
than an elevated atmospheric railway. The structure is concrete,
with steel rails and a rectangular concrete air pipe larger than
those on the 19th century lines. The longitudinal valve is made
of heavy cloth-reinforced rubber. Computerized remote control
is used.
Oh yes.
Pneumatic dispatch tubes were depicted in the 1985 movie "Brazil";
Beach's tunnel was depicted, in rather distorted form, in the 1989
movie "Ghostbusters II"; the modern form of the New York subway
has been depicted in many movies, notably the 1974 one "The Taking
of Pelham One Two Three"; but I don't believe the atmospheric or
pneumatic systems have ever been depicted at work in any movie.
Clearly this needs to be rectified! :-)
References.
Almost all the information in this posting about the pneumatic
and atmospheric systems comes from one book... "Atmospheric
Railways: A Victorian Venture in Silent Speed" by Charles Hadfield,
1967, reprinted 1985 by Alan Sutton Publishing, Gloucester; ISBN
0-86299-204-4.
For other topics, I principally consulted "The Pictorial
Encyclopedia of Railways", 1976 edition, by (C.) Hamilton Ellis,
Hamlyn Publishing; ISBN 0-600-37585-4; some details came from other
books or my memory.
The information about the Djakarta line comes from two postings in
rec.railroad, one last November by Andrew Waugh quoting the November 24
issue of "New Scientist" magazine, and the recent one by Russell Day
citing "Towards 2000".
--
Mark Brader "Great things are not done by those
SoftQuad Inc., Toronto who sit down and count the cost
utzoo!sq!msb, msb@sq.com of every thought and act." -- Daniel Gooch
This article is in the public domain.

94
txt_files/aladdin_.off Normal file
View File

@ -0,0 +1,94 @@
Newsgroups: alt.folklore.urban,rec.arts.disney
From: snopes@netcom.com (snopes)
Subject: Re: Disney's Aladdin movie causes child nudity?
Date: Tue, 12 Jul 1994 02:40:04 GMT
ucisleb@issc.unocal.com (A UL Fan) writes:
> Has anyone heard this Urban Legend? Some recent reports have parents
> complaining their children 'undress' when they watch Disney's Aladin movie.
> After some research it was found there are a few scenes in the movie where a
> faint wisper can be herard, "Take off your clothes" which may cause the
> children to 'undress'?
> Well I took a good look at the movie and found in the scene which
> Aladin is standing on the magic carpet just below Jasmine's balcony is where
> the wispers can be heard, "Take off your clothes" and this is when some
> children take it all off!
This story has been going around for months. For the uninitiated:
-----------------------------------------------------------------------------
There is a rumor, apparently still among a very few people, that the
character in the animated Disney movie slipped a saucy suggestion into a scene
with Princess Jasmine.
In the scene, Aladdin, who is dressed as a prince, flies on a magic carpet
to Jasmine's balcony to win her back after a fight.
But when he gets there, Jasmine's pet tiger, Rajah, confronts him and backs
him up onto the railing with some menacing snarls.
As Jasmine watches, Aladdin tries to shoo the tiger.
It's pretty hard to hear exactly what goes on next.
Rajah is growling, Aladdin is mumbling fearfully and the Genie is cutting
up with some wisecracks.
But there are some people who believe that in the midst of all that
confusion, Aladdin whispers to Jasmine: "Take off your clothes."
Not helping matters is the fact that the Princess Jasmine's eyes get big
and wide immediately afterward.
Disney says the whole thing is crazy.
They've gotten a few media inquiries about the rumor, and they've prepared
a little statement to explain things.
"His exact words are: 'Scat! Come on. Good Tiger. Take off and go. Down
Kitty."
"Take off and go" may not be inspired dialogue, or even what most of us
would say when faced with an angry tiger.
But if you listen just right, it could sound like "take off your
clothes."
"On no occasion does Aladdin ever say anything derogatory to Jasmine.
Disney movies have a long, long tradition of providing the highest quality
family entertainment," Fulton said.
Just to test what actual children think, The Gazette asked JoAnne Klein of
Tempe to put Aladdin in the ol' VCR and play the scene for her two children,
Matt, 7, and Becky, 6.
"We've played it about 20 times and we had it at full volume. They think it
says, 'Take off kitty,' or 'Take off carpet'."
"I highly doubt it says 'take off your clothes,' and the kids certainly
didn't get that out of it," she said.
No one seems too sure where this rumor came from, and it's hard to say how
things like this get started.
Gary Alan Fine, a professor at the University of Georgia, tracks what he
calls "contemporary legends."
"Someone who believes Hollywood studios are trying to trick the public
would be more likely to believe this," Fine said.
He has not yet heard this legend, making him believe it is just starting or
isn't good enough or funny enough for people to repeat to others.
Even if the rumor were true, do you have to worry about your kids
subliminally picking it up and developing a fondness for running around in the
buff?
Elaine Katzman, a Phoenix counselor and sex educator, says no.
"When there is so much overt stuff going on, I hardly think so," Katzman
said.

82
txt_files/alligato.sew Normal file
View File

@ -0,0 +1,82 @@
From: twcaps@tennyson.lbl.gov (Terry Chan)
Subject: Re: alligators in sewers?
In article <3080@keele.keele.ac.uk> cla04@seq1.keele.ac.uk (A.T. Fear) writes:
+> In article <1992Jun27.235945.4406@dartvax.dartmouth.edu>
zk@coos.dartmouth.edu
+> (Generator) writes:
+>> Hey, I was wondering....Anyone know why people claim there are
+>> alligators in sewers?
+
+I don't know, maybe its the fear of the nearby unknown. In Victorian
London there was a scare about savage
+black pigs living in the sewers. Are there any present day reports of
+subterranean porcine horrors?
Sounds like a great story. I'd like to hear of some details/updates.
Well, it's been a while since I've written a long post, so here goes.
A wealth of detail on the "alligators in the sewers of New York City"
legend is detailed in _The Vanishing Hitchhiker_ by Jan Harold
Brunvand (more abbreviated versions are in _More of the Straight Dope_
and _Rumor!_).
While I won't recount the details of the legend this time around, I
will share some details on what may have been the origins of this story
in _The Vanishing Hitchhiker_.
Anthropologist Loren Coleman checked out "unusual phenomena and events"
and especially animal lore in the United States. He found over 70
such reports from 1843-1973 but only one pertaining to sewers.
In the February 10, 1935 _New York Times_, there a report of kids in
the East 123rd Street area who were dumping snow into an open manhole.
Salvatore Condulucci, 16 yrs old was watching near the rim of manhole
and would direct his friends to dump more slush in as the level went
down to ensure that the sewer wouldn't be overly clogged. Then there
were signs of clogging 10 feet down where the sewer connects to the
Harlem river. He saw something black moving and then shouts to everyone,
"Honest, it's an alligator." The story is summarized in the Times'
headlines as:
ALLIGATOR FOUND IN UPTOWN SEWER
Youths Shoveling Snow into Manhole
See the Animal Churning in Icy Water
SNARE IT AND DRAG IT OUT
Reptile Slain by Rescuers
When It Gets Vicious--
Whnce It Came is Mystery
The reporter speculated that the alligator came from a passing boat
from "the mysterious Everglades."
Separately, Robert Daley in _The World Beneath the City_ writes that
there was apparently a problem with alligators in the sewers in the
1930s. Former Commissioner of Sewers Teddy May personally inspected
the sewers and told Daley that he found alligators with an average
length of 2 feet. He then commenced on an eradication campaign and
announed that all were exterminated by 1937.
These two points then seem to form a pretty good basis for the enduring
legend.
Daley's writeup of his talk with May was published in 1959. Brunvand
includes a fantasy-paradoy of the alligator story in the 1974 _New
Yorker_ and also mentions that Thomas Pynchon's 1963 sci-fi _V_ contains
one of most detailed treatments of the legend. Brunvand speculates
that Pynchon may have been influenced by hearing of Daley's discussion
with May.
If the accounts are true, then perhaps the "alligators in the sewers"
legend may be similar to the Shergold stories. I think there is some
debate as to whether one would say that the alligators were indeed
living in the sewers or were they dumped and found there or whatever.
Terry "tastes like chicken" Chan

667
txt_files/alt3.txt Normal file
View File

@ -0,0 +1,667 @@
-Here's the lowdown on "ALTERNATIVE 3" from a TV-movie compendium.
"ALTERNATIVE 3" (GB 1977; 52m, colour)
Amusing spoof do commentary about the disappearance of various high-IQ
citizens, allegedly to form nucleus of a standby civilization on Mars against
the coming End of the World. Sly parodies of fashionable breathless TV
journalism sweetened the joke, ex- newscaster Tim Brinton held it all
together with po-faced gravity and needless to say some supernature fanatics
refuse to this day to accept that it was anything but gospel truth, although
it was orignally scheduled for April 1st (1977). Written by David Ambrose;
directed by Chris Miles; for Anglia. Apparently the TV-movie was spawned by a
book (or assuming the date is accurate, vice versa) of the same name. Written
by Leslie Watkins, it was published by Sphere Books Ltd. in 1978.
======================================================================
ALTERNATIVE 003
by
Leslie Watkins
with
David Ambrose & Christopher Miles
Section 1
NO NEWSPAPER has yet secured the truth behind the operation known
as ALTERNATIVE 3. Investigations by journalists have been blocked by
governments on both sides of the Iron Curtain. American and Russia are
ruthlessly obsessed with guarding their shared secret and this obsession, as
we can now prove, has made them partners in murder.
However, despite this intensive security, fragments of information have
been made public. Often they are released inadvertently by experts who do
not appreciate their sinister significance and these fragments, in isolation,
mean little. But when jigsawed together they form a definite pattern, a
pattern which appears to emphasize the enormity of this conspiracy of
silence.
On May 3, 1977, the Daily Mirror published this story:
President Jimmy Carter has joined the ranks of UFO spotters. He sent
in two written reports stating he had seen a flying saucer when he was the
Governor of Georgia.
The President has shrugged off the incident since then, perhaps fearing
that electors might be wary of a flying saucer freak.
But he was reported as saying after the "sighting"; "I don't laugh at
people any more when they say they've seen UFOs because I've seen one
myself."
Carter described his UFO like this: "Luminous, not solid, at first bluish,
then reddish. It seemed to move towards us from a distance, stopped, then
moved partially away."
Carter filed two reports on the sighting in 1973, one to the
International UFO Bureau and the other to the National Investigations
Committee on Aerial Phenomena.
Heydon Hewes, who directs the International UFO Bureau from his
home in Oklahoma City, is making speeches praising the President's
"open-mindedness."
But during his presidential campaign last year Carter was cautious. He
admitted he had seen a light in the sky but declined to call it a UFO.
He joked: "I think it was a light beckoning me to run in the California
primary election."
Why this change in Carter's attitude? Because, by then, he had been
briefed on Alternative 3?
A 1966 Gallup Poll showed that five million Americans including several
highly experienced airline pilots claimed to have seen Flying Saucers.
Fighter pilot Thomas Mantell has already died while chasing one over
Kentucky his F.51 aircraft having disintegrated in the violent wash of his
quarry's engines.
The U.S. Air Force, reluctantly bowing to mounting pressure, asked Dr.
Edward Uhler Condon, a professor of astrophysics, to head an investigation
team at Colorado University.
Condon's budget was $500,000. Shortly before his report appeared in
1968, this story appeared in the London Evening Standard:
The Condon study is making headlines, but for all the wrong reasons. It
is losing some of its outstanding members, under circumstances which are
mysterious to say the least. Sinister rumors are circulating. At least four key
people have vanished from the Condon team without offering a satisfactory
reason for their departure.
The complete story behind the strange events in Colorado is hard to
decipher. But a clue, at last may be found in the recent statements of Dr.
James McDonald, the senior physicist at the Institute of Atmospheric
Physics at the University of Arizona and widely respected in his field. In a
wary, but ominous, telephone conversation this week, Dr. McDonald told me
that he is "most distressed." Condon's 1,485-page report denied the
existence of Flying Saucers and a panel of the American National Academy of
Sciences endorsed the conclusion that "further extensive study probably
cannot be justified."
But, curiously, Condon's joint principal investigator, Dr. David Saunders,
had not contributed a word to that report. And on January 11, 1969, the
Daily Telegraph quoted Dr. Saunders as saying of the report:
"It is inconceivable that it can be anything but a cold stew. No matter
how long it is, what it includes, how it is said, or what it recommends, it will
lack the essential element of credibility."
Already there were wide-spread suspicions that the Condon
investigation had been part of an official coverup, that the government knew
the truth but was determined to keep it from the public. We now know that
those suspicions were accurate. And that the secrecy was all because of
Alternative 3.
Only a few months after Dr. Saunders made his "cold stew" statement a
journalist with the Columbus (Ohio) Dispatch embarrassed the National
Aeronautics and Space Agency by photographing a strange craft looking
exactly like a Flying Saucer at the White Sands missile range in New Mexico.
At first no one at NASA would talk about this mysterious circular craft,
15 feet in diameter, which had been left in the "missile graveyard" a section
of the range where most experimental vehicles were eventually dumped.
But the Martin Marietta company of Denver, where it was built,
acknowledged designing several models, some with ten and twelve engines.
And a NASA official, faced with this information, said, "Actually the engineers
used to call it 'The Flying Saucer."
That confirmed a statement made by Dr. Garry Henderson, a leading
space research scientist: "All our astronauts have seen these objects but have
been ordered not to discuss their findings with anyone."
Otto Binder was a member of the NASA space team. He has stated that
NASA "killed" significant segments of conversation between Mission Control
and Apollo 11, the spacecraft which took Buzz Aldrin and Neil Armstrong to
the Moon and that those segments were deleted from the official record:
"Certain sources with their own VHF receiving facilities that by passed
NASA broadcast outlets claim there was a portion of Earth-Moon dialogue
that was quickly cut off by the NASA monitoring staff."
Binder added:
"It was presumably when the two moon walkers, Aldrin and Armstrong,
were making the round some distance from the LEM that Armstrong
clutched Aldrin's arm excitedly and exclaimed 'What was it? What the hell
was it? That's all I want to know.' "
Then, according to Binder, there was this exchange:
MISSION CONTROL: What's there? malfunction(garble).Mission
Control calling Apollo 11.
APOLLO 11: These babies were huge, sir. enormous, Oh, God you
wouldn't believe it!
I'm telling you there are other space-craft out there
lined up on the far side of the crater edge.
They're on the Moon watching us.
NASA, understandably, has never confirmed Binder's story but Buzz
Aldrin was soon complaining bitterly about the Agency having used him as a
"traveling salesman."
And two years after his Moon mission, following reported bouts of heavy
drinking, he was admitted to hospital with "emotional depression."
"Traveling salesman", that's an odd choice of words, isn't it? What, in
Aldrin's view, were the NASA authorities trying to sell? And to whom?
Could it be that they were using him, and others like him, to sell their
official version of the truth to ordinary people right across the world?
Was Aldrin's Moon walk one of those great spectaculars, presented with
maximum publicity, to justify the billions being poured into space research?
Was it part of the American-Russian cover for Alternative 3?
All men who have travelled to the Moon have given indications of
knowing about Alternative 3 and of the reasons which precipitated it.
In May, 1972, James Irwin, officially the sixth man to walk on the
Moon, resigned to become a Baptist missionary. And he said then, "The
flight made me a deeper religious person and more keenly aware of the
fragile nature of our planet."
Edgar Mitchell, who landed on the Moon with the Apollo 14 mission in
February, 1971, also resigned in May, 1972 to devote himself to
parapsychology. Later, at the headquarters of his Institute for noetic
Sciences near San Francisco, he described looking at this world from the
Moon: "I went into a very deep pathos, a kind of anguish. That incredibly
beautiful planet that was Earth, a place no bigger than my thumb was my
home.. a blue and white jewel against a velvet black sky...was being killed
off."
And on March 23, 1974, he was quoted in the Daily Express as saying
that society had only three ways in which to go and that the third was "the
most viable but most difficult alternative."
Another of the Apollo Moon walkers, Bob Grodin, was equally specific
when interviewed by a Sceptre Television reporter on June 20, 1977;
"You think they need all that crap down in Florida just to put two guys
up there on a bicycle? The hell they do! You know why they need us?
So they've got a P.R. story for all that hardware they've been firing into
space.
We're nothing, man! Nothing!"
On July 11, 1977, the Los Angeles Times came near to the heart of
the matter, nearer than any other newspaper, when it published a
remarkable interview with Dr. Gerard O'Neill.
Dr. O'Neill is a Princeton professor who served, during a 1976
sabbatical, as Professor of Aerospace at the Massachusetts Institute of
Technology and who gets nearly $500,000 each year in research grants from
NASA. Here is a section from that article:
The United Nations, he says, has conservatively estimated that the
world's population, now more than 4 billion people, will grow to about 6.5
billion by the year 2000. Today, he adds, about 30% of the world's
population is in developed nations. But, because most of the projected
population growth will occur in underdeveloped countries, that will drop to
22% by the end of the century. The world of 2000 will be poorer and
hungrier than the world today, he says.
Dr. O'Neill also explained the problems caused by the earth's 4,000 mile
atmospheric layer, but presumably because the article was comparatively
short one, he was not quoted on the additional threat posed by the notorious
"greenhouse" syndrome.
His solution? He called it Island 3. And he added: "There's no debate
about the technology involved in doing it. That's been confirmed by NASA's
top people."
But Dr. O'Neill, a family man with three children who like to fly
sailplanes in his spare time, did not realize that he was slightly off target.
He was right, of course, about the technology.
But he knew nothing of the political ramifications and he would have
been astounded to learn that NASA was feeding his research to the Russians.
Even eminent political specialists, as respected in their sphere as Dr.
O'Neill is in his own, have been puzzled by an undercurrent they have
detected in East-West relationships.
Professor G. Gordon Broadbent, director of the independently financed
Institute of Political Studies in London and author of a major study of
U.S.-Soviet diplomacy since the 1950s, emphasized that fact on June 20,
1977, when he was interviewed on Sceptre Television:
"On the broader issue of Soviet-U.S. relations, I must admit there is an
element of mystery which troubles many people in my field."
He added: "What we're suggesting is that, at the very highest levels of
East-West diplomacy, there has been operating a factor of which we know
nothing. Now it could just be and I stress the word 'could' that this
unknown factor is some kind of massive but covert operation in space. But
as for the reasons behind it we are not in the business of speculation."
Washington's acute discomfort over O'Neill's revelations through the Los
Angeles Times can be assessed by the urgency with which a "suppression"
Bill was rushed to the Statute Book.
On July 27, 1977, only sixteen days after publication of the O'Neill
interview columnist Jeremy Campbell reported in the London Evening
Standard that the Bill would become law that September. He wrote:
It prohibits the publishing of an official report without permission,
arguing that this obstructs the Government's control of its own information.
That was precisely the charge brought against Daniel Ellsberg for giving the
Pentagon papers to the New York Times.
Most ominous of all, the Bill would make it a crime for any present or
former civil servant to tell the Press of Government wrong doing or pass on
any news based on information "submitted to the Government in private."
Campbell pointed out that this final clause "has given serious pain to
guardians of American Press freedom because it creates a brand new crime."
Particularly as there was provision in the Bill for offending journalists to be
sent to prison for up to six years.
We subsequently discovered that a man called Harman Leonard Harman
read that item in the newspaper and that later, in a certain television
executives' dining room, he expressed regret that a similar Law had not been
passed years earlier by the British government.
He was eating treacle tart with custard at the time and he reflected
wistfully that he could then have insisted on such a Law being obeyed. That,
when it came to Alternative 3, would have saved him from a great deal of
trouble.
He had chosen treacle tart, not because he particularly liked it, but
because it was 2p(ence) cheaper than the chocolate sponge. That was
typical of Harman.
He was one of the people, as you may have learned already through the
Press, who tried to interfere with the publication of this book. We will later
be presenting some of the letters received by us from him and his lawyers
together with the replies from our legal advisers.
We decided to print these letters in order to give you a thorough insight
into our investigation for it is important to stress that we, like Professor
Broadbent, are not in the "business of speculation." We are interested only in
the facts.
And it is intriguing to note the pattern of facts relating to astronauts
who have been on Moon missions and who have therefore been exposed to
some of the surprises presented by Alternative 3.
A number, undermined by the strain of being party to such a
horrendous secret, suffered nervous or mental collapses. A high percentage
sought sanctuary in excessive drinking or in extramarital affairs which
destroyed what had been secure and successful marriages.
Yet these were men originally picked from many thousands precisely
because of their stability. Their training and experience, intelligence and
physical fitness all these, of course, were prime considerations in their
selection. But the supremely important quality was their balanced
temperament.
It would need something stupendous, something almost unimaginable
to most people, to flip such men into dramatic personality changes. That
something, we have now established, was Alternative 3 and, perhaps more
particularly, the night marish obscenities involved in the development and
perfection of Alternative 3.
We are not suggesting that the President of the United States has had
personal knowledge of the terror and clinical cruelties which have been an
integral part of the Operation, for that would make him directly responsible
for murders and barbarous mutilations.
We are convinced, in fact, that this is not the case. The President and
the Russian leader, together with their immediate subordinates, have been
concerned only with broad sweep of policy.
They have acted in unison to ensure what they consider to be the best
possible future for mankind. And the day to day details have been delegated
to high level professionals.
These professionals, we have now established, have been classifying
people selected for the Alternative 3 operation into two categories: those
who are picked as individuals and those who merely form part of a "batch
consignment."
There have been several "batch consignments" and it is the treatment
meted out to most of these men and women which provides the greatest
cause for outrage.
No matter how desperate the circumstances may be$and we reluctantly
recognize that they are extremely desperate$no humane society could
tolerate what has been done to the innocent and the gullible.
That view, fortunately, was taken by one man who was recruited into
the Alternative 3 team three years ago. He was, at first, highly enthusiastic
and completely dedicated to the Operation. However, he became revolted by
some of the atrocities involved. He did not consider that, even in the
prevailing circumstances, they could be justified.
Three days after the transmission of that sensational television
documentary, his conscience finally goaded him into action. He knew the
appalling risk he was taking, for he was aware of what had happened to
others who had betrayed the secrets of Alternative 3, but he made telephone
contact with television reporter Colin Benson and offered to provide Benson
with evidence of the most astounding nature.
He was calling, he said, from abroad but he was prepared to travel to
London. They met two days later. And he then explained to Benson that
copies of most orders and memoranda, together with transcripts prepared
from tapes of Policy Committee meetings, were filed in triplicate in
Washington, Moscow and Geneva where Alternative 3 had its operational
headquarters.
The system had been instituted to ensure there was no
misunderstanding between the principal partners. He occasionally had
access to some of that material although it was often weeks or even months
old before he saw it and he was willing to supply what he could to Benson.
He wanted no money. He merely wanted to alert the public, to help stop the
mass atrocities.
Benson's immediate reaction, after he had assessed the value of this
offer, was that Sceptre should mount a follow up programme, one which
would expose the horrors of Alternative 3 in far greater depth.
He argued bitterly with his superiors at Sceptre but they were adamant.
The company was already in serious trouble with the government and there
was some doubt about whether its licence would be renewed. They refused
to consider the possibility of doing another programme. They had officially
disclaimed the Alternative 3 documentary as a hoax and that was where the
matter had to rest.
Anyway, they pointed out, this character who'd come forward was
probably a nut$ If you saw the documentary, you will probably realize that
Benson is a stubborn man. His friends say he is pig obstinate. They also say
he is a first class investigative journalist.
He was angry about this attempt to suppress the truth and that is why
he agreed to co-operate in the preparation of this book. That co-operation
has been invaluable.
Through Benson we met the telephone caller who we now refer to as
Trojan. And that meeting resulted in our acquiring documents, which we
will be presenting, including transcripts of tapes made at the most secret
rendezvous in the world, thirty five fathoms beneath the ice cap of the
Arctic.
For obvious reasons, we cannot reveal the identity of Trojan. Nor can
we give any hint about his function or status in the Operation.
We are completely satisfied, however, that his credentials are authentic
and that, in breaking his oath of silence, he is prompted by the most
honourable of motives.
He stands in relation to the Alternative 3 conspiracy in much the same
position as the anonymous informant "Deep Throat" occupied in the
Watergate affair. Most of the "batch consignments" have been taken from the
area known as the Bermuda Triangle but numerous other locations have also
been used.
On October 6, 1975, the Daily Telegraph gave prominence to this
story:
The disappearance in bizarre circumstances in the past two weeks of
20 people from small coastal communities in Oregon was being intensively
investigated at the weekend amid reports of an imaginative fraud scheme
involving a "flying saucer" and hints of mass murder.
Sheriff's officers at Newport, Oregon, said that the 20 individuals had
vanished without trace after being told to give away all their possessions,
including their children, so that they could be transported in a flying saucer
"by UFO to a better life."
"Deputies under Mr. Ron Sutton, chief criminal investigator in
surrounding Lincoln County, have traced the story back to a meeting on
September 14 in a resort hotel, the Bayshore Inn at Waldport, Oregon$
Local police have received conflicting reports as to what occurred (at the
meeting).
But while it is clear that the speaker did not pretend to be from outer
space, he told the audience how their souls could be "saved through a UFO.
"The hall had been reserved for a fee of $50 by a man and a woman who
gave false names. Mr. Sutton said witnesses had described them as "fortyish,
well groomed, straight types."
The Telegraph said that "selected people would be prepared at a special
camp in Colorado for life on another planet" and quoted Investigator Sutton
as adding:
"They were told they would have to give away everything, even their
children. I'm checking a report of one family who supposedly gave away
150-acre farm and three children."
"We don't know if it's fraud or whether these people might be killed.
There are all sorts of rumours, including some about human sacrifice and
that this is sponsored by the (Charles) Manson family."
"Most of the missing 20 were described as being "hippie types"
although there were some older people among them."
People of this calibre, we have now discovered, have been what is
known as "scientifically adjusted" to fit them for a new role as a slave
species.
There have been equally strange reports of animals, particularly farm
animals, disappearing in large numbers. And occasionally it appears that
aspects of the Alternative 3 operation have been bungled, that attempts to
lift "batch consignments" of humans or of animals have failed.
On July 15, 1977, the Daily Mail under a "Flying Saucer" headline
carried this story:
Men in face masks, using metal detectors and a geiger counter,
yesterday scoured a remote Dartmoor valley in a bid to solve a macabre
mystery. Their search centred on marshy grassland where 15 wild ponies
were found dead, their bodies mangled and torn.
All appeared to have died at about the same time, and many of the bones
have been inexplicably shattered. To add to the riddle, their bodies
decomposed to virtual skeletons within only 48 hours.
Animal experts confess they are baffled by the deaths at Cherry Brook
Valley near Postbridge.
Yesterday's search was carried out by members of the Devon
Unidentified Flying Objects centre at Torquay who are trying to prove a link
with outer space.
They believe that flying saucers may have flown low over the area and
created a vortex which hurled the ponies to their death. Mr. John Wyse,
head of the four-man team, said:
"If a spacecraft has been in the vicinity, there may still be detectable
evidence. We wanted to see if there was any sign that the ponies had been
shot but we have found nothing. This incident bears an uncanny
resemblance to similar events reported in America."
The Mail report concluded with a statement from an official
representing The Dartmoor Livestock Protection Society and the Animal
Defence Society:
"Whatever happened was violent. We are keeping an open mind. I am
fascinated by the UFO theory. There is no reason to reject that possibility
since there is no other rational explanation."
These, then, were typical of the threads, which inspired the original
television investigation. It needed one person, however, to show how they
could be embroidered into a clear picture.
Without the specialist guidance of that person the Sceptre television
documentary could never have been produced, and Trojan would never have
contacted Colin Benson.
And it would have been years, possibly seven years or even longer,
before ordinary people started to suspect the devastating truth about this
planet on which we live. That person, of course, is the old man$
Section 2
THEY Realize now that they should have killed the old man.
That would have been the logical course to protect the secrecy of
Alternative 3. It is curious, really, that they did not agree to his death on
that Thursday in February for, as we have stated, they do use murder.
Of course, it is not called murder, not when it is done jointly by the
governments of America and Russia. It is an Act of Expediency.
Many Acts of Expediency are believed to have been ordered by the
sixteen men, official representatives of the pentagon and the Kremlin, who
comprise the Policy Committee.
Grotesque and apparently inexplicable slayings in various parts of the
world in Germany and Japan, Britain and Australia are alleged to have been
sanctioned by them.
We have not been able to substantiate these suspicions and allegations
so we merely record that an unknown number of people, including
distinguished radio astronomer Sir William Ballantine, have been executed
because of this astonishing agreement between the super-powers.
Prominent politicians, including two in Britain, were among those who
tried to prevent the publication of this book. They insisted that it is not
necessary for you, and others like you, to be told the unpalatable facts.
They argue that the events of the future are now inevitable, that there is
nothing to be gained by prematurely unleashing fear.
We concede that they are sincere in their views but we maintain that
you ought to know. You have a right to know.
Attemps were also made to neuter the television programme which first
focused public attention on Alternative 3. Those attemps were partially
successful. And, of course, after the programme was transmitted, when
there was that spontaneous explosion of anxiety, Septre Television was
forced to issue a formal denial.
It had all been a hoax. That's what they were told to say. That's what
they did say.
Most people were then only too glad to be reassured. They wanted to
be convinced that the programme had been devised as a joke, that it was
merely an elaborate piece of escapist entertainment. It was more
comfortable that way.
In fact, the television researchers did uncover far more disturbing
material than they were allowed to transmit. The censored information is
now in our possession. And, as we have indicated, there was a great deal
that Benson and the rest of the television team did not discover, not until
after their programme had been screened.
------------------------------------------------------------------------
Copies of Alternative 3 are rare. There is a source in ENGLAND which
we do not currently know, however, you may purchase an imported copy for
about $11.00 from Metaphysical Book Store, 9511 E. Colfax, Aurora, CO
80010 (303) 341-7562. Please mention that you got the address from VANGARD
SCIENCES or the KeelyNet Bulletin Board System. Thanks.
Placed in the public domain from the
VANGARD SCIENCES archives on October 28 1989.
Our mailing address is PO BOX 1031, Mesquite, TX 75150.
Voice phone (Jerry 214-324-8741...Ron 214-484-3189
KeelyNet (214) 324-3501
======================================================================
The Truth about Alternative 3
from its author, Leslie Watkins
(This article is taken from the $Windwords$ newsletter)
address not available
In our June issue, we told you about the controversial book Alternative
3, by British author Leslie Watkins. In out attempt to find out if the
shocking theories in the book were true, we called Avon Books, the
American publisher; they said the book was out of print in the states. We
called Penguin Books in London and found that it was listed on their
NON-FICTION list. A senior editor there told us that it was officially
classified as FICTION BASED ON FACT. The author's agent told us it was
most definitely fiction. We wrote to the author himself to try to get the
real story, and here is the letter he sent us.
Dear Ms. Dittrich:
Thank you for your letter, which reached me today. Naturally, I am
delighted by your interest in Alternative 3 and by the fact that you plan to
sell it in the Windwords bookstore. I will certainly cooperate in any way I
can.
The correct description of Alternative 3 was given to you by the
representative from Penguin Books. The book is based on fact, but uses that
fact as a launchpad for a HIGH DIVE INTO FICTION. In answer to your
specific questions:
1) There is no astronaut named Grodin.
2) There is no Sceptre Television and the reported Benson is also
fictional.
3) There is no Dr. Gerstein.
4) Yes, a "documentary" was televised in June 1977 on Anglia
Television, which went out to the entire national network in Britain.
It was called Alternative 3 and was written by David Ambrose and
produced by Christopher Miles (whose names were on the book for
contractual reasons). This original TV version, which I EXPANDED
IMMENSELY for the book, was ACTUALLY A HOAX which had been
scheduled for transmission on April Fools' Day. Because of certain
problems in finding the right network slot, the transmission was
delayed.
The TV program did cause a tremendous uproar because viewers
refused to believe it was fiction. I initially took the view that the
basic premise was so way-out, particularly the way I aimed to
present it in the book, that no one would regard it as non-fiction.
Immediately after publication, I realized I was totally wrong. In fact,
the amazing mountains of letters from virtually all parts of the world
including vast numbers from highly intelligent people in positions of
responsibility-convinced me that I had ACCIDENTALLY trespassed
into a range of top-secret truths.
Documentary evidence provided by many of these
correspondents decided me to write a serious and COMPLETELY
NON-FICTION sequel. Unfortunately, a chest containing the bulk of
the letters was among the items which were mysteriously LOST IN
TRANSIT some four years when I moved from London, England, to
Sydney, Australia, before I moved on to settle in New Zealand. For
some time after Alternative 3 was originally published, I have
reason to suppose that my home telephone was being tapped and my
contacts who were experienced in such matters were convinced
that certain intelligence agencies considered that I probably knew
too much.
So, summing up, the book is FICTION BASED ON FACT. But I now feel
that I inadvertently got VERY CLOSE TO A SECRET TRUTH. I hope this is of
some help to you and I look forward to hearing from you again.
With best wishes,
Leslie Watkins
Unfortunately, Alternative 3 is no longer available. We (Windwords)
bought all the remaining copies from the British publisher and those quickly
sold out. If the book is reprinted, you can be sure we'll let you know and
we'll carry it in the Windwords bookstore.

350
txt_files/alt_folk.faq Normal file
View File

@ -0,0 +1,350 @@
Newsgroups: alt.folklore.college,alt.folklore.urban
Path: news.cso.uiuc.edu!ux1.cso.uiuc.edu!uchinews!kimbark!thf2
From: thf2@kimbark.uchicago.edu (Ted Frank)
Subject: alt.folklore.college Frequently Asked Questions
Message-ID: <1993Mar31.155352.9047@midway.uchicago.edu>
Sender: news@uchinews.uchicago.edu (News System)
Reply-To: thf2@midway.uchicago.edu
Organization: University of Chicago
Date: Wed, 31 Mar 1993 15:53:52 GMT
Last-Modified: 93/3/31
Version: 0.58C
31 March 1993
Official Usenet Alt.Folklore.College Frequently Posted Legends
This is alt.folklore.college -- the newsgroup where nonsense is revered
as an artform, and debunking has been taken to new heights. An offshoot
of alt.folklore.urban, it discusses urban legends (ULs) about college
life: all those great stories that a "friend of a friend" (FOAF) told
you about how roommate suicides result in a 4.0 or exams where the teacher
asks "Why?" and the correct answer is "Why not?"
In other words, it's a great place to get a reality check on anything that
"a friend" told you, or to compare notes about odd things.
A NOTE TO NEW READERS:
- We encourage you to post any stories you suspect may be an UL. Funny
or whatever. Details matter! Please try to give as much as possible.
BUT, be advised that many of the stories in the FAQ have been hashed
over. If you wish to debate them, be prepared to substantiate your
claim.
The purpose of summarizing these frequently-seen legends is to provide
a guide to veracity and their experience in this newsgroup. Most ULs
cannot be traced back to original true incidents, but some, particularly
the more recent ones can be. There are ULs which may, coincidentally,
have a true manifestation, but a true manifestation does not deprive a
UL of its legendary status. However, since many if not most ULs are
false, where possible, I include a comment referring to a true incident,
subject to sufficient evidence, of course.
A DIGRESSION ON URBAN LEGENDS AND "FALSEHOOD"
Occasionally, there is a post to the effect of: "That actually happened
you st*p*d, f*ck*ng, b*st*rds, Jan Harold Brunvand is Polish, the FAQ
list is wrong, the sun rises in the West and it's not an urban legend."
As noted elsewhere in this list and by astute individuals on the net, an
UL does not have to be false. If we take the example of "The Unsolvable
Math Problem" (see below), we find that mathematician George Dantzig is
the probable individual involved. So is this story no longer an UL?
Jan Harold Brunvand addresses this issue thusly:
"Despite finding its [The Unsolvable Math Problem] apparent
origin, I continue to accept anonymous versions as legendary.
Here's why."
"An oral story is a story, whatever its origin. As long as a
story continues to circulate in different variations, partly
by word of mouth, we may regard it as folklore. But probably
'The Unsolvable Math Problem' legend should no longer be
discussed as strictly 'apocryphal,' since we now seem to have
found its source, and the deviations from the original incident
are easily recognized and are not excessive."
- JHB,_The Choking Doberman_, p. 282
Veracity is interesting but far from the only thing when it comes to
the study of urban legends.
MEANWHILE, BACK TO OUR REGULARLY SCHEDULED PROGRAM . . .
I have also begun to collect references to specific volumes of JHB's to
document various classic ULs. This is a slow and on-going process.
Acronyms for Jan Harold Brunvand's books in the list below are:
TVH - _The Vanishing Hitchhiker_
TMP - _The Mexican Pet_
TCD - _The Choking Doberman_
CBA - _Curses! Broiled Again_
TBT - _The Baby Train_ (forthcoming, March 1993)
Key to one liners below:
T = 100% scientific truth
Tb = believed true, but not conclusively proven
F = 100% falsehood
Ft = A legend, mostly untrue, but with a true occurence or known origin.
Fb = believed false, but not conclusively proven
U = unanswered and may be unanswerable
P = Maybe it didn't happen, but it's scientifically possible
(used extremely sparingly, where the opposite is expected,
as it could apply to just about every legend)
Please note that as the alt.folklore.college FAQ diverges from the
alt.folklore.urban FAQ, different FAQs may reach different conclusions.
================================================================================
Categories are:
- Absent-Minded Professors
- Death and Taxes
- Pranks
- This is Just a Test
- Sex, Drugs, and Rock and Roll
- Architectural Nightmares
Suggestions for wittier subsection names are appreciated; these are fairly
lame.
================================================================================
ABSENT-MINDED PROFESSORS
T. Prof lists famous unsolved problems;student thought it was homework- solved!
(Student was George Dantzig.) ["The Unsolvable Math Problem" in CBA.]
T. No such luck with Fermat's Last Theorem.
Fb.Professor jostled; misses watch; grabs back from jostler; later finds at home
[Variation of "The Jogger's Billfold" in TCD] [Possible source: Jack Lemmon
in "The Prisoner of Second Avenue"]
DEATH AND TAXES
F. College roommate commits suicide, gets you an automatic "A" for courses.
["The Suicide Rule" in CBA.]
Tb.Many colleges do provide leniency on exams, or allow refunds for roommates,
but it's usually on a case-by-case basis.
T. Student gets tuition $ by asking for $0.01 from each person via newspaper.
[Columnist Bob Greene helped along this Michigan student.]
T. Students find rolled-up carpet; take and unroll in dorm room to find body.
[Happened at Columbia; see 1/30/84 NY Times.]
T. Student dies after getting stuck in Cornell fraternity chimney, 1992-93.
Fb.Student kills self during exam by putting 2 pencils in nose and hitting desk.
F. Girl is alone at home/dorm with dog; sleeps; hears noise and a dripping
sound; is frightened but reaches to dog and feels a lick; goes back to
sleep. In morning, finds dog hanged in shower and note under bed which
says "humans can lick too." ["The Licked Hand" in TCD]
F. Two co-eds alone in dorm; one goes to study; other in room; roomie hears
heavy dragging sounds; blocks door; hears scratches; waits til morning;
opens door to find other co-ed with ax in head who was scratching for help.
["The Roommate's Death" in TVH and TMP] [Variation: note left behind
"aren't you glad you didn't open the door?"]
Tb.Dave Barry's friend stabbed himself in the head during a calculus exam with
a pencil.
PRANKS
T. People's lawn gnomes/elves stolen; owners were sent letter/pics from exotic
locations with the ornament. ["Roaming Gnomes" in CBA]
Fb.Students buy a barber pole and drive the town. Stopped continually by police.
F. Radio station welds antenna to railroad tracks, peeves the FCC by
broadcasting nationwide. [Told about MIT and Swarthmore.]
T. Caltech students disrupt Rose Bowl in sundry ways.
T. MITfolk do the same to Harvard-Yale game.
Tb.Rutgers grad student puts both Caltech and MIT to shame by bombing World
Trade Center.
T. Berkeley student suspended for going to classes naked.
Fb.Kibo regularly reads alt.folklore.college. Spot doesn't--he's just a dog.
F. Mikey (Life cereal) exploded from eating Pop Rocks with soda (You wish!)
["The Death of Little Mikey" in TCD]
F. Student is regularly nocturnally chloroformed by roommate, for sodomy.
Tb.This may have actually happened in the Dutch army. Those officers!
Tb.Students fake such activity as good prank on passed-out drunk roommate.
T. Students use variety of methods to make foolproof fake ID's.
T. Students will admit to any number of felonies when posting to Usenet.
F. Students play construction workers and police off of each other, each
thinking the other are pranksters.
Fb.Schoolkid beheaded by road sign, due to sticking his head out the bus window.
T. New York car thief stole lab delivery of cadaver heads...
Fb.Med student discovers cadaver is relative/friend.
Fb.Med students play joke on tollbooth operator involving cadaver.
T. Syracuse student steals skull from university archives, roommate reports it.
Tb.Cow-tipping (pushing over a sleeping cow) has happened.
T. Jason Hansen claims to have seen cow-tipping done.
T. Cows sleep lying down.
Tb.Cow-tipping is usually just a bunch of hooey to beguile city kids.
U. The proper amount to tip a cow is 15%, 20% for especially good service.
U. Cows fall in the other direction when tipped in the Southern Hemisphere
due to the coriolis effect.
THIS IS JUST A TEST
Fb.Student cheats on exam, asks "do you know who I am?",jams paper in exam pile!
["Bluebook Legends" in TMP]
Fb.Prof. gives "announced" quiz to surprised class after putting ad in paper.
Fb.Prof. allows students to "bring in what they can carry for exam"; student
carrys in a grad student (variation on allowing use of "Feynman").
Fb.Prof. nails exam thief by cutting bottom 0.5" of exam to find longer answer.
Fb.Philosophy prof.'s 1 word exam: "Why?" "A" to student who replies "Why not?"
[Many, many variations, including "What is courage""This", & "What chair?"].
T. Wise-ass teachers imitate the urban legend and have one-word exams.
T. Same kind of teacher gives exam with patently bogus directions with last
instruction being "Ignore all other directions."
Fb.Low grading prof. grades same exam in successive semesters; gives higher
grade each time. 4th time around (or so), writes: "Like it more each time".
Fb.Student submits 20 yr old paper for class; prof. gives "A"; says he always
liked it but he only got a "B" when he wrote it. [The above 6 Fb's are in
"College Con Artists and How They Operate" in CBA]
T. Professors make you erase programmable calculator memory for exams.
Fb.Professor uses staircase method to grade exams.
Fb.Squid dissections invariably involve the dissector getting squirted with
ink by the dissectee.
SEX, DRUGS, & ROCK & ROLL
F. One night stand, partner leaves early, other partner finds msg "Welcome to
the world of AIDS". ["AIDS Mary" in CBA]
F. Frat holds blood drive. Some grossly high % of frat donors are HIV positive.
F. All fraternity members are rapists.
T. Towson State study finds fraternities have the highest rape rates on campus.
T. Athletes are second.
Tb.It's generally not a good idea to provoke Ted into talking about frats.
Tb.Geraldo Rivera went to University of Arizona as "Jerry Rivers."
Fb.Abbie Hoffman was the first Sandwich Man at Brandeis; really used it as
cover to sell drugs.
Tb.The Sixties would be a dramatically different decade if not for Jerry Cohen.
T. There seems to be quite a few university buildings named after Kresge.
T. It's fairly common to be dissatisfied with one's campus newspaper and SGA.
Fb.Co-ed loses tampon inside prior to blind date; worried; sees school intern;
is acutely embarrassed. Her date shows up; it's the intern!
Fb.Young man buys condom from pharmacist; he's embarrassed so boasts of date.
He picks her up, pharmacist/dad answers the door! ["The Blind Date" in TMP]
U. A plain-Jane coed invited to special night out by a BMOC. As she gets ready,
has bad gas from lunch. Date arrives; so plans to fart in car before he gets
in. She farts and quickly rows down window. Date gets in, says, "I'd like you
to meet Tom and Mary in the backseat." ["The Fart in the Dark" in TVH.]
U. Dara reads the FAQ from beginning to end.
T. Common UL mills include Dear Abby, Ann Landers, and Paul Harvey.
T. Cecil Adams singles out Chicago and Brandeis students for their lack of
sex lives.
Tb.Agents of Cecil Adams have an account at Northwestern U.
T. Nearly every college has statues that do something strange if a virgin
graduates/walks by.
Tb.Nearly every college thinks that they're on a Playboy top ten best/worst
campuses for parties.
ARCHITECTURAL NIGHTMARES
Tb.Number one cause of student deaths at UMass-Amherst is elevator accidents.
F. Building is built backwards. Public criticizes; Architect commits suicide.
Tb.There have been buildings built backwards. [Mertz Dorm. @ Swarthmore?]
F. Various university libraries sink; books heavier than architect thought!
F. Same as above, but pool not library, weight of water, not books.
Tb.Above happened to Kodak; they use it to develop *big* pictures.
Ft.Lots of bldgs (malls, etc.) are sinking into the ground as we post!
[See "Back to the Drawing Board--Some Architectural Legends" in CBA]
F. Architect student fails final project, becomes rich, donates $ to school
on condition they use his final project as a blueprint.
T. Some universities, cities are riddled with semi-secret utility tunnels.
Fb.University of Chicago and Columbia have radioactive libraries.
Fb.Campus library named after fabulously rich inventor of mundanity.
[Variations: Q-Tips, zippers, etc.]
SOME REFERENCES:
Cecil Adams (_The Straight Dope_, 1984, ISBN 0-345-33315-2 and_More of the
Straight Dope_, 1988, ISBN 0-345-35145-2 both published by Ballantine
Books). Author of "The Straight Dope" Q&A column of _The Chicago
Reader_ and is syndicated in many alternative newspapers. Cecil is "a
National Treasure" who "tells people what they actually want and need
to know instead of useless rubbish." Worth reading if only for for his
writing style. His readership, the Teeming Millions, is fanatically
loyal.
Jan Harold Brunvand (_The Vanishing Hitchhiker_, 1981, ISBN 0-393-95169-3;
_The Choking Doberman_, 1984, ISBN 0-393-30321-7; _The Mexican Pet_, 1986,
ISBN 0-393-30542-2; _Curses! Broiled Again_, 1989, ISBN 0-393-30711-5,
_The Study of American Folklore_, 3rd Ed., 1978, all published by W.W.
Norton). New one due out in March 1993 called _The Baby Train_. JHB is
one of the leading folklorists today and has done much to popularize the
study of ULs. Also has a great back hand and skies a great "figure 11."
Bruce Tindall and Mark Watson (_Did Mohawks Wear Mohawks?_ _And Other
Wonders, Plunders, and Blunders_, Quill - William and Morrow, 1991.
ISBN 0-688-09859-2.) S'all right, and only one wrong entry so far.
But don't believe what they say about dalmatians, humans, and urea.
You can even e-mail Bruce on the net to blast him.
Peter van der Linden (_The Official Handbook of Practical Jokes_ Signet,
ISBN 0-451-15873-3, 1989 and _The Second Official Handbook of Practical
Jokes_, 1991, Signet, ISBN 0-451-16924-7). Do you want to get the scoop
on practical jokes that actually have some real world validity rather
than those by prepubescent college kids on bad banana peels? Try
checking these two bricks^H^H^H^H^H^H books out. You'll find ULs,
delightfully bad illustrations, and even practical jokes.
It's only a coincidence that all of the above-mentioned authors have
links to the Internet at one time or another.
===============================================================================
An urban legend:
* appears mysteriously and spreads spontaneously in varying forms
* contains elements of humor or horror (the horror often "punishes"
someone who flouts society's conventions).
* makes good storytelling.
* does NOT have to be false, although most are. ULs often have a basis
in fact, but it's their life after-the-fact (particularly in reference
to the second and third points) that gives them particular interest.
If you enjoy alt.folklore.college, you'll just love alt.folklore.urban.
===============================================================================
Unbounded thanks to: Jane Beckman, Steven Bellovin, Conrad Black, Mark Brader,
Jack Campin, Raymond Chen, Joe Chew, Patrick S Clark, Cathi A.Cook, Cindy
Davies, Jeff Davis, Scott Deerwester, Larry Doering, all the Terry's: Carroll,
Chan, Monks, Wood, et al., David Esan, Ted Frank, Greg Franklin, Alan Frisbie,
Kim Greer, Tom Greer, Dave Gross, Phil Gustafson, Jason R. Heimbaugh, David A.
Honigs, David B. Horvath, Wendy Foran Howard, Mark Israel, Richard Joltes, Jim
Jones, the late Cyndi Kandolf and her son Donald, Phil Kernick, Susan Mudgett,
Bill Nelson, Tom Neff, Bob O'Brien, Christophe Pettus, Brian Scearce, Sean
Smith, Randal Schwartz, Ken Shirriff, snopes, Haakon Styri, Bruce Tindall,
Dwight Tovey, Peter van der Linden, Greg Widdicombe, and Dan Wright.
alt.folklore.college additions contributed by Raymond Chen, Christopher Dunlea,
Ted Frank, Ryan Franklin, Phil Gustafson, Jason Hanson, Brian Leibowitz,
Michael Reel, Sendhil Revuluri, Kivi Shapiro, and Samuel Weiler.
OTHERS?
Have you ever wondered how those people have gotten the name at the end
of the FAQ list? They are people who are widely recognized as thoughtful
posters of reliable information. They have consistently added value to
various debates by sharing their point of view, and often researching
difficult questions which arise on the net, and posting authoritative facts
citing sources.
The official way for joining the list of distinguished AFC-ers is to
take one of these unanswered questions that come now and then, research
it and reach a definitive conclusion (or demonstrate that one cannot be
found). Post your findings. If the report is sound, and the original
question was non-trivial, you will be added to the acknowledgements section
of the FAQ list! Be prepared to submit references. We are mostly adults
here (except around the beginning of the academic year). Be prepared to
discuss and debate your research and conclusions here. The unofficial way
to get on the list is to give me a big payoff (and it better be more than
two-fifty).
Original FAQ list for alt.folklore.urban by Peter van der Linden, Feb., 1991.
Maintained by Terry Chan for a.f.u. since July 1991.
Mildly tinkered with in a few trivial ways, PvdL, December 9, 1991
Masterfully improved formatting courtesy of Tom Neff, December 16, 1991.
Modified and eviscerated for alt.folklore.college by Ted Frank, March 1, 1993.
--
ted frank | "Why do axe murderers only attack when you're
thf2@kimbark.uchicago.edu | partially nude /
the u of c law school | Or you're taking a bath?"
standard disclaimers | -- Camper Van Beethoven

1690
txt_files/althist.lst Normal file

File diff suppressed because it is too large Load Diff

374
txt_files/anti-jew.txt Normal file
View File

@ -0,0 +1,374 @@
Anti-American Jewish League
---------------------------
From: San Francisco Chronicle, Wed. Dec. 12, 1990 (Briefing Section)
----
The British Zionists were led by Chaim Weizmann, a brilliant chemist who
contributed to the war effort by discovering a new process for manufacturing
acetone, a substance vital for TNT that was until then only produced in
Germany. Weizmann saw a historic opening for Zionism and began to lobby
influential British politicians.
Early in their talks with British politicians, it became clear to them that
only a British Palestine would be a reliable buffer for the Suez Canal.
Weizmann therefore assured Britain that in exchange for its support,
Zionists would work for the establishment of a British protectorate there.
This suited Britain better than the agreement it had already made with
France for an international administration for Palestine.
So on November 2, 1917, Foreign Secretary Arthur Balfour made his famous
and deeply ambiguous declaration that Britain would "view with favor the
establishment in Palestine of a national home for the Jewish people..."
How did the pledge to the Zionists square with what had already been
promised to the Arabs in return for their support in the war against the
Turks? The Arabs realized that they had been outmaneuvered.
Note - As you can see, the main reason our troops are in the Persian Gulf
is because of the Zionist hunger for a national home in Palestine.
Palestine was an independent land before 1917. But after the
totally unfair Balfour Declaration, written by British Zionists,
Zionists (Jews) were given permission by Great Britain to take
over Palestine and keep lands which do not belong to them. And
the US has not done anything about it. Why? Because of the
better known media, which are all Zionists. (ie. Ted Koppell,
Larry King, etc etc etc) Many large corporations are also run
by Jews, including many of the large corporations which make
stuff for our military.
Note - The American Anti-Jewish League in no way supports the naked
aggression committed by Saddam Hussein against Kuwait. He
must leave Kuwait, even though Kuwait, contrary to popular
opinion, once WAS a PROVINCE of Iraq. There is no doubt about
this: just go to your public library and get a good book on
Iraq, Kuwait, or British Foreign Policy in the Middle East.
Once again, it was the British (and French) who set up the
current boundaries which exist today. However, what Saddam
has done must be overruled, exactly as what the Jews have
done to Palestine must be stopped. Do you know how much of
our TAXES go to Israel every year? Do you know how much
trouble we've gone through to protect Israel? Do you know
that there are more Jews in the USA than in any other country
in the world? Do you know most Jews (especially the conser-
vative and highly orthodox ones) are strong anti-Americans?
Why then, are we supporting them? Because many of our
highest government positions are run by Jews. They are
practically running the US. And what about the British?
It is not Japan that owns more of the US than other countries.
It is Great Britain. They own more US land, corporations,
stocks, interests, etc. in the US than the Japanese and 5
other countries put together. If you don't believe any of
this, just print it out, and go to your local public library
or ask an unbiased History professor. This is all true.
Please spread the word around, and upload this and other
files to as many BBS's as you can. We must begin to stop
this low-profile takeover of our country, or else it will
be too late to control it. Thank you for your time.
American Anti-Jewish League
---------------------------
Have you ever wondered why so many people hate or dislike Jews? From their
very first existence, they have been hated by people around them and people
who knew them. Why? All through these ages, anti-semitism is still strong.
Why? It is true that some of this hatred is not founded for truly, such as
in the case of the Germans. Hitler was looking for a people to accuse of
Germany's downfall, so he picked the Jews. Although this is not the main
reason for Germany's weakness at that time, there is still something to it.
Jews were contributing, but very minutely, and in low-profile, to Germany's
problems. Anyway, back to the main point. Now it is the Arabs who are after
the Jews, even though if you go back to Germany today, the majority of
Germans (although they will not admit it right away) are still anti-semitic.
Wouldn't you still be? Just look at ALL these movies made and shown on
TV and at cinemas in which the world is pitted against the Germans, and
the Germans always lose. These movies are still shown every day on TV and
cable. Just turn on TBS, TNT, etc. Anyway, now it is the Arabs. And
now we have and soon will have more movies which bring down the Arabs.
(ie. the new Sally Field movie, which is grossly exaggerated) Don't
forget who runs most of the TV networks and movie studios. So why do
so many people hate Jews (also known as Zionists, semitic people (not very
correctly though), Israelites, Israelis) The answer to this question
is very simple. Jews believe that they are God's chosen people (they
honestly believe this, even though they will not admit it anymore di-
rectly) and that because they are so, then they are superior to all
other people. All others must work for Jews, because no one else is
as gifted as they are. It is true that most Jews have above-average
intelligence, and that they are very handy and dexterous, and work hard
(but only for themselves) We are not denying this. What we detest is
their attitude that they are superior to us, and therefore we must
be their slaves. And they can do almost anything they want, because
they are the "chosen" ones. Because of this belief of theirs, Jews
along with their other attributes have been slowly and quietly taking
over the most important world systems. They cheat a lot; this is one
of their most distinguished characteristics. What we mean by cheat
is not just cheating, but taking advantage of the right opportunities
to gain their objectives. They are extremely well-known for their
"money habits". They take advantage of less qualified peoples, using
them knowingly. They help mostly only themselves, and have very close
ties with each other. (they even have their owns BBs's, just look in-
side Computer Currents) Because of this connections, they can get
things done easily. If a Jew needs job, no problem. There are other
Jews in all the top job areas, who will right away hire him/her first
over others. They have extremely high-level propaganda machinery;
many TV and radio commentators are Jews, many reporters, book writers,
and magazines are Jewish. AND very importantly, the many publications
companies are run by Jews. If you have any doubts, just do some
research. It might take you a while, but you will find out that, yes,
it is true. And these people are ALL over the world: Israel, USA,
England, Canada, spread over in S. American, all over Europe, USSR,
etc etc. They are practically in the highest-level positions all over
the world. And they use their clear advantage to continually gain
more and more power. The Middle East is the last bastion of true
anti-Zionism. God only knows what would happen if they were to take
over the Middle East and its oil too. They already have the biggest
banks, corporations, communications systems, etc in the world. All
they need now is oil. And all throughout the ages, they have been
doing the same thing, and when successful, suppressing all opposing
views. Now they have finally succeeded in turning the whole world
against Iraq, the 2nd biggest anti-Zionist country in the world. This
of course, has been done in an indirect manner, and has taken them a
lot of time. But it has worked. Once Saddam is ousted, thanks to
our soldiers and money, they will then begin to slowly get control of
the region. There is still Iran, Syria, and other countries, but they
can be taken care of too. It will not be easy for them, because the
Arabs are tremendous anti-semites, and they are willing to do anything
to stop the Jews. But, with the US, Britain, and other countries
helping them, the Jewish will have all the support they need to accom-
plish their goals. And all because these countries are practically
run by Jews. So please, become more informed on this subject. Read
more books, newspapers, etc. about these people, making DEAD sure
that they are not written by Jewish authors, or published by Jewish
publication companies, or third-party Jewish-influenced writers.
We must stop these people from controlling the world. We don't want
to kill them or hurt them, we want to let them know that they are
not superior to us, they are not God's chosen people, and that they
cannot do whatever they want. Please, help us out. Spread these
files around, call your senators and representatives, read more
about this stuff, etc. JEWS MUST BE STOPPED... NOW!
American Anti-Jewish League
---------------------------
How would you like it if another peoples, with greater military capability
and more money came to the United States and started to control it. If
they began to put strict restrictions on everything you did, and started
to take away your rights. If they set curfews, so that you couldn't
come outside at times, and refused to let you go wherever you wanted.
If they refused to allow you to celebrate certain holidays. If they put
down all opposition brutally, killing anyone who disobeyed their rules.
And to top if off, they were supported by the biggest military in the
world. You could do nothing about it. Nothing. All tries have been
put down by force. Anything you have done has ended in your people
being killed or injured. How would you feel? Be honest now. Well,
this is exactly what is happening in Palestine now. It's even worse
than this. There is no way to describe it. The only way to do so is
to sit down for a few minutes and imagine people coming into your
town and suddenly taking control of it. You have to do everything
they tell you to. If you go out and protest, they will injure you. If
you get violent, they will kill you, saying that you have been wanted
for other offenses as well, and that you had done such and such.
And there is absolutely nothing that you can do. Many people outside
are talking about this, but no one is really doing anything about it.
It feels terrible, doesn't it? You are beginning to get really angry
now, that no one is listening to your cries. You try more violent
methods - nothing. So you decide the only way to make it known to
others is to use terrorist methods. You hijack a plane. Now the
whole world is against you. More Jewish propaganda. You are called
a barbarian, uncivilized. Just throw a nuke on you, many say. So
what do you do? This is exactly what is happening to the Palestinian
people. Please, do something about it. Or at least, next time you
hear Jews, Jewish propaganda, or some other Jewish views, question
them, embarass them. Don't believe everything they say. Become
more informed. STOP THEM BEFORE IT'S TOO LATE!
American Anti-Jewish League
---------------------------
Disclaimer - Any use of this info for illegal purposes is forbidden
and against the law. All of the info in this file is
only for your personal knowledge. If you use any of
this info in the process, the consequences are yours
and yours alone.
Useful Addresses and Phone Numbers
----------------------------------
1. Consulate General of Israel
220 Bush
San Francisco, CA.
(415) 398-8885
Open M-F 10am to 1pm
2. Adath Israel
Rabbi Jacob Traub
1851 Noriega
(415) 564-5665
3. Ahavat Shalom
150 Eureka
(415) 621-1020
4. Congregation Anshey Sfard
1500 Clement
(415) 752-4979
5. Congregation Beth Israel-Judea
Rabbi Herbert Morris
625 Brotherhood Way
(415) 586-8833
6. Congregation Beth Sholom
Rabbi Alexander Graubart
14th Ave & Clement
(415) 221-8736
7. Congregation B'Nai B'Rit Ha Mashiach
(415) 992-2079
8. Congregation B'Nai Emunah (Conservative Jews - Give 'em HELL!)
Rabbi Theodore R. Alexander
3595 Taraval
(415) 664-7373
9. Congregation B'Nai Israel (also conservative)
Rabbi Malcolm Cohen
1575 Annie
(415) 756-5430
10. Congregation Chevra Thilim
751 25th Ave
(415) 386-9570
11. Congregation Emanu-El
199 Arguello Bl.
(415) 751-2535
12. Congregation Keneseth Israel
1255 Post Suite 427
(415) 771-3420
13. Congregation Magain David Sephardim
351 4th Ave
(415) 752-9095
14. Congregation Ner Tamid
1250 Quintara
(415) 661-3383
15. Congregation Sherith Israel
2266 California
(415) 346-1720
16. Hillel Foundation
33 Banbury Dr.
(415) 333-4922
17. Jewish Educational Center of SF
538 29th Ave
(415) 221-7045
18. United Synagogue of America
425 Divisadero
(415) 864-1051
Note - Some 42% of the problems of the US are a direct result of Jews. This
is not some hypothetical figure, it is thouroughly researched fact.
One of the main reasons our troops are in the gulf is Israel. Why?
They run practically all the biggest TV networks, newspapers, radio
stations, higher posts, etc. in the USA.
American Anti-Jewish League
---------------------------
UPDATE
So, now that Saddam Hussein has fired Scud missiles into Israel, and the
Jews have shown restraint, they immediately expect something from us. Today
they asked for 13 billion more dollars (billion, not million). In addition
to this, they have asked for another $10 billion from other countries.
Why the hell do we have to send our tax dollars to them? Why? They have
everything they already need. They have a huge air force, many nuclear
weapons, an army, navy, and money. Why should we send them anything? If
we are going to send money to someone, there are many other needier nations
on this planet who have none of the above. Instead, we send this money to
a country which from its very beginning has caused trouble. Possibly, no
other country has ever caused so many problems for humankind in history.
These Jewish pigs are now taking advantage of the circumstances to get many
of their ideas across, and thanks to Saddam, they are being very success-
ful. All the TV networks (most of which are run by Jews (many of the news
directors are Jewish, plus anchormen as well, such as Ted Coppel, Larry
King, etc etc)) are interviewing Jewish state figures, and asking them
favorable questions. CNN itself constantly interviews many Jewish heads
of state. But very few Arab leaders/figures are interviews, and if done
so, not very rational figures are chosen so that people get the wrong
impression. (ie. those two Jordanian engineers on Nightline who do not
reflect the majority opinion of Arabs) All the Jewish pigs interviewed
have been saying: "Now the world knows what we have had to put up with
all these years", when in fact, it is exactly the opposite! It is what
the Arab people have had to put up with, especially the Palestinians,
who unfortunately supported Saddam's aggression. This is truly sad,
because it has given the Palestinians a very bad image, especially in
the USA. Many of you are probably saying, "Oh, those poor Israelis,
look what they have to put up with. If San Francisco was bombed, I
would do the same too." And this is somewhat true; Saddam is a brutal
dictator, and the only thing he has done is help the Zionist pigs.
So here we go again; we've given them Patriot missile systems (each
Patriot missile costs $1 million - this is your TAX money!) Now we're
about to give those pigs, who don't really need this money, another
$13 billion. Of course the Arab countries will see us with an evil
eye. Not only have we ignored them, but now we are putting the icing
on the Jewish cake. This is enfuriating them. The Jews are (they say
this, and it is true, but they also take advantage of inferior peoples.
Just trace Jewish history) smart people, they are literate, have schools,
money, etc. Why can't they just get their own money? They practically
run a third of our country. Now, for restraining against immediate
attack (they will attack later though), they ask us for $13 billion.
This is an outrage! An absolute outrage! Our economy is going down,
we are cutting from health care, and from education, there are many
programs here that need money, and what do we do? We give those Jewish
pigs, who need the money less than we do, millions of dollars every
year. So that they can in return take advantage of our resources.
I plead with you that you do something about this. We have to stop
this. Many of the people who run the USA our Jews. Get them out
of their posts. Please, we must do something about this NOW, before
it's too late to even start something. Write letters. Ask people.
Inform yourselves. Read books (that are not biased - many of the
biggest publications companies are run by Jews) Spread this file
around as many bulletin boards as possible. Thank you for your
time.


296
txt_files/antich.mail Normal file
View File

@ -0,0 +1,296 @@
From: dsk999@arts.usask.ca (D. Kabatoff)
Newsgroups: alt.jokes.pentium
Subject: Collecting Mail For The Coming Anti-Christ
Collecting Mail For The Coming Anti-Christ
Isaiah contains 66 (7x7+17) chapters, three of the chapters are six
verses long: chapters 4, 12 and 20 each contain 6 verses while 4 plus 12
plus 20 adds to 36 or 6x6. I predict that Isaiah 4:1 is about the coming
Anti-Christ and his 7 wives... it is Bible chapter 683 (666+117).
Esther becomes Queen in Book 17 and Q is the 17th letter of the
alphabet, and I predict that the Anti-Christ is goink to want 7 Queens,
and so I thought that I should help the guy out and collect his mail for
him until he arrives. I believe that probababbly the only mail that he is
really goink to want is mail that includes photographs of nubile sweeties.
I am asking the world to trust me with the collection of the coming
Anti-Christ's mail, I won't be goink and doink anything that I am not
supposed to be doink with his mail. If you are a nubile sweety, you should
seriously consider sending him your photograph to my box number and you
might become a Queen, like Esther... in Book 17. This is an opportunity of
a lifetime, I would suggest that you include your full name and birthday
and of course your return address and telephone number as perhaps when he
comes and sees your picture, he may want to contact you. But only send
thin envelopes and no parcels as I will have the police or the Canadian
military dispose of any parcels that I receive for the coming
Anti-Christ... I risk the wrath of the coming Anti-Christ by having all
the parcels destroyed. I am taking a big chance with my life, like
Daniel.
Esther becomes Queen in Book 17 and Q is the 17th letter of the English
alphabet, as close to 66.666...% of the way into the 26 letters of the
English alphabet as you can get. The first 3 Books together contain 117
chapters and it is this 3rd Book that introduces the 17 verse length, at
chapters 91 and 93 together for 184, which is the 167 verses of Book 17
plus 17 more. The first day mentioned in the Bible by number and placement
into the year is the 17th day of the 2nd month and on this day in a normal
year there are 317 days remaining in the year. The next day mentioned is
the 17th day of the 7th month, and at this point of time there would be
167 days remaining in the year, the length of Book 17 (Gen 7:11 and 8:04,
note that 804-711=93, the placement of the 2nd 17). The shortest chapter
in the Bible is Psalm 117 while the longest is Psalm 119 (7x17). Psalm 117
is chapter position 595 (5x7x17). Psalm 119 (7x17) is broken down into 22
sections, each section corresponding to a Jewish squiggle, while Book 22
contains 117 verses. Leviticus 17 is the 107th chapter, Numbers 17 is the
134th (117+17th) chapter, Deuteronomy 17 is the 170th chapter, chapter
17x17 contains 3x17 verses, chapter 700 contains 17 verses. Chapter 7x117
is Ezekiel 17 and it contains 17+7 verses. Both chapters 117 and 119
(7x17) contain 17+17 verses, chapter 117 is the 7th to be doink so. There
are 49 (7x7) chapters that contain the length of 21 (7+7+7) verses and
these 7x7 chapters are at chapter numbers adding to 980 (7x70+7x70). There
are 34 chapters containing the length of 24 (17+7) verses and these 17+17
chapters are at chapter numbers adding to 777. The net in Gospel John
chapter 21 (7+7+7) caught 153 fish and the numbers 1 through 17 add to
153. Books 1 and 17 together contain 1700 verses. Ruth is the first Book
to contain a multiple of 17 verses and it is the 17th shortest Book.
There are 7 chapters containing the length of 7x7 verses and they are
at chapter positions adding to 4598 (4500+7x7+7x7), interesting as there
are 45 chapters containing the length of 17 verses while Book 45 contains
433 verses, just 17 short of 450, which in turn is 6x6x6 short of 666
(Esther chapter 7 is chapter 433). The 45 chapters that contain the length
of 17 verses are at chapter numbers adding to 732 (666+66). It is all the
more interesting when considering that Psalm 45 contains 17 verses. And
the 17th chapter to contain 17 verses is Psalm 59, more interesting
considering that 59 is the 17th prime. And there are 17 chapters
containing the length of 9 verses and 17 chapters containing the length of
36 verses, interesting as 9+36=45, more interesting considering that these
17+17 chapters are at chapter positions adding to 17351 (17000+117+117
+117). I further predict that the coming Anti-Christ will have an interest
in numbers, and since I too have done some research in numbers, it makes
all the more sense for me to collect his mail as when he come he will
probababbly want to see my research anyway. It is possible that when the
Anti-Christ comes he may want to 5 of his 7 wives lamenting (Bible Book
5x5 contains 5 chapters and 77+77 verses), or maybe more, maybe many many
more. There are 5 Books in the Bible that contain a total of 5 chapters,
the 105 verse length is repeated...
Five Books In The Bible Contain 5 Chapters
25 Lam 5-154 chapters 798 through 802
52 1 Thes 5-89 chapters 1112 through 1116
59 Jam 5-108 chapters 1147 through 1151
60 1 Pet 5-105 chapters 1152 through 1156
62 1 John 5-105 chapters 1160 through 1164
The first 2 Book numbers add to 77 while the first simply contains 77+77
verses. The 3rd Book number is the 17th prime, the first 3 Book numbers
add to a multiple of 17. The first 2 lengths add to 3x3x3x3x3 while the
first 3 average 117 (3x3x13). The first 4 Book numbers add to (7+7)x(7+7).
Note how the 105's are at 60 and 62, together for 105+17. There is another
105 in Book 33, interesting as this 105 versed Book contains 7 chapters,
so the 105's are in Book numbers that together contain 17 chapters (Book
33 contains material on cannibalism, but the filthy churches censor the
cannibalism spoken of in the Bible... they would rather see you pray to
Mary in merry "Mary"land and send your kids out gathering sweety treats
while dressed up as witches... add this 105 a 3rd time to the verses above
for 666...see "Little Hankies On Tehran (6,66)" in alt.religion.islam for
more discussion on 666, it's probababbly not goink to be posted much
longer). So Book 5x5 contains 5 chapters, and they are chapters 798, 799,
800, 801 and 802, together for 4000, a multiple of 5x5x5. Or take all 25
chapter positions and break them down into their digit components, the
first five 5's are at digit positions adding to 255, it's very pretty. The
5 Book numbers add with the 5 lengths for 819 (7x117). All 25 chapters
positions add to 26895 ((The length of Book 3x3x3) times (33+33) plus
3333), rather reminding me of the Trinity, maybe God was involved in this
composition of numbers. Think about it. The Bible begins with 50 chaptered
Genesis containing 1533 (17x(17+17+17)+666) verses. And then we have there
five 5 chaptered Books, the first contains 77+77 verses, the first 2 Book
numbers add to 77, more interesting considering that the 555th chapter in
the Bible is Psalm 77, it's very pretty. The first 555 chapters in the
Bible togther contain 15113 verses. First you need to know that the 17th
chapter to contain the length of 17 verses is chapter 537, chapter Psalm
58, and 59 is the 17th prime... this 15113 is 28 times 537 plus 77, more
interesting considering that 28 is not only a multiple of 7 but it is a
perfect number, and also the numbers 1 through 7 add to form 28 (see the
perfect 28 sevens in Genesis 41, it contains 57 verses and 41+57=7x7+7x7).
So in other words the first 555 chapters contain perfect 28 times the 17th
17th at chapter the 17th prime plus 77. And Americans have a 555 foot 5
inch penis beside their president. I suggest you write your president and
tell him to shove his prick into the reflecting pool. Perhaps all the
Isaiah manuscripts have yet to be found and new research may show that
Isaiah meant to say 17 women in chapter 4 as anything is possible with
God. Crazy guy that Isaiah. There is even prophecy in Hosea (9:7) to
support my thesis that Isaiah was a crazy prophet, but I have to be
careful with my words as the world might be listening and I don't want
people to be goink around and saying that I am prejudiced against crazy
Jewish prophets (I'm already in trouble with some members of the Moslem
community and I don't need extra problems in my life). I'm sure that the
coming Anti-Christ has heard so much bullshit from people all his life
that he could easily handle 17 wives, and furthermore I predict that he is
goink to be pleased with me to see that I am pushing for 17 instead of 7.
I'm doink it for the fellow because he is probababbly having a rough time
in this world and is just in need of a little bit of love and affection.
Isaiah 4:1, chapter 683 (666+17) brings the Bible verse count up to
17734 (17717+17). Let's look at Daniel (it contains 7x17+7x17+7x17
verses). We are talking Book 27 and chapter 8 and 9 are paired with 27
verses each. This is the 36th (6x6th) chapter pair in the Bible and it is
immediately preceded by chapters 6 and 7 containing 28 verses (not only is
28 a perfect number where it's factors add to form itself, but the numbers
1 through 7 add to 28). In all there are 49 (7x7) paired sets in the
Bible. Chapters 8 and 9 adds to 17 while positions 858 + 859 equals 1717.
So we have the 35th and the 36th paired sets in Daniel, together for 71,
an inverted 17. Esther is Book 17, Daniel is Book 27. Esther contains 167
verses, Daniel contains 357 verses, together 71+71 short of 666. There are
just 2 chapters in the Bible containing the length of 71 verses and they
are both in the New Testament. They are chapters 995 and 1003, together
for 666+666+666. Daniel is in part about the coming Anti-Christ. It has
6+6 chapters while Esther is the 6x6th longest Book in the Bible. Esther
and Daniel are at chapter positions adding to 14593, just 71 short of
6666+6666+666+666.
Daniel contains 357 verses and there are 4 chapters in the Bible that
contain 57 verses: chapters 41, 104, 220 and 1008, note that the last 3
add to 666+666. And then the chapters containing 66 verses are 299, 800
and 956, together for 666+666+666+57. The main Books of end-times prophecy
are Daniel and Revelation, Books 3x3x3 and 33+33. They together contain
17+17 chapters. There is no Book that contains a length that falls between
their 357 and 404 verses and they are the 28th and the 29th longest Books
in the Bible, together for 57. The first two chapter positions of Esther
are 427 and 428, together for 855, a multiple of 57. We will soon be into
1995, a multiple of 57.
All 6+6 chapters in the Bible containing the length of 6 verses are in
the Old Testament and they are chapters 461, 479, 501, 531, 604, 606, 628,
683, 691, 699, and 929, together for 7303, just prime 29 short of 6666+
666, more interesting considering that Bible chapter 666 contains 29
verses and it refers to counting: RBehold, this is what I found, says the
Preacher, adding one thing to another to find the sum...S -Ecclesiastes
7:27 (RSV). The 6th is 604 and the 6+6th is 929, together for 1533, the
length of Genesis (17x(17+17+17)+666).
There are 929 chapters in the Old Testament. Check out the 29's of
Second Samuel: Chapter 7 and 17 both contain 29 verses. Strangely, the
length of 2 Samuel is 695 verses, or 666+29. Similar to 2 Samuel, 1 Samuel
chapter 17 contains 58 (29+29) verses. The first 7 Books together contain
7128 verses while the 7 major prophets, Joshua, Judges, Samuels, Kings,
Isaiah, Jeremiah, and Ezekiel, have length adding to 8245. This 8245
exceeds 7128 by 1117, the 11x17th prime. It is more interesting
considering that the 25 chapters containing the length of 12 verses are
found from chapter position 187 to chapter position 1117 (the 187th
prime). And not only does the first 7 Books together contain 7128 verses,
but the 10 chapters containing the length of 39 verses are at chapter
positions adding to 7128 (66+66+66 short of 11x666, more interesting
considering that the numbers 1 through 11 add to 66). Also strangely, the
New Testament chapters having the length of 29 verses are also at chapter
numbers adding to 29. Could it be that the Author of the Old Testament is
the same Author of the New Testament?
Book 3x3x3 contains 3x3x3x30 verses. Book 3 contains 3x3x3 chapters and
3x3x3x3x3x3+130 verses and brings the Bible chapter count up to 3x3x13
(don't worry about those 13's). Chapter 13 contains 59 verses, the 17th
prime (it's the only chapter in the Old Testament to contain 59 verses).
This chapter 13 is chapter 103 and brings the Bible verse count up to
3112, more interesting considering that the 13th chapter to contain 13
verses is chapter 557 and this 3112 is 666+666+666+557+557. This number
557 is most special: take the numbers 1 through 557 and break them down
into their digit components so that 557 becomes 5, 5 and 7. The number 7
is repeated 106 times and these 106 7's are in positions adding to 77770.
Then break down these 106 digit positions in to their digits and see that
there are 351 (117+117+117) digits and that these digits add to 1117, the
187th prime. It is all the more interesting considering that Psalm 106 is
the 17th chapter in the 4th sub-Book of Psalms. I have developed software
that will do the manipulations for you. Again, don't worry about the
number 13, it was 13 times that the Jews marched around Jericho, once a
day for 6 days and then 7 times on the 7th day... and then walls came
tumblink down.
The Pentateuch contains 5852 verses and this can be expressed as
17x7x7x7+7+7+7 (see the seven 7's). Genesis 1533 can be expressed as
17x70+7x7x7 or 707+707+7x17. It is 777+777 minus 21 and is also 21 short
of 7x222, interesting as Ecclesiastes is Book 21 with 222 verses. Exodus
1213 is 7x17 short of 666+666 and is also (17+17)x(17+17)+57. Book 4,
Numbers, contains 1288 or 400+400+400+44+44 verses, it is 44 short of
3x444 or 666+666.
Book 61 is special as it contains 61 verses, it is the only Book with
such an agreement. Book 1 contains 1533 verses, Book 66 contains 404
verses. So Book first, plus Book last, plus Book special totals
666+666+666 verses. Job is Book 18 with 1070 verses while Revelation is
Book 66 with 404 verses. Book 6+6+6 minus Book 66 is 666. If you don't
like it you can always pray about it. If you have a nubile daughter, send
her picture in mama as she might become a Queen, like Esther... in Book
17.
I have an interest in numbers and I am collecting mail for the
Anti-Christ, when he comes he can see my research and collect his mail. I
predict Isaiah 4:1 is about the coming Anti-Christ and his 7 wives, and
that he is goink to appreciate my efforts of collecting photographs of
nubile sweeties for him from around the world, and furthermore I predict
that he is goink to be a really nice guy (probababbly). But it is possible
that the Anti-Christ will be suspicious of the intentions of red-headed
women, so please insure that any photographs of red-headed women are in
color so as not to deceive the coming Anti-Christ. Not a good thing for
you to be doink is to be goink and deceiving the coming Anti-Christ. Maybe
you should be goink so far as to write in bold red letters on the outside
of the envelope RREDS as a warning that the envelope contains a picture of
a red-headed woman. Furthermore there might be a lot of photographs coming
in and it may be difficult for your photograph to catch the attention of
the coming Anti-Christ. And in some cultures it is permitted for a woman
to show off her breasts, if you are a nubile sweety and are wanting to
marry the Anti-Christ so that you can become one of his 7 Queens (maybe 17
Queens if we can dig up another Isaiah manuscript) then you might consider
showing off your breasts in the photograph to insure that you are noticed,
and I think that I have the Spirit of The Lord with me when I say that (1
Cor 7:40). There is nothing in Scripture saying that a woman has to cover
her breasts, and if men in society are allowed to display their chests,
then women probababbly should be allowed the same freedom as men. Anyway,
it is such a sad commentary on the state of the world today for me to have
to suggest that you show off your breasts in order for you to catch the
coming Anti-Christ's attention. And don't be shy or embarrassed if you are
small breasted as he might even prefer small breasted women.
Do not e-mail the coming Anti-Christ using my internet account as the
people at the U of S may not be happy if I were to utilize their
facilities to collect mail for the coming Anti-Christ, and besides, what
we are wanting are real photographs to be mailed anyway. Please don't be
goink and doink anything to make me lose my internet account, if you don't
like what you have read then I suggest that you simply don't read it. If
you want to become a Queen, like Esther in Book 17, then you should send
that picture off in a hurry to RThe Coming Anti-ChristS care of Daryl
RShawnS Kabatoff at Box 7134 (7117+17) Saskatoon Saskatchewan Canada (27
letters, rather reminding me of Daniel) S7K 4J1. My great grandmother was
married at age 13 so if you are a mama quickly send those pictures of your
daughters to me. Your tradition is to bow to and decorate trees and
whoreship on Sunday, the Roman Catholic Sabbath, and perhaps even pray to
Mary, the coming Anti-Christ may have tradition as well, maybe his
grandparents or great grandparents were married at age 13 as well and this
is tradition in his family that he wants to follow... so I encourage young
women as young as 13 to send in their photographs for the coming
Anti-Christ to see. Just think, you might become a Queen, like Esther in
Book 17, at the age of 13 (again, don't worry about the number 13). Maybe
have your mama sign the back of the photograph if you are showing off your
tiny breasts. Trust me with his mail (would I be so foolish as to screw
with the Anti-Christ's mail???). Trust me. Remember, my intentions are
(all) most honorable. I risk the wrath of the coming Anti-Christ as I'm
goink to burn all of the pictures of fat women showing off their fat
breasts. I am taking a big chance with my life, like Daniel.
"For behold, I am sending among you serpents, adders which cannot be
charmed, and they shall bite you," says the Lord.
-Jeremiah 8:17, Bible verse 19170.
And by the way, I've got many more pentium joke to tell you people, but
if the sun-whoreshipping psychiatrists put me into captivity again and
torture me again with their drugs, then you will not be hearing the jokes
very soon. They say I'm crazy to complain for over 6 years that the
churches and the media are censoring the cannibalism spoken of repeatedly
in the Bible. As long as you people are happy with your pentium jokes and
your Fine Young Cannibals playing on the radio, and as long as you are
happy with Adventist litrature being censored from your libaries and
schools, then God is probababbly very happy for you, as you were doink
just be goink ahead and continue with what you were doink.

774
txt_files/aosc_fbi.txt Normal file
View File

@ -0,0 +1,774 @@
FROM THE ALL OHIO SCANNER CLUB:
SYSTEM PROFILE - The FEDERAL BUREAU OF INVESTIGATION
History
The FBI traces its roots back to the year 1908 when then U.S. Attorney General
Charles Bonaparte directed that Department of Justice investigations be handled
by a small group of special investigators. The group was formed as the Bureau
of Investigation and, in 1935, the present day name was designated by Congress.
Duties
The primary functions of the FBI and its agents are the investigations of
violations of certain Federal statutes and the collection of evidence in cases
in which the United States is or may be an interested party. The FBI performs
other duties specifically imposed by law or Presidential directive and conducts
a number of service activities for other law enforcement agencies. The FBI can
investigate a matter only when it has authority to do so under a law passed by
Congress or on instructions of the President or the Attorney General.
The FBI is not a Federal police force, it is a fact-finding organization
investigating violations of Federal laws and its authority is strictly limited
to matters within its jurisdiction. FBI agents may make arrests without a
warrant for any Federal offense committed in their presence, or when they have
reasonable grounds to believe that the person to be arrested has committed or
is attempting to commit a felony violation of United States laws. Agents may
also make arrests by warrant.
Agents do not make arrests for "investigation" or "on suspicion". Before
arrests are made, if at all possible, the facts of each case are presented tom
the U.S. Attorney who decides whether or not a Federal violation has occurred
and, if so, the U.S. Attorney may authorize agents to file a complaint which
serves as the basis of the arrest warrant.
The FBI has no authority to investigate local crimes which are not within its
jurisdiction. The FBI will, however, render all possible assistance to the
local police through the FBI Laboratory and Identification Division. The FBI
LID maintains fingerprint files on approximately 70 million (yes, million)
people. The FBI also maintains the National Crime Information Center (NCIC)
which keeps records of missing persons, serialized stolen property, wanted
persons for whom an arrest warrant is outstanding, and criminal histories on
individuals arrested and fingerprinted for serious or significant offenses.
The NCIC is a computerized information system established by the FBI as a
service to all criminal justice agencies- local, state and Federal. The
information can be instantly retrieved over a vast communications network
through the use of telecommunications equipment in criminal justice centers in
various locations in the United States, Canada and Puerto Rico. Many times when
monitoring the local or county police/sheriff departments a reference to a NCIC
check is heard.
The FBI is involved in criminal investigations and foreign counterintelligence
efforts. Most notably criminal investigations are those of bank robberies and
kidnapping cases. The FBI can also investigate criminal activity associated
with interstate transportation of stolen property, and the FBI can investigate
graft and corruption cases of local government under certain circumstances.
Department of Justice offices mat be found on some military installations as
the FBI has jurisdiction when a crime involves Government property, or funds,
or when only civilians are involved.
The FBI's responsibility with respect to foreign counterintelligence, within
the United States, is to detect, lawfully counteract, and/or prevent espionage
and other clandestine intelligence activities, sabotage, international
terrorist activities, or assassinations conducted for or on behalf of foreign
powers, organizations, or persons. The FBI also investigates murders,
kidnappings, and assaults against foreign diplomatic officials while in the
United States, as well as damage to property of foreign governments in the
United States.
Organization
The FBI is an agency within the U.S. Department of Justice, which is lead by
the U.S. Attorney General. The head of the FBI is the Director who is appointed
by the President with the advice and consent of the Senate. Assistant directors
are the next level of command within the FBI. The FBI has ten assistant
directors who are accountable to the Director for all matters within their
sphere of operations.
The FBI has 59 field offices located in major cities throughout the United
States and in San Juan, Puerto Rico. Each, with the exception of the New York
Office which is headed by an Assistant Director, is under the direct
supervision of a Special Agent In Charge (SAIC). The SAIC is supervised and
receives directions from the FBI headquarters in Washington, D.C.
Each FBI Field Office has Resident Agencies which are local offices in some of
the larger cities within the field offices jurisdiction. Refer to the FBI field
office map for the sectioning of the field offices across the United States.
The following list of the field offices and associated data was generated by
data contributed from several readers who wish to remain anonymous and from
this editor.
Location F.O. Telephone No. Call Letters RA's
Albany, NY 12201 1 518 465 7551 KEC 250 - 262 8
Albuquerque, NM 87102 2 505 247 1555 6
Alexandria, VA 3 KFQ 240 - 244 3
Anchorage, AK 99513 4 907 276 4441 2
Atlanta, GA 30303 5 404 521 3900 KIE 300 - 311 8
Baltimore, MD 21207 6 301 265 8080 KGB 747 - 756 9
Birmingham, AL 35203 7 205 252 7705 5
Boston, MA 02203 8 617 742 5533 KCB 800 - 814 12
Buffalo, NY 14202 9 716 856 7800 KEX 590 - 595 3
Butte, MT 59702 10 406 782 2304 13
Charlotte, NC 28217 11 704 529 1030 KEV 220 - 228 8
Chicago, IL 60604 12 312 431 1333 KSC 210 - 217 4
Cincinnati, OH 45202 13 513 421 4310 KQC 390 - 399 8
Cleveland, OH 44199 14 216 522 1400 KEX 740 - 750 9
Columbia, SC 29201 15 803 254 3011 KEX 820 - 830 8
Dallas, TX 75202 16 214 720 2200 8
Denver, CO 80202 17 303 629 7171 7
Detroit, MI 48226 18 313 965 2323 KEX 760 - 772 12
El Paso, TX 79901 19 915 533 7451 1
Honolulu, HI 96850 20 808 521 1411 0
Houston, TX 77008 21 713 868 2266 3
Indianapolis, IN 46204 22 317 639 3301 KEX 780 - 790 9
Jackson, MS 39269 23 601 948 5000 9
Jacksonville, FL 32211 24 904 721 1211 7
Kansas City, MO 64106 25 816 221 6100 KEX 570 - 582 9
Knoxville, TN 37902 26 615 544 0751 KEV 240 - 246 6
Las Vegas, NV 89104 27 702 385 1281 2
Little Rock, AR 72211 28 501 221 9100 KFQ 200 - 208 7
Los Angeles, CA 90024 29 213 477 6565 KMC 250 - 275 25
Louisville, KY 40202 30 502 583 3941 KIA 320 - 332 12
Memphis, TN 38103 31 901 525 7373 6
Miami, FL 33169 32 305 944 9101 KEV 300 - 305 4
Milwaukee, WI 53202 33 414 276 4684 KSC 220 - 228 6
Minneapolis, MN 55401 34 612 339 7861 14
Mobile, AL 36602 35 205 438 3674 5
Newark, NJ 07102 36 201 622 5613 KEX 620 - 628 6
New Haven, CT 06510 37 203 777 6311 KEX 600 - 606 4
New Orleans, LA 70113 38 504 522 4671 6
New York, NY 10278 39 212 553 2700 KEC 270 - 283 ?
Norfolk, VA 23510 40 804 623 3111 KEX 340 - 341 1
Oklahoma City, OK 73118 41 405 842 7471 11
Omaha, NE 68102 42 402 348 1210 9
Philadelphia, PA 19106 43 215 629 0800 KEX 640 - 651 7
Phoenix, AZ 85012 44 602 279 5511 6
Pittsburgh, PA 15222 45 412 471 2000 KEX 660 - 679 12
Portland, OR 97201 46 503 224 4181 KEX 720 - 728 6
Richmond, VA 23220 47 804 644 2631 KEX 360 - 369 6
Sacramento, CA 95825 48 916 481 9110 KFP 900 - 910 6
St Louis, MO 63103 49 314 241 5357 5
Salt Lake City, UT 84138 50 801 355 7521 3
San Antonio, TX 78205 51 512 225 6741 KEX 840 - 847 5
San Diego, CA 92188 52 619 231 1122 KEX 680 - ? 4?
San Francisco, CA 94102 53 415 553 7400 KFP 970 - 990 19
San Juan, PR 00918 54 809 754 6000 0
Savannah, GA 31405 55 912 354 9911 KEV 380 - 389 4
Seattle, WA 98174 56 206 622 0460 KOD 220 - 232 9
Springfield, IL 62704 57 217 522 9675 KEX 800 - 812 10
Tampa, FL 33602 58 813 228 7661 KEV 320 - 327 5
Washington, D.C. 20535 59 202 324 3000 KGB 770 0
The list of Field Offices and RA's is not 100% accurate, updates please. The
number of RA's may differ from the call letter assignment block for a given
F.O. because many RA's were closed and consolidated during the Carter and early
Regan administrations. The call letters were assigned prior to their
administrations.
The F.O. call letters will be the first is an assigned block for a given F.O.
Example Cincinnati F.O. call is KQC 390 (or simply 390 as often will be heard)
or Cleveland F.O. call is KEX 740 (740).
The following is a list of Resident Agencies for the primary coverage states of
the AOSC. The list is as of 1 October 1987. I will send a copy of the FBI Field
Office and Resident Agency map for a SASE to those who desire a copy. A list of
RA's may be obtained from the map for your local area. The map will be a copy
of a copy, however it will be fairly legible. Note the two Ohio Field Office
lists are presented later in this column with the detailed Ohio data.
Chicago "CG" Field Office - RA's
Lisle (Chicago West)
Mount Prospect (Chicago North)
Oakland Park (Chicago South)
Rockford
Frequency Plan:
A-1 167.3375 B-1 167.600
A-2 167.4875 B-2 167.675
A-3 167.425 B-3 167.7375
A-4 167.5625 B-4 167.5625
A-5 163.9875/167.3375 B-5 162.8625/167.600
A-6 Unconfirmed B-6 Unconfirmed
A-7 163.8625/167.5375 B-7 163.8625/167.5375
A-8 163.8375/167.2875 B-8 163.8375/167.2875
Chicago F.O. utilizes 8 banks, A through H. Channel banks C through H are not
confirmed to exact frequencies and usage. There are one way links in the upper
162, lower 164 and upper 165 MHz ranges. The one way links are often a control
station to a repeater site utilizing a directional antenna. The one way links
may also be a point-to-point relay of communications from an outer fringe RA to
the F.O.
Chicago appears to configured similarly as several other F.O.'s in that up to
five other VHF frequencies can be active with 163.9875 simultaneously with the
same radio traffic. Chicago F.O. also still uses some remote VHF receive/UHF
re-transmit link sites, but most are believed to be converted to microwave
links.
Also 167.7625 which Randy Strayer and this editor received via skip between KSC
210 and KSC 216. Channel identified as Bravo 1.
Detroit "DE" Field Office - RA's
Ann Arbor
Benton Harbor
Flint KEX 762
Grand Rapids
Jackson
Kalamazoo
Lansing
Marquette KEX 767
Mount Clemens
Oakland County
Saginaw
Traverse City KEX 772
Frequencies per MFFD (1986) and others: 163.925/267.2625 R.A. repeater;
163.8875/167.750 F.O. repeater; 163.8625/167.5375R; 167.3125; 167.3625;
167.400; 167.450; 167.500; 167.650; 414.500 is a state-wide UHF link to Detroit
F.O. and 419.250 is believed to a FBI UHF link, continuous tone.
Indianapolis "IP" Field Office - RA's
Bloomington
Evansville
Fort Wayne
Gary
Lafayette
Muncie
New Albany KEX 786
South Bend
Terre Haute
Frequencies from the MFFD: 163.9625/167.2125 R.A. repeater and 167.600.
Louisville "LS" Field Office - RA's
Ashland
Bowling Green
Covington
Elizabethtown
Frankfort
Hopkinsville
Lexington KIA 321
London
Paducah
Pikeville
Frequencies from the MFFD: 163.9375/167.675 R.A. repeater and 167.600.
Philadelphia Field Office - RA's
Allentown KEX 645
Harrisburg KEX 641
Landsdale KEX 648
Newtown Square KEX 650
Scranton KEX 643
State College KEX 652
Williamsport KEX 651
Frequencies: 163.9875/167.325R CH 1; 167.7125 CH 2; 167.500 CH 3; 167.5625 CH
4; 167.525 CH 5; 163.9625 ECC-1; 163.8375/167.3875R; 163.9375R; 167.2625;
167.300; 167.325; 167.3375; and 419.325 data/tone.
Pittsburgh "PG" Field Office - RA's
Beckley (WV)
Charleston (WV)
Clarksburg (WV)
Erie
Greensburg
Huntington (WV)
Johnstown
Martinsburg (WV)
New Castle
Parkersburg (WV)
Washington
Wheeling (WV)
Frequencies per MFFD (1986, no updates since then): 163.925/167.475R R.A.
repeater; 163.950/167.2125 F.O. repeater; 167.6375 and UHF links on 414.025,
414.125, 414.425 and 419.425.
Springfield (IL) Field Office - RA's
Alton
Belleville
Bloomington
Carbondale
Champaign
Danville
Decatur
Effingham
Peoria
Rock Island
Frequencies per the MFFD: 163.9125/167.725 R.A. repeater; 167.3625 and 167.625.
Now some miscellaneous data from the files on frequencies and call letters. The
following list of call signs are for NY and NJ state and are from a list dated
in 1981, so be fore told.
Albany F.O.: KEC 250; KEC 254 Watertown; KEC 256 Syracuse; KEC 257 Utica; KEC
258 Burlington (VT); KEC 259 Plattsburgh; and KEC 261 Glens Falls.
Buffalo F.O.: KEX 590; KEX 591 Rochester; KEX 592 Geneva; KEX 593 Jamestown;
and KEX 595 Niagara Falls.
Newark F.O.: KEX 620; Camden KEX 624
NYC F.O.: KEC 270/271; KEC 272 Suffolk; KEC 273 Garden City (NJ); KEC 277 JFK
Airport; KEC 278 Poughkeepsie, NY; KEC 280 Staten Island; KEC 281 Richmond
Hills; and KEC 283 New Rochelle. From a 1988 list I have a KEC 900 for NYC as
well as KEC 270.
Now some frequencies from the input basket contributed by AOSC or NESN (North
East Scanner News - more data at the end of this column) members during 1989 or
1990.
Boston F.O.: Romeo Units (R.A.'s) - 162.7625, 162.7875, 167.2625, 167.3625,
167.5625, 167.600, 167.6625 and 167.7625. Delta Units - 167.2625, 167.3625,
167.4625, 167.600, 167.6625 and 167.7625. Rhode Island - 167.2375, 167.2625,
167.4625, 167.7125 and 167.7625. New Hampshire - 163.9875/167.3625R, also
167.2375 and 167.6125.
Still with Boston from NESN: 163.8375, 163.8875, 163.900 and 163.925/164.125,
163.975/167.275 repeaters. Also 164.150, 167.250, 167.325, 167.425, 167.450,
167.500, 167.6375, and 167.750.
CT/NY FBI - 163.750 NY; 163.8625 CH 6 CT; 163.8875 CT; 164.125 Long Island;
164.150 NY; 167.2375 CT; 167.2625 NY; 167.2875 NY?; 167.3375 Long Island;
167.3875 NY; 167.425 CT primary; 167.4375 CT; 167.4625 NY; 167.5375 CT (note
input to 163.8625 CH 6); 167.5625; 167.600 NY; 167.6875 NY; 167.775 Long
Island; 167.7875 CT; 413.625 NY; 414.075 CT; 414.350 NY "Bronco Base" and
419.350 CT tone. Also note from the previous American Scannergram
169.975/168.850 as a new NYC repeater.
Also several with "?" as follows: 165.925 NY; 167.175 NY; 169.575 NY, possible
FBI/DEA; and 419.250 NY. One other interesting frequency - 170.825 as a U.S.
Marshal/INS/FBI NY "tie-in" frequency.
Charlotte F.O.: 163.9125/? A-1 Greensboro (R.A. repeater)
163.9625/?R, 167.750 and 167.7125.
Knoxville F.O.: A-1 163.9875R Knoxville F.O., also A-5 (probably different
input frequency and/or tone).
A-4 163.8375/167.2375 Chattanooga R.A.
B-5 163.8375/167.400 R.A. repeater, also C-1
C-5 163.8375R R.A. repeater
Johnson City base call is KEV-243
Knoxville Unit Numbers: 99 - Aircraft; mobile units 1 - 69.
Los Angeles F.O.: An excellent complete and detailed listing is available from
Mobile Radio Resources (2661 Carol Drive, San Jose, CA 95125). The FBI in LA
utilizes repeater channels in the 162, 163, 164, and 165 MHZ frequency range.
Inputs can be found in the 167 MHz frequencies. The 165 repeater frequencies
are 167.5875 and 165.7125.
Memphis F.O.: R.A. repeater - 163.9375; F.O. repeater 163.8625
Norfolk F.O.: 163.8375/167.600 F1; 167.2375 F2; 167.4875 F3; and 167.5625 F4.
Richmond F.O.: 163.8875/167.625 Operations Repeater; 167.5625 (note -
nationwide FBI simplex common); 163.8625/167.5375 (note - this is the only
repeater frequency pair that is common nationwide, usually used for SWAT or
special operations - ed.); 414.250 and 419.525 as UHF links.
San Diego F.O. sampling via Mobile Radio Resources Government Radio Systems
directory: Repeaters in the 162, 163, 164 and 165 MHz ranges with the input in
the 167 MHz range. The 165 repeater is on 167.5625 MHz.
San Francisco F.O. sampling via MRS GRS directory: Repeaters in the 163 and 167
MHz frequency ranges with inputs in the 167 and 162 MHz ranges respectively.
Tampa-St. Petersburg from Blaine Brooks: A-2: 167.725; A-3 167.325; A-5
167.3875; A-6 167.275; repeater on 163.9875 and 419.250 UHF satellite receiver
link.
CINCINNATI FIELD OFFICE OPERATIONS
The Cincinnati Field Office originally had nine Resident Agencies which were
located in Athens, Chillicothe, Columbus, Dayton, Hamilton, Portsmouth,
Springfield, Steubenville and Zanesville. The Springfield office is closed and
I am not sure about the Zanesville R.A.
The CI F.O. and R.A.'s radio communication systems are DES (Digital Encryption
Standard) capable and are utilized on a regular basis. CI appears to have a 32
channel DES system in place as testing was monitored during 1988 and 1989. Most
of their frequencies remained the same from the previous DES days. Note that
the CI radios are VHF/UHF mobiles. Refer to the B channel series in the
frequency list.
The signal numbers do not appear to be squad base (logically grouping by
general agent function such as bank robbery squad or drug enforcement, or by
R.A.'s), but rather a numeric numbering scheme starting with 1 and into the low
100's.
The CI F.O./R.A. operations still need some work from our southern Ohio members
as allot of holes and gaps remain. The following profile on CI was mainly made
possible by the efforts of Bill Gillie, Tony Cono, Rick Poorman, another member
who desires to named Mr. Anonymous, and this editor.
NOTE: ALL OHIO data is confirmed unless noted otherwise.
CI Call Letter Assignments
KQC 390 Cincinnati
KQC 391 Dayton
KQC 392 Columbus
KQC 393 Chillicothe
KQC 394 Springfield (closed)
KQC 395 Athens
KQC 396 Hamilton
KQC 397 Portsmouth
KQC 398 Stubenville
KQC 399 Zanesville
CI Frequency Assignments
167.650 A-1 Operations simplex R.A.'s
167.2375 A-2 " " F.O.
167.4375 A-3 " " division wide
167.5625 A-4 Nationwide common simplex
163.9875/167.650 A-5 Operations Repeater R.A.'s
163.8625/167.5375 A-6 SWAT Repeater
163.8375/167.2375 A-7 Operations Repeater F.O.
The B channels are local option assigned meaning that each office will have a
different set of frequencies. The CI F.O. has Cincinnati PD CH 5, 460.275R,
(B-1); Hamilton County Sheriff, 460.500R, (B-2); and several DEA frequencies.
??? D-6 and D-8 channel designators heard, but not confirmed.
163.9875/167.650 ECC-1 (Extended Car-to-Car) repeater R.A.'s
163.8375/167.2375 ECC-2 repeater F.O.
163.8625/167.5375 ECC-3 SWAT/Special Operations nationwide repeater
164.100/? ? Repeater heard with CI units
167.325, 167.600, 167.625, 167.6625, 167.6875 and 167.725: Simplex
operations.
412.575 - Xenia, Greene County UHF Repeater link
419.300 - New Vienna, Highland County UHF Repeater link
419.500 - Macon, Brown County UHF Repeater link
168.000 - possibly a VHF one-way link.
CI Signal Numbering
390 Signals: 1, 2, 3, 20, 22, 24, 53, 71, 72, 77, 90, 106, 133, 141 and
148.
391 Signals: 11 (SAIC), 18, 26, 29, 33, 43, 45, 49, 51, 52, 61, 64, 72,
75, 78, 91, 112, 137, 158 and 159.
392 Signals: 5 (SAIC), 6, 23, 34, 38, 40, 41, 42, 50, 54, 56, 65, 69, 73,
75, 82, 88, 93, 98, 100, 103, 104, 105, 108, 112, 113, 114,
116, 117, 122, 125, 147, 157, 166 and 225?
393 Signals: 71
397 Signals: 27 (SAIC)
398 Signals: 95 and 96.
Sometimes units may only use their last two digits, such as 14 or 17
instead of 114 or 117. Unit 90 usually in a helicopter or may be a helicopter.
Unit The MFFD has units in the 200's as surveillance vans/vehicles and units
in the 400's as surveillance air vehicles. Also we have report that unit 500 is
a surveillance aircraft.
CLEVELAND FIELD OFFICE OPERATIONS
The Cleveland Field Office originally had 10 Resident Agencies located in
Akron, Canton, Elyria, Lima, Mansfield, Mentor, Painesville, Sandusky, Toledo
and Youngstown. The Mentor R.A. currently is the only R.A. out of service in
the CV division.
The CV F.O. And R.A.'s radio communication system is DES capable and utilized
quite often in the DES mode. The CV F.O. has been in DES since the mid-eighties
on a limited basis and a full system since early 1989. The CV system appears to
be a 64 channel system which was implemented during the latter part of 1989.
The CV division utilizes a squad numbering scheme for assignment of signal
numbers. There are still a few holes in the numbering, but for the most part it
is complete.
CV Call Letter Assignment
KEX 740 Cleveland
KEX 741 Akron
KEX 742 Toledo
KEX 743 Youngstown
KEX 744 Painesville
KEX 745 Elyria
KEX 746 Mentor (closed)
KEX 747 Lima
KEX 748 Mansfield
KEX 749 Canton
KEX 750 Sandusky
CV Frequency Assignments
167.675 A-1 Operations Simplex F.O.
167.4125/167.7375 A-2 S.O.G. Repeater (Special Operations Group)
167.7875 A-3 S.O.G. Simplex; Operations Simplex
167.5625 A-4 Nationwide Common
164.100/167.2875 A-5 S.O.G. repeater
163.9125/167.675 A-6 Operations Repeater
163.8625/167.5375 A-7 (?) SWAT Repeater
154.935 A-8 Ohio LEERN
167.425 B-1 R.A. Simplex
167.5625 B-4 Simplex
163.875/167.425 B-5 R.A. Operations Repeater
155.370 B-6 Ohio Intercity
167.3375/162.7375 C-2 Canton Operations Repeater
167.3375/? C-3 " " "
167.3875/? C-4 Mansfield " "
167.7875/167.7375 C-7 CV Repeater
167.425 D-1 R.A. Simplex
163.875/167.425 D-4 R.A. Repeater
??? D-7 Akron simplex, not confirmed
167.7625 G-1 Akron Operations Simplex
167.7625/162.7625 G-2 Akron R.A. Operations Repeater
167.3625 G-3 Painesville Simplex (?)
The F bank is believed to be local option. No E or H bank references.
Confirmed frequency list:
162.7375 Canton B/M input to 167.3375 repeater
162.7625 Akron " " to 167.7625 "
163.8625/167.5375 CV SWAT Repeater
163.875/167.425 R.A. Repeater
163.9125/167.675 CV F.O. Repeater
164.100/167.2875 S.O.G. Repeater
167.100 Simplex
167.2125 CV simplex
167.2375 Akron simplex
167.2625 " "
167.2875 CV simplex; input to 164.100
167.3375/162.7375 Canton R.A. Repeater
167.3375/? Lima, Sandusky, Toledo R.A. Repeater
167.3625/162.7625 Akron, Painesville R.A. Repeater
167.3625 Akron, Painesville Simplex
167.3875/? Mansfield Operations Repeater
167.4125/167.7375 CV S.O.G. Repeater
167.425 R.A. Simplex; input to 163.875
167.4625 Mansfield Simplex
167.5125 CV Simplex
167.5375 Input to 163.8625
167.5625 Common simplex
167.675 CV Simplex; input to 163.9125
167.7375 CV Simplex AND CV Repeater
167.7625/162.7625 Akron R.A. repeater
167.7875 CV Simplex and CV Repeater
That is 22 unique confirmed frequencies and there are probably more out there
in CV. Also try 168.000 as it may be a VHF fixed one-way link.
Several frequencies come active with the same traffic at times, namely
167.4125, 167.7375 and 167.7875, and at times 164.100 also!
CV Signal Numbering
1-99 Administration
100 - 199 Exact function(s) not confirmed
200 - 299 Gambling Squad
300 - 399 Bank Robbery Squad; Kidnapping Squad; Extortion Cases
400 - 499 Drug Enforcement Squad
500 - 599 Organized Crime Task Force; S.O.G. personnel
600 - 699 Exact function(s) not confirmed
assists w/kidnapping cases, surveillances
700 - 739 Assistant U.S. Attorney's; others?
740 - 750 Base Station Calls
800 - 899 SWAT; Foreign Counterintelligence; O.C.T.F.
900 - 999 Akron, Painesville R.A.'s
Akron - 900, 901, 902, 904, 906, 921 - 929
Painesville - 903, 920, 930
1000 - 1099 Canton and Mansfield R.A.'s
Canton - 1000 to 1010; 1030 to 1040
Mansfield - 1005, 1032 and 1033
1100 - 1199 Sandusky and Toledo R.A.'s
Sandusky - 1121 - 1129
Toledo - 1100 - 1119, 1130
1200 - 1299 Youngstown R.A. - 1200 to 1209 and 1220 to 1232.
1300 - 1399 Radio Technicians and Vehicle Maintenance
Radio Techs - 1302, 1303, 1304, 1307 and 1319
Vehicle Maintenance - 1300, 1301, 1305, 1306 and 1318.
FBI COMMON FREQUENCY RANGES
I suggest searching the following frequency ranges for FBI radio activity. Note
that in many areas across the U.S. the FBI have picked up many traditional
non-FBI frequencies. Originally the Department of Justice had only 82 VHf
frequencies assigned for ALL of its members, let alone just the FBI. The FBI
originally had less than 40 of the 82 frequencies for their exclusive use.
During the change over to DES nationwide, the FBI has received additional
frequencies from other branches and departments who did not utilize or need
them. In the NE region the FBI received 110 VHF frequencies - almost 300%
increase in the number of frequencies available. The early days saw the FBI in
the 163 MHz range for repeaters and the 167 MHz range for simplex operations.
Limit your search to 500 KHz at a time, certainly no more than a 1 MHz. The
following are common ranges reported nationwide:
162.6125 - 162.7875 Repeater Inputs; Outputs; 12.5KHz steps
163.825 - 163.9875 Repeater Outputs; 12.5KHz steps
164.000 - 164.500 Repeater Outputs; 25KHz steps
165.5125 - 165.900 Repeater Outputs; 12.5KHz steps
167.100 - 167.7875 Repeater Inputs; Outputs; Simplex; 12.5KHz steps
168.825 - 169.000 Repeater Inputs; 25KHz steps
169.825 - 169.975 Repeater Outputs; 25KHz steps
FBI COMMON TEN CODES
10-0 Negative 10-29 O.L. Check
10-4 Affirmative 10-42 Residence
10-7 Out-of-Service 10-58 Mileage
10-8 In-Service 10-66 Alarm (?)
10-9 Repeat 10-76 Enroute
10-16 Message Check 10-77 Bank Alarm
10-20 Location 10-85 Meet w/agent ...
10-21 Telephone Call 10-90 Bank Robbery
10-22 Report to Office 10-91 BR In Progress
10-23 Stand-By 10-99 Assist Agent
10-26 N.C.I.C. Check
10-28 Registration check
FBI COMMON CODE WORDS
ASAIC - Assistant Special Agent In Charge
AUSA - Assistant U.S. Attorney
Big K - K-Mart
Bird Dog - Surveillance Aircraft
C.I. - Confidential Informant
Diaper Change - Changing of battery (bug or trailing transmitter)
ECC - Extended Car-to-Car
FCI - Foreign Counter Intelligence
Half Signal - An Agent's spouse
H.T. - Handi-Talkies
In-the-Pocket - Subject in surveillance net
Intel - Intelligence
KEL - Manufacturer of Surveillance equipment
Main Man - Primary subject under surveillance/investigation
Mickey D's - McDonald's
Nest - Off-site office from F.O./R.A. for S.O.G. and Undercover Agents
No Joy - Negative Communications
O, The - The Office
OCTF - Organized Crime Task Force
Other Side - DES mode
Out-of-Pocket - Subject not currently under surveillance
Outside Agency - News Media
Package - Suspect or item under surveillance
Plank - Bridge
Private - DES Mode
Private Side - DES Mode
Port - Motel
Quarter Signal - An Agent's child
RA - Resident Agency
Rabbit - Subject under surveillance
Rabbit Tracks - subject on the move
R.D.O.- Regular Day Off
Red Balled - Stopped at traffic light w/subject
Red Boarded - " " " " ; subject not stopped
Road Runner - Surveillance Aircraft
SAIC - Special Agent In Charge
Signal - A field agent
S.O.G. - Special Operations Group
S.W. - Search Warrant
SWAT - Special Weapons and Tactics
Ten Check - Message Check
Unit - A vehicle
USA - U.S. Attorney
Wagon - Surveillance Van
Wire - Body Transmitter
FEDERAL NEWS - FBI
The FCC has established a nationwide radio frequency for stolen vehicle
tracking systems operating on the frequency of 173.025. The frequency was
reported as a FBI assignment (wouldn't we like to see the exact frequency
assignment chart?) Nationwide. Perhaps this frequency was used for wireless
microphones or bugs, and if so perhaps others operate on nearby similar
frequencies. Give it a listen and let us know.
The FBI Academy, located 40 miles south of Washington, is the host to the most
crime ridden town in the United States - Hogan's Alley. Hogan's Alley is a
"Hollywood" town with a motel, bank, post office, drug store, laundry and even
a theater. It is used as a training ground for FBI agent trainees. Various
scenarios are enacted under the careful eyes of supervisors. The trainees
performance are evaluated with each exercise.
One thing about Hogan's Alley - it has a 100% success rate in solving of cases,
pretty impressive. Something that is not pretty impressive about the FBI is the
starting pay agents earn. According to a 8 January 1990 U.S. News and World
Report quirk the starting pay of a FBI agent is $26,261. Consider that an agent
does not choice his assignment location, the agent could be placed in a very
high cost of living area. Placement in certain cities such as NYC offer
slightly more pay, however it is not enough for the work that they perform for
all of us. Yet even worse is the pay for DEA agents $19,493 to $23,846.
The Congress is aware of these low salaries (after all they, the Congressmen
and Senators literally took care of themselves) and will hopefully rectify the
problem this year.


212
txt_files/art-04.txt Normal file
View File

@ -0,0 +1,212 @@
Volume : SIRS 1991 History, Article 56
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Do Assassinations Alter the Course of History?
Author : Simon Freeman and Ronald Payne
Source : European
Publication Date : May 24-26, 1991
Page Number(s) : 9
EUROPEAN
(London, England)
May 24-26, 1991, p. 9
"Reprinted courtesy of THE EUROPEAN."
DO ASSASSINATIONS ALTER THE COURSE OF HISTORY?
by Simon Freeman and Ronald Payne
India faces collapse with the violent death of Rajiv Gandhi--or
does it? Simon Freeman and Ronald Payne analyse the importance of
individuals in the march of events
They have paid their tributes, expressed their horror and
pledged, as they always do when one of their number is murdered,
that democracy will triumph in the face of terrorism. Now, in
their weekend retreats, with their foreign affairs advisers and
their top secret intelligence reports, world leaders will have to
judge the true impact on India of the assassination of Rajiv
Gandhi.
They will conclude, perhaps a little unhappily for them but
fortunately for the rest of us, that Gandhi's death is unlikely
to be more than a footnote, if a substantial one, in the history
of his country. India will not disintegrate. There will be no
civil war. The Indian military will not stage a coup. Pakistan
will not launch the oft-predicted strike which would set the
region ablaze.
Some Indians, perhaps many, may die over the next month in
the kind of primitive ethnic and religious feuding which has
always threatened to destroy the country. But, unless history is
truly mischievous, India will muddle through and get on with the
business of trying to survive.
It is rarely the personal stature of a statesman which
decides how pivotal his contribution to history will be. History
usually depends less on the drama of an assassination or the
status of the victim than on more profound political, economic or
demographic forces. In retrospect, it often appears that assassin
and victim were inexorably drawn together to become the catalyst
for inevitable change.
The most spectacular assassination in modern European
history--the shooting of Archduke Francis Ferdinand and his wife
at Sarajevo in 1914 by a Serbian student, Gavrilo Princip--was
undoubtedly the immediate cause of the First World War. But few
serious historians today subscribe to the theory that, had
Princip not pressed the trigger that late June day in the cause
of Serbian nationalism, the 19th-century order would have
survived.
Dr Christopher Andrew, of Cambridge University, believes
that the assassination merely set the timetable for war. He said:
"Even if the Archduke had not been killed then there might have
been a great war anyway." Other experts now talk not of Princip
but of an explosive cocktail of nationalism straining within
decrepit empires and of fatally dangerous alliances built by
leaders from an earlier world.
It is possible to see Sarajevo as the climax to a period in
which political murders became almost routine. The reference
books on late 19th-century Europe are peppered with the names of
hapless, long-forgotten politicians who were shot, bombed or
stabbed because, so it was thought by the many bands of
extremists, that was the only way to force change.
While there are no precise ways to assess the real
importance of an assassination, historians like Andrew reckon
that there are some general guidelines. In the stable, advanced
democracies of today the murder of a top politician is unlikely
to cause more than outrage and pain.
When the Irish Republican Army blew up the Grand Hotel in
Brighton in 1984 in an attempt to kill Prime Minister Margaret
Thatcher and most of her Cabinet, they hoped that there would be
such disgust at the murders that the British public would force
their leaders to pull out of Northern Ireland. But, even if
Thatcher had died this would not have happened. Her death would
probably have strengthened her successor's resolve not to bow to
terrorism.
The IRA should have known this from the reaction to the
killing five years earlier of Lord Louis Mountbatten,
distinguished soldier, public servant and pillar of the British
Establishment. The murder changed nothing in the province and
only demonstrated, as if it was necessary, that determined
terrorists often find ways to murder their chosen targets.
Similarly, The Red Brigade anarchists who cold-bloodedly killed
Aldo Moro, the Italian prime minister, in May, 1978, achieved
nothing except to ensure that the Italian authorities would hunt
them with even more determination. Nor did the killers of Swedish
Prime Minister Olof Palme accomplish anything. The murder--still
unsolved--drew the usual, but clearly genuine, shocked response
from world leaders. But even at the time they were hardpressed to
pretend that Palme's murder would fundamentally matter to Sweden.
The Third World, on the other hand, is more volatile.
Sometimes, as in India, countries are an uneasy blend of
feudalism and capitalism, dynastic authoritarianism and
democracy. The demise of dictators often leaves a bloody vacuum.
Yet even here, the assassination of a tyrant does not necessarily
signal major upheaval. General Zia ul-Haque, who had ruled
Pakistan since 1977, was blown up in his plane in the summer of
1988. But, though he had long seemed crucial to the continuing
stability of the country, his death seemed to be the fated climax
to the era of military rule.
The murder of Egypt's President Sadat in October 1981 seemed
then to herald some new dark age of internal repression and
aggression towards Israel. But his successor, Hosni Mubarak,
merely edged closer to the Arab world without returning to the
pre-Sadat hostility towards Israel.
The killers of kings and dictators in other Arab countries
have also discovered that they have murdered in vain. Iraq has
endured a succession of brutal military dictators who have died
as violently as they lived. The fact that Iraq has never
experienced democracy is the result of economic and historical
realities, not assassins' bullets. Saudi Arabia has also seen its
share of high level killings yet, today, the House of Saud
remains immovably in power.
But in the United States, where the idea of righteous
violence is deeply embedded in the national consciousness, the
grand assassination has been part of the political process for
more than a century. Beginning with the murder of President
Abraham Lincoln in 1865, the list of victims is a long and
distinguished one. It includes most recently, President John F.
Kennedy in 1963; his brother, Robert, heir apparent, shot in
1968; Martin Luther King, civil rights campaigner and Nobel Peace
Prize winner, gunned down the same year. Ronald Reagan could
easily have followed in 1981 when he was shot and badly wounded.
John Kennedy's death now appears important for different
reasons from those one might have expected at the time. It did
not derail any of his vaunted civil rights or welfare programmes;
rather his death guaranteed that his successor, Lyndon Johnson,
would be able to push the Kennedy blueprint for a New America
through Congress. Nor did it end the creeping US involvement in
Vietnam.
But Kennedy has been immortalised by his assassin and the
mythology of his unfulfilled promise will endure long after his
real accomplishments are forgotten.
In a curious, perverse, sense he and his fellow-martyrs
might live on as far more potent symbols of change than if they
had survived into gentle retirement with their fudges revealed
and their frailties exposed.
Why good leaders die and bad ones survive
Few names of hated tyrants appear on the roll-call of world
leaders who fall to the assassin's bomb, knife or bullet, writes
Ronald Payne. One of the curiosities of the trade in political
murder is that those the world generally recognises as bad guys
often live to a ripe old age or die quietly in their beds. Few
who mourn the passing of Rajiv Gandhi would have shed so many
tears had President Saddam Hussein been blown to pieces in Iraq.
There was a time only a few years ago when Americans and
Europeans would have celebrated the violent demise of President
Muammar Gaddafi. Both the Libyan leader and Hussein live on, as
do Idi Amin of Uganda, or Fidel Castro, whom the American Central
Intelligence Agency plotted so imaginatively and ineffectually to
remove.
When academics play the game of what might have been, the
consequences of assassinating such monstres sacres as Stalin and
Hitler arise.
When the Russian dictator died suddenly of natural causes,
the whole Soviet Union was paralysed because no leader dared
claim the right to succeed him. That in itself suggests what
might have happened had Stalin been shot unexpectedly at a more
critical moment.
The timing of a political murder is crucial. Had Adolf
Hitler been assassinated before he achieved full power or before
his invasion of the Soviet Union, the history of Germany, and
indeed of Europe, would have been very different.
Fascinating though such intellectual exercises are, it seems
that as a rule it is the decent, the innocent and the relatively
harmless who perish as assassins' victims.
The reason may not be far to seek. Tyrants watch their backs
pretty carefully. The secret police are ever active. It is easier
to kill statesmen in democracies where the rule of law prevails
and the sad truth is that leaders in those countries which
exercise authority through voting rather than shooting are more
at risk than Middle East tyrants.
A further reason for the survival of the hated monster
figure might be that Western intelligence services have been
forbidden to go in for execution. The CIA and the British secret
intelligence service are now out of the killing business. Even
the KGB's assassination specialists seem to have been stood down.
In any case the Kremlin was hardly keen on the murder of
ruling statesmen even in the bad old days. Soviet leaders
understood the realities of power well enough to know that such
acts were unlikely to further their cause.

307
txt_files/art-05.txt Normal file
View File

@ -0,0 +1,307 @@
Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Conspiracy Theories: Doubts Refuse to Die
Author : Bob Dudney
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 11
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Commemorative Section, pp. 11
Reprinted with permission from the author.
CONSPIRACY THEORIES: DOUBTS REFUSE TO DIE
by Bob Dudney
Special to the Times Herald
Editor's Note: Bob Dudney, a former reporter for the Dallas Times
Herald, has written hundreds of articles about the investigation
of President Kennedy's assassination. He has covered
congressional inquiries on the subject, has interviewed dozens of
people connected with it, and has examined thousands of
government documents.
The shots fired in Dealey Plaza on a sunny Dallas day 20
years ago still reverberate in a bizarre way: the belief that
President John F. Kennedy's assassination resulted from a
conspiracy.
There is a deep, almost theological assumption by some
Americans that the President was the victim of conspirators who
still roam at large. The conclusion is strange because there is
no solid evidence to support it--and significant reasons to
believe it is false.
There is no denying the difficulty of accepting the Warren
Commission's verdict on the events of Nov. 22, 1963--that a
down-and-out, 24-year-old ex-Marine named Lee Harvey Oswald, with
no outside assistance, murdered the most glamorous, powerful man
in the world at the time.
But no matter how strong the unwillingness to believe, the
evidence in the case demonstrates beyond a reasonable doubt that
there was no plot. Undermining the scores of conspiracy theories
that have cropped up over the years are three crucial factors:
- The scientific, eyewitness and medical data establishing
that Oswald shot Kennedy.
- The absence of uncontroverted evidence linking Oswald to
other conspirators.
- The lack of evidence to suggest that Oswald was
unwittingly manipulated by others.
So long as these elements remain unshaken, claims that a
sinister plot was afoot that November day will amount to nothing
more than speculation.
Nevertheless, theories about the active involvement of
others in the assassination thrive and multiply. Their
proponents--some skilled and some not, some sincere and some not
--have produced dozens of books, films and articles that purport
to reveal the "full" treachery of events in Dallas two decades
ago.
In fact, from the volume and variety of conspiracy theories,
one might conclude that the possibility of a conspiracy had never
been officially probed. The theories discount thousands of
documents and millions of investigative man-hours devoted to that
question by the Warren panel, the FBI and the CIA in 1963 and
1964; the Rockefeller Commission in 1975; the Senate Select
Committee on Intelligence in 1975 and the House Committee on
Assassinations in 1977-1978.
The list of "suspects" the theories implicate is extensive.
Among them: The Soviet KGB; anti-Soviet exiles; Fidel Castro;
pro-Castro Cubans in the United States; anti-Castro Cubans;
loyalists of slain South Vietnamese leader Ngo Dinh Diem; right
wing fanatics; left wing Marxists; the Mafia; rogue Texas oilmen;
labor unions; Southern white racists; the Dallas Police
Department; the CIA; the FBI; the Secret Service; the Chinese
communists; reactionary Army officers; and Jewish extremists.
But it is not enough to demonstrate that some group stood to
benefit from the murder. Theorists must establish participation
of two or more people in the murder. This they have not done.
Each theory alters the nature of Oswald's role in the death,
but the possible changes are necessarily limited. The principle
theories are:
Oswald is innocent: Adherents of this contention maintain
that law enforcement officials--cynically or through honest
error--settled on Oswald as the assassin even though there was no
reliable evidence against him. They say Oswald could have
exonerated himself at a trial had he not been killed by Dallas
nightclub owner Jack Ruby.
Challenging this theory is an abundance of evidence.
Scientific testing and physical evidence found at the scene show
that shots were fired at Kennedy's limousine from a sixth-floor
window of the Texas School Book Depository building.
Oswald worked in the building at Elm and Houston. He was
seen leaving it shortly after the shooting. Crates were found
stacked by the sixth-floor window as an apparent gun brace.
Oswald's fingerprints were on the crates. The morning of the
assassination, Oswald was seen carrying a long, paper-wrapped
object into the building. Wrapping paper found near the window
bore Oswald's fingerprints.
A rifle was found hidden between boxes in the building. A
bullet and the bullet fragments removed from Kennedy, Connally
and the limousine ballistically matched the rifle. Oswald's palm
print was found on the rifle. The rifle, purchased from a Chicago
mail order house, had been shipped to a Dallas post office box
rented by Oswald. A photograph showed Oswald holding a rifle
identical to the one found.
Proponents of this theory retort that all of the evidence
was fabricated and put credence in Oswald's post-arrest
declaration that he hadn't killed anyone.
But claims that the incriminating rifle photo was doctored--
with Oswald's head superimposed over another man's body--were
dispelled by Marina Oswald's confirmation that she took the
picture. And claims that Oswald's rifle was planted in the room
after the assassination were refuted by ballistic tests that
showed it fired the deadly shots.
Given the problems with claims of planted evidence, some
theorists have argued that there must have been a "planted
Oswald," or Oswald impersonator on the scene. This contention,
however, has been difficult to reconcile with the Oswald
fingerprints and palmprints found on the evidence.
Two years ago, conspiracy theorists, successfully pressed
for the opening of Oswald's grave to show it contained an
imposter--probably a Soviet agent. Subsequent examination,
however, determined the body was the "real" Lee Harvey Oswald.
Oswald had accomplices: Faced with the weight of evidence
indicating Oswald's guilt, quite a few conspiracy theories have
contended he was only one of those involved.
Some theories assert that a person or persons helped put
Oswald in position to shoot the President. They leave unexplained
why Oswald would need such help. As an employee of the book
depository, he had easy access to the building. After the
shooting, according to witnesses' testimony, he sought no help in
fleeing and left downtown Dallas by city bus and then a taxi.
Moreover, it would seem unlikely that accomplices could have
helped get Oswald a job that put him on the motorcycle route.
Oswald got his job at the depository on Oct. 15. White House
planning for the President's motorcade route did not begin until
Nov. 4, and the map of the route was not published until Nov. 19.
Somewhat more credible is the contention others provided
secret financing, planning, direction or encouragement for the
murder that Oswald carried out.
In this scenario, the chief suspect over the years has been
the Soviet Union. After all, Oswald defected to Russia in 1959.
He married a Russian woman, Marina Prusakova, in 1961. He was a
vociferous Marxist. Even after he returned to the United States
in June 1962, Oswald had several fleeting contacts with Soviet
diplomats.
However, no evidence of Soviet complicity has been found.
Investigators who combed Oswald's effects discovered no
unexplained funds, no code books, no messages--nothing to suggest
a Soviet hand in Oswald's actions. Also, had Oswald been
recruited as a Soviet agent, the Russians would not have been
likely to allow him to defect, as he did--thereby exposing his
relationship with them.
The other top suspect has been Cuba. Oswald admired Fidel
Castro; he was a member of the Fair Play for Cuba Committee in
the United States; he visited the Cuban embassy in Mexico City a
few weeks before the assassination, seeking a travel visa to that
country. Because the CIA was backing assassination plots against
Castro at the time, some speculate that Castro may have
retaliated through Oswald.
But, as with the theory of Soviet involvement, there is no
evidence. At one point, there did appear to be some. A young
Central American informant told U.S. authorities he saw Oswald in
the Cuban embassy, talking to two other men, one of whom was
conversing in Spanish. Later, he said, Oswald supposedly received
$6,500 to kill an important person. Under questioning, however,
the informant admitted he had never seen Oswald and had
fabricated the transaction, wishing to stir up American hatred
for Castro's Cuba. Subsequently, he retracted his retraction.
Finally, he failed a lie-detector test. Anyway, Oswald did not
speak Spanish.
Another account suggesting possible Cuban involvement was
provided by a Cuban exile who testified before the Warren
commission. She said two Hispanic men and an Anglo man they
identified as "Leon Oswald" came to her Dallas apartment 28 days
before the assassination. She said they spoke vaguely of Cuban
revolutionary plans before she turned them away. She identified
Oswald in television film as the man she had seen, but federal
investigators said they do not believe it was him. They said they
believe that at that time, Oswald was traveling from his New
Orleans home to Mexico in his quest for a Cuban entry visa.
The most publicized theories involving Oswald accomplices
are those that have featured other gunmen.
These various versions have assassins firing from other
windows in the depository building; from the Dal-Tex building;
from sewer drains, a grassy knoll near Dealey Plaza, the railroad
bridge over Elm, Main and Commerce streets and the Dallas County
Courthouse roof; and firing with silencers or automatic weapons.
The arguments surrounding these claims:
- One-man, one-bullet: The first shot that wounded Kennedy
in the neck did not also hit John Connally, as the Warren
Commission concluded. Rather they were struck by individual
bullets simultaneously, requiring that there be two shooters. A
team of experts, including a National Aeronautics and Space
Administration engineer, conducted an exhaustive study of this
question in 1978. The panel's conclusion: It is not only
possible, but almost certain that Kennedy and Connally were hit
by the same bullet.
- Filmed accomplices: Photographs of Dealey Plaza taken at
the time of the assassination show a dim form behind a wall on a
grassy knoll to the right and in front of the presidential
limousine. However, investigators found no spent cartridges,
weapons or footprints in this area. A panel of photography
experts concluded in 1978 that the images on the film were
shadows.
Films and photos also show a man in Dealey Plaza opening and
closing a black umbrella. Conspiracy theories suggest he was
signaling gunmen or that some weapon was hidden in the umbrella.
But at a hearing of the House Assassinations Committee in 1978, a
mild-mannered Dallas insurance worker identified himself as the
mysterious "umbrella man" and said he was only trying to harass
Kennedy.
- Head movement: The famous Zapruder film of the
assassination clearly shows President Kennedy's head lurching
backward when it was struck by the fatal gunshot. If the shot had
come from behind, conspiracy theorists reason, the impact would
have driven the President's head forward. Nonetheless, a panel of
medical experts concluded in 1978 that Kennedy's head wounds were
caused by a shot from the rear. Moreover, a panel of
wound-ballistics scientists concluded that the backward motion
was caused by the sudden tightening of the President's neck
muscles.
- Tape-recorded sounds: Sound transmitted through the
microphone of a motorcycle patrolman in the motorcade, and
recorded at Dallas police headquarters, shows four noise
"spikes." At the behest of the House Assassinations Committee in
1978, three acoustical experts conducted three test gunshot
firings in Dealey Plaza, compared the sounds and concluded it was
95 percent certain that four shots had been fired. The Warren
Commission had concluded that no more than three shots had been
fired from the window. The source of the previously unknown one,
the acoustical experts said, was the grassy knoll area.
The finding was the first scientific evidence supporting a
conspiracy theory and stirred an uproar. But it, too, was later
discounted. Twelve experts assembled by the National Research
Council reviewed the tapes and concluded the "spikes" were
actually recorded about a minute after the assassination.
The Assassinations Committee also grappled futily with the
prospect of a likely colleague for Oswald. "The question is with
who," said one member of the now-defunct committee. "If there's a
conspirator, then who could it have been? We asked ourselves over
and over: What associates did Oswald have, where was there
evidence of conspiracy? We found none."
Oswald was manipulated: These theories suggest that Oswald,
and perhaps other operatives, were unknowingly influenced in
their actions.
There can be only one reasonable candidate to mastermind
such a project--the KGB. It would have been the only organization
with the scientific means and the extended access to Oswald. Even
some Warren Commission lawyers and CIA members briefly toyed with
the possibility. Because Oswald spent some time in a Soviet
hospital while residing in Russia, there was the suspicion he
might have been brainwashed.
Once again, the problem is that there is no evidence to
suggest Oswald was brainwashed. Moreover, the CIA believes KGB
"mind conditioning" techniques at the time were primitive.
Surely, it is impossible to rule out the prospect of a
conspiracy in the assassination. The Warren Commission itself did
not do so. "Because of the difficulty of providing negatives to a
certainty," the panel said, proving there was no conspiracy
"cannot be established categorically." However, the panel said,
"if there is any such evidence it has been beyond the reach of
all the investigative agencies and resources of the United
States."
Twenty years later, that is still the case.

425
txt_files/art-06.txt Normal file
View File

@ -0,0 +1,425 @@
Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : The Day John Kennedy Died
Author : Bryan Woolley
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Sec. Sec. 2-3
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Special Section, pp. 2-3
Reprinted with permission from the author.
THE DAY JOHN KENNEDY DIED
Sun cleared dawn's drizzle, but gloom clouded Dallas
by Bryan Woolley
Staff Writer
The valet walked past the Secret Service guard and entered
Suite 850 of Fort Worth's Texas Hotel. He knocked on the door of
the master bedroom. It was 7:30 a.m. "Mr. President," he said,
"it's raining out."
President John F. Kennedy, coming out of sleep, replied,
"That's too bad."
While he was dressing, he heard the murmur of the crowd
outside and went to the window. Below him, 5,000 people were
standing patiently in the soft drizzle, some wearing raincoats,
some holding umbrellas, most simply ignoring the weather. They
were office and factory workers. They had begun gathering before
dawn to hear the speech the President would make in the parking
lot where they stood. Mounted police officers wearing yellow
slickers moved among them. "Gosh, look at the crowd!" the
President said to his wife. "Just look! Isn't that terrific."
In the lobby, he was joined by Vice President Lyndon
Johnson, Gov. John Connally, Sen. Ralph Yarborough, several
members of Congress and the president of the Fort Worth Chamber
of Commerce. They crossed Eighth Street and plunged into the
crowd, shaking hands, smiling. They mounted the truck that was to
serve as the speaker's platform. Kennedy grabbed the microphone
and shouted: "There are no faint hearts in Fort Worth!"
The crowd cheered. Somebody yelled, "Where's Jackie?"
Kennedy pointed toward his eighth-floor window. "Mrs.
Kennedy is organizing herself," he replied. "It takes her a
little longer, but, of course, she looks better than we do when
she does it."
Fort Worth was the third stop on the President's five-city
Texas tour. He had ridden through Houston and San Antonio like a
triumphant emperor, and Fort Worth had stayed up past midnight to
welcome the handsome 46-year-old President and his beautiful
34-year-old wife, lining their route from Carswell Air Force base
to the hotel.
After an informal speech in the parking lot, he would go to
the hotel, deliver a breakfast speech, fly from Carswell to Love
Field, ride in a motorcade through Dallas, deliver a speech at a
$100-a-plate luncheon at the Dallas Trade Mart, fly to Austin for
a banquet and a reception at the Governor's Mansion, and then go
to the LBJ ranch for a weekend of rest.
Back inside the Texas Hotel, Kennedy accepted the ceremonial
cowboy hat from his hosts, but refused to wear it for
photographers and TV cameramen. He would model it later, he said,
at the White House. His breakfast speech was the standard
fence-mending one-- about the greatness of Texas and Fort Worth
and the Democratic Party--and it drew a thunderous ovation.
The President and the first lady retired to Suite 850 to
prepare for the flight to Dallas. Kennedy placed a call to former
Vice President John Nance "Cactus Jack" Garner in Uvalde, Texas,
to wish him a happy 95th birthday, and an aide showed him a
black-bordered full-page ad with a sardonic headline in The
Dallas Morning News. "Welcome Mr. Kennedy to Dallas," it read. In
13 rhetorical questions, something called the "American
Fact-Finding Committee" accused the administration of selling out
the world to communism.
"Oh, you know, we're heading into nut country today," the
President said. Mrs. Kennedy later told author William Manchester
that he paced the floor and then stopped in front of her. "You
know, last night would have been a hell of a night to assassinate
a president," he said. "There was the rain and the night, and we
were all getting jostled. Suppose a man had a pistol in a
briefcase." He pointed a finger at the wall and pretended to fire
two shots.
Not many in the presidential party were looking forward to
Dallas. Several Texans--some from Dallas--had warned the
President not to include Dallas on his Texas tour, that an ugly
incident was likely to occur there. But Kennedy insisted that the
state's second-largest city be placed on the itinerary.
So the preparations had been made. Dallas civic leaders had
launched a public relations campaign to try to ensure a friendly
turnout for the President.
Seven hundred law officers--city police officers and
firefighters, sheriff's deputies, Texas Rangers and state highway
patrol officers--had been assembled to keep order. About the time
that John Kennedy was waking up, Dallas Police Chief Jesse Curry
had gone on TV to warn that his officers would take "immediate
action to block any improper conduct." If the police were
inadequate, he said, even citizen's arrests were authorized.
Others were preparing, too, in the early morning. Waiters
were setting the places for the Trade Mart luncheon. A warehouse
worker named Lee Harvey Oswald sneaked a rifle and a telescopic
sight into the Texas School Book Depository. Because of forecasts
showing that the rain probably would be past Dallas by the time
the presidential party arrived, a Kennedy aide told the Secret
Service not to put the bubble-top on the big blue limousine in
which the President and Mrs. Kennedy would ride.
Air Force One had barely left the runway at Carswell before
it began its descent toward Love Field. The flight took only 13
minutes. The big plane touched down at 11:38 a.m. Police armed
with rifles stood along the roof of the terminal building. A
large crowd waited beyond a chain-link fence. Many in the crowd
were jumping, screaming, waving placards: "We Love Jack," "Hooray
for JFK." Others were less friendly. They held placards, too:
"Help Kennedy Stamp Out Democracy," "In 1964 Goldwater and
Freedom," "Yankees Go Home And Take Your Equals With You." They
booed and hissed when the President and first lady emerged from
the plane, smiled, waved and descended the stairs of Air Force
One.
For the fourth time in 24 hours, Lyndon and Lady Bird
Johnson were waiting to welcome the Kennedys to a Texas city. The
presidential couple was introduced to the 12-man official
welcoming committee. Mrs. Earle Cabell, wife of the Dallas mayor,
presented Mrs. Kennedy with a bouquet of red roses. Then Kennedy
broke from the official cluster and moved along the chain-link
fence, smiling, shaking hands; letting people touch him.
At 11:55, two motorcycle police officers led the motorcade
out of Love Field and turned left on Mockingbird Lane. Police
Chief Curry drove the lead car. With him rode Dallas County
Sheriff Bill Decker and two Secret Service agents. Then came
three more motorcycles. Then the blue limousine with two Secret
Service agents in the front, John and Nellie Connally in the jump
seats and the Kennedys in the back seat. Two motorcycles flanked
the car on each side. Next was another convertible, full of
Kennedy aides and Secret Service agents, and four more agents
standing on its running boards.
Then came the vice presidential convertible, carrying two
Secret Service agents, the Johnsons and Yarborough. A Texas
highway patrol officer and four Secret Service agents rode in the
next car. A press pool car, a press bus, convertibles bearing
photographers, and cars carrying lesser dignitaries completed the
procession.
The motorcade would move through a sizable portion of
Dallas--along Mockingbird to Lemmon Avenue, right on Lemmon to
Turtle Creek Boulevard, along Turtle Creek and Cedar Springs Road
to Harwood Street, down Harwood to Main Street, where, at City
Hall, it would turn right and move westward along Main through
the downtown business district.
At the west end of downtown, it would turn right onto
Houston Street and then immediately left onto Elm Street and move
through the Triple Underpass. A few yards beyond the underpass,
it would turn right again onto Stemmons Expressway and move to
the Trade Mart at the intersection of Stemmons and Harry Hines
Boulevard. After the President's speech, it would proceed out
Harry Hines to Mockingbird, turn right, and return to Love Field.
The sidewalk crowds were sparse at first. A few people in
the factories and offices along Mockingbird came out to have a
look. The sun was bright now, and Mrs. Kennedy was regretting
that she was wearing the pink wool suit. She had expected woolen
weather. It was, after all, late November. She put on sunglasses,
but her husband told her to take them off. The people wanted to
see her, he said.
At the corner of Lemmon and Lomo Alto, a group of children
held a long banner reading, "Please Stop and Shake Our Hands."
Kennedy ordered his driver to stop. He got out and shook their
hands. Farther along, he ordered another stop and got out to
greet a group of nuns. At Lee Park on Turtle Creek, the crowd
began to thicken. And at Harwood and Live Oak, still two blocks
from the turn onto Main, the people in the motorcade heard the
downtown crowd murmuring like a distant tide.
When the caravan made the turn, it faced pandemonium. People
were standing 10 and 12 deep on the sidewalks. Red, white and
blue bunting fluttered from the buildings. People leaned out
windows, waving and screaming. There were no picket signs, no
sour faces. The feared Dallas crowd was friendly--even adoring.
The nuts had stayed home. It was 12:21 p.m.
At the Trade Mart, the luncheon guests were showing their
tickets to the door guards and filing to their seats. The huge
building was surrounded by Dallas and Texas police, standing at
parade rest, holding riot sticks, glaring at a handful of
protesters. Inside the atrium hall, parakeets flew freely from
tree to tree. A fountain splashed. An organist was practicing
"Hail to the Chief." Dozens of yellow roses adorned the head
table. The presidential seal had been mounted on the rostrum.
As the motorcade neared Houston Street, the size of the
crowd diminished, but the cheers and applause were still hearty.
Nellie Connally turned in her seat and said, "You can't say
Dallas doesn't love you, Mr. President."
Kennedy replied, "No, you can't."
Workers from the Texas School Book Depository, the Dal-Tex
Building and the Dallas County buildings lined the sidewalks at
Houston and Elm as the head of the motorcade turned toward the
Triple Underpass. Others stood on the grass of Dealey Plaza. Many
had brought their children to see the President. Several
spectators noticed a man standing very still in a sixth-floor
corner window of the depository. One man saw the rifle he was
holding and assumed he was a Secret Service agent.
As the blue limousine made the sharp left turn from Houston
onto Elm, the Hertz rental car time-and-temperature sign on the
roof of the depository red 12:30. A Secret Service man in the
motorcade radioed the Trade Mart: "Halfback to Base. Five minutes
to destination." He wrote in his shift log: "12:35 p.m. President
Kennedy arrived at Trade Mart."
Some thought the noises were firecrackers. Others thought a
motorcycle was backfiring. Some recognized them as rifle shots.
Pigeons flew from the roof of the depository. Kennedy lurched
forward and grabbed his neck.
Sen. Yarborough, in the vice president's car, cried, "My
God! They've shot the President!" Secret Service agent Rufus
Youngblood climbed from the front seat to the back, threw Johnson
to the floorboard and covered him with his own body.
In the blue limousine, Gov. Connally had been hit, too. He
pitched forward and fell toward his wife. "No, no, no, no, no!"
he screamed.
Then another shot. The President's head exploded. Blood
spattered the occupants of the blue car. The first lady, in
shock, tried to climb out over the trunk. A Secret Service agent
pushed her back. The car slowed and then lurched out of the
motorcade line and sped past the Triple Underpass, with Chief
Curry's car and the Secret Service car in pursuit.
UPI White House correspondent Merriman Smith was sitting in
the middle of the front seat of the press pool car. He grabbed
the mobile phone. He called the wire service's Dallas bureau and
dictated the first bulletin: "Three shots were fired at President
Kennedy's motorcade in downtown Dallas."
The cheers of greeting in Dealey Plaza rose to screams of
horror and fear. "They killed him! They killed him! They killed
him!" Parents grabbed children and ran. Men and women lay
prostrate on the grass and sidewalks, as if dead. The motorcade
was disintegrating, the cars veering hither and yon, trying to
get through the crowd and follow the limousine. Helmeted police
officers leaped from motorcycles, pulled guns, looked wildly
about. The Hertz clock still read 12:30.
The staff at Parkland Memorial Hospital had only five
minutes notice of the massive emergency rushing upon them, and
many thought the message was a joke. When the blue car arrived,
they weren't ready. No one was waiting at the emergency entrance.
A Secret Service agent dashed inside to order stretchers.
Connally--whose wounds were serious but not fatal--was
wheeled to Trauma Room No. 2, Kennedy to Trauma Room No. 1. Teams
of surgeons and nurses went to work. The Secret Service regrouped
around the Johnsons and hustled them to seclusion in another part
of the hospital. Reporters dashed around the halls and offices,
searching for phones. Parkland patients heard the news and rushed
to have a look.
"Gentlemen," a weeping Yarborough told reporters, "this has
been a deed of horror. Excalibur has sunk beneath the waves."
Mrs. Kennedy insisted on being in the trauma room with her
husband. A nurse protested, but she was admitted.
Outside, more of the motorcade vehicles were arriving. Their
passengers tumbled out and stared in horror at the blood-soaked
convertible.
At 1 p.m., Dr. Kemp Clark, the senior physician working on
the President, pronounced him dead. A priest administered last
rites. At 1:13, the news was carried to the vice president. At
1:26, the Secret Service, fearing the assassination was part of a
massive plot against the government, spirited the Johnsons away
to unmarked cars and sped to Love Field. They boarded Air Force
One at 1:33, while Kennedy press aide Malcolm Kilduff was
announcing the President's death to the press.
Police were still combing the Dealey Plaza area for
Kennedy's murderer. Indeed, only a minute after the fatal shot
was fired, Marrion Baker, a Dallas motorcycle officer, had
pointed his pistol at Lee Harvey Oswald. Baker had been riding by
the Texas School Book Depository when the killing occurred, and
he jumped off his motorcycle and dashed inside with Roy Truly,
the building's superintendent. They encountered Oswald in the
second-floor lunchroom. Baker drew his gun. "Do you know this
man?" he asked Truly. "Does he work here?" Truly said he did, and
Baker let him go. A minute later, Oswald walked out the front
door of the depository, where he encountered NBC reporter Robert
MacNeil, who was looking for a phone. Oswald told him he could
find one inside. Five minutes later, police sealed off the door.
At 12:44, Oswald boarded a bus at Elm and Murphy streets,
seven blocks from the depository, but got off a few minutes later
when the bus was caught in a traffic snarl. By 12:45, Dallas
police had questioned the witness who had seen the man standing
in the depository window with the rifle and had broadcast his
description from a radio car in front of the depository. Two
minutes later, Oswald caught a taxicab at the Greyhound bus
station and rode to Beckley and Neely, a corner near his Oak
Cliff rooming house. He went to his room, got a pistol and left
again.
Meanwhile, Roy Truly had drawn up a list of depository
employees and told police that Oswald was missing. At 1:12,
sheriff's deputies found three empty cartridge cases near the
sixth floor corner window. Ten minutes later, they would find the
rifle, hidden between boxes of textbooks in the room.
At 1:15, Dallas officer J.D. Tippett was cruising by a drug
store at 10th and Patton, less than a mile from the Oak Cliff
rooming house, and spotted Oswald walking along the sidewalk.
Tippett, for reasons never determined, pulled over and stopped
him. Oswald jerked his pistol from under his jacket, shot four
times and ran away. Nine people saw the shooting. A pickup truck
driver took the dead officer's radio mike and said, "Hello,
police operator. We've had a shooting out here."
On Air Force One, stewards were removing some of the seats
in the tail compartment to make room for President Kennedy's
coffin. In the plane's stateroom, Lyndon Johnson was watching
Walter Cronkite on television and was asking aides and
congressmen whether he should be sworn in immediately or wait
until they had returned to Washington. Some thought he should
wait. Others thought it might be dangerous for the country to be
without a President while he was en route. Johnson decided he
would assume the office in Dallas. "Now," he said, "What about
the oath?"
The aides and congressmen were embarrassed. They could
remember neither the words nor where to find them. They couldn't
remember who, besides Supreme Court justices, was authorized to
administer the oath. Everyone was in such shock and confusion
that phone calls were made to several Justice Department
officials in Washington and Dallas before someone remembered that
a President may be sworn in by any judge and that the oath is in
the Constitution. Deputy Attorney General Nicholas Katzenbach
dictated it by phone from Washington, and U.S. District Judge
Sarah Hughes, an old friend of Johnson who had been appointed to
the North Texas federal bench by Kennedy, was dispatched to Love
Field.
At 1:40, Lee Oswald ran into the Texas Theater on West
Jefferson--eight blocks from officer Tippit's body--without
buying a ticket. The box office attendant called the police.
Cruisers began converging on the theater. At 1:50, the house
lights went up, and officers moved up and down the aisles, looked
into the faces of the few patrons. Officer M.N. McDonald stopped
at the 10th row and said to a man sitting alone: "Get up."
"Well, it's all over now," Oswald said, according to
witnesses and he stood up. But when McDonald moved closer, Oswald
struck him in the face and went for his pistol. McDonald struck
back and grabbed for the gun. Oswald pulled the trigger, but the
web of skin between McDonald's thumb and forefinger was caught
under the hammer. The gun didn't fire. Other officers joined the
fight. They subdued Oswald and hustled him out of the theater. "I
protest this police brutality!" Oswald shouted.
Twenty-five minutes later, Capt. Will Fritz, chief of
homicide, returned to the Police Department and ordered that the
missing Texas School Book Depository worker named Lee Harvey
Oswald be arrested as a suspect in the presidential killing. An
officer pointed to a small young man with a bruised eye who was
sitting in a chair. "There he sits," he said.
At Parkland, a Secret Service agent called Oneal's Funeral
Home in Oak Lawn to order a casket. The funeral director, Vernon
Oneal, arrived with it at 1:30. After the President's body had
been placed in the casket, Mrs. Kennedy entered Trauma Room No.
1, took off her wedding ring and placed it on her husband's
finger. The casket was closed and placed on a funeral home cart
to be moved to the hearse.
Dr. Earl Rose, the Dallas County medical examiner,
protested. Kennedy was a homicide victim, he said, and the body
couldn't be released legally until after an autopsy had been
performed. A quarrel developed between him and the Secret
Service. Kennedy aides and the Secret Service agents forced the
casket through the crowd that had gathered at the hospital door
and loaded it into the hearse. Mrs. Kennedy rode in the back with
it. At 2:20, the dead President was carried up the stairs into
Air Force One. Mrs. Kennedy retired to the bedroom.
Judge Hughes boarded the plane at 2:35 and was handed a
small white card with the oath scrawled on it. Capt. Cecil
Stoughton, an Army Signal Corps photographer, tried to arrange
the crowd in the cramped stateroom so that he could take a
picture of the ceremony. "We'll wait for Mrs. Kennedy," Johnson
said. "I want her here."
Mrs. Kennedy came out of the bedroom still wearing the
blood-soaked pink suit. Johnson pressed her hand and said, "This
is the saddest moment of my life." The photographer placed her on
Johnson's left, Lady Bird on his right. Judge Hughes, the first
woman to administer the presidential oath, was shaking.
"What about a Bible?" asked one of the witnesses. Someone
remembered that President Kennedy had kept a Bible in the bedroom
and went to get it.
"I do solemnly swear..."
The oath lasted 28 seconds. At 2:38 p.m., Lyndon B. Johnson
became the 36th President of the United States. The big jet's
engines already were screaming. "Now, let's get airborne," he
said.

153
txt_files/art-07.txt Normal file
View File

@ -0,0 +1,153 @@
Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : A Remembrance of Kennedy
Author : Jim Henderson
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 1+
. . . Reprinted with permission from
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Special Section, pp. 1+
A REMEMBRANCE OF KENNEDY
by Jim Henderson
Staff Writer
`Let the word go forth from this time and place...that the torch
has been passed to a new generation of Americans--born in this
century, tempered by war, disciplined by a hard and bitter peace,
proud of our ancient heritage.'
After 20 years, the events seem as compressed as a leanly
edited videotape.
A sunny day, a dark convertible, a steady din rebounding
from the canyon walls above a crowded street, three cracks from a
rifle in a sniper's nest, a scramble below, engines racing, a
sobbing black woman outside Parkland Memorial Hospital, a
policeman shot across town, a pronouncement of death, a scrawny,
handcuffed suspect in a corridor with Jack Ruby's .38 exploding
in his belly.
The nation was stunned by the images that were transmitted
from Dallas--hard images formed in terse, teletype prose and more
vivid ones fashioned from bits and pieces of celluloid.
America paused to watch the newsreel.
A new President quickly sworn in and airlifted into command,
a bloodstained widow never far from the coffin, a change to
black, a bewildered daughter kneeling before a flag-draped box in
the Capitol rotunda, the wintry streets of the capital, a dark
riderless horse with empty boots facing backward in the stirrups,
a slow-moving caisson, a young boy saluting the honor guard
carrying his father to Arlington National Cemetery, the lighting
of the eternal flame.
On the day John F. Kennedy was buried, Alistair Cooke wrote:
"He was snuffed out. In that moment, all the decent grief of a
nation was taunted and outraged. So along with the sorrow, there
is a desperate and howling note from over the land. We may pray
on our knees, but when we get up from them, we cry with the poet:
Do not go gentle into that good night. Rage, rage against the
dying of the light."
It is only in memory that the howling note from those four
days flits past. Behind the newsreel, the hours were agonizing
and interminable. For many, particularly in Dallas, time moved as
slowly as a motorcade or a horse-drawn caisson.
Erik Jonsson, then-president of the Dallas Citizens Council,
would recall the anxiety he felt when the President did not show
up on schedule for a luncheon at the Trade Mart. What's going on?
he asked himself over and over as the wait, only a few moments in
duration, seemed endless.
After 12:33 p.m. Nov. 22, 1963, the time the first news
bulletin notified the republic that its President had been shot
in Dallas, the city stood motionless and helpless, waiting for
the firestorm of scorn. It came in searing, overlapping bursts.
"Are these human beings or are these animals?" Adlai Stevenson
had asked moments after he escaped from a violent crowd in Dallas
a month earlier.
The world looked again at Dallas with the same question. It
would seem, in the slow-motion drift of events, that the answer
would never come. Dallas mourned the assassination as the rest of
the nation mourned it, as a deeply personal tragedy.
Schoolteachers wept as they broke the news to their classes. Men
cried in public. Rage and shame and guilt and dread melted into
one great immobilizing glob of emotional turmoil.
An eternity, two hours and 20 minutes, passed before the
truth would be known. Kennedy's assassin was not of Dallas, was
far removed from the nation's perception of the city and the
city's own worst fears of itself.
In time, the world, as well as Dallas, would believe the
city was merely caught in one of history's inscrutable warps,
that it was only by chance that the light passing through the
long prism of that era intersected in Dealey Plaza.
The howl that was heard through the dark night of those
times had the tone of a primal scream, a victim raging against a
felon. In truth, it was a cry of national doubt, of the sense
that America would not be the same. More than mere innocence was
lost that day in Dallas. With it went the cable that anchored the
nation to its sense of order.
To the historians who define eras in terms of events rather
than years, the decade of the '60s was born in Dallas.
In a great, shuddering spasm, the fragile floodgates that
had held back the reservoir of a restless social movement was
punctured by the bullets that rained down from the Texas School
Book Depository.
Within months, America would experience the first of her
long hot summers, just the beginning of another newsreel: the
dogs and fire hoses of Birmingham, the first smiling Marines
marching into Vietnam and returning in body bags, campus radicals
occupying the administration building at Columbia University,
rioting outside the Democratic National Convention in Chicago,
the fires of Watts and Newark and Detroit, Dr. Strangelove,
Apollo 11, Woodstock, Charles Manson, the cultural revolution,
the counterculture revolution, the sexual revolution, the
yippies, the hippies, the peaceniks and the crazies.
In 1968, Stuart Udall, secretary of interior for both
Kennedy and Johnson, was asked his opinion of the times, which
seemed to be reeling out of control. He offered a sober, but
startling, observation.
"This may be remembered," he said, "as the most creative
time in our history."
It did not seem such an outrageous judgment when the
hurricane had passed. A sorting out had occurred in the storm.
Not many years would pass before a black preacher from Chicago
would run for the presidency. Women would flood the work place
and supervise staffs of men. Men with an eye on the White House
could talk of a female running mate without risking ridicule.
Wars would be harder to make, nuclear waste harder to conceal,
books harder to burn, air harder to pollute, justice harder to
deny.
America was starkly different. Kennedy's presidency and his
assassination may have been essential to unlocking the passions
of the time, but what the land became was neither his legacy, nor
Oswald's nor Dallas.'
After the trauma and shame and guilt were gone, the judgment
of history would be that Kennedy and Oswald, Edwin Walker and
Martin Luther King, George Wallace and Stokely Carmichael, Angela
Davis and George Lincoln Rockwell, Dallas and Los Angeles,
Memphis and Birmingham, Detroit and Da Nang were fragments of the
American character, slivers of the dream and the nightmare.
The legacy of that sunlit moment in Dallas was a nation's
fretful and all-consuming search for itself, a long and howling
rage against the dying of the light.

534
txt_files/assassin.the Normal file
View File

@ -0,0 +1,534 @@
From dave@ratmandu.SGI.COM Tue Nov 22 09:08:26 1988
Path: ratmandu!sgi!dave@ratmandu.SGI.COM
>From: dave@ratmandu.SGI.COM (dave "who can do? RATmandu!" ratcliffe)
Newsgroups: sgi.general,ba.politics,ca.politics,talk.politics.misc,sgi.engr.all
Subject: Assassination: tool of the National Security State of America
Keywords: Kennedy Watergate Iran-Contra Nazis conspiracy
Date: 22 Nov 88 17:08:26 GMT
Sender: daemon@sgi.SGI.COM
Distribution: sgi
Organization: Silicon Graphics, Inc., Mountain View, CA
Lines: 508
"The true strength of rulers and empires lies not in armies or
emotions, but in the belief of men that they are inflexibly open
and truthful and legal. As soon as a government departs from
that standard, it ceases to be anything more than 'the gang in
possession', and its days are numbered."
- H.G. Wells
25 years of on-going coverup, lies, deceit, and treason. Balance
this against 41 years of treachery, and you will begin to appreciate
the nature and extent of the most important constitutional crisis
confronting us since the civil war. There have been three major
"scandals" in post-WWII Amercia: President Kennedy's assassination,
Watergate, and Iran-Contra. I argue they are all symptoms of the
same problem: the ongoing growth and ever-expanding influence of the
National Security State of America, which began in earnest when
President Truman signed the National Security Act of 1947 which,
among other things, formalized the structure of the U.S. intelligence
community as we know it today.
General Reinhard Gehlen, Hitler's chief of intelligence for cen-
tral and eastern Europe, "surrendered" himself to us in 1945. Allen
Dulles, working for the O.S.S. in Berne, Switzerland since 1943, had
been negotiating with high-ranking Nazis like SS General Karl Wolfe
since 1943 for secret surrender plans that included enticing offers
to the Western Allies like espionage information, as well as attempts
to create alibis that downplayed the German officer's participation
in war crimes and genocide. Soon after the war was over, Dulles was
instrumental in illegally sneaking Gehlen into the U.S. wearing an
American General's uniform, and then, along with industrialists like
Herbert Hoover, Gehlen with his experience, "helped" us design and
implement the structure of our own intelligence command organization.
Such secret, illegal "appropriations" of high-level Nazis were by
no means limited to Gehlen. Among the most treacherous and nefarious
others were: SS officer Otto A. Von Bolschwing, Adolf Eichmann's tea-
cher concerning Jewry and Zionism; Wernher Von Braun, and his mili-
tary superior General Walter Dornberger, responsible for the deaths
of more than 20,000 slave laborers who were worked to death at the
Nordhausen concentration camp--the second rocket production facility;
Klaus Barbie, the butcher of Lyons; German diplomat Gustav Hilger,
who, among his other duties at the Nazi foreign office, coordinated
the operations of the dreaded SS Einsatzgruppen murder squads that
were responsible for the largest wholesale atrocities and genocide
committed against people in Eastern Europe and Russia.
These men and many others, had been our mortal enemies. But with
the end of WWII, and the beginning of WWIII (some call this the Cold
War), war became peace, enemies became valuable assets, and friends
became faceless enemies bent on our annihilation. This was accom-
plished in large part via our own budding invisible government of
non-elected, behind-the-scenes manipulators, propagandists, spies,
agent provacateurs, assassins, "defense intellectual careerists",
powerful industrialists and financiers, and a host of good-meaning
men like Truman who did not understand the long-term impilcations of
what they were giving sanction and legality to.
The three most famous scandals mentioned above are the overt sur-
facing from time to time of this government-by-covert-means. But the
primary one is unquestionably the Kennedy assassination as this was
the first time the National Security State declared itself openly and
wrested control of America's agenda away from a man who was attempt-
ing to move beyond the Cold War, stop nuclear proliferation, ease
tensions with our primary adversary, find a way out of the morass of
Vietnam, and redirect the industrial might of our country away from a
permanent warfare economy and toward a more globally co-existive
footing.
There has never been a trial for the President's murder. The
murder of Oswald made it easy to avoid having to prove in a court of
law that he had in fact pulled the trigger of the rifle that killed
the president. The "evidence" the Warren Commission used to indict,
convict, and posthumously sentence Oswald, centering around the
fantastical and physically impossible scenario of the single bullet
"theory", would never have stood up under cross-examination in a
court of law.
As long as we as a nation continue to attempt to live by the lies
of our collective past, we will continue to see the certain slide
into darkness that looms larger each year. The it-can't-happen-here
school of thought is the most blinding of all diversions. If you
are concerned about our National Security State's growing influence,
and would like more information about it, please contact the
Mae Brussell Research Center, P.O. Box 8431, Santa Cruz, CA, 95061.
Some people will complain that this lament is too long. Sadly, it
is much too short. The subject matter discussed is massive and this
is one of the main reasons people are still misinformed about the
events of 25 years ago.
What follows are exerpts from two different manuscripts. The
authors are L. Fletcher Prouty, and Roger Craig.
L. Fletcher Prouty worked closely with the CIA and other intelli-
gence services for more than 30 years. A pilot during WWII, he per-
sonally flew Roosevelt to the Cairo and Tehran conferences, as well
as flying dozens of high-level Nazis out of eastern europe at the
close of the war. After the war Mr Prouty rose through the Defense
Department chain of command to a point where all of the CIA's mili-
tary activities were channeled through him.
Between 1955 and 1963, Mr Prouty served as chief of special opera-
tions for the Joint Chiefs of Staff and in a similar capacity with
the Office of Special Operations of the Office of the Secretary of
Defense. He also headed the Special Operations Office of the U.S.
Air Force. Each of these positions was charged with military support
of the clandestine operations of the CIA.
In 1973, Mr. Prouty's book, "The Secret Team, The CIA and Its
Allies in Control of the United States and the World", was published.
Book critics called it a "a blockbuster" and said that it "reveals
more of the CIA's history, its clandestine operations and adroit
cover-up tactics than any previously published book on the subject."
Not being a CIA man, Mr. Prouty was exempt from taking the
agency's oath of secrecy. His privileged position gave him far more
knowledge of CIA activities than almost all members of that
organization.
Roger Craig was a police officer in the Dallas Police Department.
He was in Dealey plaza On November 22 and among other things, saw a
man he is certain was Oswald at about 12:41, running down the grass
from the Book Depository to a slow-moving Rambler station wagon com-
ing down Elm Street driven by a husky looking Latin. He describes
reporting this pick-up soon after to a man on the steps of the Book
Depository building identifying himself as a Secret Service agent.
There was at least one other police officer who describes confronting
a man up behind the stockade fence at the top of the grassy knoll
immediately after the assassination who also flashed credentials
identifying himself as a Secret Service man. Footprints of the con-
spiracy that murdered President Kennedy and then covered it up are
visible here when the facts show that there were no Secret Service
personnel of any kind who were stationed in Dealey Plaza that day.
The first exerpts are from Mr. Prouty. They come from a manu-
script yet to be published as a book. They were originally published
in the April/May 1987 issue of Freedom magazine.
The second exerpts of Mr Craig come from a manuscript written in
1971 titled, "When They Kill A President".
...the swing through Texas by the president and the vice president
directly contradicted a long-standing Secret Service taboo on events
that brought both men together in public appearances.
[Once in Dallas,] we begin to notice that many things which ought
to have been done, as a matter of standard security procedure, were
not done. These omissions cannot do otherwise than to show the hand
of the plotters and the undeniable fact that they were operating
among the highest levels of government in order to be able to use the
channels necessary to arrange such things covertly.
By 1963, the Secret Service had many decades of experience in the
task of protecting presidents. There were many ironclad procedures
and policies which had been established ever since the Secret Service
was given protection of the president and his family as its main re-
sponsibility by Congress, following the assassination of President
William McKinley in 1901.
Because the Secret Service is a relatively small organization, it
has been customary for it to call upon local police, the local
sheriff's office, state police, the National Guard and the regular
military establishment for assistance as necessary.
There is even a special course called "protection" for the
personnel of selected military units to familiarize them with this
responsibility. In this day of high technology it has become a pro-
fession of great precision and expertise.
In the bureaucracy, it is more difficult to arrange for some
office not to perform its duties than to let them do it. Such duties
are automatic and built into the system. Therefore, when some re-
sponsible unit does not perform its duties, it is a signal that some-
thing highly unusual has occurred. In the case of the killing of
President Kennedy, certain key people had been told they would not be
needed in Dallas. Some were told not to do certain things, while
others were simply left out.
Speaking generally, it is not always easy to obtain positive proof
of a conspiracy, even when many facts point to its existence. The
power of the conspirators may be such that they can squelch usual
legal procedures. Thus the public, if it is to know the truth, must
discover what happened from details and circumstantial material that
supports the case. Then, from whatever valid evidence becomes avail-
able, the public can eventually determine the nature of the conspir-
acy and the identity of the cabal.
More than 120 years ago, Special Judge Advocate John A. Bingham
observed that "A conspiracy is rarely, if ever, proved by positive
testimony.... Unless one of the original conspirators betrays his
companions and gives evidence against them, their guilt can be proved
only by circumstantial evidence. It is said by some writers on evi-
dence that such circumstances are stronger than positive proof. A
witness swearing positively may misrepresent the facts or swear
falsely, but the circumstances cannot lie." (Special Judge Advocate
John A Bingham, "The Trial of the Conspirators", Washington, D.C.,
1865, cited in "The Pope and the new Apocalypse, S.D. Mumford, 1986)
In something as routine as the providing of protection for the
president during a parade through a major U.S. city such as Dallas,
the fact of variations in the routine can reveal the presence and the
skill of the plotters. Let us review certain facts concerning the
events surrounding President Kennedy's death.
The Warren Report contains testimony by Forest Sorrels of the
Secret Service. Sorrels says that he and a Mr. Lawson of the Dallas
Police Department selected "the best route ... to take him [the
president] to the Trade Mart from Love Field." This is a legitimate
task. But was the route Sorrels chose truly the "best route" from a
security standpoint? Why was that specific route chosen?
The route chosen by Sorrels and the Dallas police involved a
90-degree turn from Main Street to Houston Street, and an even
sharper [120-degree] turn from Houston to Elm Street.
These turns required that the president's car be brought to a very
slow speed in a part of town where high buildings dominated the
route. That was an extremely dangerous area. Yet Sorrels told the
Warren Commission this "was the most direct route from there and the
most rapid route to the Trade Mart." What Sorrels did not say was
that such sharp turns and high buildings made the route unsafe. Why
did he and the police accept that hazardous route?
President Kennedy was shot on Elm Street just after his car made
that slow turn from Houston. This has been considered by many to be
a crucial piece of evidence that there was a plot to murder the
president. It is considered crucial because the route was selected
by the Secret Service contrary to policy and because this obvious
discrepancy has been covered up by the Warren Report and all other
investigations since then. The conclusion that has been made is that
it was part of the plot devised by the murderers, that they had to
create an ideal ambush site. The Elm Street corner was it.
Furthermore, no matter what route was selected for the presiden-
tial motorcade, the Secret Service and its trained augmentation
should have provided airtight protection all the way. This they did
not even attempt to do, and this serious omission tends to provide
strong evidence of the work of the conspirators.
According to the Secret Service's own guidelines, when a presiden-
tial motorcade can be kept moving at 40 miles an hour or faster (in
most locales), it is not necessary to provide additional protection
along the way. However, when the motorcade must travel at slow
speeds, it is essential that there be protection personnel on the
ground, in buildings, and on top of buildings. They provide essen-
tial surveillance. Protection personnel can order all the windows
sealed and can station men to ensure they stay closed.
None of these things were done in Dallas. Incredibly, there were
no Secret Service men or other protection personnel at all in the
area of the Elm Street slowdown zone.
How could this have happened? It is documented that the Secret
Service men in Fort Worth were told they would not be needed in
Dallas. The commander of an Army unit, specially trained in protec-
tion and based in nearby San Antonio, Texas, had been told he and his
men would not be needed in Dallas. "Another Army unit will cover
that city," the commander was told. There were no Secret Service men
on the roofs of any buildings in the area. There had been no precau-
tions taken to see that all the windows overlooking the parade route
in this slowdown zone had been closed, and kept closed.
The man alleged to have killed the president is said to have fired
three shots from an open window on the sixth floor of the building
directly above the sharp corner of Houston Street and Elm Street.
The availability of that "gunman's lair", if it was occupied at
all, violated basic rules of protection. It overlooked the spot
where the car was going slow. It had open windows. No Secret
Service men were covering that big building, and no Secret Service
men were on the roofs of adjacent buildings to observe such lairs.
Why did the Secret Service do everything wrong, or omit doing
things that were normal and were required for protection? Had they
actually been told they were not needed? If so, who had the power to
tell the Secret Service such a thing? Obviously, that authority had
to have come from a very high level.
The commission never really considered the possibility that anyone
other than Oswald, by himself, had committed the crime.
The president was murdered in Dallas, Texas. By law, the crime of
murder must be tried in the state where it was committed. It remains
to be tried today. There is no statute of limitations on the crime
of murder.
Why wasn't this done? Oswald is dead, but that does not preclude
a trial. He is as innocent of that crime as anyone else until a
court of law has found him guilty. Given the available evidence, no
court could convict him.
These experienced men on the Warren Commission, particularly the
chief justice of the Supreme Court, had to know that.
Why did the Texas authorities permit the removal of Kennedy's body
from Texas? Why did they not hold an official autopsy? Why did
Dr. James Humes, the man who did an autopsy at Parkland Memorial
Hospital in Dallas, burn his original notes?
For those in far-off Christchurch, New Zealand, ...the Kennedy
Assassination took place at 7:30 on the morning of Saturday,
November 23, 1963.
As soon as possible, "The Christchurch Star" hit the streets with
an "Extra" edition. One quarter of the front page was devoted to a
picture of President Kennedy. The remainder of the page was, for the
most part, dedicated to the assassination story, from various sour-
ces. Who were those sources, and how could such intimate and detail-
ed information about Oswald have been obtained instantaneously? It
wasn't. Like everything else, it had been pre-packaged by the secret
cabal.
This "instant" news is important. Experienced on-the-spot report-
ers in Dallas said the president was hit with a "burst of gunfire".
A few lines below, it said, "Three bursts of gunfire, apparently from
automatic weapons" were heard.
NBC-TV had reported that "the police had taken possession of a
British .303-inch rifle...with a telescopic sight." That was not the
rifle of the Warren Report.
Another account stated that "the getaway car was seized in Fort
Worth." Whose getaway car? Oswald never left Dallas.
This type of sudden, quite random reporting is most important, be-
cause one can usually find the truth of what occurred in these early
news reports. Later, the "news" will be doctored and coordinated,
and will bear no resemblance to the original, true accounts.
Experienced reporters travel in the presidential party. They know
gunfire when they hear it, and they reported "bursts" of gunfire.
They reported "automatic weapons". They reported what they heard and
saw. They did not yet have propaganda handouts.
Neither the FBI nor the Secret Service reported such action.
Since automatic weapons were never found, it becomes apparent that
these reporters on the scene had heard simultaneous gunfire from
several skilled "mechanics" or professional killers, and that this
simultaneous gunfire sounded like "bursts" of "automatic weapons".
Nowhere does the Warren Report mention the precision control of
several guns, yet it is hard to discount the first, eyewitness re-
ports from experienced men.
On the other hand, almost one-quarter of that front page in
Christchurch was taken up with detailed news items about Lee Harvey
Oswald. An excellent photograph of Oswald in a business suit and tie
was included on page 3.
At the time this early "Extra" of the Star had gone to press, the
police of Dallas had just taken a young man into custody and had
charged him with the death of a Dallas policeman named Tippit. They
had not accused Oswald of the murder of the president and did not
charge him with that crime until early the next morning. Yet a long
article put on the wires by the British United Press and America's
Associated Press had been assembled out of nowhere, even before
Oswald had been charged with the crime. It was pure propaganda.
Where did those wire services get it?
Nowadays, Oswald is a household name throughout the world, but in
Dallas at 12:30 p.m. on November 22, 1963, he was a nondescript 24-
year-old ex-Marine who was unknown to almost everyone. There is no
way one can believe that these press agencies had all of the detailed
information that was so quickly poured out in their files, ready and
on call, in those first hours after the assassination.
In the long account in the "Christchurch Star" about Lee Harvey
Oswald, which included a fine studio portrait, these press services
said, and the "Star" published, some very interesting information.
According to the account, Lee Harvey Oswald:
a. "defected to the Soviet Union in 1959"
b. "returned to the United States in 1962"
c. "has a [Russian] wife and child"
d. "worked in Minsk in a factory"
e. "went to the U.S.S.R. following discharge from the Marine
Corps"
f. "became disillusioned with life there [in the U.S.S.R.]"
g. "Soviet authorities had given him permission to return with
his wife and child"
h. "had been chairman of the Fair Play for Cuba Committee"
...and much more.
...By what process could the wire services have acquired, collat-
ed, evaluated, written and then transmitted all that material within
the first moments, even the first hours, following that tragic and
"unexpected" event--even before the police had charged him?
There can be but one answer: those in charge of the murder had
prepared the patsy and all of that intimate information beforehand.
Strangely, the FBI, the Secret Service, the Warren Commission, and
the Dallas police force instantly declared Oswald to be the killer.
They never considered any other possibilities. The evidence was
never examined. In newspapers around the world, even as far away as
Christchurch, New Zealand, the headlines blared that Oswald was the
president's murderer.
Lt. Day inspected the rifle briefly, then handed it to Capt. Fritz
who had a puzzled look on his face. Seymour Weitzman, a deputy con-
stable, was standing beside me at the time. Weitzman was an expert
on weapons. He had been in the sporting goods business for many
years and was familiar with all domestic and foreign weapons. Capt.
Fritz asked if anyone knew what what kind of rifle it was. Weitzman
asked to see it. After a close examination (much longer than Fritz
or Day's examination) Weitzman declared that it was a 7.65 German
Mauser. Fritz agreed with him.
[the Warren Commission claimed an Italian Mannlicher-Carcano 6.5
Caliber was the rifle owned by Oswald.]
...Later that afternoon I received word of the suspect' arrest and
fact that he was suspected of being involved in the President's
death. I immediately thought of the man running down the grassy
knoll. I made a telephone call to Capt. Will Fritz and gave him the
description of the man I had seen and Fritz said, "that sounds like
the suspect we have. Can you some up and take a look at him?"
I arrived at Capt. Fritz office shortly after 4:30 p.m. I was met
by Agent Bookhout from the F.B.I., who took my name and place of em-
ployment. The door to Capt. Fritz' personal office was open and the
blinds on the windows were closed, so that one had to look through
the doorway in order to see into the room. I looked through the open
door at the request of Capt. Fritz and identified the man who I saw
running down the grassy knoll and enter the Rambler station wagon--
and it WAS Lee Harvey Oswald. Fritz and I entered his private office
together. He told Oswald, "This man (pointing to me) saw you leave."
At which time the suspect replied, "I told you people I did." Fritz,
apparently trying to console Oswald, said, "Take it easy, son--we're
just trying to find out what happened." Fritz then said, "What about
the CAR?" Oswald replied, leaning forward on Fritz' desk, "That
STATION WAGON belongs to MRS. PAINE--don't try to drag her into
this." Sitting back in his chair, Oswald said very disgustedly and
very low, "Everybody will know who I am now." At this time Capt.
Fritz ushered me from his office, thanking me...
I was convinced on November 22, 1963, and I am still sure, that
the man entering the Rambler station wagon was Lee Harvey Oswald.
After entering the Rambler, Oswald and his companion would only have
had to drive six blocks west on Elm Street and they would have been
on Beckley Avenue and a straight shot to Oswald's rooming house.
The Warren Commission could not accept this this even though it
might have given Oswald time to kill Tippit for having two men
involved would have made it a CONSPIRACY!
...Combine the foregoing with the run-in I had with Dave Belin,
junior counsel for the Warren Commission, who questioned me in April
of 1964 and who changed my testimony fourteen times when he sent it
to Washington, and you will have some idea of the pressure brought
to bear.
David Belin told me who he was as I entered the interrogation
room (April 1964). He had me sit at the head of a long table. To
my left was a female with a pencil and pen. Belin sat to my right.
Between the girl and Belin was a tape recorder, which was turned
off. Belin instructed the girl not to take notes until he (Belin)
said to do so. He then told me that the investigation was being
conducted to determine the truth as the evidence indicates. Well, I
could take that several ways but I said nothing. Then Belin said,
"For instance, I will ask you where you were at a certain time.
This will establish your physical location." It was at this point
that I began to feel that I was being led into something but still I
said nothing. Then Belin said, "I will ask you about what you
thought you heard or saw in regard." Well, this was too much. I
interrupted him and said, "Counselor, just ask me the questions and
if I can answer them, I will." This seemed to irritate Belin and he
told the girl to start taking notes with the next question. At this
point Belin turned the recorder on. The first questions were
typical. Where were you born? Where did you go to school? When
Belin would get to certain questions he would turn off the recorder
and stop the girl from writing. The he would ask me, for example,
"Did you see anything unusual when you were behind the picket
fence?" I said, "Yes" and he said, "Fine - just a minute." He
would then tell the girl to start writing with the next question and
would again start the recorder. What was the next question? "Mr.
Craig, did you go into the Texas School Book Depository?" It was
clear to me that he wanted only to record part of the interrogation,
as this happened many times. I finally managed to get in at least
most of what I had seen and heard by ignoring his advanced questions
and giving a step by step picture, which further seemed to irritate
him. At the end of our session Belin dismissed me but when I start-
ed to leave the room, he called me back. At this time I identified
the clothing wore by the suspect (the 26 volumes refer to a box of
clothing - not boxes. There were two boxes.)...
I first saw my testimony in January of 1968 when I looked at the
26 volumes which belonged to Penn Jones. My alleged statement was
included. The following are some of the changes in my testimony:
Arnold Rowland told me that he saw two men on the sixth floor of the
Texas School Book Depository 15 minutes before the President arriv-
ed: one was a Negro, who was pacing back and forth by the southwest
window. The other was a white man in the southeast corner, with a
rifle equipped with a scope, and that a few minutes later he looked
back and only the white man was there. In the Warren Commission:
Both were white, both were pacing in front of the southwest corner
and when Rowland looked back, both were gone; I said the Rambler
station wagon was light green. The Warren Commission: Changed to a
white station wagon; I said the driver of the Station Wagon had on
a tan jacket. The Warren Commission: A white jacket; I said the
license plates on the Rambler were not the same color as Texas
plates. The Warren Commission: Omitted the not - omitted but one
word, an important one, so that it appeared that the license plates
were the same color as Texas plates; I said that I got a good look
at the driver of the Rambler. The Warren Commission: I did not get
a good look at the Rambler. (In Captain Fritz's office) I had said
that Fritz had said to Oswald, "This man saw you leave" (indicating
me). Oswald said, "I told you people I did." Fritz then said,
"Now take it easy, son, we're just trying to find out what happen-
ed", and then (to Oswald), "What about the car?" to which Oswald
replied, "That station wagon belongs to Mrs. Paine. Don't try to
drag her into this." Fritz said car (station wagon was not mention-
ed by anyone but Oswald) (I had told Fritz over the telephone
that I saw a man get into a station wagon, before I went to the
Dallas Police Department and I had also described the man. This is
when Fritz asked me to come there.) Oswald then said, "Everybody
will know who I am now;" the Warren Commission: Stated that the
last statement by Oswald was made in a dramatic tone. This was not
so. The Warren Commission also printed, "NOW everybody will know
who I am", transposing the now. Oswald's tone and attitude was one
of disappointment. (If someone were attempting to conceal his iden-
tity as Deputy and he was found out, exposed -- his cover blown,
his reaction would be dismay and disappointment). This was Oswald's
tone and attitude--disappointment at being exposed!
I told him I knew of twelve arrests, one in particular made by
R.E. Vaughn of the Dallas Police Department. The man Vaughn arrest-
ed was coming from the Dal-Tex Building across from the Texas School
Book Depository. The only thing which Vaughn knew about him was
that he was an independent oil operator from Houston,Texas. The
prisoner was taken from Vaughn by Dallas Police detectives and that
was the last that he saw or heard of the suspect. Incidentally,
there are no records of any arrests, either by the Dallas Police
Department or the Sheriff's Office, in Dealey Plaza on November 22,
1963. Very strange! Any and all arrests made during my eight years
as an officer were recorded. It may not have been entered as a re-
cord with the Identification Bureau but a report was always typed
and a permanent record kept--if only in our case files. A report on
any questioning shows a reason for your action and protects you
against false arrest. I am saying that there is absolutely no
record in the case files or any place else.
--
daveus rattus
yer friendly neighborhood ratman
Dan Quayle's legislative aide was Rob Owen, who was intro-
duced to John Hull in Quayle's senate office in 1983.
"There are two governments. There is the National Security Governement
which was put in place by the National Security Act of 1947. That is
the real government of our country. Then there is the cosmetic govern-
ment--the government for show. The ongoing presidential government and
congress, which is totally meaningless now." -Gore Vidal
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.

259
txt_files/autoscam.hum Normal file
View File

@ -0,0 +1,259 @@
Are Americans getting a square deal for the $65 billion they spend each year
to maintain their cars? To find out, a 1984 Oldsmobile Cutlass Ciera sedan
(one of the biggest- selling U.S. cars that year) with 20,000 miles on the
odometer was used.
Under the supervision of a consulting mechanic and project editor, an
Oldsmobile dealer made the car "like new": engine tuned, transmission
serviced, new spark plugs, brakes, shock absorbers, struts, fan belts and
hoses. Every vital component was thoroughly checked and, if there was any
doubt, replaced.
Then the blue-grey Olds was put on the road. Behind the wheel: a nationally
syndicated automotive columnist and veteran of hundreds of road tests. The
assignment: travel the country, pick repair garages at random and see how they
treat a customer in need. A single spark-plug wire was pulled loose from the
V-6 engine just before each stop, thus making the motor run roughly.
A loose wire is something that even a novice mechanic should notice.
Reattaching it to the plug was all that was necessary to put our car in perfect
running condition. But many mechanics either didn't spot the problem or
fraudulently "corrected" it by selling or recommending the wide array of parts,
oils and solvents.
What was discovered after stops at 225 garages should be a warning to every
car owner. Here is the account of the 10,000-mile safari through America's
auto-repair jungle.
The engine was faltering as I pulled up at a large independent garage in Old
Saybrook, Conn., one morning. I told the mechanic my car "wasn't running
right."
As he opened the hood, I heard the sharp cracking sound of a loose plug wire
"shorting out" against the engine block. Ignoring that symptom, the mechanic
slowly removed the oil-filler cap. With a grave look, he stuck a long
screwdriver into the opening and placed an ear against the wooden handle. Like
a doctor with a stethoscope, he listened to the engine.
"You got a bad rocker," he said. Beckoning me inside the garage, he staged
an impressive show-and-tell, swiveling the rocker arms (they open the engine
valves) on a rocker shaft he had picked off the floor.
He phoned about replacement parts, meanwhile congratulating me for coming to
his garage. "You're going to save about half over what a dealer would charge."
The repair would take three hours and cost $125 to $175. But, he warned,
there might be other problems once he "got inside" the engine. I told him I'd
think it over. I drove away, pulled off the road and pushed the wire back onto
the spark plug, restoring the car to smooth running condition.
FAIR GAME. That wire, about the length and thickness of a garter snake,
would bite time and time again as I sought repairs at gas stations,
dealerships, independent garages and chain automotive outlets in 33 states. My
experience made me acutely aware why so many Americans complain about their
treatment in the nation's 300,000 auto-repair shops:
Only 28 percent of my stops resulted in a correct diagnosis and repair.
Three out of four times, I was either denied service, had to wait for hours (or
days), or was victimized by dishonesty, incompetence or both.
When a mechanic did work on the car, I got a satisfactory repair only 44
percent of the time.
In the other 56 percent, mechanics performed unnecessary work, sold
unnecessary parts or charged for repairs not done. Worse, some of their work
created new engine problems.
Make no mistake, I met a lot of good, honest mechanics, but their reputation
is unfairly stained by a large number who either don't know what they are doing
or treat motorists as "fair game" or fools.
My loose wire provoked a slew of remedies, including spark-plug cleanings,
"major" and "minor" tuneups, valve adjustments, correction of "fuel
starvation," carburetor adjustment and even transmission rebuilding.
Among parts recommended were fuel filters, gasoline additives, catalytic
converters, air pumps, engine control modules, distributor caps and rotors, and
valve lifters. In all, more than 100 useless remedies were prescribed, priced
from $2 to more than $500.
One blitz of rip-offs began in Jacksonville, Fla. At five consecutive shops
there, "cures" included a distributor cap ($30), a single spark plug ($8.93)
and replacing the end of the plug wire ($17.27)
Deciding it was time to get out of Jacksonville, I headed north. In
Brunswick, Ga., a mechanic spotted the loose wire but attached it to a new plug
($17.36), replacing the one installed in Jacksonville just 65 miles earlier!
Next stop--Savannah, where two successive shops recommended tuneups for $184
(including new plug wires) and $101 (with new plug wires "highly recommended"
at extra cost).
CHAIN REACTION. Big-city shops were much more likely to go after my wallet
than small-town and rural garages were. The presence of nationally "certified"
mechanics did not guarantee good service--in fact, I got gypped in 50 percent
of the shops boasting nationally certified technicians. I received exellent
treatment in some pretty crude garages. I got taken to the cleaners in some
fancy shops complete with coffee, courtesy and the latest technology.
I found, too, that car owners are often victims of shoddy repairs that cause
other problems. When a Kansas City, Mo., mechanic replaced (unnecessarily) a
gas filter, he forgot to reinstall the spring that holds the filter in place.
I limped into a garage in Salina, Kan., where a mechanic found the spring lying
on the manifold and also discovered that my carburetor air-cleaner gasket had
not been reinstalled.
There was a monotonous quality to the majority of my encounters with the
chiselers or incompetents. Occasionally there were breathtaking instances of
outright fraud. One of these began early one morning in Tucson, Ariz.
As I pumped gas at a service station beside Interstate 10, a wiry fellow in
work clothes sauntered out and hunkered down on the other side of the car.
That's nice, I thought. He's checking my tire pressure.
"I see you've got new shocks," he said. "Good! But your coil springs are
bent." Coil springs do wear out, and may bend under extremely rare conditions,
but this was definitely not the case with our low-mileage car. The attendant
said he just happened to have a set that he could install for $125.
I drove away without the new coil springs, but I couldn't help thinking about
hapless motorists who might have been frightened into having them installed.
FISHING FOR PROFITS. Another memorable encounter took place in San Antonio,
when I pulled into a transmission repair shop. The owner test-drove the Olds
with me in the passenger seat. As we climbed a hill, the car seemed to be
straining. I looked down and noted that he had one foot on the gas and the
other on the brake. "boy, it ain't got no power at all in second gear," he
said. "It's real obvious the clutches are burnt." His solution: rebuild the
transmission for $395 to $495, "depending on if I can save the torque
converter."
One device the motorist with engine trouble is almost certain to run into is
"the scope"--an electronic engine analyzer. In honest, competent hands, the
concept is great--you let the high-tech detective with its switches, dials and
oscilloscopes sort out the problem. Trouble is, these devices vary in
accuracy, and their operaters vary widely in ability to interpret them.
At a national retailer's auto-care center in Biloxi, Miss., two mechanics
plugged a hand-held computer into an outlet under my dash. The computer was
supposed to "interface" with the car's diagnostic system and print out the
potential source of the problem. The mechanics worked for an hour, never
bothering to look for a loose wire.
Finally they produced a printout indicating, they said, that I needed a new
distributor cap and rotor. The loud snapping sound (of the shorting plug wire)
was, they claimed, coming from the fuel-adjustment solenoid on the carburetor.
I paid the scope charge of $16.93, returned to the car, lifted the loose plug
wire and asked one of the mechanics if this might be the problem. Shrugging,
he turned and walked away.
The good mechanics I met used the scope intelligently, usually to quickly
confirm that my loose plug wire was the only problem. But often the scope was
nothing more than a fishing rod to pull in profits on unnecessary repairs.
In Hays, Kan. at another large chain-store auto center, two technicians
fiddled with the car for an hour trying a new distributor cap and rotor,
apparently not noticing the loose wire inches away. They hooked the car to an
engine analyzer, but still couldn't spot the real problem. They said the
trouble was a bad leak in the intake manifold. They were clearly groping, but
at least in this case it cost me only $5.73
It seemed apparent from many encounters that some mechanics are intimidated
by the newer "high-tech" cars. They assume that any problems with them must be
exotic, and they forget to go back to trade-school basics, such as visually
checking for loose wires and hoses. The scope is assumed to be the high-tech
answer, but in inept hands, these machines often hinder rather than help.
A NEW CURE ALL. At a service station near the Pennsylvania Turnpike in
Carlisle, Pa., three employees gathered to look under the hood of my car. They
never started the engine, but immediately decided to replace the fuel filter.
One of them also said the distributor cap and rotor "might" be the problem. I
refused the $90 estimate for the cap and rotor. But this encounter--in which,
I must emphasize, the mechanics never started the engine-- still cost me $25.44
As I progressed on my trip, I found that fuel filters have become the modern
cure-all for engine troubles. Filters are a critical component of modern fuel
systems, but barring unusual circumstances (a tank of bad gas), they should
last 15,000 miles or more.
I stopped at a station in Baker, Calif. Without pausing to listen to my
faltering engine, the mechanic said, "I know what your problem is." He began
replacing a filter installed a few days earlier in Laramie, Wyo., so I asked
how the "old" one looked. He blew through it before observing sagely, "It's
pretty well clogged." I left the station $11 lighter, my engine still stumbling
and the plug wire still dangling.
At a gas station in Lordsburg. N.M., two mechanics mused on any number of
ills, for my poorly running engine. They quickly began changing--you guessed
it--the fuel filter. A silver Ford van lurched to a stop nearby. A woman got
out and announced, "My truck's broke." One mechanic threw open the hood.
"Sounds like a fuel filter to me." He was busily installing one as I refused a
$200 estimate for replacing my air pump and distributor cap.
SMALL RIP-OFFS. As I headed out of Lordsburg, I recalled something I had
heard a man say in a repair shop waiting room in Massachusetts: "Oh, I know
I'll probably get taken. I just hope it isn't for too much." Sad to say, many
people seem prepared to pay a hidden incompetent or fraud tax on repairs.
But millions of others don't even dream they are being victimized. Whether
it's a fuel filter, oil additive or "phantom" plug cleaning, these $20 or $30
bites can add up. For an unscrupulous garage, running enough of them through
the cash register is a lot safer than going for a huge swindle that might bring
local authorities onto the scene.
I found such scams especially prevalent at stations along interstates, where
the chance of a traveler coming back to complain is almost nil. The easiest is
the phony repair. In Beaumont, Texas, a garage owner said with good humor,
"Eighteen dollars and seventy-five cents is all I can do to you" for replacing
a plug wire. But he had merely re-attached the one I had loosened.
In Tucson, my wife took the car, with the plug wire loose, to the auto center
of a national retailer she has grown to trust. Somebody reconnected the wire.
But she was charged $29.99 for a "carburetor adjustment" and a timing check.
The carburetor on the Olds was factory-sealed, and should not be adjusted.
SPARK-PLUG SABOTAGE. "Here's your problem," the smiling mechanic in a Salt
Lake City garage told me. He held up a spark-plug wire. It had a "bad cut,"
he said, that was causing our engine to misfire.
Indeed, the wire WAS cut--freshly cut. There was a neat half-inch-wide
incision clear around the insulation, which had not been there when I pulled
the wire from the plug less than a half-hour before. The mechanic had replaced
the wire with a new blue one, and the car ran fine. Bill: $24.75.
At a garage an hour northeast of Las Vegas a few days later, I walked to the
back of the car while the mechanic peered under the hood, and I could see his
elbow working furiously as he tugged and twisted something. "I found your
problem," he announded triumphantly.
He held aloft the same blue wire that had been replaced in Salt Lake City.
But the end that fits over the spark plug had been broken off. (Try breaking
the end off a plug wire sometime--you really have to work at it.) He repaired
the wire for $15.30.
By the end of my trip, I found it difficult to account for the range of
prices I encountered. I found a set of plug wires with a five-year guarantee
in an auto store for $15.99. A set at an Olds dealer in Tucson cost $53.76.
Estimates for a set plus installation charge ranged from just under $50 in
Omaha to $82.60 in Wheeling, W. Va.
THE "PREVENT" DEFENSE. The most important weapon you have is knowledge of
your car. Read the owner's manual. Understand the basics. Does your car have
a carburetor or fuel injection? Four cylinders or six? Have a mechanic point
out the basic under-hood geography so you can check your oil and coolant
levels, spot a loose wire or hose. Follow a regular maintenance plan--oil
changes and such--to PREVENT trouble. A Department of Transportation study
shows that the three leading causes of on-the-road breakdowns are bad tires,
running out of gas, and cooling-system problems. All three could largely be
avoided by a "check before you drive" inspection.
*When you find an honest, competent garage, patronize it regularly.
*Insist on a detailed written estimate and the assurance that no extra work
will be done without your permission.
*Be specific in describing your car's symptoms.
*When precautions fail: Complain. Notify authorities.


330
txt_files/badges.asc Normal file
View File

@ -0,0 +1,330 @@
(word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150
There are ABSOLUTELY NO RESTRICTIONS
on duplicating, publishing or distributing the
files on KeelyNet except where noted!
April 20, 1992
BADGES.ASC
--------------------------------------------------------------------
For those of us who are fascinated by some of the REALIZABLE
technologies as shown on Star Trek, the following two items are
paraphrased from COMPUTERWORLD, April 20, 1992.
The first and most interesting is entitled "THE WALK-AND-WEAR
OFFICE, Using a multimedia system and devices that track and
identify people, Olivetti Research is working on the intelligent
office of the future." by Andy Hopper. PP 99-101.
The second is from TECH TALK, Page 25 of the same issue. The
article is entitled "PICTURE THIS" and relates to a video
recognition system for graphic images. It also ties in well with
the Olivetti ACTIVE BADGE system.
ComputerWorld is primarily for IS (information systems managers) but
covers a wide range of subjects relating to computer technology.
Current Subscription rates are $38.95 per year for a weekly paper.
If you wish to subscribe, their address is COMPUTERWORLD, PO Box
2044, Marion, Ohio 43306-4144.
--------------------------------------------------------------------
Pandora and the Active Badge System
The Olivetti Research Laboratory is located in Cambridge, England.
They are currently developing a most interesting multimedia system
called PANDORA in conjunction with devices known as ACTIVE BADGES.
ACTIVE BADGES identify and track people within a building. The
basic system monitors the movement of people and, to a lesser
extent, objects in the building. The badge is currently the size of
a typical office security identification badge. An ACTIVE BADGE
contains an infrared transmitter that every 15 seconds transmits a
48-bit word, which is the wearer's unique ID.
The ID information is held on a central database residing on a
server (controller for a network of connected workstations) and
includes items such as security clearance, preferred computer
interface and applications, right or left-handedness and even how
the user takes his coffee.
Rooms, passageways and workstations are equipped with sensors with
infrared receivers that monitor the presence of a badge. These
Page 1
sensors are tied together into a low-frequency network, which is
connected to the server on the main PANDORA network.
A central monitoring program on the server constantly updates a list
of where badge wearers are or where they last came in contact with a
sensor. This information includes what telephone or workstations
they are closest to. Users can call up this list on their
workstation.
Users can make an inquiry to locate a badge wearer in order to
transfer a phone call or send a video message. Olivetti Research is
experimenting with reconfiguring offices on the fly using the
badges.
For example, receivers in the PANDORA system find out from the
database what a user was last working on, enabling a researcher's
work to follow him from computer to computer. Walking away from a
terminal is the equivalent of logging off; approaching another
screen "wakes up" the machine, which configures itself to whatever
the user has specified. The computer even alerts a user to the fact
that there is a video mail message waiting for him.
Sensors can also transmit to badges, and the Olivetti Research
Laboratory ACTIVE BADGE system incorporates paging functions, with
which a user can page a colleague from a terminal.
ACTIVE BADGES have been useful in determining security access. For
example, sensors enable a security door to generate a small magnetic
field. When an authorized badge wearer enters the field, his badge
emits an instant pulse that can be checked for the appropriate entry
permission and trigger the door to open. Or the sensor can
differentiate among a number of badge wearers in the same room,
preventing unnecessary interruptions of meetings.
No one is forced to wear these badges at Olivetti Research
Laboratory or Cambridge University, but the 130 people on the system
do because IT MAKES LIFE EASIER.
There is less time wasted tracking someone down and fewer meeting
interruptions. And with a built-in photosensitive resistor, it is
always possible for a user to turn the badge over and effectively
log off. Furthermore, all users have access to informaton on WHO is
monitoring their whereabouts because inquiry information is logged
and recorded.
An example of how the PANDORA system would work in conjuntion with
the ACTIVE BADGE ;
It is morning, and I walk into the building in which I work and
into an office I know is unoccupied, I make sure I'm wearing my
identification badge, and as I approach the door, he electronic
lock opens, enabling me to enter the darkened room.
The lights brighten, and a workstation on the desk flashes to
life automatically, displaying a document I recognize as the one
I had been working on yesterday. I click onto the screen and my
video mail messages. There is a beep, and a colleague's face
suddenly appears on the screen in another small window. I click
onto that window, and we talk IN REAL TIME about the status of an
upcoming project.
Page 2
After we're done, I record a video mail message for another staff
member to brief him on my recent discussion. I then click on the
screen to get a recorded version of the latest television news
and finally find a minute to sip my coffee.
Science fiction? After 3 weeks of work on and use of a multimedia
system called PANDORA and devices known as ACTIVE BADGES that
identify and track people, the lab has been piecing together the
office of tomorrow.
The idea is to create an intelligent, shared office in which a room
can instantly adapt to a user's personal preferences (mouse buttons
reconfigured for left or right handed use or phone buttons
programmed with personal codes) and in which tracking and video
capabilities keep staff in constant contact.
The PANDORA multimedia system consists of a group of networked,
Unix-based workstations that provide real-time and recorded digital
audiovisual information for users. Primary applications for the 20
Olivetti Research workstations included desktop videoconferencing
and video mail.
A PANDORA system contains a video camera, a microphone, a
loudspeaker and the PANDORA processor box, which serves as the
network interface. The current version of this box contains six
processors, which work as embedded controllers with discrete
functions.
One processor handles video sampling from the camera alongside the
computer. A second acts as a digital video mixer to combine
workstation-generated video with video coming from other PANDORA
boxes. The third processor deals with audio, which is handled at
telephone-quality 8 KHZ and is picked up by a microphone. Data
stream switching is performed by the fourth processor, with two
final devices serving as the I/O processors to the network. In this
way, users can run video applications (controlled by the processor
box) as well as other applications, such as word processing, from
windows on their desktops.
The simplest use of PANDORA is just observation. The staff at
Olivetti Research can view remote offices through video cameras
mounted over each PANDORA station. Although it's perfectly
permissible to peek at the scene surveyed by another PANDORA
station, a user can't listen to that station until somebody at that
end lets him - i.e., accepts the call.
In addition, if a staff member surveys another office, the user in
that office will always get an image of the surveryor on his screen.
In this way, no one can observe without being observed.
In a two-way videoconference, PANDORA handles four streams of
digital video and audio; two incoming and two outgoing. Add one or
two extra people to make a conference call, and the load increases
exponentially. The system has no built-in limits, but as the
processing demand increases, the visual quality drops.
Sound is recorded separately from the video, but it is synchronized
on playback. Because it's better to hear the conversation clearly
than to see it, the video is always sacrificed in favor of audio
Page 3
when data traffic reaches its limits. Typically, any user can have
a four-way videoconferencing displaying five windows and mixing five
audio streams on his terminal without overloading the system.
This load is one reason why PANDORA utilizes an asychronous transfer
mode (ATM) network. ATM allows real-time performance to drop off
gradually (we call this "graceful degradation") as the system
becomes congested without losing the video or audio completely. ATM
networks can chop up data streams very finely and preserve their
real-time attribute.
By far the most successful PANDORA application has been video mail.
This involves recording short messages and sending them to other
PANDORA users - a kind of video fax.
Not only is it a lot faster to record a video message as opposed to
composing and typing a written memo, but video mail is also a very
personal form of communication that can convey expression and body
language.
A message from the boss to drop by his office at the end of the day
may cause panic - but if you see that he has a smile on his face
when he says it, you will probably be less worried.
Video mail is quick and easy to record and play back. Videocassette
recorder-style buttons are provided on the computer window, and the
user can start, pause, stop, rewind and play back the recording at
any time. A cursor or slider control lets him move immediately to a
position in the recorded sequence by using the mouse, rather like
scrolling text up and down in a word processor.
There are cut-and-paste facilities for editing recordings and
creating composite ones in which text and video is mixed. Video
does not have to include only internal video. For instance, the
laboratory has a directory of the latest recorded TV news that can
be brought onto the screen at any time and viewed or recorded.
This broadcast data resides on a server that we receives live TV
relays and automatically records the news for users who want to view
it later.
Video mail digital recording is stored remotely on a bank of
Winchester disk drives, which currently provide about 2.5 Gbytes, or
6.4 hours, or recording.
Because typing a file name and dialogue text detracts from the
simplicity of video mail, Olivetti Research is starting to work on
voice pattern recognition for filing and retrieving video mail. In
this way, a user would simply state the name of the person whose
video mail he'd like to see, and the system would search for and
play back the messages sent by that person. As for filing, a
powerful voice recognition system may eventually enable the system
to produce an automatic transcript of a conversation as it takes
place.
The video mail application is being isolated to run on standard
platforms with a minimum of additional hardware and software.
Researchers can already send and receive videomail from an Intel
Corp. 80386-based personal computer running Microsoft Corp.'s
Page 4
Windows across a standard network. They can also send video mail to
colleagues at Ing. C. Olivetti & Co. in Italy and Digital Equipment
Corp. in the U.S. over standard public networks.
Future advances for PANDORA will include features such as high-
definition color and faster networking.
--------------------------------------------------------------------
PICTURE THIS
There has been plenty of work done on teaching computers to "see" in
such areas as robotics and on storing photographic images
electronically. Now, researchers hope to teach computers to see and
understand digitized images so that users can search database of
photos and other images based on the actual content of the image.
MIT's Media Laboratories and UK-based BT (formerly British Telecom)
have launched a five-year project to develop a method to search
image databases using analysis tools that do not require textual
descriptions of the images.
Alex Pentland, co-director of MIT's Vision and Modeling Group, said
of the project's goal. "For example, a user could show a computer a
person's picture and ask it to find all the images with this person
in them. The computer would then retrieve all the pictures, images
and video files which contain this same face."
--------------------------------------------------------------------
Vangard Notes...
SHADES of 1984!! No doubt such technology offers up tremendous
potential for the invasion of privacy. However, note that one
can step away from the network by removing the badge or covering
up the emitter so that it will not respond.
Ron and I discussed this article and both agree that it would
greatly ease communications in our respective work environments.
Paging over a system wide intercom would be eliminated since the
user would be directly targeted. We have long marvelled at some
of the technologies as shown in daily use on Star Trek with
their personal communicators and long for the day a commercial
system would be available. Well, it looks like it is getting
close to becoming a reality in everyday life.
--------------------------------------------------------------------
If you have comments or other information relating to such topics
as this paper covers, please upload to KeelyNet or send to the
Vangard Sciences address as listed on the first page.
Thank you for your consideration, interest and support.
Jerry W. Decker.........Ron Barker...........Chuck Henderson
Vangard Sciences/KeelyNet
--------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
--------------------------------------------------------------------
Page 5

179
txt_files/bankcris.txt Normal file
View File

@ -0,0 +1,179 @@
The Next Banking Crisis:
=========================================
The Issue Whose Name They Dare Not Speak.
=========================================
Late in June, [the Bush] Administration unleashed a bill that
would gut the Community Reinvestment Act (which requires banks to
make loans in their own neighborhoods, including low-income
areas), ease restrictions on loans to a bank's own officers and
directors and postpone the effective date of some tighter
regulations contained in last year's banking law.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This proposal is only the latest in a series of deregulatory
gestures by the Administration and the Fed. [whose] gifts to the
financial industry -- [recently] forty-five actions, taken rather
quietly since December [..] mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective
effect is to make the banking industry look healthier than it
really is and to permit riskier behavior in the future. These
moves defer tomorrow's disasters
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The CBO estimates that the repeated delays in shutting down
insolvent institutions from 1980 to 1991 added $66 billion to the
cost of the S&L bailout -- enough to fund the Aid to Families with
Dependent Children program for three years, or AIDS research for 50
The Next Banking Crisis:
=========================================
The Issue Whose Name They Dare Not Speak.
=========================================
By Doug Henwood, _The Nation_, July 20/27, 1992
(See below for more about _The Nation_)
Transcribed by Joseph Woodard
Whatever happened to the financial crisis? Only a year ago, it seemed
the credit system was imploding, and ever-more-extravagant bailouts
appeared inevitable. Now, the Resolution Trust Corporation (R.T.C.),
liquidator of failed savings and loans, is winding down operations;
banks and surviving thrifts seem generally profitable; and the seizure
of failing institutions has all but ceased. Surely the weak, possibly
failing, economic recovery we've seen since late last year can't be
solely responsible for this apparent reversal of fortune.
No, finance owes its recovery mainly to an indulgent government, whose
normal generosity has been deepened by election year concerns. The
Bush Administration wants to bury the problem, Congress is happy to go
along and the media aren't asking any unpleasant questions. Clinton
raises the issue with his typical technocratic dullness, and Perot
with his usual empty fury -- but neither has made that big a deal of
the timely disappearance of the financial crisis. That's odd,
considering that, as Bush campaign officials told Lynda Edwards of
_The Village Voice_, people in their focus groups are obsessed with
the savings and loan bailout and wonder why the press isn't covering
it.
One reason the banking mess has receded from view is that the Federal
Reserve -- which no doubt prefers that the financial system never be
an electoral issue at all -- has been easing policy gradually but
steadily since March 1989. The federal funds rate (the interest rate
banks charge one another for overnight loans), the most sensitive
indicator of the central bank's policy, has fallen in thirty-two of
the past forty months, pushing short-term interest rates to their
lowest levels since 1963.
Although the economy has barely responded to this treatment -- no
modern slump has proved so resistant to lowered rates -- it has helped
refloat the banking system in at least two ways. First, banks haven't
really shared the Fed's generosity with their customers. Rates charged
for loans haven't declined anywhere near as much as those paid on
deposits, boosting bank profits. And second, long-term rates haven't
declined nearly as much as short-term rates. Leaving aside two brief
spikes in the 1950s, the gap between long- and short-term rates is the
widest it's been since the dislocations of the 1930s and 1940s. This
also fattens the banks, which have been buying government bonds
(rather than making loans) and pocketing the large spread between what
they pay their depositors and what they can get from Uncle Sam. Should
the relation between long-term and short-term rates return to normal,
the banks would take a quick turn for the worse.
Fed chairman Alan Greenspan isn't the banks' only friend. The other is
the man who has said he will do anything to get re-elected, George
Bush. Late in June, his Administration unleashed a bill that would gut
the Community Reinvestment Act (which requires banks to make loans in
their own neighborhoods, including low-income areas), ease
restrictions on loans to a bank's own officers and directors and
postpone the effective date of some tighter regulations contained in
last year's banking law.
This proposal is only the latest in a series of deregulatory gestures
by the Administration and the Fed. The Durham, North Carolina-based
Financial Democracy Campaign recently issued a five-page list of such
gifts to the financial industry -- forty-five actions, taken rather
quietly since December, that mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective effect
is to make the banking industry look healthier than it really is and
to permit riskier behavior in the future.
These moves defer tomorrow's disasters, shoring up shaky banks (more
than 1,000 are on the F.D.l.C.'s problem list); yesterday's disasters
are being dealt with separately. The government has virtually stopped
seizing failed banks and thrifts; the liquidators can only move in
when ordered to by Administration agencies (the Office of Thrift
Supervision and the Comptroller of the Currency, both fiefdoms within
Nicholas Brady's Treasury Department), and such orders aren't being
given. This is good news for the liquidators, since their insurance
funds are broke, and Congress is reluctant to vote them more money --
at least not in an election year.
If you listen to the R.T.C., its work is nearly done. Even though it
has run through only half its budget, the corporation is shutting
offices and reducing staff. Among the staff being reduced, as Susan
Schmidt has been reporting in _The Washington Post_, are lawyers with
the professional liability section, who are supposed to be going after
the executives and board members who ran the thrift industry into the
ground. With a three-year statute of limitations (running from the
moment institutions are seized), the division needs more staff, not
less -- but the R.T.C. is dismissing experienced lawyers and replacing
them with novices. No one can prove anything yet, of course, but the
likely targets of such liability investigations, aside from bankers,
would be realtors, accountants, lawyers, doctors and others who are
likely to be generous campaign contributors to both parties.
Insofar as there's a strategy behind this delay in dealing with the
banking problem (aside from political expediency), it's one of
"forbearance" -- the hope that the problem will just go away with time
and economic growth. But the economy is hardly growing, and insolvency
isn't one of the diseases that time can cure. The Congressional Budget
Office estimates that the repeated delays in shutting down insolvent
institutions from 1980 to 1991 added $66 billion to the cost of the
S&L bailout -- enough to fund the Aid to Families with Dependent
Children program for three years, or AIDS research for fifty.
Students of the S&L disaster are reminded of 1988, when the same trio
of co-conspirators -- the executive and legislative branches, assisted
by a lazy or complicit media -- ignored the disaster until after the
election. In early 1989, the thrift crisis was suddenly "discovered,"
only to disappear again in accordance with the quadrennial cycle.
But the problems won't just go away. Bank and thrift balance sheets
are contaminated with billions of dollars of loans that went to build
pointless shopping centers and see-through office buildings. Salomon
Brothers estimates that it will take a national average of twelve
years to fill up existing empty commercial real estate -- ten years in
Los Angeles, twenty-six years in Boston, forty-six years in New York
City and fifty-six years in San Antonio, the national champ.
Aside from increasing the ultimate cost of the financial rescue, the
conspiracy of silence has largely prevented any serious discussion of
why the financial meltdown happened or how we might make the best of
the situation. The government is spending hundreds of billions of
public dollars to restore business as usual. Instead, failed
institutions could be transformed to publicly or cooperatively owned
local development banks, and the government's vast inventory of
near-worthless real estate could be turned over to community groups,
local governments or nonprofit associations for creative use. But some
things are too important to be discussed openly, especially during
election season.
**************************************************************
Doug Henwood is Editor of _Left Business Observer_ (see below)
**************************************************************
##################################################################
Reprinted with permission - granted by The Nation magazine/The Nation
Company, Inc. Copyright 1992
##################################################################
Subscriptions to _The Nation_ -- published since 1865 and the oldest
weekly magazine in America -- are $32 per year (47 issues):
The Nation // Dept MAP // 72 Fifth Ave. // New York, NY 10011
Or a half-year subscription (24 issues) is $22.

1223
txt_files/bcci-1.txt Normal file

File diff suppressed because it is too large Load Diff

510
txt_files/bendini.txt Normal file
View File

@ -0,0 +1,510 @@
&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#
%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&
#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%
&%# &%#
%#& Axon Industries Present %#&
#&% #&%
&%# The Kromery Converter/Free Electricity &%#
%#& %#&
#&% Original articles by John Bedini, Eike Mueller, and Tom Bearden. #&%
&%# Retyped Without Permission 07/04/86 by (_>Shadow Hawk 1<_) &%#
%#& %#&
#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%
&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#
%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&%#&
Tom Bearden
John Bedini has a prototype free energy motor.
Imagine having a small D.C. electrical motor sitting on your laboratory bench powered
by a common 12 volt battery. Imagine starting with a fully charged battery and
connecting it to the motor with no other power input. Obviously, the motor is go
ing to run off the battery, but by conventional thinking it will stop when the battery
runs down.
It isn't running by the conventional wisdom of electrical physics. It isn't running
by the conventional rules of electric motors and generators, but it is running.
And it isn't something complex. It's pretty simple, once one gets the hang of the
basic idea.
Impossible, you say. Not at all. That's precisely what John Bedini has done, and the
motor is running now in his workshop.
It's running off the principles of electromagnetics that Nikola Tesla
discovered shortly before 1900 in his Colorado Springs experiments. It's running
off the fact that pure empty vacuum - pure "emptiness", so to speak, is filled with riv
ers and oceans of seething energy, just as Nikola Tesla pointed out.
It's running off the fact that vacuum space-time itself is nothing but pure masless
charge. That is, vacuum has a very high electrostatic scalar potential - it is greatly
stressed. To usefully tap the enormous locked-in energy of that stress, all one
has to do is crack it sharply and tap the vacuum oscillations that result. The best
way to do that is to hit something resonant that is imbedded in the vacuum, then
tap the resonant stress of the ringing of the vacuum itself.
In other words, we can ring something at its resonant frequency and, if that
something is imbedded in the vacuum, we can tap off the resonance in vacuum stress,
without tapping energy directly from the embedded system we rang into oscillation.
So
what we really need is something that is deeply imbedded in the vacuum, that is,
something that can translate the "vacuum" movement into "mass" movement.
Well, all charged particles and ions are already imbedded in the vacuum by their
charged fluxes, so stressed oscillations - that is, vacuum oscillations - can be
converted into normal energy of mass movement by charged particles or ions, if the
sy
stem of charged particles or ions is made to resonate in phase with our tapping
"potential". For our purpose, let's use a system of ions.
First we will need a big accumulator to hold a lot of the charged ions in the system
that we wish to shock into oscillation. We need something that has a big capacitance
and also contains a lot of ions.
An ordinary battery filled with electrolyte fits the bill nicely. While it's not
commonly known, ordinary lead-acid storage batterys have a resonant ionic frequency,
usually in the range of from 1 - 6 Mhz. All we have to do is shock -oscillate the
ions in the electrolyte at their resonant frequency and time our "trigger" potential
and "siphon" circuit correctly. Then if we keep adding potential to trigger the
system we can get all that "potential" to translate into "free electrical energy".
Look at it this way. Conventionally "electrostatic scalar potential" is composed
of work or energy per columb of charged particle mass. So if we add potential alone,
without the mass flow, to a system of oscillating charged particles, we add "physica
l energy" in the entire charged particle system. In other words, the "potential" we
add is converted directly into "ordinary energy " by the imbedded ions in the system.
And if we are clever we don't have to furnish any pushing energy to move pure po
tential around. (For proof that this is possible, see Bearden's Toward a New
Electromagnetics; Part IV; Vectors and Mechanisms Clarified, Tesla Book Co., 1983,
Slide 19, Page 43, and the accompanying write-up, pages 10, and 11. Also see Y.
Aharonov an
d V. Bohm, "Significance of Electromagnetic Potentials in the Quantum Theory",
Physical Review, Second Series, Vol. 115, No. 3, Aug. 1, 1959, pages 485-491. On page
490 you will find that it's possible to have a field-free reigon of space, and
still have the potential determine the physical properties of the system.)
Now this "free energy resonant coupling" can be done in a simple, cheap system.
You don't need big cyclotrons and huge laboratories to do it; you can do it with
ordinary D.C. motors, batteries, controllers and trigger circuits.
And that's exactly what John Bedini has done. It's real. It works. It's running
now on John's laboratory bench in prototype form.
But that's not all. John is also a humanitarian. He's as concerned as I am for that
little old widow lady at the end of the lane, stretching her meager Social Security
check as far as she can, shivering in the cold winter and not daring to turn
up her furnace because she can't afford the frightful utility bills.
That's simply got to change and John Bedini may well be the fellow who changes it.
By openly releasing his work in this paper, he is providing enough information
for all the tinkerers and independent inventors around the world to have at it. If
he can get a thousand of them to duplicate his device, it simply can't be supressed as
so many others have been.
So here it is. John has deliberately written his paper for the tinkerer and
experimenter, not for the scientist. You must be careful, for the device is a little
tricky to adjust in and synchronize all the resonances. You'll have to fiddle with
it,
but it will work. Keep at it.
Also, we warn you not to play with this unless you know what you are doing. The
resonating battery electrolyte produces hydrogen, and if you hit it to hard with a
"voltage spike" you can get an electrical spark inside the battery. If that happens,
THE BATTERY WILL EXPLODE, so don't mess with it unless you are qualified and use the
utmost caution.
But it DOES work. So all you experimenters and pioneers, now's your chance. Have
at it. Build it. Tinker with it. Fiddle it into resonant operation. Then lets build
this thing in quantity, sell it widely, and get those home utilities down to where w
e can all afford them - including the shivering little old lady at the end of the lane.
And when we do, lets give John Bedini, and men like him the credit and appreciation
they so richly deserve.
Tom Bearden
April 13,1984
John Bedini
[Note: John Bedini developed Two kinds of controller devices. One, being very simple,
is the one I will present here. The other is quite a bit more complex, and would be
impossible for me to reproduce here... Anyway if you want to see the all electro
nic controller, get the book "Bedini's Free Energy Generator" by John C. Bedini,
Published by the Tesla Book Co. 1580 Magnolia Ave., Millbrae, CA 94030.]
For some time man has been looking for different ways to generate electricity. He has
used water power, steam power, nuclear power, and solar power. Recent papers written
by Tom Bearden make a free energy generator possible. Tom Bearden, rather
than patent his devices, chose to share them with people who had open ears. I
myself have had many conversations with Tom Bearden. He found Tom to be one of
the most reasonable men he had ever dealt with in this energy field. Most others woul
d tell you stories of great machines they had, but would never present the truth
with circuit diagrams or a look at the machine in question. Tom, on the other hand,
clearly presents his ideas and clearly presents his ideas and discloses the
concepts by means of which they work.
The facts I am about to present to you about free energy were never put into textbooks,
only portions were. The textbooks have grounded people in conventional theory and made
things very complicated. What I am about to explain is very simple; anyone
can understand this theory and anyone who understands what he is doing can build
this device.
I have been grounded in conventional theory for some eleven years. I have always
tried to study the simplicity of electrical circuits, but my mind wouldn't allow
this because of my orthodox training. In any event, I had to change the way
i was looking at things. I started to wonder, why do we need to have things so
complicated? The truth of the matter is, we have been taught to consume or waste energy
at every turn in our lives, so we jump into our cars, turn on lights, etc. In other
words, we have been conditioned to waste energy and fuels lavishly, not realizing
that someday someone will sky-rocket our energy bills to a point where we will
not be able to pay for these fuels. Everything will come to a stand-still. But la
ugh as you will, at that time Rube Goldberg machines will power your future. It
probably will not be uncommon to see machines from the size of garbage cans to the
size of two story apartment houses powering everything in sight. These machines will
be using a force in nature never conceived by the conventionally trained mind of today.
The theory I am about to explain to you will bring you one step closer to gaining
free energy.
To begin my story I must state I had a vision - looking for this energy. Many times
I hammered my head into the ground, but I refused to give up in my search. Any person
with a dream should never let it be wasted by fools, who will always say "you
can't do that". All that statement really means is that they do not know how to do it.
There are many different ways to explain this theory. I will discuss the first
one now.
The device is very simple and uses a motor, a generator, a controller switch, and a
battery. Basically, we drive a direct current motor with pulsed current from a battery,
then utilize a special means to cause the battery to recharge itself.
First, the battery, controller, and generator are interconnected as shown in figure
3. (See also Figure 1)
/-----\ /-----\
o-12v | |===| || | 14v.o
[Motor==| |==||===Gen. ]
o+ | |===| || | .o
\-----/ Mass \-----/
Controller
Figure 1: The Kromery Converter
__________
= Brush 1
_-_ * =shaft
/xxx\ xxx=copper
/x/x\x\ = =brush
| x*x=|_________ _o--o1
\ \x/ /Brush 2 /|
\_ _/ 2o--/
-
= Brush 3 o--o3
__________ Equivelant
Circuit
Figure 2: Controller Construction
3O To controller 1O To controller
| brush #3 | brush #1
| |
| Mass | 2O To controller
| Gen. Motor| | brush #2
| ____ = ____ | |
\----O+ |-=-| +O-/ \-To batt +
/--O- |-=-| -O--+---To batt -
| ---- = ---- |
\---------------/
Figure 3: Schematic of the device
Let's begin by stating certain facts. The ions move backwards under charging
conditions and in reverse under discharging conditions. So here we start our new
concept. Suppose we have constructed a machine that has tricked this battery into a
different space and time relationship. Simply put, suppose the battery never did any
work
and it should have its full charge left in it. Suppose this becomes possible because
we have stressed the terminals in such a way that the ions in the battery electrolyte
actually move themselves backwards. The machine, or unit, that makes this possible h
as many different names. Some people call these units generators, energizers,
alternators, etc. Conventionally such devices have one thing in common; they stress the
battery backwards by pushing electricity into the battery and forcibly pushing the ions
i
n the electrolyte backwards. In our theory, we are not going to push anything - the ions
are going to move themselves, recharging the battery.
If we go a little deeper into this theory, you are probably asking yourself, "what is
this madman talking about?" Simply put, we are going to put a stress on the battery
terminals for a moment in time and the battery will do the rest. Now comes the heavy
part of this theory. What they didn't teach you in textbooks is that, in order for the
battery to charge, two oscillatory actions must occur, one at the positive terminal and
one at the negative terminal. Under different stress levels this then forces the
ions backwards. The same would occur for an electron. Our machine will slingshot ions
in the battery electrolyte backwards beyond the normal recoil action.
I must give a very stern warning at this time that if the voltage developed is too
high the battery will explode. Use the utmost care. Test setups in my lab have proven
that this can be dangerous. Do not build the device and experiment with it unless yo
u know what you are doing, and use the utmost caution.
When struck by a sharp voltage spike, the electrolyte in the battery will resonate
at a certain frequency and this can also force the ions backwards. Simply put, the
battery, the motor, and the energizer will become resonant at some point, "ring" like
a
bell when we "strike" it, and in its ringing the most energy will be developed.
[Note: sorry I can't produce waveforms here so get the book! I will present the
explanation here, however]
The battery is really charging itself. The ions in the electrolyte are being stressed
in a curved space and time relationship, the battery is actually forced into believing
that no work ever occured. The oscillatory action that has taken place by the en
ergizer has just pulsed our "slingshot" and immediately let go. Once this has happened,
the electrolyte in the battery goes wild and the ions race backwards, giving off
hydrogen and oxygen gas. I must make a stern warning here! The time of the stimulaing
pulse is very important. If the time is to long the battery will burn itself out. If
the pulse time is too short or if the circuit fails to operate correctly, the battery
will never recover its charge. Taking this into consideration, the only failures tha
t could occur would be the controller failure due to a points faiulre (on the electronic
controller), or the multivibrator latched in the "on" position (again, only on the
electronic controller). Anyone studying this can see that we have used very little
energy to get to this point, and gained a lot of resonant energy in return.
We must remember that, if the battery is applied to the energizer longer than normal,
we must burn up the excess energy to keep the battery cool. The problem now becomes one
of embarrassing excess of energy, not a shortage.
The energizer is also a simple machine, but if yu want to, you can make it very
complex. The simple way is to study the alternator principles. The waves we want to
generate are like those that came from old D.C. generators with the exception of
armature
drag, bearing drag, and no excited fields. Also, we would want to cut the magnetic
fields at 90 degress to the armature. The simpler the better.
I am going to throw a few ideas your way. I have run some tests in my lab and
discovered that certain types of energizers, generators, and alternators do what we
need. Also, we want to be able to tune the output of our energizer. The old D.C.
generator
puts out something very close towhat we need, except for The drag.
In an A.C. generator output we are going to see just what we manufacture. It would
appear that this leaves this generator out. Not really, because we can make this
generator's output change by rectifying it.
In looking at the A.C. generator with rectified output, we see that it could become
very useful to us as an energizer, simply because it is the easiest to construct and
its principles are simple. I have done experiments with an A.C. generator using ALL
N. alligned magnets, and rectified. Most people can see that that type o alternator
might have some problems. However, remember that I am looking for a certain type of wave
form that I want to tune to a certain frequency at a certain speed. The winding of
this alternatr is a problem and it is a bit tricky, but I chose to stay with this unit.
You may choose a different method if you retain the principle. The type of energizer
that was used for the prototype was a standard office type 2-speed A.C. fan housi
ng. The coils were replaced with 6 coils of approx. 200 turns of #20 wire - all in
phase. Six permanent magnets are bonded to an aluminum disc. This arrangement is
basically a magneto, but will produce more amperage than ordinarily expected of a
magneto.
Controller Construction: Figure 2 shows the controller. It should be made of two
coencentric circles, one with approx. 140 degrees of copper, the other, spaced far
enough from the first for a brush to be inserted between them, a full 360 degrees of
copper
. Provisions should be made to rotate the brushes in relationship to each other in order
to secure the required timing.
Eike Mueller
John Bedini found that the material generally available concerning Kromery's
Converter had been altered. Rebuilding the Kromery Converter from the patent papers
ended up in a non-functioning device. Bedini found the necessary modifications
which made this machine perform.
Our first goal was to determine the converters efficiency. We found this to be
quite difficult as the efficiency changes with the load applied.
Figure K-1 shows the first setup we used. We drove the Kromery Converter from
a 12v motorcycle battery. We connected at the output of the converter a condenser
and a rectifier bridge in parallel. The rectified current was then put b
ack into the motorcycle battery. To detect any current flow, we connect into the
positive line a 12 V light bulb.
The result of this test was the light bulb was lit up. However after 15 minutes the
batrery voltage had dropped from 11.05 V to 9.10 V. The speed of the converter
was stabale at 1020 rpm.
/----------\ /----\
/--O Kromery +O----+--O+12v|
|/-OConverter-O---+---O- | FIGURE K - 1 || \--
--------/ || \----/ ||
|| || /------------/|
KROMERY CONVERTER |\-------. |
| | / \ |
| | /FW \ |
TEST SETUP #1 | \-Bridg+--(X)-/
| \ / Bulb
| \ /
\--------.
In the next test we introduced a seperate battery (battery #2) for charging from
the converter.
We recharged the battery #2 from 12.30 V to 12.40 V within 4 minutes, and we measured
a current flow into the battery #2 of 0.8 amperes.
/----------\ /----\
/--O Kromery +O-------O+12v|
|/-OConverter-O-------O-#1 | FIGURE K - 2 || \--
--------/ \----/ ||
|| /-------------\
/----\ KROMERY CONVERTER |\-------. \--O-
12*| | | / \ /--O+#2 |
| | /FW \ | \----/
TEST SETUP #2 | \-Bridg+--(/)-/
| \ / Ampere *Note difference
| \ / Meter in polarity from
\--------. battery #1.
Figure K-2 shows the second test setup. Because the kromery converter ran
too slow on one 12 V battery, we decided to drive the converter using 24 V via tw
o 12 V batteries, connected in series.
Next we wanted to find a correlation between the normal charging of battery #2 using
a commercial battery charger, and charging this same battery with the Kromery converter.
We drained the battery #2 to 8 V, connected it to the Kromery Converter, and af
ter reaching 11.51 V, we measured the time it took to charge the battery from this
voltage level of 11.51 V to 12.45 V. We reached this voltage (12.45 V) after 11
minutes. The indicated current into the battery was 0.94 A.
We then repeated these steps using the commercial battery charger. Because we ran out
of time after nearly 2 hours, we disconnected the battery from the charger. The
battery voltage had reached 12.41 V. The measurement is depicted in Figure K-3.
THE BATTERY CHARGER NEEDED 119 MINUTES
TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.41 V
FIGURE K - 3
THE KROMERY CONVERTER NEEDED 11 MINUTES
TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.45 V
NOTE: The charger could not fill up the batteries
to 12.45 volts within two hours.
We wanted to find a correction factor for the Kromery Converter by comparing the
same effect, i.e. the charging of the same battery from one specific voltage to
another specific voltage. The calculation of this factor is avilable in the book "E
xperiments with a Kromery and a Brandt-Tesla converter built by John Bedini" By Eike
Mueller, with Comments by Tom Bearden. Table K-1 shows the combined test results.
Because we detected an increase in the speed of the Kromery Converter as well as
a
decrease in the input energy when we increased the output load, we decided to
measure the input energy and speed when the output was shorted. Again, the input energy
dropped and the speed increased.
Measurement No Load Loaded With Shorted Corrected
Battery Fact. 5.535
============================================================
Input Voltage 25.30 25.00 24.90
Input Current 3.90 3.00 2.20
------------------------------------------------------------
Watts In 98.67 75.00 54.78
Watts Out N/A 10.26 N/A 56.78
------------------------------------------------------------
Speed In Rev/Sec 40.00 65.00 73.00
Output Voltage DC 48.00 10.80 N/A
Output Current N/A 0.95 1.05
------------------------------------------------------------
Watts In/Out N/A 7.31 N/A 1.32
============================================================
Table K - 1
Using the earlier determined correction factor of 5.535 we calculated the energy
they put into the battery to 56.78 watts (from 10.26 * 5.535). Looking at Table K-1
we see that it takes only 54.78 watts to run the Kromery Converter when the outpu
t is shorted. This result led us to continue with theese tests and load the converter
output even more. The results of these tests can be seen in Table K-2.
Here again, we detected that we would get a higher efficiency of the total device,
the more we load down the output side. This effect is totally contradictory
to the conventional laws of physics.
Measurement No Load Loaded With Loaded w/ Loaded w/
Lamp & Batt 13.5 Ohms 0.63 Ohms
============================================================
Input Voltage 25.40 25.30 20.00 21.90
Input Current 3.90 3.90 3.39 2.30
------------------------------------------------------------
Watts In 99.06 98.67 67.80 50.37
Watts Out N/A 21.00 185.19 634.92
Watts Out (Corrected) 116.24
------------------------------------------------------------
Resistance (Ohms) N/A N/A 13.50 0.63
Output Voltage DC 48.00 28.00 50.00 20.00
Output Current N/A 0.75 N/A N/A
------------------------------------------------------------
Watts In/Out N/A 0.85 0.37 0.08
============================================================
Table K - 2
We used the Kromery correction factor for the First case, when we had connected the
battery to the converter output. We did not use this factor in both other cases when
we used resistors in the output circuit.
The above test results show that the efficiency of the Kromery Converter is well
above 100%.
The end. Typed by (_>Shadow Hawk 1<_). May be distributed anywhere as long as you keep
the credits. I dont give a shit what you do with it either.
DOWNLOADED FROM P-80 SYSTEMS......

44
txt_files/bermutri.txt Normal file
View File

@ -0,0 +1,44 @@
"The Bermuda Triangle and Parapsychology" By Dave Beall
. Although not embraced by the parapsychological community, the Bermuda
Triangle phenomena is an intriguing topic to the public. Jane Roberts' Seth
claims the mysterious disappearances of ships and planes is the result of a
"coordination point", which is a place where time and space meet. Supposed
energy "crystals" from the ancient culture of Atlantis, which Edgar Cayce
predicted would be discovered in the Atlantic Ocean, are suspected by some to
be responsible for the peculiar events in this region. Some individuals
consider UFOs as the source of the phenomena.
. A provacative theory has been proposed by geologists as a result of the
recent discover and subsequent laboratory analysis of an ice like substance
called hydrate. A hydrate layer, formed by mixing cold sea water and natural
gas at immense pressures of the deep ocean, has been found on the ocean floor
in the triangle area, and this seal prevents natural venting of natural gas
from the large hydrocarbon desposits located there.
. When a large natural gas pocket is suddenly released as a result of a
buildup in pressure or sea floor movement (i.e. faulting), ships can be
suddenly swallowed by the foamy mixture of gas and water and temporary
"islands" as much as one mile across can be visible on neighboring ship's radar
screens, as the gas enters the atmosphere. Negative ions generated by agitated
sea water rise into the atmosphere along with the lighter-than-air-gas, causing
magnetic disturbances which could disrupt compass readings in the area.
Aircraft, passing over the gas blowout, could experience engine failure due to
oxygen starvation in the gas rich air and crash without a trace.
. Any sinking wreckage from a plane or ship could be carried miles from the
accident site by the strong currents in the region, before being consumed by
thick bottom muds or hydrate accumulations, leaving no evidence. The release
of trapped gas desposits ruptured by faulting in shallow ocean areas could
display similar characteristics, whithout hydrate, and the chance of a gas
blowout of this nature exists anywhere in the world's oceans where large
natural gas deposits are present. In the case of the Bermuda Triangle
phenomena, it would appear that a reasonable explanation has been proposed.
. Many aspects of parapsychology or related areas may not have solutions
which readily conform to known physical principles. On the other hand, many
esoteric or metaphysical ideas may someday be explainable in purely physical
terms. In an attempt to understand paranormal occurences, an individual should
remain open and objective until all of the evidence is in so that the
temptation towards premature and unfounded conclusions can be overcome.

403
txt_files/bigbroth.hum Normal file
View File

@ -0,0 +1,403 @@
THE NATIONAL GUARDS
by Donald Goldberg
Taken from OMNI, May 1987, p45...
typed in by Thomas Covenant, in preparation for the future.
"...if you liked 1984, you're gonna love what
the military has planned..."
The mountains bend as the fjord and the sea beyond stretch out before the
viewer's eyes. First over the water, then a sharp left turn, then a bank to
the right between the peaks, and the secret naval base unfolds upon the screen.
The scene is of a Soviet military installation on the Kola peninsula in the
icy Barents Sea, a place usually off limits to the gaze of the Western world.
It was captured by a small French satellite called SPOT Image, orbiting at an
altitude of 517 miles above the hidden Russian outpost. On each of several
passes -- made over a two week period last fall -- the satellite's high
resolution lens took its pictures at a different angle; the images were then
blended into a three dimensional, computer generated video. Buildings, docks,
vessels, and details of the Arctic landscape are all clearly visible.
Half a world away and thousands of feet under the sea, sparkling clear images
are being made of the ocean floor. Using the latest bathymetric technology and
state of the art systems known as Seam Beam and Hydrochart, researchers are for
the first time assembling detailed underwater maps of the continental shelves
and the depths of the world's oceans. These scenes of the sea are as sophisti-
cated as the photographs taken from the satellite.
From the three dimensional images taken far above the earth to the charts of
the bottom of the oceans, these photographic systems have three things in
common: They both rely on the latest technology to crate accurate pictures never
dreamed of even 25 years ago; they are being made widely available by non-
commercial, nongovernmental enterprises; and the Pentagon is trying desperately
to keep them from the general public.
In 1985 the Navy classified the underwater charts, making them available only
to approved researchers whose needs are evaluated on a case by case basis. Under
a 1984 law the military has been given a say in what cameras can be licensed to
use on American satellites; and officials have already announced they plan to
limit the quality and resolution of photos made available. The National Security
Agency (NSA) -- the secret arm of the Pentagon in charge of gathering electronic
intelligence as well as protecting sensitive U.S. communications -- has defeated
a move to keep it away from civilian and commercial computers and databases.
That attitude has outraged those concerned with the military's increasing
efforts to keep information not only from the public but from industry experts,
scientists, and even other government officials as well. "That's like
classifying a road map for fear of invasionm" says Paul Wolff, assistant ad-
ministrator for the National Oceanic and Atmospheric Administration, of the
attempted restrictions.
These attempts to keep unclassified data out of the hands of scientists,
researchers, the news media, and the public at large are part of an alarming
trend that has seen the military take an ever increasing role in controlling the
flow of information and communications through American society, a role
traditionally -- and almost exclusively -- left to civilians. Under the
approving gaze of the Reagan administration, Department of Defense (DoD)
officials have quietly implemented a number of policies, decisions, and orders
that give the military unprecedented control over both the content and public
use of data and communications. For example:
o The Pentagon has created a new category of "sensitive" but unclassified
information that allows it to keep from public access huge quantities of data
that were once widely accessible.
o Defense Department officials have attempted to rewrite key laws that spell
out when the president can and cannot appropriate private communications
facilities.
o The Pentagon has installed a system that enables it to seize control of the
nation's entire communications network -- the phone system, data transmissions,
and satellite transmissions of all kinds -- in the event of what it deems a
"national emergency". As yet there is no single, universally agreed upon
definition of what constitutes such a state. Usually such an emergency is
restricted to times of natural disaster, war, or when national security is
specifically threatened. Now the military has attempted to redefine "emergency".
The point man in the Pentagons onslaught on communications is Assistant
Defense Secretary Donald C. Latham, a former NSA deputy chief. Latham now heads
an interagency committee in charge of writing and implementing many of the
policies that have put the military in charge of the flow of civilian
information and communication. He is also the architect of National Security
Decision Directive 145 (NSDD 145), signed by Defense Secretary Caspar Wein-
berger in 1984, which sets out the national policy on telecommunications and
computer systems security.
First NSDD 145 set up a steering group of top level administration officials.
Their job is to recommend ways to protect information that is unclassified but
has been designated sensitive. Such information is held not only by government
agencies but by private companies as well. And last October the steering group
issued a memorandum that defined sensitive information and gave federal agencies
broad new powers to keep it from the public.
According to Latham, this new category includes such data as all medical
records on government databases -- from the files of the National Cancer
Institute to information on every veteran who has ever applied for medical aid
from the Veterans Administration -- and all the information on corporate and
personal taxpayers in the Internal Revenue Service's computers. Even agricul-
tural statistics, he argues, can be used by a foreign power against the United
States.
In his oversize yet Spartan Pentagon office, Latham cuts anything but an
intimidating figure. Articulate and friendly, he could pass for a network
anchorman or a television game show host. When asked how the government's new
definition of sensitive information will be used, he defends the necessity for
it and tries to put to rest concerns about a new restrictiveness.
"The debate that somehow the DoD or NSA are going to monitor or get into
private databases isn't the case at all," Latham insists. "The definition is
just a guideline, just an advisory. It does not give the DoD the right to go
into private records."
Yet the Defense Department invoked the NSDD 145 guidelines when it told the
information industry it intends to restrict the sale of data that are now
unclassified and publicly available from privately owned computer systems. The
excuse it offered was that these data often include technical information that
might be valulable to a foreign adversary like the Soviet Union.
Mead Data Central -- which runs some of the nation's largest computer data-
bases, such as Lexis and Nexis, and has nearly 200,000 users -- says it has
already been approached by a team of agents from the Air Force and officials
from the CIA and the FBI who asked for the names of subscribers and inquired
what Mead officials might do if information restrictions were imposed. In
response to government pressure, Mead Data Central in effect censored itself.
It purged all unclassified government supplied technical data from its system
and completely dropped the National Technical Information System from its
database rather than risk a confrontation.
Representative Jack Brooks, a Texas democrat who chairs the House Government
Operations Committee, is an outspoken critic of the NSA's role in restricting
civilian information. He notes that in 1985 the NSA -- under the authority
granted by NSDD 145 -- investigated a computer program that was widely used in
both local and federal elections in 1984. The computer system was used to count
more than one third of all the votes cast in the United States. While probing
the system's vulnerability to outside manipulation, the NSA obtained a detailed
knowledge of that computer program. "In my view," Brooks says, "this is an un-
precedented and ill advised expansion of the military's influence in our
society."
There are other NSA critics. "The computer systems used by counties to
collect and process votes have nothing to do with national security, and I'm
really concerned about the NSA's involvement," says democratic congressman Dan
Glickman of Kansas, chairman of the House science and technology subcommittee
concerned with computer security.
Also, under NSDD 145 the Pentagon has issued an order, virtually unknown to
all but a few industry executives, that affects commercial communications
satellites. The policy was made official by Defense Secretary Caspar Weinberger
in June of 1985 and requires that all commercial satellite operators that carry
such unclassified government data traffic as routine Pentagon supply information
and payroll data (and that compete for lucrative government contracts) install
costly protective systems on all satellites launched after 1990. The policy
does not directly affect the data over satellite channels, but it does make the
NSA privy to vital information about the essential signals needed to operate a
satellite. With this information it could take control of any satellite it
chooses.
Latham insists this, too, is a voluntary procedure and that only companies
that wish to install protection will have their systems evaluated by the NSA.
He also says industry officials are wholly behind the move, and argues that
the protective systems are necessary. With just a few thousand dollars' worth
of equipment, a disgruntled employee could interfere with a satellite's control
signals and disable or even wipe out a hundred million dollar satellite carrying
government information.
At best, his comments are misleading. First, the policy is not voluntary. The
NSA can cut off lucrative government contracts to companies that do not comply
with the plan. The Pentagon alone spent more than a billion dollars leasing
commercial satellites last year; that's a powerful incentive for business to
cooperate.
Second, the industry's support is anything but total. According to the
minutes of one closed door meeting between NSA officials -- along with represen-
tatives of other federal agencies -- and executives from AT&T, Comsat, GTE
Sprint, and MCI, the executives neither supported the move nor believed it was
necessary. The NSA defended the policy by arguing that a satellite could be held
for ransom if the command and control links weren't protected. But experts at
the meeting were skeptical.
"Why is the threat limited to accessing the satellite rather than destroying
it with lasers or high powered signals?" one industry executive wanted to know.
Most of the officials present objected to the high cost of protecting their
satellites. According to a 1983 study made at the request of the Pentagon, the
protection demanded by the NSA could add as much as $3 million to the price of
a satellite and $1 million more to annual operating costs. Costs like these,
they argue, could cripple a company competing against less expensive communi-
cations networks.
Americans get much of their information through forms of electronic communi-
cations, from the telephone, television and radio, and information printed in
many newspapers. Banks send important financial data, businesses their spread-
sheets, and stockbrokers their investment portfolios, all over the same channels
from satellite signals to computer hookups carried on long distance telephone
lines. To make sure that the federal government helped promote and protect the
efficient use of this advancing technology, Congress passed the massive
Communications Act of 1934. It outlined the role and laws of the communications
structure in the United States.
The powers of the president are set out in Section 606 of that law; basically
it states that he has the authority to take control of any communications
facilities that he believes "essential to the national defense". In the language
of the trade this is known as a 606 emergency.
There have been a number of attempts in recent years by Defense Department
officials to redefine what qualifies as a 606 emergency and make it easier for
the military to take over national communications.
In 1981 the Senate considered amendments to the 1934 act that would allow the
president, on Defense Department recommendation, to require any communications
company to provide services, facilities, or equipment "to promote the national
defense and security or the emergency preparedness of the nation," even in
peacetime and without a declared state of emergency. The general language had
been drafted by Defense Department officials. (The bill failed to pass the
House for unrelated reasons.)
"I think it is quite clear that they have snuck in there some powers that
are dangerous for us as a company and for the public at large," said MCI vice
president Kenneth Cox before the Senate vote.
Since president Reagan took office, the Pentagon has stepped up its efforts
to rewrite the definition of national emergency and give the military expanded
powers in the United States. "The declaration of 'emergency' has always been
vague," says one former administration official who left the government in 1982
after ten years in top policy posts. "Different presidents have invoked it
differently. This administration would declare a convenient 'emergency'". In
other words, what is a nuisance to one administration might qualify as a
burgeoning crisis to another. For example, president Reagan administration might
decide that a series of protests on or near military bases constituted a
national emergency.
Should the Pentagon ever be given the green light, its base for taking over
the nation's communications system would be a nondescript yellow brick building
within the maze of high rises, government buildings, and apartment complexes
that make up the Washington suburb of Arlington, Virginia. Headquartered in a
dusty and aging structure surrounded by a barbed wire fence is an obscure branch
of the military known as the Defense Communications Agency (DCA). It does not
have the spit and polish of the National Security Agency or the dozens of other
government facilities that make up the nation's capital. But its lack of shine
belies its critical mission: to make sure all of America's far flung military
units can communicate with one another. It is in certain ways the nerve center
of our nation's defense system.
On the second floor of the DCA's four story headquarters is a new addition
called the National Coordinating Center (NCC). Operated by the Pentagon, it is
virtually unknown outside of a handful of industry and government officials. The
NCC is staffed around the clock by representatives of a dozen of the nation's
largest telecommunications companies -- the so called "common carriers" --
including AT&T, MCI, GTE, Comsat, and ITT. Also on hand are officials from the
State Department, the CIA, the Federal Aviation Administration, and a number of
other federal agencies. During a 606 emergency the Pentagon can order the
companies that make up the NCC to turn over their satellite, fiberoptic, and
land line facilities to the government.
On a long corridor in the front of the building is a series of offices, each
outfitted with a private phone, a telex machine, and a combination safe. It's
known as "logo row" because each office is occupied by an employee from one of
the companies that staff the NCC and because their corporate logos hang on the
wall outside. Each employee is on permanent standby, ready to activate his
company's system should the Pentagon require it.
The NCC's mission is as grand as its title is obscure: to make available to
the Defense Department all the facilities of the civilian communications network
in this country -- the phone lines, the long distance satellite hookups, the
data transmission lines -- in times of national emergency. If war breaks out and
communications to a key military base are cut, the Pentagon wants to make sure
that an alternate link can be set up as fast as possible. Company employees
assigned to the Center are on call 24 hours a day; they wear beepers outside the
office, and when on vacation they must be replaced by qualified colleagues.
The Center formally opened on New Year's Day, 1984, the same day Ma Bell's
monopoly over the telephone network of the entire United States was finally
broken. The timing was no coincidence. Pentagon officials had argued for years
along with AT&T against the divestiture of Ma Bell, on grounds of national
security. Defense Secretary Weinberger personally urged the attorney general
to block the lawsuit that resulted in the breakup, as had his predecessor,
Harold Brown. The reason was that rather than construct its own communications
network, the Pentagon had come to rely extensively on the phone company. After
the breakup the dependence continued. The Pentagon still used commercial
companies to carry more than 90 percent of its communications within the
continental United States.
The 1984 divestiture put an end to AT&T's monopoly over the nation's tele-
phone service and increased the Pentagon's obsession with having its own nerve
center. Now the brass had to contend with several competing companies to acquire
phone lines, and communications was more than a matter of running a line from
one telephone to another. Satellites, microwave towers, fiberoptics, and other
technological breakthroughs never dreamed of by Alexander Graham Bell were in
extensive use, and not just for phone conversations. Digital data streams for
computers flowed on the same networks.
These facts were not lost on the Defense Department or the White House.
According to documents obtained by OMNI, beginning on December 14, 1982, a
number of secret meetings were held between high level administration officials
and executives of the commercial communications companies whose employees would
later staff the NCC. The meetings, which continued over the next three years,
were held at the White House, the State Department, the Strategic Air Command
(SAC) headquarters at Offutt Air Force Base in Nebraska, and at the North
American Aerospace Defense Command (NORAD) in Colorado Springs.
The industry officials attending constituted the National Security Tele-
communications Advisory Committee -- called NSTAC (pronounced N-stack) -- set
up by President Reagan to address those same problems that worried the Pentagon.
It was at these secret meetings, according to the minutes, that the idea of a
communications watch center for national emergencies -- the NCC -- was born.
Along with it came a whole set of plans that would allow the military to take
over commercial communications "assets" -- everything from ground stations and
satellite dishes to fiberoptic cables -- across the country.
At a 1983 Federal Communications Commission meeting, a ranking Defense
Department official offered the following explanation for the founding of the
NCC: "We are looking at trying to make communications endurable for a protracted
conflict." The phrase "protracted conflict" is a military euphemism for nuclear
war.
But could the NCC even survive the first volley in such a conflict?
Not likely. It's located within a mile of the Pentagon, itself an obvious
early target of a Soviet nuclear barrage (or a conventional strike, for that
matter). And the Kremlin undoubtedly knows its locations and importance, and
presumably has included it on its priority target list. In sum, according to
one Pentagon official, "The NCC itself it not viewed as a survivable facility."
Furthermore, the NCC's "Implementation Plan", obtained by OMNI, lists four
phases of emergencies and how the center should respond to each. The first,
Phase 0, is Peacetime, for which there would be little to do outside of a hand-
full of routine tasks and exercises. Phase 1 is Pre Attack, in which alternate
NCC sites are alerted. Phase 2 is Post Attack, in which other NCC locations are
instructed to take over the Center's functions. Phase 3 is known as Last Ditch,
and in this phase whatever facility survives becomes the de facto NCC.
So far there is no alternate NCC to which officials could retreat to survive
an attack. According to NCC deputy director William Belford, no physical sites
have yet been chosen for a substitute NCC, and even whether the NCC itself will
survive a nuclear attack is still under study.
Of what use is a communications center that is not expected to outlast even
the first shots of a war and has no backup?
The answer appears to be that because of the Pentagon's concerns about the
AT&T divestiture and the disruptive effects it might have on national security,
the NCC was to serve as the military's peacetime communications center.
The Center is a powerful and unprecedented tool to assume control over the
nation's vast communications and information network. For years the Pentagon
has been studying how to take over the common carriers' facilities. That
research was prepared by NSTAC at the DoD's request and is contained in a series
of internal Pentagon documents obtained by OMNI. Collectively this series is
known as the Satellite Survivability Report. Completed in 1984, it is the only
detailed analysis to date of the vulnerabilities of the commercial satellite
network. It was begun as a way of examining how to protect the network of
communications facilities from attack and how to keep it intact for the DoD.
A major part of this report also contains an analysis of how to make commer-
cial satellites "interoperable" with Defense Department systems. While the
report notes that current technical differences such as varying frequencies
make it difficult for the Pentagon to use commercial satellites, it recommends
ways to resolve those problems. Much of the report is a veritable blueprint for
the government on how to take over satellites in orbit above the United States.
This information, plus NSDD 145's demand that satellite operators tell the NSA
how their satellites are controlled, guarantees the military ample knowledge
about operating commercial satellites.
The Pentagon now has an unprecedented access to the civilian communications
network: commercial databases, computer networks, electronic links, telephone
lines. All it needs is the legal authority to use them. Then it could totally
dominate the flow of all information in the United States. As one high ranking
White House communications official put it: "Whoever controls communications
controls the country." His remark was made after our State Department could not
communicate directly with our embassy in Manila during the anti-Marcos
revolution last year. To get through, the State Department had to relay all its
messages through the Philippine government.
Government officials have offered all kinds of scenarios to justify the NCC,
the Satellite Survivability Report, new domains of authority for the Pentagon
and the NSA, and the creation of top level government steering groups to think
of even more policies for the military. Most can be reduced to the rationale
that inspired NSDD 145: that our enemies (presumably the Soviets) have to be
prevented from getting too much information from unclassified sources. And the
only way to do that is to step in and take control of those sources.
Remarkably, the communications industry as a whole has not been concerned
about the overall scope of the Pentagon's threat to its freedom of operation.
Most protests have been to individual government actions. For example, a media
coalition that includes the Radio-Television News Directors Association, the
American Society of Newspaper Editors, and the Turner Broadasting System has
been lobbying that before the government can restrict the use of satellites, it
must demonstrate why such restrictions protect against a "threat to distinct
and compelling national security and foreign policy interests". But the whole
policy of restrictiveness has not been examined. That may change sometime this
year, when the Office of Technology Assessment issues a report on how the
Pentagon's policy will affect communications in the United States. In the mean-
time the military keeps trying to encroach on national communications.
While it seems unlikely that the Pentagon will ever get total control of our
information and communications systems, the truth is that it can happen all too
easily. The official mechanisms are in place; and few barriers remain to guaran-
tee that what we hear, see, and read will come to us courtesy of our being mem-
bers of a free and open society and not courtesy of the Pentagon.


355
txt_files/bkgroun1.txt Normal file
View File

@ -0,0 +1,355 @@
Foresight Background
No. 4, Rev. 0
Copyright 1989 The Foresight Institute.
All rights reserved by the author.
Box 61058, Palo Alto, CA 94306 USA
by Arthur Kantrowitz
Dartmouth College
"The best weapon of a dictatorship is secrecy, but the best weapon of
a democracy should be the weapon of openness."
--Niels Bohr
Introduction
What is the "weapon of openness" and why is it the best weapon of a
democracy? Openness here means public access to the information needed
for the making of public decisions. Increased public access (i.e. less
secrecy) also gives information to adversaries, thereby increasing
their strength. The "weapon of openness" is the net contribution that
increased openness (i.e. less secrecy) makes to the survival of a
society. Bohr believed that the gain in strength from openness in a
democracy exceeded the gains of its adversaries, and thus openness was
a weapon.
This is made plausible by a Darwinian argument. Open societies evolved
as fittest to survive and to reproduce themselves in an international
jungle. Thus the strength of the weapon of openness has been tested
and proven in battle and in imitation. Technology developed most
vigorously in precisely those times, i.e. the industrial revolution,
and precisely those places, western Europe and America, where the
greatest openness existed. Gorbachev's glasnost is recognition that
this correlation is alive and well today.
Let us note immediately that secrecy and surprise are clearly
essential weapons of war and that even countries like the U.S., which
justifiably prided itself on its openness, have made great and
frequently successful efforts to use secrecy as a wartime weapon.
Bohr's phrase was coined following WWII when his primary concern was
with living with nuclear weapons. This paper is concerned with the
impact of secrecy vs. openness policy on the development of military
technology in a long duration peacetime rivalry.
Let us also immediately note that publication is the route to all
rewards in academic science and technology. When publication is
denied, the culture changes toward the standard hierarchical culture
where rewards are dependent on finding favor with superiors. Reward
through publication has been remarkably successful in stimulating
independent thinking. However, in assessing openness vs. secrecy
policy it must be borne in mind that research workers (including the
present author) start with strong biases favoring openness.
In contrast, secrecy insiders come from a culture where access to
deeper secrets conveys higher status. Those who "get ahead" in the
culture of secrecy understand its uses for personal advancement.
Knowledge is power, and for many insiders access to classified
information is the chief source of their power. It is not surprising
that secrecy insiders see the publication of technological information
as endangering national security. On the other hand, to what degree
can we accept insiders' assurances that operations not subject to
public scrutiny or to free marketplace control will strengthen our
democracy?
My own experience relates only to secrecy in technology. Therefore I
will not discuss such secrets as submarine positions (which seem
perfectly justifiable to me in the sense that they clearly add to our
strength) or activities which are kept secret to avoid the
difficulties of explaining policy choices to the public (which seem
disastrously divisive to me).
First, we offer some clues to understanding the historical military
strength of openness in long duration competition with secrecy.
Second, we suggest a procedure for the utilization of more openness to
increase our strength.
The Strength of Openness
An important source of support for secrecy in technology is the
ancient confusion between magic and science. In many communications
addressed to laymen the terms are used almost interchangeably. Magic
depends on secrecy to create its illusions while science depends on
openness for its progress. A major part of the educated public and the
media have not adequately understood this profound difference between
magic and science. This important failure in our educational system is
one source of the lack of general appreciation of the power of
openness as a source of military strength. A more general
understanding of the power of openness would bolster our faith that
open societies would continue to be fittest to survive.
Openness is necessary for the processes of trial and the elimination
of error, Sir Karl Popper's beautiful description of the mechanism of
progress in science. Let's try to understand what happens to each of
these processes in a secret project and perhaps we can shed some light
on how the peacetime military was able to justly acquire its
reputation for resistance to novelty.
Trial in Popper's language means receptivity to the unexpected
conjecture. There is the tradition of the young outsider challenging
the conventional wisdom. However in real life it is always difficult
for really new ideas to be heard. Such a victory is almost impossible
in a hierarchical structure. The usual way a new idea can be heard is
for it to be sold first outside the hierarchy. When the project is
secret this is much more difficult, whether the inventor is inside or
outside the project.
Impediments to the elimination of errors will determine the pace of
progress in science as they do in many other matters. It is important
here to distinguish between two types of error which I will call
ordinary and cherished errors. Ordinary errors can be corrected
without embarrassment to powerful people. The elimination of errors
which are cherished by powerful people for prestige, political, or
financial reasons is an adversary process. In open science this
adversary process is conducted in open meetings or in scientific
journals. In a secret project it almost inevitably becomes a political
battle and the outcome depends on political strength, although the
rhetoric will usually employ much scientific jargon.
Advances in technology incorporate a planning process in addition to
the trial and elimination of error which is basic to all life. When
the planned advance is small the planning can be dominant, in the
sense that little new knowledge is required and no significant errors
must be anticipated. When the planned advance is large it will usually
involve research and invention, and the processes of trial and the
elimination of error discussed above will determine the rate of
progress. In these cases the advantages of openness will be especially
important. The familiar disappointments in meeting schedules and
budgets are frequently related to the fact that, in selling new
programs, the importance of these unpredictable processes is not
sufficiently emphasized. More openness would reduce these
disappointments.
Trial and the elimination of error is essential to significant
progress in military technology, and thus both aspects of the process
by which significant progress is made in military technology are
sharply decelerated when secrecy is widespread in peacetime. Openness
accelerates progress. In peacetime military technology, openness is a
weapon. It is one clue to the survival of open societies in an
international jungle.
Secrecy as an Instrument of Corruption
The other side of the coin is the weakness which secrecy fosters as an
instrument of corruption. This is well illustrated in Reagan's 1982
Executive Order #12356 on National Security (alarmingly tightening
secrecy) which states {Sec. 1.6(a)};
In no case shall information be classified in order to conceal
violations of law, inefficiency, or administrative error; to prevent
embarrassment to a person, organization or agency; to restrain
competition; or to prevent or delay the release of information that
does not require protection in the interest of national security.
This section orders criminals not to conceal their crimes and the
inefficient not to conceal their inefficiency. But beyond that it
provides an abbreviated guide to the crucial roles of secrecy in the
processes whereby power corrupts and absolute power corrupts
absolutely. Corruption by secrecy is an important clue to the strength
of openness.
One of the most important impacts of corruption from secrecy is on the
making of major technical decisions. Any federally sponsored project
and especially a project so hotly contested as the Strategic Defense
Initiative must always keep all its constituencies in mind when making
such decisions. Thus the leadership must ask itself whether its
continual search for allies will be served by making a purely
technical decision one way or the other. (A purely technical decision
might determine whether money flows to Ohio or to Texas. Worse yet,
revealing technical weaknesses could impact the project budget.)
When this search for allies occurs in an unclassified project,
technical criticisms, which will come from the scientific community
outside the project, must be considered. Consideration of these
criticisms can improve the decision making process dramatically by
bringing a measure of the power of the scientific method to the making
of major technical decisions.
In a classified project, the vested interests which grow around a
decision can frequently prevent the questioning of authority necessary
for the elimination of error. Peacetime classified projects have a
very bad record of rejecting imaginative suggestions which frequently
are very threatening to the existing political power structure.
When technical information is classified, public technical criticism
will inevitably degrade to a media contest between competing
authorities and, in the competition for attention, it will never be
clear whether politics or science is speaking. We then lose both the
power of science and the credibility of democratic process.
Corruption is a progressive disease. It diffuses from person to person
across society by direct observations of its efficacy and its safety.
The efficacy of the abuse of secrecy for interagency rivalry and for
personal advancement is well illustrated by the array of abuses listed
in Sec. 1.6(a). The safety of the abuse of secrecy for the abuser is
dependent upon the enforcement of the Section. As abuses spread and
become the norm, enforcibility declines and corruption diffuses more
rapidly.
However, diffusive processes take time to spread through an
organization, and this makes it possible for secrecy to make a
significant contribution to national strength during a crisis. When a
new organization is created to respond to an emergency, as for example
the scientific organizations created at the start of WWII, the
behavior norms of the group recruited may not tolerate the abuse of
secrecy for personal advancement or interagency rivalry. In such
cases, and for a short time, secrecy may be an effective tactic. The
general belief that there is strength in secrecy rests partially on
its short-term successes. If we had entered WWII with a well-developed
secrecy system and the corruption which would have developed with
time, I am convinced that the results would have been quite different.
Secrecy Exacerbates Divisiveness: the SDI Example
Reagan's Executive Order, previously referred to, provides another
clue to the power of openness. The preamble states;
It [this order] recognizes that it is essential that the public be
informed concerning the activities of its Government, but that the
interests of the United States and its citizens require that certain
information concerning the national defense and foreign relations be
protected against unauthorized disclosure.
The tension in this statement is not resolved in the order. It may be
informative to attempt a resolution by considering a concrete example,
namely the Strategic Defense Initiative. SDI symbolizes one of the
conflicts, clearly exacerbated by secrecy, which currently divide us.
I would assert that there are unilateral steps toward openness which
we could take, and which would leave us more unified and stronger,
even if no reciprocal steps were taken by the Soviets. I propose that
we start unclassified research programs designed to provide scientific
information needed for making public policy. If these programs are
uncoupled from classified programs, their emphases would not
compromise classified information. Their purpose would be to provide a
knowledge base for public policy discussions. These programs would not
reveal the decisions taken secretly, but a public knowledge base would
reduce the debilitating divisiveness fostered by secrecy.
The Strategic Defense Initiative provides a classic example of
debilitating divisiveness. Countermeasures to SDI are deeply
classified. The deadly game of countermeasures and
countercountermeasures will probably determine whether SDI is
successful or a large-scale Maginot Line. At the present time,
classification of the countermeasure area trivializes the public
debate to a media battle between opposed authorities offering
conflicting interpretations of secret information.
An example of this game is decoying vs. discrimination. If the offense
can proliferate a multitude of decoys which cannot be discriminated
from warheads by the defense, SDI will not succeed. Knowing a decoy
design would of course make it easier for an adversary to discriminate
it from a warhead. It is therefore very important that such designs be
carefully guarded. On the other hand, maintaining secrecy over the
scientific and engineering research basic to the
decoying-discrimination technology would, for the reasons discussed
earlier, make it much more difficult to provide assurance to the
public that all avenues had been explored. Indeed, a substantial part
of the criticism of the feasibility of SDI turns on the possibility
that an adversary would invent a countermeasure for which we would be
unprepared.
The Cryptography Case: Uncoupled Open Programs
We can learn something about the efficiency of secret vs. open
programs in peacetime from the objections raised by Adm. Bobby R.
Inman, former director of the National Security Agency, to open
programs in cryptography. NSA, which is a very large and very secret
agency, claimed that open programs conducted by a handful of
matheticians around the world, who had no access to NSA secrets, would
reveal to other countries that their codes were insecure and that such
research might lead to codes that even NSA could not break. These
objections exhibit NSA's assessment that the best secret efforts, that
other countries could mount, would miss techniques which would be
revealed by even a small open uncoupled program. If this is true for
other countries is it not possible that it also applies to us?
Inman (1985) asserted that "There is an overlap between technical
information and national security which inevitably produces tension.
This tension results from the scientists' desire for unrestrained
research and publication on the one hand, and the Federal Government's
need to protect certain information from potential foreign adversaries
who might use that information against this nation.
I would assert that uncoupled open programs (UOP) in cryptography make
America stronger. They provide early warning of the capabilities an
adversary might have in breaking our codes. There are many instances
where secret bureaucracies have disastrously overestimated the
invulnerability of their codes. In this case I see no tension between
the national interest and openness. The cryptographers have provided a
fine case study in strengthening the weapon of openness.
Consider then the value of starting unclassified, relatively cheap,
academic research programs uncoupled from the classified programs.
These UOP could provide the more solid information on countermeasures
needed for an informed political decision on SDI, just as the open
cryptography research has taught us something about the security of
our codes. If indeed SDI's critics are right about the opportunities
for the invention of countermeasures, then the UOP would provide an
opportunity to make a conclusive case. On the other hand if the open
programs exhibited that SDI could deal with all the countermeasures
suggested and retain its effectiveness, its case would be
strengthened.
These open programs would indeed be shared with the world. They would
strengthen the U.S. even if there were no response from the USSR by
reducing corruption by secrecy, by improving our decision making, and
by reducing our divisiveness. Undertaking such programs would exhibit
our commitment to strengthening the weapon of openness. Making that
commitment would enable democratic control of military technology.
More openness, reducing suspicions in areas where Americans are
divided, will do more to increase our military strength by unifying
the country and its allies than it could possibly do to increase the
military strength of its enemies.
The Weapon of Openness and the Future
Bohr's phrase which was the keynote of this article was invented in an
effort to adapt to the demands for social change required to live with
advancing military technology. Unfortunately Bohr's effort, to
persuade FDR and Churchhill of the desirability of more openness in
living with nuclear weapons, was a complete failure. There can be no
doubt that the future will bring even more rapid rates of progress in
science-based technology. Let's just mention three possibilities,
noting that these are only foreseeable developments and that there
will be surprises which, if the past is any guide, will be still more
important.
Artificial Intelligence is advancing, driven by its enormous economic
potential and its challenge in understanding brain function.
Molecular biology and genetic engineering are creating powers beyond
our ability to forecast limits.
Feynman some years ago wrote a paper entitled "There's Plenty of Room
at the Bottom" pointing out that miniaturization could aspire to the
huge advances possible with the controlled assembly of individual
atoms. When the possibility of the construction of assemblers which
could reproduce themselves was added by Eric Drexler in his book
Engines of Creation, a very large expansion of the opportunities in
atomic scale assembly were opened up. This pursuit, today known as
nanotechnology, will also be driven by the enormous advantages it
affords for health and for human welfare.
But each of these has possible military uses comparable in impact to
that of nuclear weapons. With the aid of the openness provided by
satellites and arms control treaties, we have been able to live with
nuclear weapons. We will need much more openness to live with the
science-based technologies that lie ahead.
Dr. Kantrowitz is a professor at the Thayer School of Engineering at
Dartmouth, and former Chairman of Avco-Everett Research Lab. He
serves as an Advisor to the Foresight Institute.

186
txt_files/bnlgate.txt Normal file
View File

@ -0,0 +1,186 @@
The War and Peace Digest is a bimonthly international newsletter on issues
of disarmament, government secrecy, media accountability, the nuclear
threat (from both civilian power plants and the military weapons complex),
ecological destruction, and peaceful conflict resolution through the
structures of the United Nations. If you would like to be placed on our
mailing list or receive a copy of our new information packet on nuclear
power, contact Matthew Freedman at 32 Union Square East, New York, NY
10003-3295 (Tel: 212-777-6626).
Contributions are always welcome. All materials may be reproduced without
permission.
--------------------
BNL - IRAQGATE SCANDAL
The Chicago Connection - Bush & Saddam Inc.
Key documents - sought by Gonzalez - withheld
With George Bush ready to take America into another war with Iraq to
destroy the nuclear, chemical, biological and missiles weapons that Bush
himself helped Saddam Hussein to build, Congressmen Henry Gonzalez, the
courageous Texas Democrat who heads the House Banking Committee, continues,
single-handedly, to peel back layer after layer of cover-up to reveal the
monumental proportions of the Iraqgate-BNL (Banca Nazionale Del Lavoro)
scandal that now threatens to bring down the Bush regime. But the most
explosive documents have been withheld.
Over the past several months Gonzalez has shown the Iraqgate-
BNL scandal to be bigger than anyone had imagined. He has uncovered and
reported incontestable evidence that Bush and his associates secretly sold
nuclear, biological, chemical and missile-related weapons materials to
Saddam Hussein; blocked investigations into the use of such materials by
Hussein; suppressed memos warning of the dangers of such sales;
deliberately falsified documents on such sales submitted to Congress and
interfered illegally to halt investigations into the criminal activities of
the BNL bank in secretly diverting American agricultural loans to buy the
weapons for Hussein.
BNL-BCCI Chicago Branches
Gonzalez has revealed a Bush policy disaster that lead to the first
Gulf War and a blunder that is now costing the Americans $2 billion to pay
off the loans Bush guaranteed with U.S. taxpayersU money . Bush repeatedly
ignored warnings that Iraq would default on the loans. Now, certain key
documents - perhaps the most revealing yet - are being withheld from the
Gonzalez investigation. They are said to be the records of the Chicago
branches of BNL and BCCI (Bank of Credit and Commerce International),
through which, some investigators say , George Bush and Saddam Hussein may
have been involved in a joint, private enterprise to skim oil profits
arising from Reagan-Bush policies toward Iraq. The documents have been
impounded by a Chicago court and Congressman Gonzalez Banking Committee
has been denied access.
Bush's Pennzoil Profits
Between 1980 and 1990 the Gulf region exported a trillion dollars
worth of oil to the West. Hundreds of billions of dollars in kickbacks were
involved. Some of the kickbacks were said to be handled by the BNL/BCCI
banks for Pennzoil, an oil company founded by George Bush The Pennzoil
case was (is?) the target of Ross PerotUs much-denied investigation of the
Bush family and friends. Investigators believe the Chicago bank records
could help explain BushUs massive, covert military support for Iraq in the
years between 1981-1990.
The Chicago BNL /BCCI records could also provide clues to why the
Bush Administration secretly - and possibly illegally - exempted eleven
members of the Bush cabinet from conflict of interest restrictions in their
handling of the Gulf war policy. Bush simply declared that the law
regarding conflict of interest would cease to apply to his advisors on the
Gulf war policy. He then ordered that his declaration would be not be made
public. Congressman Gonzalez is now asking Bush to explain the deal. Bush
has not responded.
According to some investigators, the BNL-BCCI bank documents
now impounded by a Chicago judge could shed light not only on the
Iraqgate case, but on other illegal transactions including Iran-Contra,
October Surprise and the Inslaw case. In all instances monies passed
through the BNL/BCCI banking network.
BNL is an Italian bank now under investigation by Congress for
fraud in using loans from the U.S. Department of Agriculture to finance
IraqUs pre-war military buildup. Over the past thirty years, BNL is
suspected of involvement in a wide range of international criminal
activities. (French Intelligence investigators have even linked the bank to
large payments to certain individuals in Europe in late 1963, thought to be
associated with the John Kennedy assassination.)
On December 28th 1990, when Gonzalez sought the records of the
Chicago branch of BNL (Case number 90 C 6863 of the U.S. District Court in
Chicago: People of the State of Illinois ex re; William C. Harris v. the
Board of Governors of the Federal Reserve System), Gonzalez was told by
Federal Judge, Brian Duff that he could not have them. Duff, a friend of
both Bush and Reagan, works closely with the Federal Reserve Bank. Duff
impounded the documents and abused GonzalezU attorney for Rbehaving like an
800 -pound gorilla.S That is when Duff impounded the records.
Questions abound. Suspicions arise from the fact that among
officials involved in the BNL bank is Brent Scowcroft, BushUs National
Security advisor who, Gonzalez has now revealed, maintained a million-
dollar financial interest in 40 of the biggest U.S. weapons companies that
profited from U.S. policies toward Iraq, including General Electric,
General Motors, ITT, and Lockheed. Gonzalez has also revealed that
Assistant Secretary of State Laurence Eagleberger worked closely with BNL
when he and Scowcroft were part of Henry KissingerUs consulting firm.
Kissinger was a member of the board of BNL and his firm represents BNL in
the USA.
BNL, P2 and the Vatican Bank
The BNL bank was also used for secret arms trade by the outlawed P2
Masonic Lodge of Rome, whose Grandmaster, Licio Gelli is thought to have
been the mastermind behind BNLUs illegal, world-wide banking strategies,
until his arrest in 1981, for embezzling $1.5 billion from the Vatican
Bank. The Vatican Bank had close ties with BNL. Gelli was recently
sentenced to 18 years in jail for his role in the case.
Gelli was involved with the PopeUs banker and bodyguard, Bishop
Marcinkus (formerly of Chicago) in the Vatican Bank embezzlement. When the
Italian government issued a warrant for the BishopUs arrest they were
blocked by the Vatican, which claims separate city-state authority. (The
Pope is still closely involved with Marcinkus and the Vatican Bank is still
closely associated with BNL.)
Bush and Gelli are friends. Gelli was guest of honor at the 1981
Reagan-Bush inaugural ball. (N.Y. Times, June 4, 1981, page 7.) Kissinger
also knew Gelli. When Gelli was arrested in March, 1981, Kissinger
immediately sent an agent to Rome with $18,000 to try to buy some of the
documents in the P2 case to keep them from becoming public ( In These
Times, Sept. 1982). It may be of interest that P2 had a lodge in Chicago.
Chicago, it is now emerging, has been the central point for vast,
international, illegal transactions involving the BNL and BCCI banks and
secret deals with American oil companies, military manufacturers, the CIA,
and possibly U.S. politicians. (According to a London source, unreleased
BCCI documents in the possession of the Bank of London list the names of
at least 105 members of U.S. Congress - of both Houses and both parties -
who have received money through the Chicago branch of BCCI. The U.S.
Federal Reserve is said to have a copy of the same secret BCCI list).
The Octopus
Just as the P2 scandal in Italy brought down the government and
destroyed hundred of careers in politics, industry and banking, so too the
BNL/BCCI - Penzzoil case could bring down the Bush administration and send
dozens of top administration officials to jail. Indeed the P2 and BNL cases
overlap in the October Surprise case, and U.S. investigators would do well
to examine the Italian government documents in the P2 case as part of their
inquiry into the October Surprise/BNL/BCCI/Penzzoil/Bush/Hussein links. It
is beginning to look as though the late journalist, Danny Casselaro was on
the right track at the time of his highly suspicious RsuicideS last year,
when he was investigating what he called RThe OctopusS, a vast,
interlocking, international criminal conspiracy.
Bush's Watergate
Congress is now calling for the appointment of a Special Prosecutor
to investigate the ballooning BNL-Iraqgate case. In his insightful and
relentless reporting on the case in The New York Times, William Safire says
flatly that BNL will be BushUs Watergate. Saffire is now investigating the
Chicago link to the case. (Updates on the case now appear regularly on the recorded telephone hotlines of controversial Chicago investigator, Sherman
Scholnick of the RCommittee to Clean Up the CourtsS, who has spearheaded
his own investigation. Call: 312 - 731 1100 & 312- 731 1505 for five-
minute recorded updates.)
When appointed, the Special Prosecutor in the BNL/Iraqgate case
should have immediate access to all the records, including the crucial
documents now confiscated and impounded by the Chicago court.
When the truth of the BNL case is finally revealed, the War &
Peace foundation believes we will see the extent to which politics around
the world
have been corrupted by the arms trade. Iraqgate will serve as further
evidence of the need for international monitoring by the United Nations of
all weapons traffic as a first, essential step toward complete world
disarmament.
Ironically, as we go to press, joint efforts by both houses of
Congress in the wake of the Iraqgate revelations to tighten restrictions on
the sale of nuclear weapons-related materials to nations like Iraq, Iran
and Syria, have provoked a threat of veto by George Bush, who argues that
such non- proliferation legislation would mean a loss of business for
American nuclear exporters!
** End of text from cdp:gen.newsletter **

54
txt_files/bohemian.txt Normal file
View File

@ -0,0 +1,54 @@
THE BOHEMIAN CLUB
For two and a half weeks every July, two thousand of the top
movers and shakers in business and government attend the Bohemian
Club's summer encampment. Although highly selective, the club has
a national membership and is among the most prestigious of
affiliations in neoconservative circles. Its membership is known
to include Ronald Reagan, George Bush, Gerald Ford, William F.
Buckley, Jr., Frank Borman, Justin Dart, William Randolph Hearst,
Jr., Caspar Weinberger, Charles Percy, George Schultz, Edward
Teller, Merv Griffin, and a large proportion of the directors and
chief executive officers of the Fortune 1000. Daniel Ludwig, the
richest private citizen on earth, is a Bohemian. Conspiracy nuts
think the Bohemian Club meets each summer to plot to take over the
world. These guys ALREADY run the world.
The club's name harkens back to its founding in 1872 by
artists and journalists in the Bay Area; the club proper is at 624
Taylor Street in San Francisco. The annual summer camp is held at
"Bohemian Grove," an isolated site in Sonoma County, California,
near the town of Monte Rio. To get there, you cross the bridge
over the Russian River and take the second left.
Signs warn off trespassers, and the Grove is guarded during
the encampment. Visitors must have invitations and sign in and
out; cooks and other workers have to wear ID badges. The club (and
hired staff) is all male. There are no black Bohemians and just
one Asian; the former Philippine president Carlos Romulo.
The club does a good job of avoiding publicity, although in
1980 Rick Clogher, a writer for MOTHER JONES magazine, managed to
slip in to the encampment for four days with the help of an
unidentified insider. Brooding over the Grove is a giant rock that
looks like an owl. Clogher discovered that the rock is concrete,
covered with moss to look natural. The Cremation of Care ritual
takes place in front of the owl when, on the first night of camp,
robed members burn a doll representing Dull Care.
Bohemian Grove includes 122 distinct camps in its 2,700
acres. The camps have whimsical names such as Whiskey Flat,
Toyland, Owl's Nest, Hill Billies, and Cave Man's, and each one
has its own kitchen-bar building -- there is a lot of drinking --
and sleeping quarters. The members of some camps sleep in tents;
other camps have redwood cabins. Daily "Lakeside Talks" on
geopolitical topics are given by prominent speakers, both members
and non-members. It is claimed that Richard Nixon and Ronald
Reagan conferred during the 1967 encampment, Reagan agreeing not
to challenge Nixon for the presidential nomination.
The highlight of camp is the Grove play, which is written
exclusively for the club. All the female roles are played by men
in drag. The 1980 play was an adaptation of the Greek myth of
Cronus and Zeus supplemented with fireworks, smoke bombs, and a
light show. (One can only wonder if Reagan ever starred in a Grove
play. He certainly has more acting experience than most club
members.) The polished productions cost the Bohemians as much as
$25,000 -- for one performance.
xperience than most

544
txt_files/bookfile.txt Normal file
View File

@ -0,0 +1,544 @@
Path: uuwest!spies!apple!usc!samsung!uunet!isis!jsanders
From: jsanders@isis.cs.du.edu (Jim Sanders)
Newsgroups: alt.conspiracy
Subject: BOOK FILE! PROVES CIA-MOB-OIL-DRUG-MURDER WORLD CONSPIRACY!!!!
Message-ID: <1991Jan21.054207.6954@isis.cs.du.edu>
Date: 21 Jan 91 05:42:07 GMT
Reply-To: jsanders@isis.UUCP (Jim Sanders)
Organization: Math/CS, University of Denver
Lines: 534
HERE IT IS -> ********** THE BOOK FILE ************ * * *
THE SUPER RADICAL FILE THAT USES REAL SOURCES TO DOCUMENT THE
CIA/BUXH/MOB/ILLUMINATI/OIL CO LINKS TO RAPE AND STEAL FROM WE THE PEOPLE!!!
A KILLER COMPANION FILE TO THIS ONE IS THE OPAL FILE - WHICH WAS POSTED TO
ALT.CONSPIRACY ON 1/10/91 AND AGAIN ON APPX 1/21/91.
PLEASE CROSS POST THESE FILES ON YOUR LOCAL SSYSTEM NEWS FOR ALL TO SEE THE
TRUTH BEHIND WHY WE MUST NOW DIE FOR THE SEVEN SISTERS(THE OIL COMPANIES).
TABLE OR CONTENTS:
PARTI=LAWYERS/KILLER BOOKS,PARTII=MOB BOOK,PARTIII=DEA BOOK,PARTIV=ILLUMINATI.
PART I:
LAWYERS/CIA/MOB/BUSH -----> RAPE/MURDER/DRUG SMUGGLE/STEAL
Part A:
Lawyers have amassed into a worldwide coalition to dominate the world in the
tradition of the Bavarian Illuminati. Back in the 1800's they managed to gain
control of Amerika by planting their seeds in the Executive, Legislative, and
Judicial branch of U.S. Now separation of powers of the 3 branches exists only
on the hemp paper the Constitution was written on. Oh, and they managed to make
hemp illegal because their buddies own chemical and logging industries that
hemp paper was and can put out of business because it grows 20 times faster,
makes better paper, and needs fewer chemicals to process into paper! They
turned U.S. politics into a morbid game for money. In 1700's our founders
warned us of political parties and hired farmers for presidents who did not use
CIA hitmen to topple foreign regimes for private business concerns. (Bush's
international construction company builds oil refineries in Saudi Arabia!*!*!)
Big brother is nothing more than a four eyed wimp called George with a
lust for megabucks. Death to all who oppose the villain - ex-head of the CIA -
turned US Pres! But he made a terrible mistake. He called a war on drugs,but
his CIA has imported Heroin from Asia for half a century and brought Coke into
the US on Air Amerika planes coming back from Contra Arms deliveries in Central
Amerika!
IMPEACH BUSH NOW - HE'S A DOPE DEALER BETTER YET HANG HIM HIGH FOR TREASON for
working in the Cia when they killed Kennedy so they could escalate the Viet
Nam War and sell heroin to soldiers and JP4 fuel and military jets/helicopters
to U.S. TAXPAYERS!
**** SEND THIS TO YOUR FRIENDS AND CONGRESSMAN/WOMAN AND TELL HER/HIM YOU WANT
BUSH IMPEACHED TODAY AND NO EXCUSES !!!
BESIDES, QUALE WOULD HAVE TROUBLE ESCALATING A BAR FIGHT BY DIALING 911
- HE COULDN'T START A WAR!!!
(MANY UNCONFIRMED THEORIES FORMULATE THAT IF BUSH WERE TO LOSE HIS LIFE OR GET
ROUND FILED, THE CIA WOULD HAVE TO ASSASINATE QUALE)
______________________________________________
| |
| WHAT FOLLOWS ARE EXPLANATIONS AND SOURCES: |
|______________________________________________|
Part B:(Some facts and logical conclusions about lawyers)
"AN AMERICAN TYRANNY,"
by David C. Morrow:
LAWYERS MAKE THE LAWS, JUDGE THE LAWS, BREAK THE LAWS, FUDGE THE LAWS
----------------> SHOULDN'T THIS CHANGE?
Slave owners often helped themselves to their female property and medieval
lords showed their ability to dominate and degrade by having serfs' brides
spend their wedding nights with them and not the grooms.
The California State Bar's Standing Committee on Professional Responsibility
and Conduct has recently decided that "a lawyer-client sexual relationship"
does not impair the lawyer's ability "to competently perform the legal services
required."
"A ban on any sexual relationship with a client," the gentlemen of the Bar
concluded, "appears overly broad and unnecessary." Like the Alaska Bar
Association and, a few years ago, its Oregon counterpart, they ruled it
perfectly fine for lawyers to have sex with women (or men) they represent.
Much criticism of lawyers has come from men trying to reform divorce laws
that give wives at least half a man's property, most of his future income, and
child support without enforced visitation. The accusation is that attorneys,
in legislative offices deliberately make laws that bribe women to divorce in
order to generate cases and that judges, themselves lawyers, assign custody to
women because of evidence showing that maternal more than paternal custody
results in juvenile delinquency. That divorcees may not enjoy as high a living
standard as they anticipate is of no concern to the lawyers.
While these observations can be supported by findings of such established
researchers as the Kettering Foundation and the FBI Crime report, there are
broader implications.
Minnesotan R. F. Doyle, while researching the law's abuse of marriage, came
across a telling article in the September 17, 1975 "Philadelphia Inquirer".
Participants in a Philadelphia Bar Association meeting voted against marijuana
decriminalization. No health reasons were cited; instead the prominent attorney
A. Charles Peruto said that lawyers needed marijuana cases for personal profit.
One need but recall how prostitution, pornography, and other vices are usually
tolerated except during election year when incumbents need to demonstrate their
"effectiveness" and raise extra revenues while scratching one another's backs.
More recently, victims of violent crimes by repeat offenders have begun to
speak out against lenient judges and parole boards who do not keep dangerous
offenders locked up. Each retrial means money for lawyers, judges and a host of
court employees, and who better to guarantee retrials than habitual criminals?
"SINCE LAWYERS OCCUPY ALL BRANCHES OF GOVERNMENT,
THE SEPARATION OF POWER EXISTS ONLY ON PAPER!!!"
To test the lawyer conspiracy theory a few years ago, I sent to various
state legislatures for copies of their statistics. While Idaho listed only
eight of 105 legislators as lawyers in 1983, I discovered that in Wisconsin,
for example, eleven of thirty-one senators and twelve of ninety-nine
representatives were attorneys. During that time, seventeen of Alabama's
thirty-five senators and eleven of sixty-five representatives were lawyers.
The New York State legislature was twenty percent lawyers. Governors, as in
Wisconsin, frequently proved to be lawyers.
It would seem that since members of the legal fraternity occupy all branches
of government, the separation of powers exists only on paper. This enables them
to generate cases for profit and the public detriment by making unenforceable
laws, encouraging repeat offenders as long as possible, and appealing to greed
to keep families - and thereby society in general - in disorder. Perhaps,
indeed, most of America's problems are due less to mysterious sociological
factors than to sly legal machinations.
In their zeal to publicly approve their own sexual misbehavior, what lawyers
are really doing is, like slave owners or medieval lords, sneering down at the
rest of us from their pinnacle and flaunting their privileges in the most
degrading and insulting manner. They are also engaging in behavior that causes
social change, especially change of ruling classes. It is the signal to take
actions to eliminate their tyranny.
We should exclude attorneys from all legislative and executive positions.
Office holders can hire or appoint legal advisers. Judges should be elected,
since appointment, especially by professional peers, would be perverted to
favor persons who work to advance their profession and not to secure justice
and social stability. Rather than campaigning, judges should have to publish
their decisions and sentences with complete explanations in ordinary language,
and this information alone should be the basis of the voters' decision to
re-elect or turn them out of office. Since they enjoy immunity from prosecution
for wrongful decisions, judges' punishments for crimes committed while in
office should be extremely severe.
With these and other measures that may be found useful, we can enter the next
century with few social problems, a very high standard of public morality, and
with crimes violent and victimless under a functional measure of control.
<--REPRINT FROM NOMOS, Vol. 7, #'s 2 & 3, Nomos Press, Inc. 9857 S. Damen Ave.,
Chicago, IL 60643, 1 year subscription of 4 issues costs $15 (Never mail cash)
Part C:(Some more facts about lawyers and Mr. CIA dude(G.BUSH!))
In the early 1800's, the professional politicians took over this country and
public office went from "A duty and a privilege" to a profession. A
professional politician must be a master of words. A lawyer's rhetoric is as
effective as a 357 magnum. Who better to pull off the bloodless coup. Or has it
been blood-less? The civil war devastated the north, the south, and the blacks
had to go to work in polluted northern factories for pennies a day afterwards
(quite handy however for the northern industrial imperialists.) Then the
bluecoats killed off the Indians and the buffalo to boot! Then came Korea, Nam,
Graneda, Nicaragua, Panama, El Salvador, Kuwait.
Around 1903 a New York oil baron had Nikolai Tesla thrown out of N.Y.
(Tesla was a super inventer of such things as AC current and the Westinghouse
electric motor!) It seems Tesla had discovered a way to transmit electricity
without wires around NY city! The oilmen knew it would be an end to their
gross profiteering from energy manipulation and tossed Nik outta there!
A book called "The Emperor Wears No Clothes" documents how hemp was
needed to win world wars, but soon after became illegal after oil, logging and
chemical companies realized hemp made better paper with less petro-chemicals
and converted to alcohol easily with extremely high energy per kilo of biomass!
(Cars can run on alcohol just as easily as gas-I know-I raced cars & planes!)
"The Origin of Consciousness In the Breakdown of the Bicameral Mind" by
Dr. Julian Jaynes of Princeton U., shows in his book how leaders of the world
have confused us for thousands of years with rhetoric, mysticism, music, &
theology, so as to better manipulate and tax the poor masses.
Then there was the carburetor invented in the 70's that got 100 MPG. All
of a sudden a major U.S. company bought the patent rights to the carb and
locked it away. Think of the pollution we now have that we could have avoided
if a handful of greedy politicians and oilmen didn't want all of the excess
wealth their oil businesses have afforded them at the cost of our health!
And Bush is an Oil Refinery Contractor from Texas! Remember, the place
where LBJ, Carlos Marcello, and the CIA had Kennedy shot. Oh, but Bush was in
the CIA! Oh and Bush became the head of the CIA - the same folks that killed
JFK to escalate war and drug profits in NAM. A book "The politics of Heroin in
South East Asia" documents the CIA's selling of narcotics to fund operations.
So does the Book "The American Heroin Empire". HOT NEW BOOK ON DRUGWAR SCAM &
COUNTERINSUGENCY IS CALLED "DEEP COVER" BY MICHAEL LEVINE - GET IT NOW!!!!!!!!!
Garrison's book, "On the trail of Assassins" shows how Oswall was indeed also a
CIA agent. Lucky for the CIA & FBI that Oswald died soon after, along with over
a dozen very important witnessess and suspects who perished for unexplainably
weird reasons within a year of JFK's murder. (And David Scheim's book "Contract
On America" provides the evidence showing how Mafia chiefs like Marcello worked
together with the CIA to murder JFK, Robert Kennedy(he prosecuted MOB Bosses
as JFK's Attorney General), Martin Luther King and Malcom X(these two were
begining to expose the facts that the CIA/MOB drug dealers were taking all the
money from the poor people they sold narcotics to!))
But Bush wants a drug war? But his CIA sells drugs(hard narcotics). Let
us impeach Bush for accessory to a felony to import narcotics(He knew about it)
Or impeach him for accessory to JFK's treasonous murder.(It is supreme high
treason to withhold knowledge of a conspiracy to kill a U.S. President - and
treason carries the death penalty!)
Hoover ran the FBI at the time the killing and helped the coverup. Such
twisted justice can be found described in Turner's book, "Hoover's FBI."
Ex-CIA agents have written books like "The CIA File" and "Deadly Deceits" which
further documents the ruthless activities of drug smuggling and crime by
the CIA abroad and at home. (U.S. law strictly forbids CIA operation in U.S.)
"The Cocaine Wars" explains that the CIA now imports South American Cocaine
into U.S. The Mafias do too, but then they also work for the CIA in many areas
like drug smuggling, assassinations, and other clandistine, cloak and dagger
dirty work no longer needed in the global world of the nineties!
According to the book "Poisoning for Profit," by Block and Scarpitti, the
Mafias basically own the nations waste disposal companies and have dumped toxic
waste illegally into U.S. water supplies for decades. If the CIA and the Mafia
work together, then who is committing crimes against the U.S. now?
I would say that the Bush/Oil/CIA/Mafia connection poses the most threat
to U.S. national security for choking US with oil pollution in Air and Water,
killing our presidents, poisoning our water with toxic waste, and getting our
kids hooked on Smack, Coke and Crack - and all for their love of $.
Hell, these guys make the KGB look about as dangerous as a Cub Scout Pack
loaded with water balloons!
But these same guys control the news services too! No one ever hears any
of this. But then no one reads non-fiction books any more either! These books
are all available at a good college or city library to read for free! Just when
Iraq grabbed the headlines months ago, the Gannett news agency reported in a
small article that mostly Texans including G.Bush received over 500,000 bucks
from failing S&L's. Great smokescreen(sandscreen) George!
Oh, and Bush is a life member of the "Skull and Crossbones Club" which is
the American equivalent of the Bavarian Illuminati - the motto of which falls
along the lines of "secrecy or death!" These secret sects were formed by
Lawyers as far back as 1776 to dominate, manipulate and tax the masses!
Part D(Conclusion:)
We the people could all have 2 day work weeks if $.60 out of every $1.00 we
spend did not pay for energy costs they have assessed us soley for their own
gains-this alone is multiple felony counts of interstate fraud/mail fraud by
Bush & Company. (CIA, & Logging, Oil, Chemical & Financial Industries!)
I propose a new order, not of imperfect, selfish, egotistical humans, but of
and through microprocessors. These machines would not rule the world as most
would expect, but would just aid in applying logic to the production of
solutions to the race's survival.
Data on natural resources, human resources, pollution, et cetera, would be
inputed into a program written in Basic language, open to anyone's inspection,
that would give a committee of non-lawyers/oilmen logical options to take in
handling the affairs of the people. Data input into the Basic interpreter by
the committee would be available to all citizens to duplicate and certify the
committees results.
If the program can be run on anyone's PC, then everyone with a PC could
verify the results the committee obtained so as to make sure that the committee
was not exceeding its own authority. The committee would have to post input
data in newspapers for each problem entered, to allow citizens to duplicate the
committee's findings. If the committee obtained results that differed with the
people's results, the committee would be subject to an audit of their hardware
and software systems until the reason was determined that they obtained
different solutions. This would eliminate the possibility for a virus to be
injected into their system and would eliminate the criminal elements from
tampering with our government for their own personal gains!
With such a system, we no longer would have the personal conflicts of
interest that we presently have with our leaders who are so economically tied
to world events and whose "solutions" are now tainted by such events.
---
PART II:
HOW POLITICIANS/ILLUNINATI USE MAFIAS TO DO THERE DIRTY WORK:
"CONTRACT ON AMERICA" =superexpose on mob/cia/illuminati JFK,King,Malcm X hits!
Well go to a good bookstore and aquire the book "Contract On America" by
David E Scheim. Paperback versions have 624 pages and cost 4.95 US bux.
This is probably the best single source on "the conspiracy" by our governent
to work with the Mob to take over the U.S.A. and run it for their personal
profit.
Chapter 21 "More Assassinations"
Documents how the Mob killed Martin Luther/Malcom X because the two had
begun to expose how much the Mob profitted off of ghetto Blacks by
selling drugs to the poor People!
Chapter 22 "Richard Nixon and the Mob."
This chapter documents a multitude of conections between Nixon and
the Mob/Hoffa/Teamsters/and relatives of such.
(in my opinion, Nixon was one of the fuckin greasyest, slimyest, scum
buckets who pretended to work for the People as a "politician" -
- next to Rea-gun and Bush-wacker of course!)
Chapter 23 "The Reagan Administration"
Obviously deals with CIA/Mob connections that Reagan and his cronies like
G.Bush had in those 8 years of blood sucking!
And now for a quote from page 257 of "Contract On America" (read it and weep)
"Organized crime involves itself in the life of every single human being.
It causes prices to be raised; it affects your pocketbook when you go to a
laundry or dry cleaner; the price you pay for food in the market. I have
been involved in and know of bad meat being purchased, unfit for human
consumption, that has been converted into salami in delicatessens and
forced to be sold through grocery stores...
When I testified about Mr DeCarlo, I, too, had the native feel of what
organized crime was.
I saw photographs of graves dug in New Jersey, with over 35 bodies over
a period of years, melted with lye. I sat and heard the voices at dinner
talking over murdering a 12-year-old child and burying bodies in New Jersey...
Narcotics, manipulation of businesses that cause prices to spiral, we can
go on for a long, long time. . . .It goes on and on.
Mob defector Gerald Zelmanowitz, testifying
in 1973 before a U.S. Senate committee"
BUSH & THE MOB:
page 594 states "Gelli is also "very well aquainted with Vice-President-Bush."
(in Mobese this translates to "the two fuckin worked together")
page367 states "On August 2, 1980, as resort-bound Italian and foreign tourists
crowded Italy's Bologna R.R. station, a massive bomb ripped through a waiting
room. The explosion left 85 dead and 200 others injured. It was the worst
terrorist strike in postwar Europe....
....Another defendent in the pending trial(on the bombing) is P2
grandmaster Licio Gelli, now a fugitive believed to be hiding in S Amerika.
In 1981, shortly before fleeing multiple criminal indictments, Gelli had
been an honored guest at Reagan's inaugural ball...
...when police raided Gelli's villa in 1981...they found an exchange of
letters between Gelli and Guarino discussing ways to help "our brother
Michele," refering to Sindona, another P2 member. Sindona, who had curried the
Italian-American vote for Nixon as Guarino did for Reagan, was then on trial
in New York. Gelli also wrote a letter of support to Reagan offering to ensure
favorable coverage for him in the Italian press. The powerful Italian used his
infuence in a major publishing empire to do exactly that....
....the president(Reagan-Bush) has countenanced the use of unsavory
partnerships and methods to further a political agenda. Moreover, two policy
developments of his presidency find disturbing counterparts in Mob ideology and
perhaps reflect traces of the Mob's insidious, post-assassination influence on:
1) A classic mob scam is to assume control of a thriving business and drain
its wealth through massive loans based on its previoously good finacial
standing. During Reagan's 2 terms, Amerikans have been steered along in an orgy
of consumption that has tripled the national debt from $645 billion to
$2 trillion and turned the world's largest creditor nation into the world's
largest debtor.
2) Organized crime's "ultimate solution to everything is to kill somebody,"
as one defector observed. During the early years of Reagan's presidency,
military force became the prime instrument of U.S. foreign policy. Patterned
after a percieved Soviet menace and financed by the ballooning deficit, the
biggest peacetime weapons buildup in U.S. history was conducted. This obsessive
reliance on weaponry was no better exhibited than in the 1985 covert U.S. arms
sale to Iran - obstensibly a good-will gesture - while that nation was known
to be sponsoring terrorism against Amerikan citizens."
Borrow or buy this book and learn even more! It has pictures, and it seems as
though every other sentence is documented with footnotes referencing hard core
sources!
_____
PART III:
*** NEW DRUGWAR COUNTERINSURGENCY MANUAL - "DEEP COVER": ***
"Deep Cover", by Michael Levine (an expose of the
phony drug war by a former undercover operative)
is out in paperback for $6.00. Seems pretty good
reading, and should provide lots of ammunition for
those of us trying to end this "drug war" madness.
(Standard plug: legalized drugs could bring in on
the order of $100 *BILLION* a year in tax revenues,
the best chance to reduce the deficit and pull us
out of the recession. Currently that money is going
overseas to 3rd world drug producers.)
Quote from the book: " ... the secret agencies that
really pull the strings of foreign policy believe that
our two-hundred-BILLION-dollar-a-year drug habit is a
necessary subsidy to keep the millions of poor in Third
World countries from turning to communism ..."
"Once lead the American people into war, and they'll forget there
ever was such a thing as tolerance. To fight you must be brutal
and ruthless, and the spirit of ruthless brutality will enter into
every fiber of our national life ..." --- President Woodrow Wilson
----
PART IV:
ILLUMINATI DIRECTLY LINKED TO CURRENT WORLD EVENTS BY VICTORY CHART:
Hell, I'm Jewish, but it sure as hell to me looks like international
banking is a Religious plot to rule the world. After all, the
major International Banks are owned by three Jewish families, the
Rosenthauls, the Rockefellers, and the Rothschilds! New York City was
owned by 'em until the Japs bought them out! Read a book by a former
Moussad operative(Israeli SS) called "Moussad" to become more enlightened about
this matter! And order the best single source on the Illuminati for *FREE*
by asking for the "Rise and Power of the International Bankers" chart from:
VICTORY BAPTIST CHURCH
900 46TH AVENUE
EAST MOLINE, IL 61244
(Summary of just one-hundredth of the chart is found at end of this document.)
Jayne's book and I&O Publishing out of Boulder City Nevada will illustrate that
whenever a bunch of religious fanatics do something, they ruin things for all
others. Take the Pope's overpopulation of the earth for example, or the
crusades, or the Koran's evil followers in Arabia. Every time We the People
are left holding the bag naked. I say lets drop the bag in the dumpster. Ditch
religion forever and think for yourself damn-it! I only include this church
literature cause they are involved with the Freedom Movement who, yes, are a
little fanatical, but they are the only ones around who will stand up to
the B.S. that has suppressed so many others, and are the only ones who dare
expose the Illuminati and live to talk about it!
NOW FOR THE SUM OF A MAN'S KNOWLEDGE ABOUT THE ILLUMINATI:
These folks are more secret than Moussad(the Israeli SS) who is the
undisputed ultimate "secret agent men/women" experts of the world.
Therefore, you will find no reliable sources of information on them.
They like to frequent Swiss chalets and spend their loot on good
spirits and women. Oh, they do not have women for members.
Their associates are in international banking and are world leaders of
organized crime. But they are not ever necessarily top world leaders or
top CEO's, but they completely influence the major decisions of most
multinational companies and world leaders.
They are always there but you never see them:
Once, at a coffee shop in an affluent Denver 'burb in the foothills, I ran
across a man of this general authority. With a German accent, he had told
me that if I were to sit at a table, I was to buy coffee, but he did not
work there. He wore a $2,000 Swiss pilot's chronometer on one wrist. His
clothes cost at least half of the watch and he wasn't wearing a suit!
We were just waiting for the rain to stop and I could not believe my ears
when he tried to shoo me away from my dry spot under the curbside table's
canvas awning. I thought carefully and then replied something to the likes
of "The Illuminati would always like for me to be recirculating my money
back into their economic system of manipulation."
As soon as I said this, never mind the weather, he took off. He was a
strong 50 year old Aryan, about 6'1", 200lbs, to my 5'11", 150lbs
but he looked extremely agitated before he left. I could tell he was not
physically scared of me. In fact, he knew all too well what I was saying about
the global economic policies of his "associates" in the Illuminati. You see,
they have so effectively cut off information about even their existence, that
it will damn near give one of them vapor lock if you call their hand!
(Notice that Europe houses the ultimate banks next to Bavaria on Swiss soil,
and note how the Swiss are given International Neutrality to boot so that
the Secret accounts will be safe and stable! I would wager a month of Sundays
that money in a Swiss account is backed by real gold too!)
Bush belongs to the "Skull and Crossbones Club" which is the American
Equivalent of the Illuninati. You have to study at Yale and be in a family that
is part of the old boy system and then you might get in. It is highly secret,
but really is much more well known than the Illuminati. It exists to perpetuate
the existence of the old boys in Amerika, much as the Illuminati does the same
in Europe.
Amazingly, the only reference to the Illuminati that I have ever seen other
than in a few paper back books on mysticism called the Trilogy which actually
are probably right 50% of the time, was in the Unabridged Webster's Dictionary,
where all it dares say is that they were "the members of an anticlerical,
deistic, republican society founded in 1776 by Adam Weishaupt, professor of
law at Ingolstadt in Bavaria. It was suppressed by the Bavarian government in
1785: called also the Order of the Illuminati."
I suppose they had to go deep undercover, much more so than even the Mafia.
This might explain the agitation I evoked in the fellow!
It might be fun to know more about these fellow, but you now know all you
need to know, except their names. Search and destroy!
The Illuminati was formed by the creme de la creme of Europe's most powerful
aristocrats to perpetuate its iron grip on the peasants, to maintain the status
quo, to keep the rich rich, and the poor masses poor.
J.Jaynes book, "The Origin of Consciousness in the Breakdown Of the Bicameral
Mind," explains how for thousands of years, the masses have been hypnotized
into not thinking for themselves by Illuminati like leaders who use mysticism,
religion, music and propaganda to accomplish this. A person can still do very
hard organized work for these manipulators and actually still not ever think in
a non-bicameral or enlightened state of mind. This has allowed the world's
sadistic, oppressive leaders to screw us for 1000's of years.
It appears that the illuminati had penetrated U.S. government from the
beginning. The Illuminati was formed in 1776 by a lawyer in Bavaria.
These esquires snaked their way into the womb of Amerika from the getgo!
I find it revolting and an infinite slap in the face to see lawyers' own symbol
of economic repression on the very money we get shafted for by these leach
lawyers daily.
(In 1776 The European Economic Community (the aristocracy) worried quite
a bit when WE told England to get the Hell outta here, so naturally they
regrouped and formed the Illuminati to deal with US and prevent future colonies
from being so eager to toss the king's tea taxes overboard!)
ACCORDING TO THE RISE AND POWER OF THE INTERNATIONAL BANKERS CHART:
Beginning in 1795, five of the Rothschild's sons were sent to five different
European countries, were the Illuminati/World Banker scam started to spread
in Germany, Vienna, England, Italy, and France. This put them in the top five
countries, where they soon rose to positions of immense power and influence.
Thus the manipulation of global affairs began!
The 10 commandments of the Illuminati are:
1 - Abolish land ownership.
2 - Taxation of the people.
3 - Abolish all rights of inheritance.
4 - Confiscate lands and properties of all rebels.
5 - Centralize credit - Create National banks.
6 - Control transportation and communication.
7 - State owned factories.
8 - Equal liability of all to labor.
9 - Distribution of the population.
10 - Free education to all in "public" schools.
(Sounds like bigbro ta me, Booboo!)
The chart shows that in 1798 the following 3 things occurred:
1 - Washington warned of the danger of the Illuminati.
2 - Jefferson wrote to John Adams stating that he agreed with
him that the international bankers were more powerful and
dangerous than standing armies.
3 - Professor John Robinson exposed it in his book, " PROOFS OF
A CONSPIRACY."
And then in 1836, Andrew Jackson abolished the central bank. If this
measure had not been taken, America would have fallen to the
International bankers at this time.
NOTE: the last 40 lines were 1% of the data on the chart showing the
Illuminati's links and activities as "Control," which appears
to be their new name. Get the damn chart - I don't care what
you think of Baptists, these folks are just helping us now!
?
* * * * * * * * * * * * * * *
* PLEASE COPY AND DISTRIBUTE THIS TO AS MANY PEOPLE AS POSSIBLE !!! *
* SEND A COPY TO YOUR POLICE, GOVERNORS, LEGISLATORS, RELATIVES !!! *
* * * * * * * * * * * * * * *
____________________
| __ .__ |
| |__| |__| " |
| |
| DON'T TREAD ON ME! |
|____________________|

588
txt_files/bor-stat.txt Normal file
View File

@ -0,0 +1,588 @@
Feel free to copy this article far and wide, but please
keep my name and this sentence on it.
The Bill of Rights, a Status Report
by Eric Postpischil
4 September 1990
6 Hamlett Drive, Apt. 17
Nashua, NH 03062
edp@jareth.enet.dec.com
How many rights do you have? You should check, because it
might not be as many today as it was a few years ago, or
even a few months ago. Some people I talk to are not
concerned that police will execute a search warrant without
knocking or that they set up roadblocks and stop and
interrogate innocent citizens. They do not regard these as
great infringements on their rights. But when you put
current events together, there is information that may be
surprising to people who have not yet been concerned: The
amount of the Bill of Rights that is under attack is
alarming.
Let's take a look at the Bill of Rights and see which
aspects are being pushed on or threatened. The point here
is not the degree of each attack or its rightness or
wrongness, but the sheer number of rights that are under
attack.
Amendment I
Congress shall make no law respecting an
establishment of religion, or prohibiting the
free exercise thereof; or abridging the freedom
of speech, or of the press; or the right of the
people peaceably to assemble, and to petition the
Government for a redress of grievances.
ESTABLISHING RELIGION: While campaigning for his first
term, George Bush said "I don't know that atheists should
be considered as citizens, nor should they be considered
patriots." Bush has not retracted, commented on, or
clarified this statement, in spite of requests to do so.
According to Bush, this is one nation under God. And
apparently if you are not within Bush's religious beliefs,
you are not a citizen. Federal, state, and local
governments also promote a particular religion (or,
occasionally, religions) by spending public money on
religious displays.
FREE EXERCISE OF RELIGION: Robert Newmeyer and Glenn
Braunstein were jailed in 1988 for refusing to stand in
respect for a judge. Braunstein says the tradition of
rising in court started decades ago when judges entered
carrying Bibles. Since judges no longer carry Bibles,
Braunstein says there is no reason to stand -- and his
Bible tells him to honor no other God. For this religious
practice, Newmeyer and Braunstein were jailed and are now
suing.
FREE SPEECH: We find that technology has given the
government an excuse to interfere with free speech.
Claiming that radio frequencies are a limited resource, the
government tells broadcasters what to say (such as news and
public and local service programming) and what not to say
(obscenity, as defined by the Federal Communications
Commission [FCC]). The FCC is investigating Boston PBS
station WGBH-TV for broadcasting photographs from the
Mapplethorpe exhibit.
FREE SPEECH: There are also laws to limit political
statements and contributions to political activities. In
1985, the Michigan Chamber of Commerce wanted to take out
an advertisement supporting a candidate in the state house
of representatives. But a 1976 Michigan law prohibits a
corporation from using its general treasury funds to make
independent expenditures in a political campaign. In
March, the Supreme Court upheld that law. According to
dissenting Justice Kennedy, it is now a felony in Michigan
for the Sierra Club, the American Civil Liberties Union, or
the Chamber of Commerce to advise the public how a
candidate voted on issues of urgent concern to their
members.
FREE PRESS: As in speech, technology has provided another
excuse for government intrusion in the press. If you
distribute a magazine electronically and do not print
copies, the government doesn't consider you a press and
does not give you the same protections courts have extended
to printed news. The equipment used to publish Phrack, a
worldwide electronic magazine about phones and hacking, was
confiscated after publishing a document copied from a Bell
South computer entitled "A Bell South Standard Practice
(BSP) 660-225-104SV Control Office Administration of
Enhanced 911 Services for Special Services and Major
Account Centers, March, 1988." All of the information in
this document was publicly available from Bell South in
other documents. The government has not alleged that the
publisher of Phrack, Craig Neidorf, was involved with or
participated in the copying of the document. Also, the
person who copied this document from telephone company
computers placed a copy on a bulletin board run by Rich
Andrews. Andrews forwarded a copy to AT&T officials and
cooperated with authorities fully. In return, the Secret
Service (SS) confiscated Andrews' computer along with all
the mail and data that were on it. Andrews was not charged
with any crime.
FREE PRESS: In another incident that would be comical if
it were not true, on March 1 the SS ransacked the offices
of Steve Jackson Games (SJG); irreparably damaged property;
and confiscated three computers, two laser printers,
several hard disks, and many boxes of paper and floppy
disks. The target of the SS operation was to seize all
copies of a game of fiction called GURPS Cyberpunk. The
Cyberpunk game contains fictitious break-ins in a
futuristic world, with no technical information of actual
use with real computers, nor is it played on computers.
The SS never filed any charges against SJG but still
refused to return confiscated property.
PEACEABLE ASSEMBLY: The right to assemble peaceably is no
longer free -- you have to get a permit. Even that is not
enough; some officials have to be sued before they realize
their reasons for denying a permit are not Constitutional.
PEACEABLE ASSEMBLY: In Alexandria, Virginia, there is a
law that prohibits people from loitering for more than
seven minutes and exchanging small objects. Punishment is
two years in jail. Consider the scene in jail: "What'd
you do?" "I was waiting at a bus stop and gave a guy a
cigarette." This is not an impossible occurrence: In
Pittsburgh, Eugene Tyler, 15, has been ordered away from
bus stops by police officers. Sherman Jones, also 15, was
accosted with a police officer's hands around his neck
after putting the last bit of pizza crust into his mouth.
The police suspected him of hiding drugs.
PETITION FOR REDRESS OF GRIEVANCES: Rounding out the
attacks on the first amendment, there is a sword hanging
over the right to petition for redress of grievances.
House Resolution 4079, the National Drug and Crime
Emergency Act, tries to "modify" the right to habeas
corpus. It sets time limits on the right of people in
custody to petition for redress and also limits the courts
in which such an appeal may be heard.
Amendment II
A well regulated Militia, being necessary to the
security of a free State, the right of the people
to keep and bear Arms, shall not be infringed.
RIGHT TO BEAR ARMS: This amendment is so commonly
challenged that the movement has its own name: gun
control. Legislation banning various types of weapons is
supported with the claim that the weapons are not for
"legitimate" sporting purposes. This is a perversion of
the right to bear arms for two reasons. First, the basis
of freedom is not that permission to do legitimate things
is granted to the people, but rather that the government is
empowered to do a limited number of legitimate things --
everything else people are free to do; they do not need to
justify their choices. Second, should the need for defense
arise, it will not be hordes of deer that the security of a
free state needs to be defended from. Defense would be
needed against humans, whether external invaders or
internal oppressors. It is an unfortunate fact of life
that the guns that would be needed to defend the security
of a state are guns to attack people, not guns for sporting
purposes.
Firearms regulations also empower local officials, such as
police chiefs, to grant or deny permits. This results in
towns where only friends of people in the right places are
granted permits, or towns where women are generally denied
the right to carry a weapon for self-defense.
Amendment III
No Soldier shall, in time of peace be quartered
in any house, without the consent of the Owner,
nor in time of war, but in a manner to be
prescribed by law.
QUARTERING SOLDIERS: This amendment is fairly clean so
far, but it is not entirely safe. Recently, 200 troops in
camouflage dress with M-16s and helicopters swept through
Kings Ridge National Forest in Humboldt County, California.
In the process of searching for marijuana plants for four
days, soldiers assaulted people on private land with M-16s
and barred them from their own property. This might not be
a direct hit on the third amendment, but the disregard for
private property is uncomfortably close.
Amendment IV
The right of the people to be secure in their
persons, houses, papers and effects, against
unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be seized.
RIGHT TO BE SECURE IN PERSONS, HOUSES, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: The RICO law
is making a mockery of the right to be secure from seizure.
Entire stores of books or videotapes have been confiscated
based upon the presence of some sexually explicit items.
Bars, restaurants, or houses are taken from the owners
because employees or tenants sold drugs. In Volusia
County, Florida, Sheriff Robert Vogel and his officers stop
automobiles for contrived violations. If large amounts of
cash are found, the police confiscate it on the PRESUMPTION
that it is drug money -- even if there is no other evidence
and no charges are filed against the car's occupants. The
victims can get their money back only if they prove the
money was obtained legally. One couple got their money
back by proving it was an insurance settlement. Two other
men who tried to get their two thousand dollars back were
denied by the Florida courts.
RIGHT TO BE SECURE IN PERSONS, HOUSES, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: A new law goes
into effect in Oklahoma on January 1, 1991. All property,
real and personal, is taxable, and citizens are required to
list all their personal property for tax assessors,
including household furniture, gold and silver plate,
musical instruments, watches, jewelry, and personal,
private, or professional libraries. If a citizen refuses
to list their property or is suspected of not listing
something, the law directs the assessor to visit and enter
the premises, getting a search warrant if necessary. Being
required to tell the state everything you own is not being
secure in one's home and effects.
NO WARRANTS SHALL ISSUE, BUT UPON PROBABLE CAUSE, SUPPORTED
BY OATH OR AFFIRMATION: As a supporting oath or
affirmation, reports of anonymous informants are accepted.
This practice has been condoned by the Supreme Court.
PARTICULARLY DESCRIBING THE PLACE TO BE SEARCHED AND
PERSONS OR THINGS TO BE SEIZED: Today's warrants do not
particularly describe the things to be seized -- they list
things that might be present. For example, if police are
making a drug raid, they will list weapons as things to be
searched for and seized. This is done not because the
police know of any weapons and can particularly describe
them, but because they allege people with drugs often have
weapons.
Both of the above apply to the warrant the Hudson, New
Hampshire, police used when they broke down Bruce Lavoie's
door at 5 a.m. with guns drawn and shot and killed him.
The warrant claimed information from an anonymous
informant, and it said, among other things, that guns were
to be seized. The mention of guns in the warrant was used
as reason to enter with guns drawn. Bruce Lavoie had no
guns. Bruce Lavoie was not secure from unreasonable search
and seizure -- nor is anybody else.
Other infringements on the fourth amendment include
roadblocks and the Boston Police detention of people based
on colors they are wearing (supposedly indicating gang
membership). And in Pittsburgh again, Eugene Tyler was
once searched because he was wearing sweat pants and a
plaid shirt -- police told him they heard many drug dealers
at that time were wearing sweat pants and plaid shirts.
Amendment V
No person shall be held to answer for a capital,
or otherwise infamous crime, unless on a
presentment or indictment of a Grand Jury, except
in cases arising in the land or naval forces, or
in the Militia, when in actual service in time of
War or public danger; nor shall any person be
subject to the same offence to be twice put in
jeopardy of life or limb; nor shall be compelled
in any criminal case to be a witness against
himself, nor be deprived of life, liberty, or
property, without due process of law; nor shall
private property be taken for public use without
just compensation.
INDICTMENT OF A GRAND JURY: Kevin Bjornson has been
proprietor of Hydro-Tech for nearly a decade and is a
leading authority on hydroponic technology and cultivation.
On October 26, 1989, both locations of Hydro-Tech were
raided by the Drug Enforcement Administration. National
Drug Control Policy Director William Bennett has declared
that some indoor lighting and hydroponic equipment is
purchased by marijuana growers, so retailers and
wholesalers of such equipment are drug profiteers and
co-conspirators. Bjornson was not charged with any crime,
nor subpoenaed, issued a warrant, or arrested. No illegal
substances were found on his premises. Federal officials
were unable to convince grand juries to indict Bjornson.
By February, they had called scores of witnesses and
recalled many two or three times, but none of the grand
juries they convened decided there was reason to criminally
prosecute Bjornson. In spite of that, as of March, his
bank accounts were still frozen and none of the inventories
or records had been returned. Grand juries refused to
indict Bjornson, but the government is still penalizing
him.
TWICE PUT IN JEOPARDY OF LIFE OR LIMB: Members of the
McMartin family in California have been tried two or three
times for child abuse. Anthony Barnaby was tried for
murder (without evidence linking him to the crime) three
times before New Hampshire let him go.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: Oliver North
was forced to testify against himself. Congress granted
him immunity from having anything he said to them being
used as evidence against him, and then they required him to
talk. After he did so, what he said was used to find other
evidence which was used against him. The courts also play
games where you can be required to testify against yourself
if you testify at all.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: In the New York
Central Park assault case, three people were found guilty
of assault. But there was no physical evidence linking
them to the crime; semen did not match any of the
defendants. The only evidence the state had was
confessions. To obtain these confessions, the police
questioned a 15-year old without a parent present -- which
is illegal under New York state law. Police also refused
to let the subject's Big Brother, an attorney for the
Federal government, see him during questioning. Police
screamed "You better tell us what we want to hear and
cooperate or you are going to jail," at 14-year-old Antron
McCray, according to Bobby McCray, his father. Antron
McCray "confessed" after his father told him to, so that
police would release him. These people were coerced into
bearing witness against themselves, and those confessions
were used to convict them.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: Your answers to
Census questions are required by law, with a $100 penalty
for each question not answered. But people have been
evicted for giving honest Census answers. According to the
General Accounting Office, one of the most frequent ways
city governments use census information is to detect
illegal two-family dwellings. This has happened in
Montgomery County, Maryland; Pullman, Washington; and Long
Island, New York. The August 8, 1989, Wall Street Journal
reports this and other ways Census answers have been used
against the answerers.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: Drug tests are
being required from more and more people, even when there
is no probable cause, no accident, and no suspicion of drug
use. Requiring people to take drug tests compels them to
provide evidence against themselves.
DEPRIVED OF LIFE, LIBERTY, OR PROPERTY WITHOUT DUE PROCESS
OF LAW: This clause is violated on each of the items life,
liberty, and property. Incidents including such violations
are described elsewhere in this article. Here are two
more: On March 26, 1987, in Jeffersontown, Kentucky,
Jeffrey Miles was killed by police officer John Rucker, who
was looking for a suspected drug dealer. Rucker had been
sent to the wrong house; Miles was not wanted by police.
He received no due process. In Detroit, $4,834 was seized
from a grocery store after dogs detected traces of cocaine
on three one-dollar bills in a cash register.
PRIVATE PROPERTY TAKEN FOR PUBLIC USE WITHOUT JUST
COMPENSATION: RICO is shredding this aspect of the Bill of
Rights. The money confiscated by Sheriff Vogel goes
directly into Vogel's budget; it is not regulated by the
legislature. Federal and local governments seize and
auction boats, buildings, and other property. Under RICO,
the government is seizing property without due process.
The victims are required to prove not only that they are
not guilty of a crime, but that they are entitled to their
property. Otherwise, the government auctions off the
property and keeps the proceeds.
Amendment VI
In all criminal prosecutions, the accused shall
enjoy the right to a speedy and public trial, by
an impartial jury of the State and district
wherein the crime shall have been committed,
which district shall have been previously
ascertained by law, and to be informed of the
nature and cause of the accusation; to be
confronted with the witnesses against him; to
have compulsory process for obtaining Witnesses
in his favor, and to have the assistance of
counsel for his defence.
THE RIGHT TO A SPEEDY AND PUBLIC TRIAL: Surprisingly, the
right to a public trial is under attack. When Marion Barry
was being tried, the prosecution attempted to bar Louis
Farrakhan and George Stallings from the gallery. This
request was based on an allegation that they would send
silent and "impermissible messages" to the jurors. The
judge initially granted this request. One might argue that
the whole point of a public trial is to send a message to
all the participants: The message is that the public is
watching; the trial had better be fair.
BY AN IMPARTIAL JURY: The government does not even honor
the right to trial by an impartial jury. US District Judge
Edward Rafeedie is investigating improper influence on
jurors by US marshals in the Enrique Camarena case. US
marshals apparently illegally communicated with jurors
during deliberations.
OF THE STATE AND DISTRICT WHEREIN THE CRIME SHALL HAVE BEEN
COMMITTED: This is incredible, but Manuel Noriega is being
tried so far away from the place where he is alleged to
have committed crimes that the United States had to invade
another country and overturn a government to get him. Nor
is this a unique occurrence; in a matter separate from the
Camarena case, Judge Rafeedie was asked to dismiss charges
against Mexican gynecologist Dr. Humberto Alvarez Machain
on the grounds that the doctor was illegally abducted from
his Guadalajara office in April and turned over to US
authorities.
TO BE INFORMED OF THE NATURE AND CAUSE OF THE ACCUSATION:
Steve Jackson Games, nearly put out of business by the raid
described previously, has been stonewalled by the SS. "For
the past month or so these guys have been insisting the
book wasn't the target of the raid, but they don't say what
the target was, or why they were critical of the book, or
why they won't give it back," Steve Jackson says. "They
have repeatedly denied we're targets but don't explain why
we've been made victims." Attorneys for SJG tried to find
out the basis for the search warrant that led to the raid
on SJG. But the application for that warrant was sealed by
order of the court and remained sealed at last report, in
July. Not only has the SS taken property and nearly
destroyed a publisher, it will not even explain the nature
and cause of the accusations that led to the raid.
TO BE CONFRONTED WITH THE WITNESSES AGAINST HIM: The courts
are beginning to play fast and loose with the right to
confront witnesses. Watch out for anonymous witnesses and
videotaped testimony.
TO HAVE COMPULSORY PROCESS FOR OBTAINING WITNESSES: Ronald
Reagan resisted submitting to subpoena and answering
questions about Irangate, claiming matters of national
security and executive privilege. A judge had to dismiss
some charges against Irangate participants because the
government refused to provide information subpoenaed by the
defendants. And one wonders if the government would go
to the same lengths to obtain witnesses for Manuel Noriega
as it did to capture him.
TO HAVE THE ASSISTANCE OF COUNSEL: The right to assistance
of counsel took a hit recently. Connecticut Judge Joseph
Sylvester is refusing to assign public defenders to people
ACCUSED of drug-related crimes, including drunk driving.
TO HAVE THE ASSISTANCE OF COUNSEL: RICO is also affecting
the right to have the assistance of counsel. The
government confiscates the money of an accused person,
which leaves them unable to hire attorneys. The IRS has
served summonses nationwide to defense attorneys, demanding
the names of clients who paid cash for fees exceeding
$10,000.
Amendment VII
In Suits at common law, where the value in
controversy shall exceed twenty dollars, the
right of trial by jury shall be preserved, and no
fact tried by a jury, shall be otherwise
reexamined in any Court of the United States,
than according to the rules of common law.
RIGHT OF TRIAL BY JURY IN SUITS AT COMMON LAW: This is a
simple right; so far the government has not felt threatened
by it and has not made attacks on it that I am aware of.
This is our only remaining safe haven in the Bill of Rights.
Amendment VIII
Excessive bail shall not be required, nor
excessive fines imposed, nor cruel and unusual
punishments inflicted.
EXCESSIVE BAIL AND FINES: Tallahatchie County in
Mississippi charges ten dollars a day to each person who
spends time in the jail, regardless of the length of stay
or the outcome of their trial. This means innocent people
are forced to pay. Marvin Willis was stuck in jail for 90
days trying to raise $2,500 bail on an assault charge. But
after he made that bail, he was kept imprisoned because he
could not pay the $900 rent Tallahatchie demanded. Nine
former inmates are suing the county for this practice.
CRUEL AND UNUSUAL PUNISHMENTS: House Resolution 4079
sticks its nose in here too: "... a Federal court shall
not hold prison or jail crowding unconstitutional under the
eighth amendment except to the extent that an individual
plaintiff inmate proves that the crowding causes the
infliction of cruel and unusual punishment of that
inmate."
CRUEL AND UNUSUAL PUNISHMENTS: A life sentence for selling
a quarter of a gram of cocaine for $20 -- that is what
Ricky Isom was sentenced to in February in Cobb County,
Georgia. It was Isom's second conviction in two years, and
state law imposes a mandatory sentence. Even the judge
pronouncing the sentence thinks it is cruel; Judge Tom
Cauthorn expressed grave reservations before sentencing
Isom and Douglas Rucks (convicted of selling 3.5 grams of
cocaine in a separate but similar case). Judge Cauthorn
called the sentences "Draconian."
Amendment IX
The enumeration in the Constitution, of certain
rights, shall not be construed to deny or
disparage others retained by the people.
OTHER RIGHTS RETAINED BY THE PEOPLE: This amendment is so
weak today that I will ask not what infringements there are
on it but rather what exercise of it exists at all? What
law can you appeal to a court to find you not guilty of
violating because the law denies a right retained by you?
Amendment X
The powers not delegated to the United States by
the Constitution, nor prohibited by it to the
States, are reserved to the States respectively,
or to the people.
POWERS RESERVED TO THE STATES OR THE PEOPLE: This
amendment is also weak, although it is not so nonexistent
as the ninth amendment. But few states set their own speed
limits or drinking age limits. Today, we mostly think of
this country as the -- singular -- United States, rather
than a collection of states. This concentration of power
detaches laws from the desires of people -- and even of
states. House Resolution 4079 crops up again here -- it
uses financial incentives to get states to set specific
penalties for certain crimes. Making their own laws
certainly must be considered a right of the states, and
this right is being infringed upon.
Out of ten amendments, nine are under attack, most of them
under multiple attacks of different natures, and some of
them under a barrage. If this much of the Bill of Rights
is threatened, how can you be sure your rights are safe? A
right has to be there when you need it. Like insurance,
you cannot afford to wait until you need it and then set
about procuring it or ensuring it is available. Assurance
must be made in advance.
The bottom line here is that your rights are not safe. You
do not know when one of your rights will be violated. A
number of rights protect accused persons, and you may think
it is not important to protect the rights of criminals.
But if a right is not there for people accused of crimes,
it will not be there when you need it. With the Bill of
Rights in the sad condition described above, nobody can be
confident they will be able to exercise the rights to which
they are justly entitled. To preserve our rights for
ourselves in the future, we must defend them for everybody
today.

749
txt_files/brainwsh.txt Normal file
View File

@ -0,0 +1,749 @@
NOTE: This is a report on Government and military techniques, notterrorist!
B R A I N W A S H I N G
By Lorenzo Saint Dubois
The report that follows is a condensation of a study by training experts of
the important information available on this subject.
BACKGROUND
Brainwashing, as a technique, has been used for centuries and is no mystery
to psychologists. In this sense, brainwashing means involuntary re-education
of basic beliefs and values. All people are being re-educated continually.
New information changes one's beliefs.
Everyone has experienced to some degree the conflict that ensues when new
information is not consistent with prior belief.
The experience of the brainwashed individual differs in that the inconsistent
information is forced upon the individual under controlled conditions after
the possibility of critical judgment has been removed by a variety of
methods.
There is no question that an individual can be broken psychologically by
captors with knowledge and willingness to persist in techniques aimed at
deliberately destroying the integration of a personality. Although it is
probable that everyone reduced to such a confused, disoriented state will
respond to the introduction of new beliefs, this cannot be stated
dogmatically.
HUMAN CONTROL AND REACTION TO CONTROL
There are progressive steps in exercising control over an individual and
changing his behaviour and personality integration.
The following five steps are typical of behaviour changes in any controlled
individual:
1. Making the individual aware of control is the first stage in changing his
behaviour. A small child is made aware of the physical and psychological
control of his parents and quickly recognizes that an overwhelming force
must be reckoned with.
So a controlled adult comes to recognize the overwhelming powers of the
state and the impersonal, incarcerative machinery in which he is enmeshed.
The individual recognizes that definite limits have been put upon the ways
he can respond.
2. Realization of his complete dependence upon the controlling system is a
major factor in the controlling of his behaviour.
The controlled adult is forced to accept the fact that food, tobacco,
praise and the only social contact that he will get come from the very
interrogator who exercises control over him.
3. The awareness of control and recognition of dependence result in causing
internal conflict and breakdown of previous patterns of behaviour.
Although this transition can be relatively mild in the case of a child,
it is almost invariably severe for the adult undergoing brainwashing.
Only an individual who holds his values lightly can change them easily.
Since the brainwasher/interrogators aim to have the individuals undergo
profound emotional change, they force their victims to seek out painfully
what is desired by the controlling individual. During this period the
victim is likely to have a mental breakdown characterized by delusions
and hallucinations.
4. Discovery that there is an acceptable solution to his problem is the
first stage of reducing the individuals conflict.
It is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror of
internal conflict would cease and that perhaps they would not be driven
insane.
It is at this point that they are prepared to make major changes in their
value system. This is an automatic rather than voluntary choice. They have
lost their ability to be critical.
5. Reintegration of values and identification with the controlling system is
the final stage in changing the behaviour of the controlled individual.
A child who has learned a new, socially desirable behaviour demonstrates
its importance by attempting to as apt the new behaviour to a variety of
other situations. Similar states in the brainwashed adult are pitiful.
His new value-system, his manner of perceiving, organizing, and giving
meaning to events, is virtually independent of his former value system.
He is no longer capable of thinking or speaking in concepts other than
those he has adopted. He tends to identify by expressing thanks to his
captors for helping him see the light.
Anyone willing to use known principles of control and reactions to
control and capable of demonstrating the patience needed in raising a
child can probably achieve successful brainwashing.
CONTROL TECHNIQUES AND THEIR EFFECTS
A description of usual communist control techniques follows.
INTERROGATION
There are at least two ways in which interrogation is used:
A. Elicitation, which is designed to get the individual to surrender
protected information, is a form of interrogation. One major difference
between elicitation and interrogation used to achieve brainwashing is that
the mind of the individual must be kept clear to permit coherent,
undistorted disclosure of protected information.
B. Elicitation for the purpose of brainwashing consists of questioning,
argument, indoctrination, threats, cajolery, praise, hostility and a
variety of other pressures. The aim of this interrogation is to hasten the
breakdown of the individual's value system and to encourage the substitution
of a different valuesystem.
The procurement of protected information is secondary and is used as a
device to increase pressure upon the individual. The term interrogation in
this article will refer in general, to this type. The interrogator is the
individual who conducts this type of interrogation and who controls the
administration of the other pressures. He is the protagonist against whom
the victim develops his conflict and upon whom the victim develops a state
of dependency as he seeks some solution to his conflict.
PHYSICAL TORTURE & THREATS OF TORTURE
Two types of physical torture are distinguishable more by their psychological
effect in inducing conflict than by the degree of painfulness:
A. The first type is one in which the victim has a passive role in the pain
inflicted on him (e.g., beatings). His conflict involves the decision of
whether or not to give in to demands in order to avoid further pain.
Generally, brutality of this type was not found to achieve the desired
results. Threats of torture were found more effective, as fear of pain
causes greater conflict within the individual than does pain itself.
B. The second type of torture is represented by requiring the individual to
stand in one spot for several hours or assume some other pain-inducing
position. Such a requirement often engenders in the individual a
determination to stick it out. This internal act of resistance provide a
feeling of moral superiority at first. As time passes and his pain mounts,
the individual becomes aware that it is his own original determination to
resist that is causing the continuance of pain.
A conflict develops within the individual between his moral determination and
his desire to collapse and discontinue the pain. It is this extra internal
conflict, in addition to the conflict over whether or not to give in to the
demands made of him, that tends to make this method of torture more
effective in the breakdown of the individual personality.
ISOLATION
Individual differences in reaction to isolation are probably greater than to
any other method. Some individuals appear to be able to withstand prolonged
periods of isolation without deleterious effects, while a relatively short
period of isolation reduces others to the verge of psychosis. Reaction
varies with the conditions of the isolation cell.
Some sources have indicated a strong reaction to filth and vermin, although
they had negligible reactions to the isolation. Others reacted violently to
isolation in relatively clean cells. The predominant cause of breakdown in
such situations is a lack of sensory stimulation (i.e., grayness of walls,
lack of sound, absence of social contact, etc.). Experimental subjects
exposed to this condition have reported vivid hallucinations and
overwhelming fears of losing their sanity.
CONTROL OF COMMUNICATION
This is one of the most effective methods for creating a sense of
helplessness and despair. This measure might well be considered the
cornerstone of the system of control. It consists of strict regulation of
the mail, reading materials, broadcast materials and social contact
available to the individual. The need to communicate is so great that when
the usual channels are blocked, the individual will resort to any open
channel, almost regardless of the implications of using that particular
channel.
Many POWs in Korea, whose only act of collaboration was to sign petitions
and peace appeals, defended their actions on the ground that this was the
only method of letting the outside world know they were still alive.
Many stated that their morale and fortitude would have been increased
immeasurably had leaflets of encouragement been dropped to them. When the
only contact with the outside world is via the interrogator, the prisoner
comes to develop extreme dependency on his interrogator and hence loses
another prop to his morale.
Another wrinkle in communication control is the informer system. The
recruitment of informers in POW camps discouraged communication between
inmates. POWs who feared that every act or thought of resistance would be
communicated to camp administrators, lost faith in their fellow man and
were forced to untrusting individualism. Informers are also under several
stages of brainwashing and elicitation to develop and maintain control over
the victims.
INDUCTION OF FATIGUE
This is a well-known device for breaking will power and critical powers of
judgment. Deprivation of sleep results in more intense psychological
debilitation than does any other method of engendering fatigue. They vary
their methods.
Conveyor belt interrogation that last 50-60 hours will make almost any
individual compromise, but there is danger that this will kill the victim.
It is safer to conduct interrogations of 8-10 hours at night while forcing
the prisoner to remain awake during the day. Additional interruptions in the
remaining 2-3 hours of allotted sleep quickly reduce the most resilient
individual.
Alternate administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression. Fatigue, in addition to reducing the will to resist, also
produces irritation and fear that arise from increased slips of the
tongue forgetfulness and decreased ability to maintain orderly thought
processes.
CONTROL OF FOOD, WATER AND TOBACCO
The controlled individual is made intensely aware of his dependence upon his
interrogator for the quality and quantity of his food and tobacco. The
exercise of this control usually follows a pattern.
No food and little or no water is permitted the individual for several
days prior to interrogation. When the prisoner first complains of this to
the interrogator, the latter expresses surprise at such inhumane treatment.
He makes a demand of the prisoner, if the latter complies, he receives a
good meal. If he does not, he gets a diet of unappetizing food containing
limited vitamins, minerals and calories.
This diet is supplemented occasionally by the interrogator if the prisoner
cooperates. Studies of controlled starvation indicate that the whole value-
system of the subjects underwent a change. Their irritation increased
as their ability to think clearly decreased. The control of tobacco presented
an even greater source of conflict for heavy smokers. Because tobacco is not
necessary to life, being manipulated by his craving for it can in the
individual a strong sense of guilt.
CRITICISM AND SELF-CRITICISM
There are mechanisms of thought control. Self-criticism gains its
effectiveness from the fact that although it is not a crime for a man to be
wrong, it is a major crime to be stubborn and to refuse to learn. Many
individuals feel intensely relieved in being able to share their sense of
guilt.
Those individuals however, who have adjusted to handling their guilt
internally have difficulty adapting to criticism and self-criticism. In
brainwashing, after a sufficient sense of guilt has been created in the
individual, sharing and self-criticism permit relief. The price paid for
this relief, however, is loss of individuality and increased dependency.
HYPNOSIS AND DRUGS AS CONTROLS
There is no reliable evidence of making widespread use of drugs or hypnosis
in brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and mood swings.
Other methods of control, which when used in conjunction with the basic
processes, hasten the deterioration of prisoners' sense of values and
resistance are:
A. Requiring a case history or autobiography of the prisoner provides a mine
of information for the interrogator in establishing and documenting
accusations.
B. Friendliness of the interrogator, when least expected, upsets the
prisoner's ability to maintain a critical attitude.
C. Petty demands, such as severely limiting the allotted time for use of
toilet facilities or requiring the POW to kill hundreds of flies, are
harassment methods.
D. Prisoners are often humiliated by refusing them the use of toilet
facilities during interrogation, until they soil themselves. Often
prisoners were not permitted to bathe for weeks until they felt
contemptible.
E. Conviction as a war criminal appears to be a potent factor in creating
despair in the individual. One official analysis of the pressures exerted
by the ChiComs on confessors and non-confessors to participation in
bacteriological warfare in Korea showed that actual trial and conviction
of war crimes was overwhelmingly associated with breakdown and confession.
F. Attempted elicitation of protected information at various times during
the brainwashing process diverted the individual from awareness of the
deterioration of his value-system.
The fact that, in most cases, the ChiComs did not want or need such
intelligence was not known to the prisoner. His attempts to protect
such information was made at the expense of hastening his own breakdown.
EXERCISE OF CONTROL
A SCHEDULE FOR BRAINWASHING
From the many fragmentary accounts reviewed, the following appears to be the
most likely description of what occurs during brainwashing. In the period
immediately following capture, the captors are faced with the problem of
deciding on best ways of exploitation of the prisoners.
Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. Concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological softening-up which
includes: limited unpalatable food rations, withholding of tobacco, possible
work details, severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness, limitation of sleep such as requiring a
subject to sleep with a bright light in his eyes.
The interrogation and autobiographical material, the reports of the
prisoner's behaviour in confinement and tentative personality typing by the
interrogators, provide the basis upon which exploitation plans are made.
There is a major difference between preparation for elicitation and for
brainwashing. Prisoners exploited through elicitation must retain sufficient
clarity of thought to be able to give coherent, factual accounts.
In brainwashing, on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defence, the controlled individual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes. The
most important aspect of the brainwashing process is the interrogation. The
other pressures are designed primarily to help the interrogator achieve his
goals. The following states are created systematically within the
individual. These may vary in order, but all are necessary to the
brainwashing process:
1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.
2. An initial reaction of surprise.
3. A feeling of uncertainty about what is required of him.
4. A developing feeling of dependence upon the interrogator.
5. A sense of doubt and loss of objectivity.
6. Feelings of guilt.
7. A questioning attitude toward his own value-system.
8. A feeling of potential breakdown i.e., that he might go crazy.
9. A need to defend his acquired principles.
10. A final sense of belonging (identification).
A feeling of helplessness in the face of the impersonal machinery of control
is carefully engendered within the prisoner. The individual who receives the
preliminary treatment described above not only begins to feel like an animal
but also feels that nothing can be done about it. No one pays any personal
attention to him. His complaints fall on deaf ears. His loss of
communication, if he has been isolated, creates a feeling that he has been
forgotten. Everything that happens to him occurs according to an impersonal
time schedule that has nothing to do with his needs. The voices and
footsteps of the guards are muted. He notes many contrasts, e.g., his
greasy, unpalatable food may be served on battered tin dishes by guards
immaculately dressed in white.
The first steps in depersonalization of the prisoner have begun. He has no
idea what to expect. Ample opportunity is allotted for him to ruminate upon
all the unpleasant or painful things that could happen to him. He approaches
the main interrogator with mixed feelings of relief and fright.
Surprise is commonly used in the brainwashing process. The prisoner is rarely
prepared for the fact that the interrogators are usually friendly and
considerate at first. They make every effort to demonstrate that they are
reasonable human beings.
Often they apologize for bad treatment received by the prisoner and promise
to improve his lot if he, too, is reasonable. This behaviour is not what he
has steeled himself for. He lets down some of his defences and tries to take
a reasonable attitude. The first occasion he balks at satisfying a request
of the interrogator, however, he is in for another surprise. The formerly
reasonable interrogator unexpectedly turns into a furious maniac. The
interrogator is likely to slap the prisoner or draw his pistol and threaten
to shoot him. Usually this storm of emotion ceases as suddenly as it began
and the interrogator stalks from the room. These surprising changes create
doubt in the prisoner as to his very ability to perceive another person's
motivations correctly. His next interrogation probably will be marked by
impassivity in the interrogator's mien.
A feeling of uncertainty about what is required of him is likewise carefully
engendered within the individual. Pleas of the prisoner to learn specifically
of what he is accused and by whom are side-stepped by the interrogator.
Instead, the prisoner is asked to tell why he thinks he is held and what he
feels he is guilty of. If the prisoner fails to come up with anything, he is
accused in terms of broad generalities (e.g, espionage, sabotage, acts of
treason against the people etc.)
This usually provokes the prisoner to make some statement about his
activities. If this take the form of a denial, he is usually sent to
isolation on further decreased food rations to think over his crimes.
This process can be repeated again and again, as soon as the prisoner thinks
of something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it. Meanwhile a strong sense of
dependence upon the interrogator is developed. It does not take long for the
prisoner to realize that the interrogator is the source of all punishment,
all gratification, and all communication. The interrogator, meanwhile,
demonstrates his unpredictbility. He is perceived by the prisoner as a
creature of whim.
At times, the interrogator can be pleased very easily and at other times no
effort on the part of the prisoner will placate him. The prisoner may begin
to channel so much energy into trying to predict the behaviour of the
unpredictable interrogator that he loses track of what is happening
inside himself. After the prisoner has developed the above psychological
and emotional reactions to a sufficient degree, the brainwashing begins in
earnest.
First, the prisoner's remaining critical faculties must be destroyed. He
undergoes long, fatiguing interrogations while looking at a bright light.
He is called back again and again for interrogations after minimal sleep.
He may undergo torture that tends to create internal conflict. Drugs may
be used to accentuate his mood swings. He develops depression when the
interrogator is being kind and becomes euphoric when the interrogator is
threatening the direst penalties. Then the cycle is reversed, the
prisoner finds himself in a constant state of anxiety which prevents him
from relaxing even when he is permitted to sleep. Short periods of
isolation now bring on visual and auditory hallucinations.
The prisoner feels himself losing his objectivity. It is in this state that
the prisoner must keep up an endless argument with the interrogator. He
may be faced with the confessions of other individuals who collaborated with
him in his crimes.
The prisoner seriously begins to doubts his own memory. This feeling is
heightened by his inability to recall little things like the names of the
people he knows very well or the date of his birth. The interrogator
patiently sharpens this feeling of doubt by more questioning. This tends to
create a serious state of uncertainty when the individual has lost most of
his critical faculties.
The prisoner must undergo additional internal conflict when strong feelings
of guilt are aroused within him. As any clinical psychologist is aware, it
is not at all difficult to create such feelings. Military servicemen are
particularly vulnerable.
No one can morally justify killing even in wartime. The usual justification
is on the grounds of necessity or self-defence. The interrogator is careful
to circumvent such justification. He keeps the interrogation directed toward
the prisoner's moral code. Every moral vulnerability is exploited by
incessant questioning along this line until the prisoner begins to question
the very fundamentals of his own value-system.
The prisoner must constantly fight a potential breakdown. He finds that
his mind is going blank for longer and longer periods of time. He can
not think constructively. If he is to maintain any semblance of psychological
integrity, he must bring to an end this state of interminable internal
conflict. He signifies a willingness to write a confession.
If this were truly the end, no brainwashing would have occurred. The
individual would simply have given in to intolerable pressure. The final
stage of the brainwashing process has just begun. No matter what the prisoner
writes in his confession the interrogator is not satisfied. The interrogator
questions every sentence of the confession. He begins to edit it with the
prisoner. The prisoner is forced to argue against every change. This is the
essence of brainwashing.
Every time that he gives in on a point to the interrogator, he must rewrite
his whole confession. Still the interrogator is not satisfied, in a desperate
attempt to maintain some semblance of integrity and to avoid further
brainwashing, the prisoner must begin to argue that what he has already
confessed to is true. He begins to accept as his own the statements he has
written. He uses many of the interrogator's earlier arguments to buttress
his position. By this process, identification with the interrogator's
value-system becomes complete.
It is extremely important to recognize that a qualitative change has taken
place within the prisoner. The brainwashed victim does not consciously
change his value-system; rather the change occurs despite his efforts. He is
no more responsible for this change than is an individual who snaps and
becomes psychotic. Like the psychotic, the prisoner is not even aware of the
transition.
DEFENSIVE MEASURES
1. Training of Individuals potentially subject to communist control.
Training should provide for the trainee a realistic appraisal of what
control pressures the interrogators are likely to exert and what the
usual human reactions are to such pressures. The trainee must learn the
most effective ways of combating his own reactions to such pressures and
he must learn reasonable expectations as to what his behaviour should be.
Training has two decidedly positive effects; first, it provides the
trainee with ways of combating control; second, it provides the basis for
developing an immeasurable boost in morale. Any positive action that the
individual can take, even if it is only slightly effective, gives him a
sense of control over a situation that is otherwise controlling him.
2. Training must provide the individual with the means of recognizing
realistic goals for himself.
A. Delay in yielding may be the only achievement that can be hoped for.
In any particular operation, the agent needs the support of knowing
specifically how long he must hold out to save an operation, protect
his cohorts, or gain some other goal.
B. The individual should be taught how to achieve the most favourable
treatment and how to behave and make necessary concessions to obtain
minimum penalties.
C. Individual behavioural responses to the various control pressures
differ markedly. Therefore, each trainee should know his own particular
assets and limitations in resisting specific pressures. He can learn
these only under laboratory conditions simulating the actual pressures
he may have to face.
D. Training must provide knowledge of the goals and the restrictions
placed upon his interrogator. The trainee should know what controls
are on his interrogator and to what extent he can manipulate the
interrogator.
For example, the interrogator is not permitted to fail to gain
something from the controlled individual. The knowledge that, after
the victim has proved that he is a tough nut to crack he can
sometimes indicate that he might compromise on some little point to
help the interrogator in return for more favourable treatment, may be
useful indeed. Above all, the potential victim of interrogator control
can gain a great deal of psychological support from the knowledge that
the interrogator is not a completely free agent who can do whatever he
wills with his victim.
E. The trainee must learn what practical cues might aid him in recognizing
the specific goals of his interrogator. The strategy of defence against
elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the individual may hasten his
own state of mental confusion; whereas, to prevent brainwashing,
maintaining clarity of thought processes is imperative.
F. The trainee should obtain knowledge about carrots as well as sticks.
They keep certain of their promises and always renege on others, for
example, demonstrable the fact that informers receive no better
treatment than other prisoners should do much to prevent this particular
evil. On the other hand, certain meaningless concessions will often get
a prisoner a good meal.
G. In particular, it should be emphasized to the trainee that, although
little can be done to control the pressures exerted upon him, he can
learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about
internal conflict and conflict-producing mechanisms. He should learn
to recognize when someone is trying to arouse guilt feelings and what
behavioural reactions can occur as a response to guilt.
H. The training must teach some methods that can be utilized in thwarting
particular control techniques:
ELICITATION
In general, individuals who are the hardest to interrogate for information
are those who have experienced previous interrogations. Practice in being
the victim of interrogation is a sound training device.
TORTURE
The trainee should learn something about the principles of pain and shock.
There is a maximum to the amount of pain that can actually be felt. Any
amount of pain can be tolerated for a limited period of time. In addition,
the trainee can be fortified by the knowledge that there are legal
limitations upon the amount of torture that can be inflicted by jailors.
ISOLATION
The psychological effects of isolation can probably be thwarted best by
mental gymnastics and systematic efforts on the part of the isolate to
obtain stimulation for his neural end
organs. Controls on Food and Tobacco. Food given will always be enough to
maintain survival, sometimes the victim gets unexpected opportunities
to supplement his diet with special minerals, vitamins and other nutrients
(e.g., iron from the rust of prison bars).
In some instances, experience has shown that individuals could exploit
refusal to eat. Such refusal usually resulted in the transfer of the
individual to a hospital where he received vitamin injections and
nutritious food. Evidently attempts of this kind to commit suicide arouse
the greatest concern in officials.
If deprivation of tobacco is the control being exerted. The victim can gain
moral satisfaction from giving up tobacco. He can't lose since he is not
likely to get any anyway.
FATIGUE
The trainee should learn reactions to fatigue and how to overcome them
insofar as possible. For example, mild physical exercise clears the head in
a fatigue state.
WRITING PERSONAL ACCOUNTS AND SELF-CRITICISM
Experience has indicated that one of the most effective ways of combating
these pressures is to enter into the spirit with an overabundance of
enthusiasm.
Endless written accounts of inconsequential material have virtually
smothered some eager interrogators. In the same spirit, sober, detailed
self-criticisms of the most minute sins has sometimes brought good results.
Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an individual's
duties may become mutually incompatible in this situation.
Take the example of a senior grade military officer, he has the knowledge
of sensitive strategic intelligence which it is his duty to protect. He
has the responsibility of maintaining the physical fitness of his men and
serving as a model example for their behaviour. The officer may go to the
camp commandant to protest the treatment of the POW`s and the commandant
assures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another.
The officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for any
other behaviour if he does his utmost to carry out his highest priority
responsibility.
There is considerable evidence that many individuals tried to evaluate the
priority of their responsibilities on their own, but were in conflict over
whether others would subsequently accept their evaluations. More than one
individual was probably brainwashed while he was trying to protect himself
against elicitation.
CONCLUSIONS
The application of known psychological principles can lead to an
understanding of brainwashing.
1. There is nothing mysterious about personality changes resulting from the
brainwashing process.
2. Brainwashing is a complex process. Principles of motivation, perception,
learning, and physiological deprivation are needed to account for the
results achieved in brainwashing.
3. Brainwashing is an involuntary re-education of the fundamental beliefs of
the individual. To attack the problem successfully, the brainwashing
process must be differentiated clearly from general education methods for
thought-control or mass indoctrination, and elicitation.
4. It appears possible for the individual, through training, to develop
limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting
individual emotional reactions to brainwashing techniques rather than to
ward thwarting the techniques themselves.
DEVELOPMENT IN THE FIELD OF CONTROL OF HUMAN BEHAVIOUR
1. There are two major methods of altering or controlling human behaviour
and the Soviets where interested in both.
The first is psychological; the second, pharmacological. The two may be
used as individual methods or for mutual reinforcement.
For long-term control of large numbers of people, the former method is
more promising than the latter. In dealing with individuals, the U.S.
experience suggests the pharmacological approach (plus psychological
techniques) would be the only effective method. Neither method would be
very effective for individuals on a long term basis.
2. Soviet research on the pharmacological agents producing behavioural
effects has consistently lagged about five years behind Western research.
They have been interested in such research and are now pursuing research
on such chemicals as LSD-25, amphetamines, tranquillizers, hypnotics and
similar materials. There is no present evidence that anyone has any
singular, new, potent drugs to force a course of action on an individual.
They are aware of the tremendous drive produced by drug addiction and
perhaps could couple this with psychological direction to achieve
control of an individual.
3. The psychological aspects of behaviour control would include not only
conditioning by repetition and training, but such things as hypnosis,
deprivation, isolation, manipulation of guilt feelings, subtle or covert
threats, social pressure and so on.
Some of the newer trends in the USSR where as follows:
A. The adoption of a multi-disciplinary approach integrating biological,
social and physicalmathematical research in attempts better to
understand, and eventually, to control human behaviour in a manner
consonant with national plans.
B. The outstanding feature, in addition to the inter-disciplinary approach,
is a new concern for mathematical approaches to an understanding of
behaviour.
Particularly notable are attempts to use modern information theory,
automata theory and feedback concepts in interpreting the mechanisms by
which the second signal system, i.e., speech and associated phenomena,
affect human behaviour.
Implied by this second signal system, using information inputs as
causative agents rather than chemical agents, electrodes or other more
exotic techniques applicable, perhaps, to individuals rather than groups.
C. This new trend, observed in the early Soviet post-Stalin period,
continues. By 1960 the word cybernetics was used by the Soviets to
designate this new trend.
This science is considered by some as the key to understanding the human
brain and the product of its functioning - Psychic activity and
personality - To the development of means for controlling it and to ways
for moulding the character of the New Communist Man.
As one Soviet author put it: Cybernetics can be used in moulding of a
child's character, the inculcation of knowledge and techniques, the
amassing of experience, the establishment of social behaviour patterns,
all functions which can be summarized as 'control' of the growth process
of the individual. Students of particular disciplines in the USSR, such
as psychologist and social scientists, also support the general
cybernetic trend.
Research indicates that the Soviets had attempted to develop a technology
for controlling the development of behavioural patterns among the
citizens of the USSR in accordance with politically determined
requirements of the system. Furthermore, the same technology can be
applied to more sophisticated approaches to the coding of information for
transmittal to population targets in the battle for the minds of men.
Some of the more esoteric techniques such as ESP or, as the Soviets call
it, biological radio-communication, and psychogenic agents such as LSD,
are receiving some overt attention with, possibly, applications in mind
for individual behaviour control under clandestine conditions.

873
txt_files/bugged.msg Normal file
View File

@ -0,0 +1,873 @@
ELECTRONIC SURVEILLANCE
Are you bugged?
(C) Copyright 1993 Michael E. Enlow
----------------------------------------------------------
DISCLAIMER
This document was written by an expert, quite knowledgeable in
the methods and techniques of good, successful investigation.
The author has based this material solely upon his discoveries
and experiences in the trade but is not an attorney. Thus no legal
advice is offered herein.
Be cautioned therefore, that this document neither asserts the
legality of any of the methods described herein, nor does it
advocate any usage of techniques without first seeking competent
legal advice and adherence to the law.
The author, editor, and service providers, unequivocally disclaim
any responsibility for damages resulting from the use of any of the
techniques or the consequences of implementing anything contained
herein. This writing is provided strictly for informational purposes
only.
---------------------------------------------------------------
(This is an abstract from The Inside Secrets, a newsletter
catering to detectives, attorneys, law enforcement officers
and professionals around the world. Want to know how the
pro's bug, tap phones, and use other things to hear what
you're saying.)
I'm now going to show you just how widespread illegal
electronic surveillance, or bugging really is. But, let me
begin by saying. . .
MY INTENTION IS NOT TO SHOW YOU WAYS YOU MAY DO ILLEGAL
ELECTRONIC SURVEILLANCE, BUT ONLY TO INFORM YOU OF HOW IT IS
DONE, ON WHAT SCALE, AND WHAT YOU CAN DO TO PROTECT YOUR
RIGHTS. I, THEREFORE, DISCLAIM ANY AND ALL LIABILITY FOR
YOUR MISUSE OF ANY OF THE TECHNIQUES AND/OR CONCEPTS OUTLINED
WITHIN THIS ISSUE AND FURTHER ISSUES OF THE INSIDE SECRETS
NEWSLETTER.
Do you get it? If you take it upon yourself to use the
information I share with you and do something illegal, then
you pay the price. I am warning you in advance. I am not an
attorney and do not claim to be rendering legal advice. If
you consider using any of the concepts I disclose, you should
consult your attorney to insure they are legal in your
jurisdiction. With that behind us, let's move on.
Do you know there are only about three to four hundred court
orders issued each year for electronic surveillance
applications in the U.S.? Yet, there are hundreds (if not
thousands) of electronic surveillance equipment suppliers. I
wonder how they manage to stay in business?
Well, my friend, I'll tell you. They make a lot of money
selling electronic surveillance equipment. Their customers
are Federal, State, and Local Law Enforcement Agencies,
corporations, and a few private investigators, who often
illegally use these devices in their investigations--but
you'll never know it...
A very popular book on electronic surveillance came out in
1967, and it listed some of the buyers of electronic
surveillance gear. Everyone was quite surprised to find Avis
Rent-A-Car, various hotel chains, Coca-Cola, several life
insurance companies, and the like, were allegedly spending
millions for specialized bugging devices. But to find out
that Walt Disney was a major customer . . .? Hmmm....
In my career, I have discovered numerous illegal electronic
surveillance applications. Bugs are everywhere; they're in
small businesses, large corporations, people's homes,
conventions, everywhere! In fact, if you don't believe me,
you can hear for yourself. Use a programmable police scanner
to scan the 35 to 50 megahertz bands. You'll almost always
find some very strange transmissions. (Things mother wouldn't
have wanted you to hear.)
Let me tell you more about electronic surveillance. There
are many ways of using electronics for surveillance, but
first lets take a look at what's called hardwiring.
Hardwiring is basically the same as having an everyday
microphone plugged into a tape recorder. When you speak into
the microphone, everything you say is sent through the
microphone's wire and recorded onto a tape.
Then, there are electronic transmitters which intercept the
signal via microphone and transmit it as a radio signal to a
receiver of some kind. (Sort of like a miniature radio
station.)
There are also more advanced long range listening devices
like the laser mic, the shotgun microphone, the parabolic
microphone, and others which can pick up a whisper for long
ranges (sometimes even miles away).
To elaborate on a few types of electronic surveillance
applications and the ways to protect yourself from them, I'll
expound and tell of a couple of case scenarios.
First let's discuss. . .
HARDWIRING
As I said earlier, this type of electronic interception
requires the use of wire to carry the sound to you or some
other listening device. There are many ways hardwiring is
done. Wires the size of a human hair can be used to transmit
a signal from a microphone. They can be painted over,
implanted under carpet, in an air condition duct, or behind
baseboards, etc., to conceal them from view.
At one end of the wire is the microphone, and on the other a
tape recorder or even someone who is listening with a set of
headphones. This method of electronic interception is the
oldest in the industry, yet still practiced today.
To make everything a little more complicated, there is also a
conductive paint that closely resembles fingernail polish,
which will transmit the minute electrical impulses from the
microphone to a recorder or headphones.
There are so many different hardwire applications that I will
not attempt to cover them all. I will just emphasize a bit
by sharing with you a couple we've discovered in our
countermeasures work.
Once, in checking a certain client's business for bugs, we
located a very cleverly installed hard-wire system.
Obviously someone had access to the office for a considerable
length of time, or maybe did a little breaking and entering
to get into the office.
Anyway, this particular application was a small microphone
element about a quarter inch in diameter (found at all Radio
Shack stores) placed in a small hole in a picture frame. A
hole drilled into the rear of the picture frame held the
microphone in place. A small eighth inch hole continued
through the frame to allow the sound waves to reach the
microphone. A couple of fine wires running from the
microphone to the wall were thumb tacked there. At this
point, conductive paint, as described above, continued down
the seams of the paneling walls to the baseboard. Behind the
baseboard the conductive paint joined with an old set of
unused telephone wires.
A recorder was concealed in the basement near the phone box.
Every sound made in our client's office was being taped
using a long play tape recorder. Many times agents will
change the play and record speed of tape recorders by
alternating the internal components. This enables a standard
tape recorder to record from 4 to 15 hours on one side of a
tape.
Let me tell you of another clever hardwire I discovered. We
received a call from a lady who, believing that she was
bugged, requested a "bug-sweep" of her home to detect any
illegal electronic surveillance devices. After a very
thorough sweep b y several of my agents, they found nothing.
My agents told her there were no electronic surveillance
devices on the premises. My men really did a thorough sweep
and search.
A few days later the lady called again and said she knew
without a doubt that she was bugged. She insisted we must
have missed something. This time I went to the location and
ran every test we had equipment to run. Still--no bug.
Then, I began the next countermeasures procedure, a physical
inspection of the entire house from attic to basement.
As I was searching, I noticed something very unusual. The
stereo, situated in the center of the home, was on and the
cassette deck was playing. Closer inspection showed that it
was recording! However, there wasn't a microphone plugged
into the microphone jack and it didn't have an internal
microphone. I stopped the tape and played it back. There was
a perfect recording of our client and myself as I was
questioning her during my search.
I checked the back of the stereo and there it was! I noticed
one of the speaker wires was routed into the cabinet of the
stereo. I disassembled the stereo and the wire was connected
to the microphone jack on the inside and connected to a
speaker. A SPEAKER WAS BEING USED TO CONDUCT MICROPHONE
SIGNALS TO THE TAPE RECORDER! It worked like a charm!
On top of this, the husband had changed the record/play speed
of the recorder to accommodate eight hours of recording.
This was one of the most sophisticated "home-made" jobs I had
ever seen! Every night while the wife was working, as a
nurse, h e was reviewing everything that happened at home the
day before -- overhearing her telephone calls, and her
visitors. I have to credit this guy, it was quite a design.
ARE YOU BUGGED?
My best advice on detecting any type of hard wire
installation is to look for any alteration in the carpet
where wiring may have been routed under the carpet. Watch
for any unusual sets of wires near and around your telephone
wiring. (You should always be familiar with the type and
number of wires near your outside telephone connection box,
and watch out for any new wires that may appear.)
Keep notice of the baseboards around the floor and note any
unusual scratches in the paint, or other indications that the
base board has been removed. Be cautious of any metal
objects that may be part of a conductor for electricity.
This could b e part of a hot-wire for a bug. Let me
illustrate this for you:
As you can see, many types of metals carry current and can be
used as a decoy for wiring. This type installation will out-
wit most private detective countermeasure sweeps and
searches, particularly in hard-wire systems.
Another type of hard-wire system is a direct telephone tap.
This only requires a standard tape recorder with both a
microphone and remote control jack with an "auto recording
control." These are about $25.00 and are available at any
Radio Shack or other electronic supply store.
The "auto recording control" is a small box about three
inches square and has two wires coming out of it. It also
has two switches on top of it to set it for record or
playback mode. There is a gray wire which plugs directly
into any extra telephone jack or it can be cut and spliced
into the telephone line. The other wire, with two plugs,
connects to the tape recorder. The small plug goes to the
remote jack of the tape recorder and the other, larger plug,
to the microphone jack on the recorder. One simply presses
the record button on the recorder and you're all set.
The auto recording control will keep the recorder inactive
until the phone is in use. Once the phone is lifted from the
cradle, the auto recorder control activates the recorder to
clearly record both sides of the conversation. As soon as
the phone is placed back on the hook, the recorder stops
recording and waits for the next incoming or outgoing call.
This feature prevents the tape recorder from playing
constantly and allows for the recorder to only be active
during calls.
Most people who use this method of bugging will plug the auto
recording control into an extra telephone jack in the home or
business, and conceal the recorder underneath a bed or behind
some other object to conceal it.
However, in those cases where there are no extra jacks, they
will cut the telephone jack wire coming out of the auto
recording control and strip away the insulation from the red
and green wires. Then, they will splice these colored wires
into the phone wire.
Nearly all phone systems operate on a single grey or white
cable. Once the insulation is removed the cable contains a
red, green, yellow, and black wire. This cable carries
approximately 40 to 50 volts and will seldom shock if handled
improperly, (unless of course, the phone rings which sends
about 110 volts or so down the line) allowing for amateur
surveillance applications.
Once the insulation is stripped away, these two wires, the
red and green, should be matched with the red and green in
the telephone wire and then properly taped to insure no
static will occur. In 99% of the applications we've found,
we seldom find them with static, clicks, hums, or any other
noise that would alert the subject of a bug. We have seen
instances where people have used bubble gum to seal the wires
once spliced. (The FEDS love finding fingerprints in bubble
gum. It makes their job so easy...)
Here's another tactic that has been used in phone tapping.
We've seen cases where extensions of people's phones are
installed at other locations where the tap can be easily
accessible. Generally, the person doing the bugging will
design a plan to get the phone company to have a new line
with the same number installed (an extension) in a
predetermined location, often under the guise of an "office
extension." Then, they connect the recording device, and
monitor calls for several weeks. Before the person being
bugged receives their phone bill reflecting the added charge
for the new phone line, the culprit is long gone. . .
THE CORDLESS PHONE
Cordless phones are in near every American home. Sure they
are convenient to carry around with us, but they can easily
transmit both side of your phone calls to anyone with a
police scanner for up to a mile away!
BEWARE OF DISCUSSING CONFIDENTIAL BUSINESS
ON CORDLESS PHONES!
The box in which your cordless phone was purchased usually
warns you that these phones are transmitters. Yet, every day
millions of people, both at work and home, continue to use
them, spreading their business through the airwaves. There
is little you can do to stop people from hearing your calls,
short of purchasing a scrambling device. Even then the party
to whom you are talking would also have to have a matching
descrambling device to understand you. This would so
restrict the use of your cordless phone to the point that you
may as well use a regular telephone.
Cordless phones are easily intercepted. For your own
security, I'll share how it is done. Again, I am not an
attorney and highly recommend you consult with a competent
attorney should you decide to use this technique for
information gathering...
It works like this. Nearly all cordless phones (with the
exception of the new 900 megahertz phones) transmit in the
46.00 to 47.00 megahertz band. To intercept the cordless
phone, the investigator will use the search feature on the
scanner and program 46.00 as the low and 47.00 as the high
and touch the search/scan key. If a cordless phone is in use
in the area it will lock in on that frequency. He or she
can, then, hear both sides of the conversation crystal clear
for up to a mile. The use of a good low-band antenna with
the scanner will increase the reception range of a cordless
phone even further.
Many private investigators will drive by a subject's home
searching these frequencies, and obtain "inside information"
that will provide leads that later help them to document
evidence.
It is arguable whether this is an invasion of privacy or a
violation of federal law because of the notice on the carton
in which this type telephone is purchased. It clearly states
they are not private. Many investigators and attorneys argue
that people waive their rights to the expectation of privacy
when they use such a telephone.
TO GO A STEP FURTHER. . .
There is also a device called an "auto scanner recording
control" which will allow a police scanner to be connected to
a tape recorder. It activates the recorder to begin
recording--only when the cordless phone is in use.
Investigators will determine the exact frequency of the
subject's phone, and then place a battery powered scanner
with the scanner recorder control in a water-tight baggie or
other container, conceal the equipment in hedges, culverts,
etc., near the subject's home or office. Later he or she
will retrieve the equipment along with the "juicy info" of
the targets telephone conversations! And to go a step
further, the investigator will often use a long-play recorder
that will record hours of conversation.
Surveillance companies and spy shops sell recorders that will
record up to 10 hours of conversation on a single cassette
tape. If you are a business man who often uses a tape
recorder for business, this may be a real help to you.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><
> INTEC Investigative Technology recently bought <
> the entire plans line of famous surveillance <
> genius John Wilson. For a free copy of the plan<
> to modify a tape recorder for long play, call <
> our Fax-Vault from your fax and get document <
> number 120 at 601-876-9740 or 6757 <
> Another free service of INTEC! <
><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
The concepts mentioned above are only the "tip of the
iceberg" of what is happening in illegal electronic
surveillance. I could write an entire book on just this
topic. Since we have only so much space to write each month,
I will have to continue this topic in future issues.
However, if you have specific questions or comments, you may
call my office or send a fax, and we will try to answer your
questions.
Please don't be so foolish as to believe, "It couldn't happen
to you," or you may find a lot of your deals going sour.
Perhaps, someone may even decide your secrets are worth more
than your bank account....
BEWARE: IT IS HAPPENING MORE THAN YOU WOULD BELIEVE!
I have turned down many multi-thousand dollar jobs to do
industrial spying, and if I am getting these offers, so are
many others. You can never be too careful.
There are devices which will help you to detect illegal
telephone taps, transmitters, and conventional hard-wire
bugs, but the best protection is to follow a few rules:
a. Never say anything on the phone you wouldn't want to
say in a courtroom.
b. Never trust anyone. If what you say could hurt you
and your business, shut-up.
c. If you must discuss very confidential business,
create a loud background noise that will hinder the
less expensive electronic devices, i.e., a radio or
television with loud volume, a fan running in the
same room, etc., and talk quietly. You would be
amazed at how effective this background noise is
against electronic invasion of your privacy.
d. When discussing very delicate issues, never meet in
anyone's office. Meet in public places and be sure
to be observant of any bulges which could be
concealed tape recorders, etc.
Until next time. . . .
Michael E. Enlow, Legal Investigator
P.S. Please don't hesitate to call if you have questions
or send e-mail to michael@enlow.com.
*****************************************************************
NOTE:
To retrieve a copy of our complete "insider" catalog of books,
newsletters, special reports, and the famous John Wilson catalog
of high-tech, electronic surveillance and countermeasure gadgetry,
along with schematics and very simple construction plans, send
e-mail to catalog@enlow.com. The catalog will be automatically
e-mailed back to you.
INTEC Investigative Technology
voice: (601) 783-6037
fax: (601) 783-2111
Internet: info@enlow.com
Anonymous FTP: enlow.com (198.92.134.50)

97
txt_files/burning.ppl Normal file
View File

@ -0,0 +1,97 @@
S P O N T A N E O U S H U M A N C O M B U S T I O N
No longer a burning issue...
By Al Seckel
Have you ever gotten so mad that you felt that you were about to
burn up?
Well, in 1984 the Journal of the International Association of
Arson Investigators published a lengthy two-part report that
found possible prosaic explanations for the best known cases of
that bizarre, gruesome, and seemingly inexplicable phenomenon
known as spontaneous human combustion. In other words, the best
evidence now suggests that you can't spontaneously ignite.
Through the years many medical experts and forensic
pathologists have dismissed spontaneous human combustion as an
impossibility, but there has always remained enough documented
cases and evidence for a smouldering controversy.
There exist about two dozen modern cases where a claim involving
spontaneous human combustion has been made.
The best-documented modern case is that of Mrs. Mary Reeser, a
67-year-old widow who died in 1951. Her remains were discovered
in her bedroom within a blackened circle on the floor about four
feet in diameter. This case was unusual because the fire had no
apparent cause and a pile of newspapers less than a foot away
bore no signs of scorching.
There are several peculiarities to the alleged cases of
spontaneous human combustion. First, the torso, even including
the bones, were often reduced to a greasy ash, while the
extremities, particularly the legs, were often spared. Secondly,
the victims were elderly, obese, and alcoholic.
The fact that almost all of the victims were alcoholic led some
early theorists, including members of the temperance movement,
to suggest that alcohol-impregnated tissues were rendered highly
combustible.
This theory, however, was disputed by scientists who pointed out
that a person would die of alcohol poisoning long before imbibing
enough alcohol to have any effect on the body's flammability.
A more plausible explanation, however, suggests that the victims
were so impaired by alcohol that they were unable or very slow to
react when they started to burn.
A recent two-year investigation by Dr. Joe Nickell, a private
detective and Dr. John Fisher, a forensic analyst with the crime
laboratory of the Orange County Sheriff's Office in Orlando,
Florida revealed even more significant correlations behind the
thirty most significant spontaneous human combustion cases.
Nickell and Fisher found that in those instances where the
destruction of the body was relatively minimal, the only
significant fuel source seems to have been the individual's
clothes, but where the destruction was considerable, additional
fuel sources - chair stuffing, wooden flooring, floor covering,
and so on augmented the combustion. Such materials under the body
appear also to have helped retain melted fat that flowed from the
body and then volatilized and burned, destroying more of the body
and yielding still more liquefied fat to continue the burning
process.
In the cases that Nickell and Fisher researched they always found
plausible sources of ignition - proximate candles, cigarettes,
lamps, fireplaces, etc. This sort of evidence would seem to
demonstrate an external rather than an internal source of
ignition.
The 92-year-old pipe-smoking Dr. Bentley frequently dropped
burning ashes. This was evident from the many burns found on his
bedroom rug. Evidently he tried to make his way into the bathroom
with his walker in a futile attempt to extinguish his burning
robe. His robe was found smoldering in the bathtub.
Or in the case of the aforementioned Mrs Reeser: She was last
seen sitting in an overstuffed chair wearing a nightgown and
housecoat and was smoking a cigarette. In addition, she had told
her son that she had taken two sleeping pills.
The poor woman probably fell asleep in her chair and the burning
ashes fell on her chair and ignited, but they only smoldered,
which is not unusual. Smoldering heat can consume entire pieces
of furniture without any flames breaking out.
Nickell and Fisher also found that the fire did spread in Mrs
Reeser's apartment. An adjacent end table and lamp were destroyed
and a ceiling beam had to be extinguished when firemen arrived.
The floor was untouched because it was made of concrete.
Nickell and Fisher found that the proponents of spontaneous human
combustion often omitted such important details in their
published accounts. After all, you can make a mystery out of
anything by leaving out half the facts.


3767
txt_files/bushbio.txt Normal file

File diff suppressed because it is too large Load Diff

107
txt_files/bushbomb.txt Normal file
View File

@ -0,0 +1,107 @@
Wrong Number BBS FILE NAME: BUSHBOMB.TXT
[Reproduced with permission from _The Spotlight_, June 22, 1992
The Spotlight
300 Independence Avenue, SE
Washington, DC 20003
Free use of this material is permitted provided that _The Spotlight_
is credited, including publisher's address]
BUSH LINKED TO TERROR BOMBING;
WILL U.N. ASK FOR EXTRADITION?:
Shocking Evidence Revealed
The evidence pointing to President Bush's role in the terrorist bombing of
a Cuban airliner grows stronger with new revelations. Will the UN Security
Council demand his extradition to Cuba or the World Court, as Bush and the
UN have done in the case of Libyan suspects in a similar crime?
By Warren Hough
Exclusive to The Spotlight
Washington, DC, 6/12/92 -- Long-suppressed records have turned up
"shattering" new evidence of the role played by President George Bush in
the midair bombing of a Cuban airliner and in its subsequent cover-up,
Latin American officials conducting a "preliminary review" of the tragic
incident have told the UN Security Council.
The secret files reportedly confirm that in mid-1976, while serving as
CIA chief, Bush was in "overall command" of a botched sabotage operation
that ended in the crash of a Cuban passenger jet, killing all 73 aboard,
The SPOTLIGHT has learned from diplomatic sources close to the
investigation.
A CIA agent identified as Luis Posada was arrested by Venezuelan
authorities shortly after the Cuban plane exploded in midair during its
takeoff from a Caribbean stopover, these sources say. Posada, a member of
a sizable CIA contingent conducting covert operations from Venezuelan bases
at the time, was charged with having smuggled an explosive device aboard
the flight, and held for trial.
Bush, anxious to disclaim all responsibility for such an atrocious
terrorist outrage, ordered a "no-holds-barred" cover-up of the crime, the
record suggests.
"In order to take the heat off Posada, the CIA targeted another
suspect, Dr. Orlando Bosch, a militant Cuban exile activist who advocated
`armed action' against the Castro dictatorship," recounted Felipe Rivero,
the popular Miami broadcaster who is The SPOTLIGHT's correspondent in the
region." Venezuela's secret police, known after its Spanish initials as DISIP,
maintained close relations with the CIA and followed its lead. Bosch was
imprisoned and charged with complicity in the bombing in Venezuela.
BUSH ORCHESTRATION
The next move in the cover-up reportedly orchestrated by Bush was to
"recover" Posada, these sources day. In a well-organized and lavishly
financed jailbreak, the alleged aerial bomber was spirited from Venezuela
to Panama, where the CIA issued him a new set of identity documents under
the name of Ramon Medina, a Guatemalan businessman.
In the concluding move of the cover-up, Posada, now known as "Medina,"
was handed over to Felix Rodriguez, a senior CIA field agent with whom Bush
had a personal working relationship, the record shows. Rodriguez gave
Posada a series of covert jobs with CIA teams stationed in Central America,
largely in order to protect him and "keep him happy," these sources
related.
"I, for my part, spent 11 years in various maximum security Venezuelan
prisons," Bosch told a SPOTLIGHT reporter during a recent telephone
interview. "During those years, I was put on trial four times for that
airplane bombing. My case was heard by military, civilian and appellate
courts. I was found innocent each time. But after each acquittal, the CIA
came up with new `suggestions' about my guilt."
PALE AND FRAIL
Finally the Venezuelan government told Washington it could no longer
hold Bosch. Pale and in frail health, the falsely accused "terrorist" was
flown back to Miami. "Here I could hope for no acquittal," recounted
Bosch. "At the airport, immigration officials threw me into chains. I was
held in solitary confinement for 29 months."
Finally granted a provisional release after leading Cuban-American
Republicans pressed his cause without letup, Bosch now lives in seclusion
near Miami. "My status is that of a `deportable' alien," he told The
SPOTLIGHT. "If I engage in any political activity, or even if I talk too
much, I can be tossed back into jail. I am in no position to comment on
controversial questions -- not even in my own cause."
Living under the assumed name and a small CIA paycheck in Central
America also proved difficult for Posada, SPOTLIGHT correspondent Rivero
reports. "A couple of years ago, two men walked up to Posada in a
Guatemalan restaurant and shot him five times," Rivero related. "He
survived the shooting by a sheer miracle. Badly injured -- he lives
largely on liquefied food and walks with a crutch, I hear -- he has
vanished into the `protective custody' of the CIA."
The reason for Posada's attempted assassination is known, however. He
"drank a bit and began to talk too much," U.N. sources said. "The CIA
needed an airtight cover-up of that airline bombing. When Posada turned
talkative, his usefulness to Bush was at an end -- and, but for an iron
physique and that miraculous survival, he would have been, too."
Now the U.N. Security Council, having assumed jurisdiction over such
international terrorist crimes when it clamped harsh sanctions on Libya
last April, faces a tougher challenge: How to deal with a case of aerial
mass murder in which the principal suspect happens to be THE INCUMBENT
PRESIDENT OF THE UNITED STATES.

58
txt_files/caesar Normal file
View File

@ -0,0 +1,58 @@
Is Caesarism the Conspiracy?
An enormously popular conspiracy theory (that was perhaps best presented
in Taylor Caldwell's novel, A Pillar of Iron [Life of Cicero]) holds that
the ultimate goal of the ruling class/conspiracy for America consists in
moving from the virtues of "Republic" with its rigorous limits on
government power, rule of law, and checks and balances to the degradation
of unlimited rule or "Caesarism" of one man. This theory implies, but
does not often explicitly state, that America as a social organism is in
morphic resonance a la Sheldrake's Presence of the Past with Rome, perhaps
through the intentional seeding of America by the Founders Fathers with
Roman forms and archetypes: bicameral legislature, Senate, architecture,
etc, etc.
Those unfamiliar with the remarkable parallels between the America's
system and history and that of Rome need to read Amaury de Riencourt's The
Coming Caesars and American Empire and Haskell' New Deal In Old Rome.
While Haskell deals with the parallel resort to collectivist economic
measures under the impoverishing strain and drain of Imperial adventure,
more fundamentally, de Riencourt demonstrates the similarity of America's
and Rome's geopolitical positions, namely that of representing a more
powerful new Imperial embodiment of an old culture--America of
England/Europe and Rome of Greece. Rome was responsible for defending
Greece from the alien Parthian empire to the East as America has been
responsible for defending Europe from the hostile Soviet Union to the
East. De Riencourt examines in detail how under the stress of world
empire and domestic economic pressures the tendency toward mass democracy
culminating in Caesarism is inevitable in the Republican system shared by
America and Rome. Though America has so far avoided the fall into true
Caesarism or "Presidents for Life", Franklin Roosevelt can only be viewed
as a very close call, a close call indeed, and other presidents such as
Jackson, Wilson, and Lincoln have risen to near Caesar status.
Apparently, the American system, in contrast to that of Rome, can provide
an "Imperial Presidency" for the duration of a crisis (Military or
Economic), but return rather smoothly to Congressional Bickering after the
crisis has passed.
Perhaps this helps provide a key to where the Taylor Caldwell theory
that "the conspiracy equals Caesarism" misses the mark. It is not
"Caesarism" that the ruling class/conspiracy wants (Caesar can be as
difficult to control as Congress). It is successful World Imperialism
best typified by Rome. Rome's Empire was not a product primarily of the
Emperors, but of the Republic! The Masonic conspiracy modeled America's
political forms on Rome's because they were forms known to be compatible
with the future World Imperial role they sought for America (Novus Ordo
Seclorum--New Order of the Ages). The Masonic conspiracy fashioned a
Presidency that would be "Imperial" as required, but could always be
checked by the "Money Power" through Congress and the Supreme Court, the
States, or the people to avoid the notorious excesses and "flakiness" of
all powerful Emperors that did much to undermine the Roman Empire.
So far, the question in America remains: whose Congress? whose
President? whose Supreme Court? whose Governor? whose People? The
Vatican's or Queen's? Maybe eventually, if the growing "multi-cultural"
ethnic tribalism and "Balkanization" makes America ungovernable
democratically, Whose Caesar!

245
txt_files/camps.txt Normal file
View File

@ -0,0 +1,245 @@
*** The "Liberation of the Camps": FACTS vs. LIES ***
By Theodore J. O'Keefe
_______________________________________________________________________________
Nothing has been more effective in establishing the authenticity of the Holocaust in the minds of Americans than the terrible scenes U.S. GI's discovered when they entered the German concentration camps at the close of World War II.
At Dachau, Buchenwald, Dora, Mauthausen, and other work and detention camps, horrified American infantrymen encountered heaps of dead and dying inmates, emaciated and diseased. Survivors told them hair-raising stories of torture and slaughter, a
d backed up their claims by showing the GI's crematory ovens, alleged gas chambers, supposed implements of torture, even shrunken heads and lampshades, gloves, and handbags purportedly made from skin flayed from dead inmates.
U.S. government authorities, mindful that most Americans, who remembered the atrocity stories fed them during World War I, still doubted the Allied propaganda directed against the Hitler regime, resolved to "document" what the GI's had found in
he camps. Prominent newsmen and politicians were flown in to see the harrowing evidence, while the U.S. Army Signal Corps filmed and photographed the scenes for posterity. The famous journalist Edward R. Murrow reported, in tones of horror, but no lo
ger of disbelief, what he had been told and shown, and Dachau and Buchenwald were branded on the hearts and minds of the American populace as names of infamy unmatched in the sad and bloody history of this planet.
For Americans, what was "discovered" at the camps - the dead and the diseased, the terrible stories of the inmates, all the props of torture and terror - became the basis not simply of a transitory propaganda campaign but of the conviction that
es, it was true: the Germans DID exterminate six million Jews, most of them in lethal gas chambers. What the GI's found was used, by way of films which were mandatory viewing for the vanquished populace of Germany, to "re-educate" the German people b
destroying their national pride and their will to a united, independant national state, imposing in their place overwhelming feelings of collective guilt and political impotence. And when the testimony, and the verdict, at Nuremberg incorporated mos
, if not all, of the horror stories Americans were told about Dachau, Buchenwald, and other places captured by the U.S. Army, the Holocaust could pass for one of the most documented, one of the most authenticated, one of the most proven historical ep
sodes in the human record.
A Different Reality
* But it is known today that, very soon after the liberation of the *
* camps, American authorities were aware that the real story of the camps *
* was quite different from the one in which they were coaching military *
* public information officers, government spokesmen, politicians, *
* journalists, and other mouthpieces. *
When American and British forces overran western and central Germany in the spring of 1945, they were followed by troops charged with discovering and securing any evidence of German war crimes. Among them was Dr. Charles Larson, one of America's
leading forensic pathologists, who was assigned to the Judge Advocate General's Department. Dr. Larson performed autopsies at Dachau and some twenty other German camps, examining on some days more than 100 corpses. After his grim work at Dachau, he w
s questioned for three days by U.S. Army prosecutors.^1
Dr. Larson's findings? According to an interview he gave to an American journalist in 1980, "What we've heard is that six million Jews were exterminated. Part of that is a hoax."^2 And what part was the hoax? Dr. Larson, who told his biographer
hat to his knowledge he "was the only forensic pathologist on duty in the entire European Theater,"^3 informed "Wichita Eagle" reporter Jan Floerchinger that "never was a case of poison gas uncovered."^4 Neither Dr. Larson nor any other forensic spec
alist has ever been cited by any Holocaust historian to substantiate a single case of death by poison gas, whether Zyklon-B or any other variety.
Typhus, Not Poison Gas
If not by gassing, how did the unfortunate victims at Dachau, Buchenwald, and Bergen-Belsen perish? Were they tortured to death? Deliberately starved? The answers to these questions are known as well. As Dr. Larson and other Allied medical men d
scovered, the chief cause of death at Dachau, Belsen, and the other camps was disease, above all typhus, an old and terrible scourge of mankind which until recently flourished in places where populations were crowded together in circumstances where p
blic health measures were unknown or had broken down. Such was the case in the overcrowded internment camps in Germany at war's end, where, despite such measures as systematic delousing, quarantine of the sick, and cremation of the dead, the virtual
ollapse of Germany's food, transport, and public health systems led to catastrophe.
Perhaps the most authoritative statement of the facts as to typhus and mortality in the camps has been made by Dr. John E. Gordon, M.D., Ph.D., a professor of preventive medicine and epidemiology at the Harvard University School of Public Health
who was with U.S. forces in Germany in 1945. Dr. Gordon reported in 1948 that "The outbreaks in concentration camps and prisons made up the great bulk of typhus infection encountered in Germany." Dr. Gordon summarized the causes for the outbreaks as
follows:
* * *
Germany was in chaos. The destruction of whole cities and the path left by advancing armies produced a disruption of living conditions contributing to the spread of the disease. Sanitation was low grade, public utilities were seriously disrupted
food supply and food distribution was poor, housing was inadequate and order and discipline were everywhere lacking. Still more important, a shifting of populations was occurring such as few countries and few times have experienced.^5
* * *
Dr. Gordon's findings are corroborated by Dr. Russel Barton, today a psychiatrist of international repute, who entered Bergen-Belsen with British forces as a young medical student in 1945. Barton, who volunteered to care for the diseased survivo
s, testified under sworn oath in a Toronto courtroom in 1985 that "Thousands of prisoners who died at the Bergen-Belsen concentration camp during World War II weren't deliberately starved to death but died from a rash of diseases."^6 Dr. Barton furth
r testified that on entering the camp he had credited stories of deliberate starvations but had decided such stories were untrue after inspecting the well-equipped kitchens and the meticulously maintained ledgers, dating back to 1942, of food cooked
nd dispensed each day. Despite noisily publicized claims and widespread popular notions to the contrary, no researcher has been able to document a German policy of extermination through starvation in the German camps.
No Lampshades, No Handbags, Etc.
What of the ghoulish stories of concentration camp inmates skinned for their tattoos, flayed to make lampshades and handbags, or other artifacts? What of the innumerable "torture racks," "meathooks," whipping posts, gallows, and other tools of t
rment and death that are reported to have abounded at every German camp? These allegations, and even more grotesque ones profferred by Soviet prosecutors, found their way into the record at Nuremberg.
The lampshade and tattooed-skin charges were made against Ilse Koch, dubbed by journalists the "Bitch of Buchenwald," who was reported to have furnished her house with objects manufactured from the tanned hides of luckless inmates. But General L
cius Clay, military governor of the U.S. zone of occupied Germany, who reviewed her case in 1948, told his superiors in Washington: "There is no convincing evidence that she [Ilse Koch] selected inmates for extermination in order to secure tattooed s
ins or that she possessed any articles made of human skin."^7 In an interview General Clay gave years later, he stated about the material for the infamous lampshades: "Well, it turned out actually that it was goat flesh. But at the trial it was still
human flesh. It was almost impossible for her to have gotten a fair trial."^8 Ilse Koch hanged herself in a West German jail in 1967.
It would be tedius to itemize and refute the thousands of bizarre claims as to Nazi atrocities. That there were instances of German cruelty, however, is clear from the testimony of Dr. Konrad Morgen, a legal investigator attached to the Reich Cr
minal Police, whose statements on the witness stand at Nuremberg have never been challenged by believers in the Jewish Holocaust. Dr. Morgen informed the court that he had been given full authority by Heinrich Himmler, commander of Hitler's SS and th
dread Gestapo, to enter any German concentration camp and investigate instances of cruelty and corruption on the part of the camp staffs. According to Dr. Morgen's sworn testimony at Nuremberg, he investigated 800 such cases, in which over 200 convi
tions resulted.^9 Punishments included the death penalty for the worst offenders, including Hermann Karl Koch, Ilse's husband, commandant of Buchenwald.
In reality, while camp commandants in certain cases did inflict physical punishment, such acts had to be approved by authorities in Berlin, and it was required that a camp physician first certify the good health of the prisoner to be disciplined
and then be on hand at the actual beating.^10 After all, the camps were throughout most of the war important centers of industrial activity. The good health and morale of the prisoners was critical to the German war effort, as is evidenced by a 1942
order issued by SS-Brigadefuhrer Richard Glucks, chief of the office which controlled the concentration camps, which held camp commanders "personally responsible for exhausting every possibility to preserve the physical strength of the detainees."^11
Concentration Camp Survivors - Merely Victims?
U.S. Army investigators, working at Buchenwald and other camps, quickly ascertained what was common knowledge among veteran inmates: that the worst offenders, the cruelest denizens of the camps were not the guards but the prisoners themselves. C
mmon criminals of the same stripe as those who populate U.S. prisons today committed many villainies, particularly when they held positions of authority, and fanatical Communists, highly organized to combat their many political enemies among the inma
es, eliminated their foes with Stalinist ruthlessness.
Two U.S. Army investigators at Buchenwald, Egon W. Fleck and Edward A. Tenenbaum, carefully investigated circumstances in the camp before its liberation. In a detailed report submitted to their superiors, they revealed, in the words of Alfred To
mbs, their commander, who wrote a preface to the report, "how the prisoners themselves organized a deadly terror within the Nazi terror."^12
Fleck and Tenenbaum described the power exercised by criminals and Communists as follows:
* * *
. . . The trusties, who in time became almost exclusively Communist Germans, had the power of life and death over all other inmates. They could sentence a man or a group to almost certain death . . . The Communist trusties were directly responsible f
r a large part of the brutalities at Buchenwald.
* * *
Colonel Donald B. Robinson, chief historian of the American military government in Germany, summarized the Fleck-Tenenbaum report in an article which appeared in "The American Mercury" shortly after the war. Colonel Robinson wrote succinctly of
he American investigators' findings: "It appeared that the prisoners who agreed with the Communists ate; those who didn't starved to death."^13
Additional corroboration of inmate brutality has been provided by Ellis E. Spackman, who, as Chief of Counter-Intelligence Arrests and Detentions for the Seventh U.S. Army, was involved in the liberation of Dachau. Spackman, later a professor of
history at San Bernardino Valley College in California, wrote in 1966 that at Dachau "the prisoners were the actual instruments that inflicted the barbarities on their fellow prisoners."^14
"Gas Chambers"
On December 9, 1944 Col. Paul Kirk and Lt. Col. Edward J. Gully inspected the German concentration camp at Natzweiler in Alsace. They reported their findings to their superiors at the headquarters of the U.S. 6th Army Group, which subsequently f
rwarded Kirk and Gully's report to the War Crimes Division. While, significantly, the full text of their report has never been published, it has been revealed, by an author supportive of Holocaust claims, that the two investigators were careful to ch
racterize equipment exhibited to them by French informants as a "SO-CALLED lethal gas chamber," and claim it was "ALLEGEDLY used as a lethal gas chamber"^15 [emphasis added].
Both the careful phraseology of the Natzweiler report, and its effective suppression, stand in stark contrast to the credulity, the confusion, and the blaring publicity which accompanied official reports of alleged gas chambers at Dachau. At fir
t, a U.S. Army photo depicting a GI gazing mournfully at a steel door marked with a skull and crossbones and the German words for: "Caution! Gas! Mortal danger! Don't open!" was identified as showing the murder weapon. Later, however, it was evidentl
decided that the apparatus in question was merely a standard delousing chamber for clothing, and another alleged gas chamber, this one cunningly disguised as a shower room, was exhibited to American congressmen and journalists as the site where thou
ands breathed their last. While there exist numerous reports in the press as to the operation of this second "gas chamber," no official report by trained Army investigators has yet surfaced to reconcile such problems as the function of the shower hea
s: Were they "dummies," or did lethal cyanide gas stream through them? (Each theory has appreciable support in journalistic and historiographical literature.)
As with Dachau, so with Buchenwald, Bergen-Belsen, and the other camps captured by the Allies. There was no end of propaganda about "gas chambers," "gas ovens," and the like, but so far not a single detailed description of the murder weapon and
ts function, not a single report of the kind that is mandatory for the successful prosecution of any assault or murder case in America at the time and today, has come to light.
Furthermore, a number of Holocaust authorities have now publicly decreed that there were no gassings, no extermination camps in Germany after all! All these things, we are told, were located in what is now Poland, in areas captured by the Soviet
Red Army and off-limits to Western investigators. In 1960 Dr. Martin Broszat, who is now director of the Munich-based Institute for Contemporary History, which is funded by the West German government to SUPPORT the Holocaust story, wrote a letter to
he German weekly "Die Zeit" in which he stated categorically: "Neither in Dachau nor in Bergen-Belsen nor in Buchenwald were Jews or other prisoners gassed."^16 Professional Nazi-hunter Simon Wiesenthal wrote in 1975 that "there were no extermination
camps on German soil."^17 And Dachau "gas chamber" No. 2, which was once presented to a stunned and grieving world as a weapon which claimed hundreds of thousands of lives, is now described in the brochure issued to tourists at the modern Dachau "mem
rial site" in these words: "This gas chamber, camouflaged as a shower room, was not used."^18
The Propaganda Intensifies
More than forty years after American troops entered Dachau, Buchenwald, and the other German camps, and trained American investigators established the facts as to what had gone on in them, the government in Washington, the entertainment media in
Hollywood, and the print media in New York continue to churn out millions of words and images annually on the horrors of the camps and the infamy of the Holocaust. Despite the fact that, with the exception of the defeated Confederacy, no enemy of Ame
ica has ever so suffered so complete and devestating defeat as did Germany in 1945, the mass media and the politicians and bureaucrats behave as if Hitler, his troops, and his concentration camps continue to exist in an eternal present, and our opini
n makers continue to distort, through ignorance or malice, the facts about the camps.
Time for the Truth
It is time that the government and the professional historians revealed the facts about Dachau, Buchenwald, and the other camps. It is time that they let the American public know how the inmates died, and how they didn't die. It is time that the
claims as to mass murder by gassing were clarified and investigated in the same manner as any other claims of murder are dealt with. It is time that the free ride certain groups have enjoyed as the result of unchallenged Holocaust claims be terminate
, just as it is time that other groups, including Germans, eastern Europeans, the Roman Catholic hierarchy, and the wartime leadership of America and Britain stop being scapegoated, either for their alleged role in the Holocaust or their supposed fai
ure to stop it.
Above all, it is time that the citizens of this great democratic Republic have the facts about the camps, facts which they possess a right to know, a right that is fundamental to the exercise of their authority and their will in the governance o
their country. As citizens and as taxpayers, Americans of all ethnic backgrounds, of all faiths, have a basic right and an overriding interest in determining the facts of incidents which are deemed by those in positions of power to be determinative
n America's foreign policy, in its educational policy, in its selection of past events to be memorialized in our civic life. The alleged facts of the Holocaust are today at issue all over the civilized world: in Germany, in France, in Italy, in Brita
n, in the Low Countries and Scandinavia, in Japan, across our border in Canada and in the United States of America itself. The truth will be decided only by recourse to the facts, in the public forum: not by concealing the facts, denying the truth, s
onewalling reality. The truth will out, and it is time the government of this country, and governments and international bodies throughout the world, made public and patent the evidence of what actually transpired in the German concentration camps in
the years 1933-1945, so that we may put paid to the lies, without fear or favor, and carry out the work of reconciliation and renewal that is and must be the granite foundation of mutual tolerance between peoples and of a peace based on justice, rath
r than on guns, barbed wire, prisons, and lies.
NOTES
1. _Crime Doctor_, a biography of Larson by John D. McCallum, Mercer,
Washington & Vancouver, British Columbia, Canada, 1979, p. 69.
2. _Wichita Eagle_, April 1, 1980, p. 4C.
3. _Crime Doctor_, p. 46.
4. _Wichita Eagle_, April 1, 1980, p. 4C.
5. John E. Gordon, "Louse-Borne Typhus Fever in the European Theater of
Operations, U.S. Army, 1945," in Forest Ray Moulton, Ed., _Rickettsial
Diseases of Man_, Am. Acad. for the Advancement of Science, Washington D.C.
1948.
6. _Toronto Star_, February 8, 1985, p. A2.
7. _New York Times_, 24 September 1948, p. 3.
8. Interview with Lucius Clay, _Official Proceeding of the George C. Marshall
Research Foundation,_ cited in "Buchenwald: Legend and Reality," Mark
Weber, _The Journal of Historical Review_, Vol. 7, no. 4.
9. International Military Tribunal, Vol. XVII, p. 556; IMT, Vol. XX, pp. 489,
438.
10. Cited in _The Theory and Practice of Hell_, Eugen Kogon, Berkley Books, New
York, pp. 108-109.
11. Nuremberg document NO-1523.
12. _Buchenwald: A Preliminary Report_, Egon W. Fleck and Edward A. Tenenbaum,
U.S. Army, 12th Army Group, 24 April 1945. National Archives, Record Group
331, SHAEF, G-5, 17.11, Jacket 10, Box 151 (8929/163-8929/180).
13. "Communist Atrocities at Buchenwald," Donald B. Robinson, in _American
Mercury_, October 1946.
14. _San Bernardino Sun-Telegram_, March 13, 1966 (cited in _The Man Who
Invented "Genocide"_, James J. Martin, Institute for Historical Review,
IHR, 1984, pp. 110-111.
15. _Concentration Camp at Natzwiller [sic]_, RG 331, Records of Allied
Operations and Occupation, Army Headquarters WW2, SHAEF/G-5/2717, Modern
Military, National Archives, Washington, D.C., cited in Robert H. Abzug,
_Inside the Vicious Heart_, Oxford University Press, New York, 1985, p. 10,
p. 181.
16. _Die Zeit_, Hamburg, Germany, August 26, 1960.
17. _Books & Bookmen_, April 1975, Vol. 7, p. 5.
18. Leaflet, _Memorial Site Concentration Camp Dachau_, The International
Dachau-Committee, Dachau, Germany, n.d.
_______________________________________________________________________________
Theodore J. O'Keefe is the editor of "The Journal of Historical Review." Educated at Harvard, he has studied history and literature on three continents, and has published many articles on historical and political subjects.
_____________________________________________________________________________
| |
| The conclusions of the early U.S. Army investigations as to the |
| truth about the wartime German concentration camps have since been |
| corroborated by all subsequent investigators and can be summarized: |
| |
| 1. The harrowing scenes of dead and dying inmates were not the result of |
| a German policy of "extermination," but rather the result of epidemics of |
| typhus and other disease brought about largely by the effects of Allied |
| aerial attacks. |
| |
| 2. Stories of Nazi supercriminals and sadists who turned Jews and others |
| into handbags and lampshades for their private profit or amusement were |
| sick lies or diseased fantasies; indeed, the German authorities |
| consistently punished corruption AND cruelty on the part of camp |
| commanders and guards. |
| |
| 3. On the other hand, the representations of the newly liberated inmates |
| to have been saints and martyrs of Hitlerism were quite often very far |
| from the truth; indeed, most of the brutalities inflicted on camp |
| detainees were the work of their fellow prisoners, in contravention of |
| German policy and German orders. |
| |
| 4. The alleged homicidal showers and gas chambers had been used either |
| for bathing camp inmates or delousing their clothes; the claim that they |
| had been used to murder Jews or other human beings is a contemptible |
| fabrication. Orthodox, Establishment historians and professional "Nazi- |
| hunters" have quietly dropped claims that inmates were gassed at Dachau, |
| Buchenwald, and other camps in Germany. They continue, however, to keep |
| silent regarding the lies about Dachau and Buchenwald, as well as to |
| evade an open discussion of the evidence for homicidal gassing at |
| Auschwitz and the other camps captured by the Soviets. |
|_____________________________________________________________________________|
Send $2 for a packet of literature and a full listing of books, audio cassettes and videotapes. Or, order more copies of this leaflet, postpaid, at the following prices:
10 copies: $2
50 copies: $5
100 copies or more: 8 cents each
THE INSTITUTE FOR HISTORICAL REVIEW
1822 1/2 Newport Blvd., Suite 191
Costa Mesa, California 92627

114
txt_files/carter.txt Normal file
View File

@ -0,0 +1,114 @@
-------------------------------------------------------------------------------
CARTER'S TRUE LEGACY SHOCKING
By Mike Blair
Exclusive to The SPOTLIGHT
Washington, DC -- While many frown when they think of the high interest
rates, U.S. hostages held abroad and foreign policy giveaways associated
with the Carter administration, former President Jimmy Carter's true legacy
may be even more shocking than imagined.
Carter seemingly ran an end run around a law passed in the wake of
Watergate and signed before Carter took office, which limited White House
powers, when he formed the Federal Emergency Management Agency (FEMA).
FEMA was based on Richard Nixon's Executive Order (EO) 11490.
The legislation contained nearly 200,000 words on 32 pages. It
pertained to every executive order ever issued unless specifically revoked.
When Carter took office, EO 11490 was incorporated into a new order
allowing a president to assume dictatorial powers during any self-
proclaimed "emergency" situation; these powers will remain with a president
until specifically revoked by Congress.
Some senators thought they had successfully squashed the chief
executive's "national emergency" powers more than 10 years ago, after a
bipartisan congressional committee pushed the National Emergencies Act into
law.
Until September 14, 1976, the nation's chief executive officer was
empowered by more than 470 special statues to "seize property, organize and
control the means of production, seize commodities, institute martial law,
seize and control all transportation and communication, regulate the
operation of private enterprise, restrict travel and, in a host of other
ways, control the lives of Americans," then-Sen. Frank Church (D-Idaho)
said in the _Congressional Record_.
The National Emergencies Act, which took effect in 1978, was supposed
to prevent the nation from turning into a potential dictatorship.
Presidents had used their "emergency" powers at least four times in the
previous 45 years.
The president held this little-known sway over citizens through
executive orders, which he could write into law in a moment's notice. No
group, neither elected officials, business leaders, nor private citizens,
had the power to void these laws.
Franklin Roosevelt invoked a national emergency in 1933 to deal with
the banking crisis, and Harry Truman responded to the Korean War with an
emergency act in 1950.
Richard Nixon declared a pair of crises. In March 1970 he declared a
national emergency to deal with the post office strike. The Nixon White
House was at it again 16 months later when it implemented currency
restriction in August of 1971 in order to control foreign trade.
Then, in 1976, after two years of public hearings and committee
meetings, a bipartisan special congressional Committee on Emergency Powers
pushed legislation to wrestle power from the White House.
The National Emergencies Act became law on September 14, 1978,.
Senators used the second anniversary of their law to pat each other on the
back -- through the _Congressional Record_ -- and to attempt to establish
Congress's role in national security.
"The Congress must never again trade away its responsibilities in the
name of national emergency," Church said. "Let that be one of the lessons
learned from the investigation completed, the passage of the National
Emergencies Act and the termination today of emergency powers."
Church's warning fell on deaf ears. Less than one year later,
President Jimmy Carter ordered into being an entire apparatus --
unprecedented in American history -- designed to seize and exercise all
political, economic and military power in the United States.
Carter, Ronald Reagan, George Bush or any future president could
establish himself as total dictator.
Carter did this with an executive order -- EO 12148.
An executive order has never been defined by Congress. The validity
of such directives has been questioned many times, but there has never been
a decision made by the courts or Congress on how far-reaching executive
orders may be.
Through existing executive orders it is possible for one person to
ignore the Constitution, Congress and the will of the American people. A
complete dictatorship can be imposed under the veil of law.
A declaration by the president of the existence of a "national
emergency" has always stopped short of martial law, although the president
has that prerogative. Undoubtedly it would be exercised in the event of an
attack on the United States.
An attempt was made to incorporate all the "national emergency" powers
into one law under Nixon. However, in the wake of the Watergate scandal,
he was unable to pull off the presidential coup.
Carter, a Trilateralist, did.
-----------------
Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:
The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003

802
txt_files/castro.txt Normal file
View File

@ -0,0 +1,802 @@
CUBA, CASTRO, and the UNITED STATES
or
How One Man With A Cigar
Dominated American Foreign Policy
In 1959, a rebel, Fidel Castro, overthrew the reign of
Fulgencia Batista in Cuba; a small island 90 miles off the
Florida coast. There have been many coups and changes of
government in the world since then. Few if any have had the
effect on Americans and American foreign policy as this one.
In 1952, Sergeant Fulgencia Batista staged a successful
bloodless coup in Cuba .
Batista never really had any cooperation and rarely
garnered much support. His reign was marked by continual
dissension.
After waiting to see if Batista would be seriously opposed,
Washington recognized his government. Batista had already
broken ties with the Soviet Union and became an ally to the
U.S. throughout the cold war. He was continually friendly and
helpful to American business interest. But he failed to bring
democracy to Cuba or secure the broad popular support that
might have legitimized his rape of the 1940 Constitution.
As the people of Cuba grew increasingly dissatisfied with
his gangster style politics, the tiny rebellions that had
sprouted began to grow. Meanwhile the U.S. government was
aware of and shared the distaste for a regime increasingly
nauseating to most public opinion. It became clear that Batista
regime was an odious type of government. It killed its own
citizens, it stifled dissent. (1)
At this time Fidel Castro appeared as leader of the growing
rebellion. Educated in America he was a proponent of the
Marxist-Leninist philosophy. He conducted a brilliant guerilla
campaign from the hills of Cuba against Batista. On January
1959, he prevailed and overthrew the Batista government.
Castro promised to restore democracy in Cuba, a feat
Batista had failed to accomplish. This promise was looked
upon benevolently but watchfully by Washington. Castro was
believed to be too much in the hands of the people to stretch
the rules of politics very far. The U.S. government supported
Castro's coup. It professed to not know about Castro's
Communist leanings. Perhaps this was due to the ramifications
of Senator Joe McCarty's discredited anti-Communist diatribes.
It seemed as if the reciprocal economic interests of the
U.S. and Cuba would exert a stabilizing effect on Cuban
politics. Cuba had been economically bound to find a market for
its #1 crop, sugar. The U.S. had been buying it at prices much
higher than market price. For this it received a guaranteed
flow of sugar. (2)
Early on however developments clouded the hope for peaceful
relations. According to American Ambassador to Cuba, Phillip
Bonsal, "From the very beginning of his rule Castro and his
sycophants bitterly and sweepingly attacked the relations of
the United States government with Batista and his regime".(3)
He accused us of supplying arms to Batista to help overthrow
Castro's revolution and of harboring war criminals for a
resurgence effort against him. For the most part these were
not true: the U.S. put a trade embargo on Batista in 1957
stopping the U.S. shipment of arms to Cuba. (4) However, his
last accusation seems to have been prescient.
With the advent of Castro the history of U.S.- Cuban
relations was subjected to a revision of an intensity and
cynicism which left earlier efforts in the shade. This
downfall took two roads in the eyes of Washington: Castro's
incessant campaign of slander against the U.S. and Castro's
wholesale nationalization of American properties.
These actions and the U.S. reaction to them set the stage
for what was to become the Bay of Pigs fiasco and the end of
U.S.- Cuban relations.
Castro promised the Cuban people that he would bring land
reform to Cuba. When he took power, the bulk of the nations
wealth and land was in the hands of a small minority. The huge
plots of land were to be taken from the monopolistic owners and
distributed evenly among the people. Compensation was to be
paid to the former owners. According to Phillip Bonsal, "
Nothing Castro said, nothing stated in the agrarian reform
statute Castro signed in 1958, and nothing in the law that was
promulgated in the Official Gazzette of June 3, 1959, warranted
the belief that in two years a wholesale conversion of Cuban
agricultural land to state ownership would take place".(5) Such
a notion then would have been inconsistent with many of the
Castro pronouncements, including the theory of a peasant
revolution and the pledges to the landless throughout the
nation. Today most of the people who expected to become
independent farmers or members of cooperatives in the operation
of which they would have had a voice are now laborers on the
state payroll. (6)
After secretly drawing up his Land Reform Law, Castro used
it to form the National Institute of Agrarian Reform (INRA)
with broad and ill defined powers. Through the INRA Castro
methodically seized all American holdings in Cuba. He promised
compensation but frequently never gave it. He conducted
investigations into company affairs, holding control over them
in the meantime, and then never divulging the results or giving
back the control. (7)
These seizures were protested. On January 11 Ambassador
Bonsal delivered a note to Havana protesting the Cuban
government seizure of U.S. citizens property. The note was
rejected the same night as a U.S. attempt to keep economic
control over Cuba. (8)
As this continued Castro was engineering a brilliant
propaganda campaign aimed at accusing the U.S. of "conspiring
with the counter revolutionaries against the Castro regime"(9).
Castro's ability to whip the masses into a frenzy with wispy
fallacies about American "imperialist" actions against Cuba was
his main asset. He constantly found events which he could work
the "ol Castro magic " on, as Nixon said , to turn it into
another of the long list of grievances, real or imagined, that
Cuba had suffered.
Throughout Castro's rule there had been numerous minor
attacks and disturbances in Cuba. Always without any
investigation whatsoever, Castro would blatantly and publicly
blame the U.S..
Castro continually called for hearings at the Organization
of American States and the United Nations to hear charges
against the U.S. of "overt aggression". These charges were
always denied by the councils. (10)
Two events that provided fuel for the Castro propaganda
furnace stand out. These are the "bombing" of Havana on
October 21 and the explosion of the French munitions ship La
Coubre on March 4, 1960.(11)
On the evening of October 21 the former captain of the
rebel air force, Captain Dian-Lanz, flew over Havana and
dropped a quantity of virulently anti-Castro leaflets. This was
an American failure to prevent international flights in
violation of American law. Untroubled by any considerations of
truth or good faith, the Cuban authorities distorted the
facts of the matter and accused the U.S. of a responsibility
going way beyond negligence. Castro, not two days later,
elaborated a bombing thesis, complete with "witnesses", and
launched a propaganda campaign against the U.S. Ambassador
Bonsal said, "This incident was so welcome to Castro for his
purposes that I was not surprised when, at a later date, a
somewhat similar flight was actually engineered by Cuban secret
agents in Florida."(12)
This outburst constituted "the beginning of the end " in
U.S.- Cuban relations. President Eisenhower stated ,"Castro's
performance on October 26 on the "bombing" of Havana spelled
the end of my hope for rational relations between Cuba and the
U.S."(13)
Up until 1960 the U.S. had followed a policy of non
intervention in Cuba. It had endured the slander and seizure
of lands, still hoping to maintain relations. This ended,
when, on March 4, the French munitions ship La Coubre arrived
at Havana laden with arms and munitions for the Cuban
government. It promptly blew up with serious loss of life. (14)
Castro and his authorities wasted no time venomously
denouncing the U.S. for an overt act of sabotage. Some
observers concluded that the disaster was due to the careless
way the Cubans unloaded the cargo. (15) Sabotage was possible
but it was preposterous to blame the U.S. without even a
pretense of an investigation.
Castro's reaction to the La Coubre explosion may have been
what tipped the scales in favor of Washington's abandonment of
the non intervention policy. This, the continued slander, and
the fact that the Embassy had had no reply from the Cuban
government to its representations regarding the cases of
Americans victimized by the continuing abuses of the INRA.
The American posture of moderation was beginning to become,
in the face of Castro's insulting and aggressive behavior, a
political liability. (16)
The new American policy, not announced as such, but
implicit in the the actions of the United States government was
one of overthrowing Castro by all means available to the U.S.
short of open employment of American armed forces in Cuba.
It was at this time that the controversial decision was
taken to allow the CIA to begin recruiting and training of
ex-Cuban exiles for anti-Castro military service. (17)
Shortly after this decision, following in quick steps,
aggressive policies both on the side of Cuba and the U.S. led
to the eventual finale in the actual invasion of Cuba by the
U.S!
In June 1960 the U.S. started a series of economic
aggressions toward Cuba aimed at accelerating their downfall.
The first of these measures was the advice of the U.S. to
the oil refineries in Cuba to refuse to handle the crude
petroleum that the Cubans were receiving from the Soviet Union.
The companies such as Shell and Standard Oil had been buying
crude from their own plants in Venezuela at a high cost. The
Cuban government demanded that the refineries process the crude
they were receiving from Russia at a much cheaper price. These
refineries refused at the U.S. advice stating that there were
no provisions in the law saying that they must accept the
Soviet product and that the low grade Russian crude would
damage the machinery. The claim about the law may have been
true but the charge that the cheaper Soviet
crude damaging the
machines seems to be an excuse to cover up the attempted
economic strangulation of Cuba. (The crude worked just fine as
is soon to be shown)
Upon receiving the refusal Che Gueverra, the newly
appointed head of the National Bank,and known anti-American,
seized all three major oil company refineries and began
producing all the Soviet crude,not just the 50% they had
earlier bargained for. This was a big victory and a stepping
stone towards increasing the soon to be controversial alliance
with Russia.
On July 6, a week after the intervention of the refineries,
President Eisenhower announced that the balance of Cuba's 1960
sugar quota for the supply of sugar to the U.S. was to be
suspended. (18). This action was regarded as a reprisal to
the intervention of the refineries. It seems obvious that it
was a major element in the calculated overthrow of Castro.
In addition to being an act of destroying the U.S. record
for statesmanship in Latin America, this forced Cuba into
Russia's arms and vice-versa.
The immediate loss to Cuba was 900,000 tons of sugar
unsold. This was valued at about $100,000,000.(19) Had the
Russians not come to the rescue it would have been a serious
blow to Cuba. But come to the rescue they did, cementing the
Soviet-Cuban bond and granting Castro a present he could have
never given himself. As Ernest Hemingway put it,"I just hope to
Christ that the United States doesn't cut the sugar quota. That
will really tear it. It will make Cuba a gift to the
Russians." (20) And now the gift had been made.
Castro had announced earlier in a speech that action
against the sugar quota would cost Americans in Cuba "down to
the nails in their shoes" (21) Castro did his best to carry
that out. In a decree made as the Law of Nationalization, he
authorized expropriation of American property at Che Gueverra's
discretion. The compensation scheme was such that under
current U.S. - Cuban trade relations it was worthless and
therefore confiscation without compensation.
The Soviet Unions assumption of responsibility of Cuba's
economic welfare gave the Russians a politico-military stake in
Cuba. Increased arms shipments from the U.S.S.R and
Czechoslovakia enabled Castro to rapidly strengthen and expand
his forces. On top of this Cuba now had Russian military
support. On July 9, three days after President Eisenhowers
sugar proclamation, Soviet Premier Nikita Kruschev announced,
"The U.S.S.R is raising its voice and extending a helpful hand
to the people of Cuba.....Speaking figuratively in case of
necessity Soviet artillerymen can support the Cuban people with
rocket fire. (22) Castro took this to mean direct commitment
made by Russia to protect the Cuban revolution in case of U.S.
attack. The final act of the U.S. in the field of economic
aggression against Cuba came on October 19, 1960, in the form
of a trade embargo on all goods except medicine and medical
supplies. Even these were to be banned within a few months.
Other than causing the revolutionaries some inconvenience, all
the embargo accomplished was to give Castro a godsend. For the
past 25 years Castro has blamed the shortages, rationings,
breakdowns and even some of the unfavorable weather conditions
on the U.S. blockade.
On January 6, 1961, Castro formally broke relations with
the United States and ordered the staff of the U.S. embassy to
leave. Immediately after the break in relations he ordered
full scale mobilization of his armed forces to repel an
invasion from the United States, which he correctly asserted
was imminent. For at this time the Washington administration,
under new President-elect Kennedy was gearing up for the Cuban
exile invasion of Cuba. The fact that this secret was ill kept
led to increased arms being shipped to Cuba by Russia in late
1960.
President Kennedy inherited from the Eisenhower-Nixon
administration the operation that became the Bay of Pigs
expedition. The plan was ill conceived and a fiasco.
Both Theodore Sorensen and Arthur Schlesinger describe the
President as the victim of a process set in motion before his
inauguration and which he, in the first few weeks of his
administration, was unable to arrest in spite of his
misgivings. Mr. Schlesinger writes -"Kennedy saw the project
in the patios of the bureaucracy as a contingency plan. He did
not yet realize how contingency planning could generate its own
reality." (23)
The fact is that Kennedy had promised to pursue a more
successful policy towards Cuba. I fail to see how the proposed
invasion could be looked upon as successful. The plan he
inherited called for 1500 patriots to seize control over their
seven million fellow citizens from over 100,000 well trained,
well armed Castroite militia!
As if the plan wasn't doomed from the start, the
information the CIA had gathered about the strength of the
uprising in Cuba was outrageously misleading. If we had won,
it still would have taken prolonged U.S. intervention to make
it work. This along with Kennedys decision to rule out
American forces or even American officers or experts, whose
participation was planned, doomed the whole affair.
Additionally these impromptu ground rules were not relayed
to the exiles by the CIA, who were expecting massive U.S.
military backing!
The exiles had their own problems; guns didn't work, ships
sank, codes for communication were wrong, the ammunition was
the wrong kind - everything that could go wrong, did. As could
be imagined the anti-Castro opposition achieved not one of its
permanent goals. Upon landing at the Bay of Pigs on April 17,
1961, the mission marked a landmark failure in U.S. foreign
politics. By April 20, only three days later, Castro's forces
had completely destroyed any semblance of the mission: they
killed 300 and captured the remaining 1,200!
Many people since then have chastised Kennedy for his
decision to pull U.S. military forces. I feel that his only
mistake was in going ahead in the first place, although, as
stated earlier, it seems as if he may not have had much choice.
I feel Kennedy showed surer instincts in this matter than
his advisors who pleaded with him not to pull U.S. forces. For
if the expedition had succeeded due to American armed forces
rather than the strength of the exile forces and the anti-
Castro movement within Cuba, the post Castro government would
have been totally unviable: it would have taken constant
American help to shore it up. In this matter I share the
opinion of `ambassador Ellis O. Briggs, who has written "The
Bay of Pigs operation was a tragic experience for the Cubans
who took part, but its failure was a fortunate (if mortifying)
experience for the U.S., which otherwise might have been
saddled with indefinite occupation of the island.
Beyond its immediately damaging effects, the Bay of Pigs
fiasco has shown itself to have far reaching consequences.
Washington's failure to achieve its goal in Cuba provided
the catalyst for Russia to seek an advantage and install
nuclear missiles in Cuba. The resulting "missile crisis" in
1962 was the closest we have been to thermonuclear war.
America's gain may have been America's loss. A successful
Bay of Pigs may have brought the United States one advantage.
The strain on American political and military assets resulting
from the need to keep the lid on in Cuba might have lid on Cuba
might have led the President of the United States to resist,
rather than to enthusiastically embrace, the advice he received
in 1964 and 1965 to make a massive commitment of American air
power, ground forces, and prestige in Vietnam.
Cuban troops have been a major presence as Soviet
surrogates all over the world, notably in Angola.
The threat of exportation of Castro's revolution permeates
U.S.-Central and South American policy. (Witness the invasion
of Grenada.)
This fear still dominates todays headlines. For years the
U.S. has urged support for government of El Salvador and the
right wing Contras in Nicaragua. The major concern underlying
American policy in the area is Castro's influence. The fear of
a Castro influenced regime in South and Central America had
such control of American foreign policy as to almost topple the
Presidency in the recent Iran - Contra affair. As a result the
U.S. government has once again faced a crisis which threatens
to destroy its credibility in foreign affairs. All because of
one man with a cigar.
In concluding I would like to state my own feelings on the
whole affair as they formed in researching the topic. To
start, all the information I could gather was one-sided. All
the sources were American written, and encompassed an American
point of view. In light of this knowledge, and with the
advantage of hindsight, I have formulated my own opinion of
this affair and how it might have been more productively
handled. American intervention should have been held to a
minimum. In an atmosphere of concentration on purely Cuban
issues, opposition to Castro's personal dictatorship could be
expected to grow. Admittedly, even justified American
retaliation would have led to Cuban counterretaliation and so
on with the prospect that step by step the same end result
would have been attained as was in fact achieved. But the
process would have lasted far longer; measured American
responses might have appeared well deserved to an increasing
number of Cubans, thus strengthening Cuban opposition to the
regime instead of, as was the case, greatly stimulating
revolutionary fervor, leaving the Russians no choice but to
give massive support to the Revolution and fortifying the
belief among anti-Castro Cubans that the United States was
rapidly moving to liberate them. The economic pressures
available to the United States were not apt to bring Castro to
his knees, since the Soviets were capable of meeting Cuban
requirements in such matters as oil and sugar. I believe the
Cuban government would have been doomed by its own
disorganization and incompetence and by the growing
disaffection of an increasing number of the Cuban people. Left
to its own devices, the Castro regime would have withered on
the vine.
ammunition was
the wrong kind - everything that could go wrong, di
Downloaded from Just Say Yes. 2 lines, More than 1500 files online!
Do you write? Give us a call! 415-922-2008 CASFA
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron 415-935-5845
Just Say Yes 415-922-1613
Rat Head 415-524-3649
Cheez Whiz 408-363-9766
Reality Check 415-474-2602
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"

524
txt_files/celine.txt Normal file
View File

@ -0,0 +1,524 @@
CELINE'S LAWS
by Hagbard Celine
As every thinking person has noticed, our national life has
become increasingly weird and surrealistic. The waiting lines at
banks and post offices are growing longer all the time, even
though demographers tell us US population is no longer rising.
The street signs more often than not say WALK on the red and
DON"T WALK on the green. You can't get a plumber on the
weekends. Nobody has been able to explain the cattle mutilations
yet. Every survey shows that the price of consumer goods, the
number of violent crimes, and the eerie popularity of THE GONG
SHOW are ominously accelerating.
I believe I have found the explanation these distressing
trends. Needless to say, I cannot present, in a short article,
all the evidence which I have accumulated in three decades of
careful metasociological research; that will have to await the
publication of my three-volume study, "Why Everybody Is Going
Bonkers." Here I can only mention the thousands of depth
interviewws, the innumerable flowcharts and helix-matrix
equations, the vast files of computer readouts, the I CHING
divinations, and other rigorous scientific techniques used in
developing what I modestly call Celine's Laws of Chaos, Discord
and Confusion.
Celine's First Law is that National Security is the chief
cause of national insecurity!
That may sound like a paradox, but I will explain it at one.
Every secret police agency must be monitored by an elite corps
of secret-police-of-the-second-order. There are numerous reasons
for this, but three are especially noteworthy.
********************************************************************************************
NATIONAL SECURITY IS THE CHIEF CAUSE OF NATIONAL INSECURITY!!!
*******************************************************************************
1). Infiltration of the secret police, for the purpose of
subversion, will always be a prime goal of internal
revolutionaries. This is an ordinary part of the spy-counterspy
game. There is nothing Weather Underground would like better
than having a few agents in the FBI or CIA, for the same reasons
that the FBI or CIA would like to have a few agents in Weather
Underground.
2). Such infiltration will also be a prime goal of hostile
foreign powers, for the same reasons.
Please note that these are simple facts of the secret-police
game, well-known even to the general public, the subject of many
ingenious plots in popular spy films, and not particularly
alarming...yet. Nonetheless, the seeds of Chaos, Discord,
Confusion, and Paranoia are already here, for the simple reason
that once a human being develops the habits of worry and
suspicion, he or she finds increasing justifications for more
worry and more suspicion. For instance, Richard Q. (not his real
initial), one of my interview subjects, became concerned, after
ten years in the CIA, with the possibility of infiltration by
"extraterrestrial" agents. He was eventually retired when he
began to claim that demons in the form of dogs wanted him to
assassinate Laverne and Shirley.
3). Secret-police officials acquire fantastic capacities to
blackmail and intimidate others in goverment.
Stalin executed three chiefs of his secret police in a row,
because of this danger. One of my informants claims that every
president since the National Security Act was passed in 1947 has
learned how to have sexual intercourse without making a single
audible sound, because of the possible electronic eavesdroppers.
As Nixion says so wistfully on the Watergate transcripts, "Well,
Hoover performed. He would have fought. That was the point. He
would have defied a few people. He would have scared them to
death. HE HAS A FILE ON EVERYBODY!" <Caps added>. Thus, those
who employ secret-police organizations MUST monitor them th be
sure they are not acquiring too much power.
In the United States today, the superelite that monitors the
CIA is the National Security Agency. ( And a group called "The
Store" monitors the NSA).
Here is where a sinister infinite regress enters the game.
Any such elite, second or third order secret-police agency must
be, according to the above pragmatic and necessary rules, subject
to infiltration by native subversives or hostile foreign powers,
or to acquiring "too much power" in the opinion of its masters.
(It may even be subject, if Richard Q. was correct in his
anxieties, to extraterrestrial manipulation). And so, it, too,
must be monitored by a secret police of the third order.
But this third-order secret-police (such as Nixon's notorious
"plumbers", or more currently, "The Store"). is also subject to
infiltration or to acquiring too much power...and thus, with
relentless logic, the infinite regress builds. Once a goverment
has n orders of secret police spying on each other, all are
potentially suspect, and to be safe a secret police of order n+1
must be created. And so on, forever.
******************************************
* THUS WHO EMPLOY SECRET *
* POLICE MUST MONITOR THEM TO *
* BE SURE THEY ARE NOT ACQUIRING *
* TOO MUCH POWER. *
******************************************
In practice, of course, this cannot really regress to
infinity, but only to the point where every other citizen, or
until the funding runs out, whichever comes first.
National Security in practice, then, must always fall short of
the logically ideal infinite regress which we have shown is
necessary to the achievement of its goal. In that gap between
the ideal of "One nation under survillance, with wiretaps and
mail covers for all" andthe strictly limited real situation of
finite funding, there is ample encouragement for paranoias of all
sorts to flourish. In short, every government that employs
secret-police agencies must grow more insecure, not more secure,
as the strength, versatility, and power of the secret-police
agencies grow.
For instance, a certain left-wing nation which has employed
secret-police agencies for 61 years has now reached the point
where the leaders are terrified of painters and poets. In
another, right-wing nation infested with secret-police agencies,
several purges have been caused by three practical jokers who
regularly call middle-rank officials on the phone and talk in
what appears to be a code. The secret police, of course, are no
fools, and are aware that this might be what it in fact is, a
form of anarchist humor; but they can't be sure.
What usually happens in such cases is this: an official
receives one of these mystery calls, saying perhaps "Pawn to
queen rook five. No wife, no horse, no mustache. A boy has never
wept nor dashed a thousand kim." He knows immediately that
surveillance upon him will be increased tenfold. In the next few
days, while memories of all his mistakes, small bribes,
incautious remarks, and other incriminating events haunt his
imagination, he observes the increased surveillance, and begins
to suspect even the most loyal of his subordinates of watching
him with eyes that miss nothing and to give a sinister
interpertation to everything. Within ten days, he usually
attempts to contact a foreign goverment to seek political
sanctuary, and the secret-police net closes on him.
By the same process of worry leading to more worry and
suspicion leading to more suspicion, the very act of joining a
ecret-police organization will eventually turn a man or woman
into a clinical paranoi; in layman's terms, "bananas" or "wigged
out." THE AGENT KNOWS WHOM HE IS SPYING ON; BUT HE NEVER KNOWS
WHO IS SPYING ON HIM! Could it be his wife, his girl friend, his
secretary, the newsboy, the Good Humor man?
For these reasons, secret-police agents develop elaborate and
complex theories to account for what is actually going on.
According to one of my tables of data, there isn't a single
theory held by professional conspiracy buffs which isn't also
believed by many members of our various secret-police agencies.
In fact, the exact percentages of believes in these extravagant
scenarios are quite similar among a group of 1,000 CIA agents and
a control group of 1,000 readers of the underground press, as
shown in table 1.
Table 1. True Believes in various Conspiracy Theories Among CIA
Agents and Underground-Press Readers.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: :: :: UNDERGROUND PRESS ::
::CONSPIRACY THEORY :: CIA :: READERS ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::The Yankees (Eastern :: :: ::
::millionaires) run :: 25% :: 30% ::
::everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: The Cowboys(Western :: :: ::
:: millionaires) run :: 25% :: 15% ::
:: everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the result of :: :: ::
:: civil war between :: 23% :: 17% ::
::Yankees and Cowboys :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the 33 degree :: :: ::
:: Masons :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the Jesuits :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Elders of Zion :: 2% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Military :: :: ::
::Industrial Complex :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Bilderbergers :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Gnomes of :: :: ::
:: Zurich :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Lesbian :: :: ::
:: Vegetarians :: 10% :: 28% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Rock n Roll :: :: ::
:: Empire :: 2% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
a). Source: Gallup, Roper, and Hogtied, "WHO'S WATCHING WHOM"
(Washington, DC: US Goverment Printing Office, 1979), p. 432.
b). All figures are percentages. Figures do not add to 100, for
a variety of reasons. For a list of them, please send 25 cents
and a list of suspicious persons in your neighborhood to the US
Dept. of Bedding, Washington DC 20001.
c). Includes those who blame it all on the Bavarian Illuminati;
those who hold a multiconspiracy theory (e.g., the Lesbian
Vegetarians are allied with the Yankees and Bilderbergers against
the Cowboys, the TV Networks, and the Cattle Mutilators); those
who believe it is all part of the UFO Cover-Up; and those who
claim that demons in the form of dogs told them it's connected
somehow with the alligators in New York's sewers.
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
************************************
* IN RUSSIA, THE GOVERMENT IS *
* TERRIFIED OF PAINTERS AND POETS! *
************************************
Now, Table 1 clearly gives a picture of a rather schizzed-out
nation. This is the result of the impossible infinite regress
and its resultant of worry leading to more worry.
Furthermore, if there is a secret police at all, in any nation
you care to imagine, every branch and department of that
country's government becomes suspect, in the eyes of cautious and
intelligent people, as a possible front or funnel to the secret
police. (That is, the more shrewd citizens will recognize that
something titled a branch of the HEW or even PTA might actually
be run by the CIA). Inevitably, the government as a whole, and
many nongovernmental agencies, will be regarded by reasonable
persons with fear and trepidation. Proverbs like "One can't be
too careful these days" and "Better safe than sorry" become a
kind of sinister folk wisdom.
But further yet: any government which already has a secret
police (and a secret police monitoring the secret police, etc).
will become alarmed on observing that its more hip and
intelligent citizens now regard it with loathing and misgivings.
The government will therefore increase the size and powers of the
secret police. This is the only rational move, within the
context of the secret-police game.
******************************
* SOMETHING PASSING AS A *
* BRANCH OF HEW MIGHT BE A *
* FRONT FOR THE CIA! *
******************************
(The only alternative was once suggested sarcastically by
playwright Bert Brecht, who said, "If the government doesn't
trust the people, why does'nt it dissovle them and elect new
people?" No way has yet been invented to elect a new people; so
the police state will instead spy on the existing people even
more vigorously).
This, of course, creates additional paranoia in both the
governors and the citizens, because a suffciently pugnacious
secret police will eventually "have a file on everybody,"
including its own creators. This leads to another infinite
regress: the more people will loathe the government, the more
power will be given to the secret police.
Thus, whether any of the hypothetical conspiracies mentioned
earlier really exist or not, a system of clandestine goverment
inevitably produces, in both the rulers and the ruled, a mood of
paranoia in which such conspiracy theories flourish.
This escalating sense of suspiciousness is accelerated by the
fact that every secret-police organization engages in both the
collection of information and the production misinformation.
That is, you score points in the secret-police game both by
hoarding signals (information units)---that is, by hiding facts
from competitive players---and by foisting false signals (fake
information units) on the other players. This creates the
situation which I call Optimum Fuckup, in which every participant
has rational (not neurotic) cause to suspect that every other
player may be attempting to deceive him, gull him, con him, dupe
him, and generally misinform him. As Henry Kissinger is rumored
to have said, "Anybody in Washington these days who isn't
paranoid is crazy!"
One could generalize the remark: anyone in the United States
today who isn't paranoid must be crazy!!!
**********************************
* "IF THE GOVERMENT DOESN'T *
* TRUST THE PEOPLE, WHY DOESN'T *
* IT DISSOLVE THEM AND ELECT A *
* NEW PEOPLE?" *
**********************************
The deliberate production of misinformation (or, as
intelligence agencies more euphemistically call it,
disinformation) creates a situation profoundly disorienting to
the philosopher, the scientist, and the ordinary Joe who wants to
know the best time to go to the bank. The desire to discover
"what-the-hell-is-really-going-on" (the definition of science
offered by physicist Saul-Paul Sirag) is totally incompatible
with the circulation of disinformation; we all need to know, at
least roughly, what the hell is really going on if we are not to
stumble around like blind robots colliding with things we weren't
told were there.
Maybe the UFO's really exist---or maybe the whole UFO
phenomenon is a cover for an intelligence operation. Maybe there
are black holes where space and time implode---or maybe the
entire black-hole cosmology was created to befuddle and mislead
Russian scientists. Maybe Jimmy Carter really exists---or maybe
he is, as the National Lampoon claims, an actor named Sidney
Goldfarb specially trained to project the down-home virtues that
the American people nostalgically seek. Perhaps only three men
at the top of the National Security Angency REALLY know the
answers to these questions---or perhaps those three are being
deceived by certain subordinates (as Lyndon Johnson was deceived
by the CIA about Vietnam) and are as disoriented as the rest of
us. Such is the logic of a Disinformation Matrix.
Personally, I find it easier to believe in UFO's than in black
holes or Jimmy Carter; but that may just indicate the damage to
my own brain caused by the Optimum Fuckup of the Disinformation
Matrix.
According to a recent survey 19 per cent of the population
believe the moon landings were faked by Stanley Kubrick and a
gang of special effects experts. Perhaps these archskeptics are
the sanest ones left among us. Who among the readers of this
file has a security clearance high enough to be ABSOLUTELY sure
that these ultraparanoids are wrong?
This general tendency toward chaos discord, and confusion,
once a secret police has been established, is complicated and
accelerated by Celine's Second Law, to wit: "Accurate
communication is only possible in a nonpunishing situation."
This is a very simple statement of the obvious, and means no more
than that everybody tends to lie a little, to flatter or to
protect themselves, when dealing with those who have power over
them, especially the power to punish. (this is why communication
between parents and children is notoriously befoolzled).
Every authoritarian structure can be visualized as a pyramid,
with very few at the top and very many at the bottom, as in the
flowchart of any corperation or bureaucracy. On each rung,
participants bear a burden of nescience in relation to those
above them. That is, they must be very, very careful that their
natural sensory activities as conscious organisms---the acts of
seeing, hearing, smelling, tasting, feeling, drawing inferences
from perception, etc.---be in accord with the wishes of those
above them. This is absolutely vital; job security depends on
it. It is much less important---a luxury that can easily be
discarded---that these perceptions be in accord with actual
reality.
*************************
* COMMUNICATION IS ONLY *
* BETWEEN EQUALS. *
*************************
For instance, in the FBI under J. Edgar Hoover, the agent had
to develop the capacity to see godless communists everywhere.
Any agent whose perceptions indicated that there were actually
very few godless communists anywhere in this country wold
experience what psychologists call cognitive dissonance: his or
her reality grid was at variance with the official reality grid
of the pyramidal authority structure. To talk about such
divergent perceptions at all would be to invite suspicions of
eccentricity, of intellectual wiseacreing, or of being oneself a
godless communist. The same would apply to any Dominican
Inquisitor of earlier centuries who lacked the capacity to see
witches everywhere. In such authoritarian situations, it is
important to see what the authorities see; it is inconvenient,
and possibly dangerous, to see what is actually there.
But this leads to an equal and opposite burden of omniscience
on those at the top, in the Eye of the authoritarian pyramid.
All that is forbidden to those at the bottom---the conscious
activities of perception andand evaluation---is demanded of the
master classes, the elite and the super-elite. They must attempt
to do the seeing, hearing, smelling, tasting, feeling, thinking,
and decisionmaking for the whole society.
But a man with a gun (the power to punish) is told only what
his target thinks will not cause him to pull the trigger. The
elite, with their burden of omniscience, face the underlings,
with their burden nescience, and receive only the feedback
consistent with their own preconceived notions. The burden of
omniscience becomes, in short, another and more complex burden of
nescience. Nobody really knows anything anymore, or if they do,
they are careful to hide the fact.
As the national security paradigm approaches (or attempts to
approach) the ideal infinite regress of spies-spying-on-spies-
spying-on-spies, etc., the resultant general trepidation causes
all persons to hide anything they know (if it differs from the
official reality), not only from their superiors, but from peers
and inferiors as well. Anybody, after all, might be part of the
nth-degree secret police. "One can't be too careful these days."
The burden of nescience becomes omnipresent. More and more of
reality becomes unspeakable.
But as Freud noted, that which is objectively repressed
(unspeakable) soon becomes subjectively repressed (unthinkable).
Nobody likes to feel like a coward and a liar constantly. It is
easier to cease to notice where the official reality grid differs
from sensed experience. Thus Optimun Fuckup gradually becomes
Terminal Fuckup, and rigiditus bureaucraticus sets in; this is
the last stage before all brain activity ceases, and the society
is intellectually dead.
Celine's Third Law is like unto the first two, and holds that
AN HONEST politician is a national calamity.
At first glance, this seems preposterous. People of all
shades of opinion agree that at least on the axiom that we need
more honest politicians, not more crooked ones. Please remember,
however, that people of all shades of opinion once agreed that
the Earth is flat.
Your typical dishonest politician (bocca grande normalis) is
interested only in enriching himself at the public expense, a
goal he shares with most of his fellow citizens, especially
doctors and lawyers. This is normal behavior for our primate
species, and society has always been able to endure and survive
it.
********************************
* NOBODY KNOWS ANYTHING, OR IF *
* THEY DO, THEY ARE CAREFUL TO *
* HIDE THE FACT! *
********************************
An honest politician (bocca grande giganticus) is far more
dangerous. He or she is sincerley commited to bettering society
by political action. In practice, that means by writing and
enacting more laws. Indeed, many groups of idealistic citizens
publish rating sheets on politicians every year, and those who
have created more laws are estimated as having higher value than
those who are frequently absent when bills are voted upon. The
assumption is that adding more laws to statute books is a
positive achievement, like adding more money to our paychecks or
more art works to a museum.
A little thought, however, shows that this assumption is not
tenable. Every law creates a whole new criminal class; for
instance, when marijuana was illegalized in 1937, several hundred
thousand formerly law-abiding citizens became criminals
overnight, by Act of Congress. As more and more laws are passed,
more and more citizens become criminals. The chief cause of the
rising crime rate is the rising number of laws being enacted. An
honest politician, who keeps his nose to the grindstone and
enacts several hundered laws in the course of his career, thereby
produces as many as several million new criminals.
It is furthermore mathematically demonstrable that the more
laws there are, the more restrictions there are on the freedom of
the individual. If there were, say, only three laws in a given
society---e.g., Thou shalt not kill; thau shalt not steal; thou
shalt not lie or defraud---there would be only three restrictions
on freedom, which all rational persons would accept as obviously
necessary to the maintenance of order. When there are several
hundred thousand restrictions on freedom, most of which are felt
as extremely irksome by large segments of the populace.
In fact, it would take a brigade of lawyers several weeks,
minutely examining your affairs, to determine if you are a
criminal. Certainly, no ordinary citizen has the time or
research facilities to discover if he or sshe is in violation of
one out of skillions of laws currently on our statute books. In
many cases, two lawyers consulted independently will give
opposite opinions about whether or not a given course of action
is in violation of the statutes.
And new laws are being enacted all the time. Obviously,
unless there is a sudden paper shortage, the number of laws on
the books will eventually reach the point satirized by T.H.White,
in which "everything not prohibited is compulsory." It would
then probably only take a few years or decades more for a cadre
of honest politicians diligently writing even more laws to reach
the complementary point where "everything not compulsory is
prohibited."
*********************************
* EVERY LAW CREATES A WHOLE *
* NEW CRIMINAL CLASS OVERNIGHT! *
*********************************
At that stage the nightmare world of Orwell's 1984 will be
achieved. Crooked politicians, merely interested in the normal
human activity of making themselves rich and comfortable, could
never create that ultimate horror; but honest and idealistic
politicians bring us closer to it every day, with every new law
they enact.
These three generalizations---that national security produces
national insecurity; that authoritarianism produces
miscommunication and eventual idiocy; and that honest politicians
are a plague upon society---will be found to fully explain the
Decline and Fall of Rome, the Decline and Fall of the British
Empire, and the Decline and Fall of any country you care to name.
They are as universal as Newton's laws of motion and apply to
ALL cases. Of course, the American Sociological Association says
I am mad. Mad, am I? They said the Wright Brothers were mad.
They said Edison was mad. They said Baron Frankenstein was
mad...
HABARD CELINE was trained in contract law and naval engineering
but claims he acquired his real education playing the piano in a
whorehouse. He is captain of the world's largest yellow
submarine, the Leif Erikson, and president of Gold and Appel
Inc., an import-export firm that has frequently aroused the
suspicions of law enforcement agencies ("137 arrests and no
convictions," Hagbard brags). Some claim that he is a master of
disguise and has successfully passed himself off under such
alternative identities as Howard Cork, Carl Cory, Hugh Crane,
Clutch Cargo, Captain Nemo, etc., and has appeared in countless
epics and sagas.
I am mad.
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron 415-935-5845
Just Say Yes 415-922-2008
Rat Head 415-524-3649
Cheez Whiz 408-363-9766
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"

345
txt_files/chaos.def Normal file
View File

@ -0,0 +1,345 @@
DEFINING CHAOS
by Mark Chao
Introduction
Chaos, according to the `Oxford English Dictionary' means:
1. A gaping void, yawning gulf, chasm, or abyss.
2. The `formless void' of primordial matter, the `great deep' or
'abyss' out of which the cosmos or order of the universe was
evolved.
There are a couple of additional definitions, but they are
irrelevant to this discussion. When chaos is used in magic, there
is no place for con- fusion or disorder.
Chaos is the creative principle behind all magic. When a magical
ritual is performed, regardless of `tradition' or other variables in
the elements of performance, a magical energy is created and put
into motion to cause something to happen. In his book, `Sorcery as
Virtual Mechanics', Stephen Mace cites a scientific precedent for
this creative principle.
I quote:
"To keep it simple, let us confine our example to just two
electrons, the pointlike carriers of negative charge. Let us say
they are a part of the solar wind--beta particles, as it
were--streaming out from the sun at thousands of miles a second. Say
that these two came close enough that their negative charges
interact, causing them to repel one another. How do they accomplish
this change in momentum?
"According to quantum electrodynamics, they do it by
exchanging a "virtual" photon. One electron spawns it, the other
absorbs it, and so do they repel each other. The photon is "virtual"
because it cannot be seen by an outside observer, being wholly
contained in the interaction. But it is real enough, and the
emission and absorbtion of virtual photons is how the electromagnetic
interaction operates.
"The question which is relevant to our purpose here is where
does the photon come from. It does not come out of one electron
and lodge in the other, as if it were a bullet fired from one
rock into another. The electrons themselves are unchanged, except for
their momenta. Rather, the photon is created out of nothing by the
strain of the interaction. Accord- ing to current theory, when the
two electrons come close their waveforms interact, either cancelling
out or reinforcing one another. Waveforms are intimately tied to
characteristics like electric charge, and we could thus expect the
charges on the two electrons to change. But electron charge does not
vary; it is always 1.602 x (-19) coulombs. Instead the virtual
photons appear out of the vacuum and act to readjust the system. The
stress spawns them and by their creation is the stress resolved".
Austin Spare understood this principle in regard to magical
phenomena long before scientists discovered photons or began
experiments in the area of chaos science.
Austin Osman Spare-some history
Austin Spare was born at midnight, Dec. 31st, 1886 in a London
suburb called Snow Hill. His father was a London policeman, often on
night duty.
Spare showed a natural talent for drawing at an early age, and in
1901- 1904 left school to serve an apprenticeship in a stained-glass
works, but continued his education at Art College in Lambeth.
In 1904 he won a scholarship to the Royal College of Art. In that
year he also exhibited a picture in the Royal Academy for the first
time.
In 1905 he published his first book, `Earth Inferno'. It was
primarily meant to be a book of drawings, but included commentaries
that showed some of his insight and spiritual leanings. John Singer
Sargent hailed him as a genius at age 17. At an unspecified time
in his adolescence, Spare was initiated into a witch cult by a
sorceress named Mrs. Patterson, whom Spare referred to as his "second
mother". In 1908 he held an exhibition at Bruton Gallery. In 1910
he spent a short time as a member of the Golden Dawn. Becoming
disenchanted with them, he later joined Crowley's Argentium
Astrum. The association did not last long. Crowley was said to
have considered Spare to be a Black Magician. In 1909 Spare began
creation of the `Book of Pleasure'.
In 1912 his reputation was growing rapidly in the art world. In
1913 he published the `Book of Pleasure'. It is considered to be his
most important magical work, and includes detailed instructions for
his system of sigili- zation and the "death postures" that he is well
known for. 1914-1918 he served as an official war artist. He was
posted to Egypt which had a great effect on him. In 1921, he
published `Focus of Life', another book of drawings with his unique
and magical commentaries. 1921-1924 Spare was at the height of
his artistic success, then, in 1924 he published the `Anathema
of Zos', in which he effectively excommunicated himself from his
false and trendy artistic "friends" and benefactors. He returned to
South London and obscurity to find the freedom to develop his
philosophy, art and magic.
In 1947 Spare met Kenneth Grant and became actively involved with
other well-known occultists of the period. In 1948-1956 he
began work on a definitive Grimoire of the Zos Kia Cultus, which is
referred to in his various writings. This is unfinished and
being synthesized from Spare's papers by Kenneth Grant, who inherited
all of Spare's papers. Much of this information was included in
`Images and Oracles of Austin Osman Spare' by Kenneth Grant, but
there are some unpublished works which Grant plans to publish after
completion of his Typhonian series.
References for this section are mostly from Christopher Bray's
introduc- tion to `The Collected Works of Austin Osman Spare' and from
`Excess Spare', which is a compilation by The Temple Ov Psychic
Youth of photocopied articles about Spare from various sources.
The Magic of Austin Osman Spare
Spare's art and magic were closely related. It is reputed that
there are messages in his drawings about his magical philosophy.
One particular picture of Mrs. Patterson has reportedly been
seen to move; the eyes opening and closing. Spare is best known for
his system of using sigils. Being an artist, he was very visually
oriented.
The system basically consists of writing down the desire,
preferably in your own magical alphabet, eliminating all repeated
letters, then forming a design of the remaining single letters.
The sigil must then be charged. There is a variety of specific ways to
do this, but the key element is to achieve a state of "vacuity"
which can be done through exhaustion, sexual release or several other
methods.
This creates a `vacuum' or `void' much like the condition
described in the introduction to this discussion, and it is filled
with the energy of the magician. The sigil, being now charged, must
be forgotten so that the sub-conscious mind may work on it without
the distractons and dissipation of energy that the conscious mind
is subject to. Spare recognized that magic comes from the
sub-conscious mind of the magician, not some outside `spirits' or
`gods'.
Christopher Bray has this to say about Spare's methods in his
intro- duction to `The Collected Works of Austin Osman Spare':
"So in his art and writing, Spare is putting us in the mood; or
showing by example what attitude we need to adopt to approach the
`angle of depart- ure of consciousness' in order to enter the
infinite. What pitch of con- sciousness we need to gain success.
"One must beware making dogma, for Spare went to great pains to
exclude it as much as possible to achieve success in his magic;
however a number of basic assumptions underpin chaos magic.
"Chaos is the universal potential of creative force, which is
constantly engaged in trying to seep through the cracks of our
personal and collective realities. It is the power of
Evolution/Devolution.
"Shamanism is innate within every one of us and can be tapped
if we qualify by adjusting our perception/attitude and making our
being ready to accept the spontaneous. Achieving Gnosis, or
hitting the `angle of departure of consciousness and time', is a
knack rather than a skill."
There are other methods to utilize the same concept that Spare
explains for us. Magicians since Spare have written about their
own methods and expantions of his method quite frequently in occult
magazines, mostly in Great Britain. Spare is certainly not the
first person in history to practice this sort of magic, but he
is the one who has dubbed it (appropriately), Chaos.
Chaos since A.O.S.
Austin Spare died May 15, 1956, but his magic did not die with
him. There have been select groups of magicians practicing versions
of Chaos ever since, especially in Northern England and Germany. In
the late 1970's, Ray Sherwin was editor and publisher of a
magazine called `The New Equinox.' Pete Carroll was a regular
contributor to the magazine, and together, due to dissatisfaction with
the magical scene in Britain at the time, they formed the
`Illuminatos Of Thanateros.' They advertised in `New Equinox' and a
group formed. Part of the intention of the group was to have an Order
where degrees expressed attainment rather than authority, and
hierarchy beyond just organizational requirements was non-existent.
At some point, about 1986, Ray Sherwin "excommunicated himself"
because he felt that the Order was slipping into the power structure
that he had intended to avoid with this group, and Pete Carroll
became known as the leader of `The Pact.' The IOT continues to thrive
and is identified as the only international Chaos organization to
date. The IOT has also spread to America, and has headquarters in
Encino, California and Atlanta, Georgia.
There are smaller groups of Chaos practitioners, as well as
individuals practicing alone. Chaos since Spare has taken on a
life of its own. It will always continue to grow, that is its nature.
It was only natural that eventually the world of science would
begin to discover the physical principles underlying magic, although
the scientists who are making these discoveries still do not realize
that this is what they are doing. It is interesting that they have
had the wisdom to call it chaos science...
Chaos Science
Modern chaos science began in the 1960's when a handful of
open-minded scientists with an eye for pattern realized that simple
mathematical equa- tions fed into a computer could model patterns
every bit as irregular and "chaotic" as a waterfall. They were able
to apply this to weather patterns, coastlines, all sorts of
natural phenomena. Particular equations would result in pictures
resembling specific types of leaves, the possibilities were
incredible. Centers and institutes were founded to specialize in "non-
linear dynamics" and "complex systems." Natural phenomena, like
the red spot of Jupiter, could now be understood. The common
catch-terms that most people have heard by now; strange attractors,
fractals, etc., are related to the study of turbulence in nature.
There is not room to go into these subjects in depth here, and I
recommend that those who are interested in this subject read
`Chaos: making a new science' by James Gleick and `Turbulent
Mirror' by John Briggs & F. David Peat.
What we are concerned with here is how all this relates to magic.
Many magicians, especially Chaos Magicians, have begun using
these terms, "fractal" and "strange attractor", in their everyday
conversations. Most of those who do this have some understanding of
the relationship between magic and this area of science. To put it
very simply, a successful magical act causes an apparantly acausal
result. In studying turbulence, chaos scientists have realized
that apparantly acausal phenomena in nature are not only the
norm, but are measurable by simple mathematical equations.
Irregularity is the stuff life is made of. For example, in the
study of heartbeat rhythms and brain-wave patterns, irregular
patterns are measured from normally functioning organs, while
steady, regular patterns are a direct symptom of a heart attack
about to occur, or an epileptic fit. Referring back again to
"virtual" photons, a properly executed magical release of energy
creates a "wave form" (visible by Kirlian photography) around the
magician causing turbulence in the aetheric space. This
turbulence will likely cause a result, preferably as the
magician has intended. Once the energy is released, control over the
phenomena is out of the magician's hands, just as once the
equation has been fed into the computer, the design follows the path
set for it.
The scientists who are working in this area would scoff at this
explana- tion, they have no idea that they are in the process of
discovering the physics behind magic. But then, many common place
sciences of today, chemistry for example, were once considered to
be magic. Understanding this subject requires, besides some reading,
a shift in thinking. We are trained from an early age to think in
linear terms, but nature and the chaos within it are non-linear,
and therefore require non-linear thinking to be understood. This
sounds simple, yet it reminds me of a logic class I had in college. We
were doing simple Aristotelian syllogisms. All we had to do was to put
everyday language into equation form. It sounds simple, and it is.
However, it requires a non-linear thought process. During that
lesson over the space of a week, the class size dropped from 48
to 9 students. The computer programmers were the first to drop out.
Those of us who survived that section went on to earn high grades in
the class, but more importantly, found that we had achieved a
permanent change in our thinking processes. Our lives were
changed by that one simple shift of perspective.
Chaos science is still in the process of discovery, yet magicians
have been applying its principles for at least as long as they have
been writing about magic. Once the principles of this science begin
to take hold on the thinking process, the magician begins to notice
everything from the fractal patterns in smoke rising from a cigarette
to the patterns of success and failure in magical workings, which
leads to an understanding of why it has succeeded or failed.
Defining Chaos Magic
Chaos is not in itself, a system or philosophy. It is rather an
attitude that one applies to one's magic and philosophy. It is the
basis for all magic, as it is the primal creative force. A
Chaos Magician learns a variety of magical techniques, usually as
many as s/he can gain access to, but sees beyond the systems and
dogmas to the physics behind the magical force and uses whatever
methods are appealing to him/herself. Chaos does not come with a
specific Grimoire or even a prescribed set of ethics. For this
reason, it has been dubbed "left hand path" by some who choose not to
understand that which is beyond their own chosen path. There is no
set of specific spells that are considered to be `Chaos Magic
spells'. A Chaos Magician will use the same spells as those of other
paths, or those of his/ her own making. Any and all methods and
information are valid, the only requirement is that it works.
Mastering the role of the sub-conscious mind in magical operations is
the crux of it, and the state called "vacuity" by Austin Osman Spare
is the road to that end. Anyone who has participated in a successful
ritual has experienced some degree of the `high' that this state
induces.
An understanding of the scientific principles behind magic
does not necessarily require a college degree in physics (although it
wouldn't hurt much, if the linear attitude drilled into the student
could be by-passed), experience in magical results will bring the
necessary understanding.
This series is directed toward the increasing numbers of people who
have been asking, "What is Chaos Magic?" It is very basic and
by no means intended to be a complete explanation of any of the
elements discussed. Many of the principles of magic must be
self-discovered, my only intent here is to try to define and pull
together the various elements associated with Chaos Magic into an
intelligible whole. For those who wish to learn more about this
subject, I have prepared a suggested reading list for the last
section, however, I must emphasize that there are always more sources
than any one person knows about, so do not limit yourself to this
list. Chaos has no limits...
For Further Reading:
`The Book Of Pleasure' by Austin Osman Spare
`Anathema Of Zos' by Austin Osman Spare
`A Book Of Satyrs' by Austin Osman Spare
`Images and Oracles of Austin Osman Spare' by Kenneth Grant
`The Early Work of A.O.S.'
`Excess Spare'
`Stations In Time'
These three are collections available through TOPY.
Available from most bookstores (at least by special order):
`Chaos: making a new science' by James Gleick
`Turbulent Mirror' by John Briggs & F. David Peat
`Liber Null & Psychonaut' by Peter J. Carroll
`Practical Sigil Magick' by Frater U.D.
-oOo-

114
txt_files/chappaqu Normal file
View File

@ -0,0 +1,114 @@
From Manchurian@aol.comWed Feb 8 04:40:45 1995
Date: Wed, 8 Feb 1995 01:12:45 -0500
From: Manchurian@aol.com
Reply to: prj@mail.msen.com
To: prj@garnet.msen.com
Subject: Watergate & Chappaquidick
from alt.conspiracy.jfk:
Subject: Watergate & Chappaquidick
From: lpease@netcom.com (Lisa Pease)
Date: Sun, 15 Jan 1995 04:31:12 GMT
Message-ID: <lpeaseD2FJ80.Mxx@netcom.com>
Just reading through some transcripts from the Watergate mess... found
this interesting conversation between Dean and President Nixon. D=Dean
and P=President. From the tape of 3/13/74, 12:42-2:00pm.
Quote on:
D: Let me tell you something that lurks at the bottom of this whole
thing. If, in going after Segretti, they go after Kalmbach's bank
records, you will recall sometime back -- perhaps you did not know about
this -- I apologize. That right after Chappaquidick somebody was put up
there to start observing and within six hours he was there for every
second of Chappaquidick for a year, and for almost two years he worked
for Jack Caulfield.
P: Oh, I have heard of Caulfield.
D: He worked for Caulfield when Caulfield worked for John, nd then when I
came over here I inherited Caulfield and this guy was still on this same
thing. If they get to those bank records between the start of July of
1969 through June of 1971, they say what are these about? who is this
fellow up in New York that you paid? There comes Chappaquidick with a
vengeance. This guy is a twenty year detective on the New York City
Police Department.
P: In other words, we --
D: He is ready to disprove and show that --
P: (Unintelligible)
D: If they get to it -- that is going to come out and this whole thing
can turn around on that. If Kennedy knew the bear trap he was walking
into --
P: How do we know -- why don't we get it out anyway?
D: Well, we have sort of saved it.
P: Does he have any records? Are they any good?
D: He is probably the most knowledgeable man in the country. I think he
ran up against walls and they closed the records down. There are things
he can't get, but he can ask all of the questions and get many of the
answers as a 20 year detective, but we don't want to surface him right
now. But if he is ever surfaced, this is what they will get.
P: How will Kalmbach explain that he hired this guy to do the job on
Chappaquidick? Out of what type of funs?
D: He had money left over from the pre-convention --
P: Are they going to investigate those funds too?
D: They are funds that are quite legal. There is nothing illegal about
those funds. Regardless of what may happen, what may occur, they may
stumble into this in going back to, say 1971, in Kalmbach's bank records.
They have already asked for a lot of his bank records in conection with
Segretti, as to how he paid Segretti.
P: Are they going to go back as far as Chappaquidick?
D: Well this fellow worked in 1971 on this. He was up there. He has
talked to everybody in that town. He is the one who has caused a lot of
embarrassment for Kennedy already by saying he went up there as a
newspaperman, by saying; "Why aren't you checking this? Why aren't you
looking there?" Calling the press people's attention to things. Gosh, the
guy did a masterful job. I have never had the full report.
End quote.
At that point the conversation changed.
There is much interesting stuff here, which I will no doubt share from
time to time, but what did you make of the above?
Sounds like Dean's guy uncovered something that showed Kennedy was set up
in Chappaquidick, but of course, it wouldn't benefit them politically if
that got out, so they were sitting on it - and saving something to use
against those who di the setting up? Interesting.... very interesting....
there's more than one way to kill a presidential candidate...
--
Lisa Pease
----------
I think that the idea that our government would be complicit, not just in
the killing, but in this very cynical effort to lie about it, and hide
about it, and pretend it didn't happen, and attack those who find out that
it did happen, is in many ways almost worse. It is something that, as a
democracy, we can't really allow to happen.
- Investigative Journalist Robert Parry on the Iran Contra conspiracy
--------------------------------------------------------------------------
Files available at my ftp site. Type ftp ftp.netcom.com, cd pub/lp/lpease
and get what you want! :)

179
txt_files/christ-c.txt Normal file
View File

@ -0,0 +1,179 @@
CHRISTIANITY AND FREEDOM
By JACOB G. HORNBERGER
Many Americans believe that by supporting the Welfare State,
they are fulfilling God's great commandment to "love thy
neighbor as thyself." Having been taught in public schools
since childhood that the Welfare State helps needy people,
Americans usually are filled with a deep sense of guilt and
embarrassment whenever they object to any aspect of
governmental assistance for others.
Of course, government officials foster these feelings in order
to minimize resistance to the Welfare State. For whenever a
citizen objects to any part of the welfare system in America,
he inevitably is assaulted by political officials with such
accusations as: "You hate the poor!"; "You are a racist!"; and
"You hate God!" These tactics usually are quite effective in
breaking down resistance to welfare programs. And the usual
result is that Americans call for reform, rather than
elimination, of the Welfare State.
But, in actuality, the Welfare State is founded on absolutely
immoral principles. And not only does a person not further
God's work by advocating or defending the Welfare State, he
instead denigrates it.
One can imagine the following scenario when a new arrival gets
to the pearly gates:
St. Peter: What did you do to fulfill God's commandment
to love thy neighbor as thyself?
Applicant: I have here my income tax returns, the
Internal Revenue Code, and the Federal Register.
St. Peter: What meaning do these items have?
Applicant: St. Peter, you obviously are not familiar with
the Welfare State of the United States of America. These
items show how much of my tax money was used by the
government to help others in need. So, please step aside
and let me in.
St. Peter: You were participating in a way of life which
constituted a wilful violation of God's sacred
commandment against stealing?
Applicant: Stealing? What are you talking about? Through
my tax payments, people were helped.
St. Peter: Was not the political process used to take
money from people against their will in order to
redistribute to others? Were you not supporting and
participating in this evil way of life?
Applicant: Oh! No, that wasn't me. That was the
politicians and bureaucrats. I just voted for them, just
like other patriotic Americans. Don't blame me for the
stealing. Just give me credit for all the good that was
done with the loot.
If I held a gun to a person's head, and demanded "Your money
or your life!," most people would believe that I had committed
an immoral (and illegal) act. Suppose I needed the money for
my (or someone else's) education. Would this change the
immoral (and illegal) nature of my act? Most people would
respond in the negative. While punishment might be mitigated
due to extenuating circumstances, it remains morally (and
legally) wrong to steal, no matter how great the need for
another person's money.
But the interesting phenomenon about the Welfare State is that
many people believe that by making the exact same act legal--
that is, by enshrining it into their political system--it
somehow is converted into a moral act. In other words, in the
Welfare State, people vote for someone who is given the legal
power to take a person's money in order to give it to someone
else; then, it is believed that this political act, immoral if
committed by a private individual, somehow becomes moral
because it is now performed by a democratically elected public
official.
We must also consider the matter of free will--one of the
greatest gifts which God bestowed on human beings. He
obviously loved us so much that we have been given the freedom
even to deny Him (and our neighbor). In other words, while we
are told to love Him and others, we are not compelled by Him
to do so.
One of the best examples of this wide ambit of freedom is
found in the story of "The Danger of Riches" in the New
Testament. A rich man approached Jesus and asked, "Teacher,
what good must I do to possess everlasting life?" After the
man advised Jesus that he already kept all of the
commandments, Jesus told him, "If you seek perfection, go,
sell your possessions, and give to the poor. You will then
have treasure in heaven. Afterward, come back and follow me."
Unable to let go of his material wealth, however, the man went
away sad.
The story, of course, is valuable in advising people of the
dangers of spiritual or psychological attachment to material
things. But the lesson it teaches is important in another way:
After the young man chose to reject the suggestion to give
everything he had to the poor, Jesus did not ask the political
authorities to seize the man's possessions and redistribute
them to the poor. In other words, he did not force the man to
comply with the suggestion. Since the man had been given the
freedom to choose, the choice he made, although not the
desired one, was honored.
It is the vital importance of freedom of choice that advocates
of the Welfare State so often forget. They favor "freedom" but
only when the person chooses the "right" way. In other words,
the person is told, "It is morally and ethically correct that
you should share your possessions with others, and you are
free to make this decision in your own way . . . but if you
choose the wrong way, we shall simply take your money from
you, against your will, and do with it what you should have
done with it."
It is the great principles of freedom of choice and individual
responsibity on which the United States was founded. By and
large, our American ancestors were free to engage in a
tremendously wide range of choices as long as they did not
inflict violence or fraud on others. And early Americans
believed that the primary purpose of government was to protect
the exercise of choice rather than interfere with it. Thus,
for the first century of America's history, there was, for
example, neither income taxation nor welfare.
Does this mean that our ancestors were evil and mean for not
providing a Welfare State as their descendants have? Of course
not. It simply means that they believed that each individual
should be free to do what he wants with his own money even
when, and especially when, it is not in accordance with the
wishes of the majority of his fellow citizens. And the irony
was that 19th-century America was not only the most prosperous
nation in history but also the most charitable nation in
history.
But unfortunately, the American people of the 20th century
have rejected and abandoned that philosophy. The idea now is
that people must be forced to be "good" through the political
plunder of the Welfare State. Money is taken from people
against their will so that it can be given to those who need
it. And the taxpayers claim "credit" for all of the "good"
which the political authorities do with their money.
The result, of course, is that the government has become the
means by which everyone is trying to live at the expense of
everyone else. Everyone is trying to get his "fair" share of
the loot while, at the same time, blocking out of his mind
that it is being stolen from his friends, neighbors, and
fellow citizens across the land. And everyone is trying to get
his "fair" share of the "credit" while doing everything he can
to protect his own pocketbook.
At the end of the year, it is important to count our
blessings. Fortunately, we live in a nation in which, by and
large (and with many exceptions), the government is
constitutionally prohibited from interfering with our
religious, intellectual, and political activities. But it is
also important, at the beginning of the new year, to make
resolutions: Let us resolve to dedicate ourselves to ending
the Welfare State by recapturing the vision of freedom,
private property, and limited government which guided our
American ancestors.
Mr. Hornberger is founder and president of The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the December 1990 issue of FREEDOM DAILY,
Copyright (c) 1990, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.

252
txt_files/chron.txt Normal file
View File

@ -0,0 +1,252 @@
CHRONOLOGY OF SECRET SOCIETIES
Excerpted from THE OCCULT CONSPIRACY
by Michael Howard
Published by Destiny Books
Pages 179 - 183
------------------------------------------------------------------
40,000 BCE
Early establishment of Mystery schools, as depicted in the Lascaux
cave paintings.
30,000 BCE
According to some occult traditions this period saw the
colonization of Asia and Australasia by the inhabitants of the
lost continent of Lemuria or Mu. Goddess worship and matriaarchal
cultures established worldwide.
10,000 BCE
Evidence suggestive of early contact between extraterrestials and
Stone Age tribes in Tibet.
9,000 - 8,000 BCE
Estimated date of the destruction of Atlantis, according to some
occult traditions. The Atlantean priesthood flee to establish
colonies in the British Isles, Western Europe, North Africa and
South America. Rise of the Northern Mystery Tradition centered on
the island of Thule and the Aryan culture. Invention of the runic
alphabet.
5,000 BCE
First primitive cities established in the Middle East.
Agriculture begins with domestication of animals such as sheep and
goats. Possible contact between extraterrestials and early
Sumerian culture.
5,000 - 3,000 BCE
Formation of the two lands in pre-dynastic Egypt ruled by
outsiders (Isis and Osiris). The Egyptian pantheon of gods
established including Horus, Thoth, Set, Ra, Ptah and Hathor.
Pharoahs regarded as the divine representatives of the Gods.
3,000 - 2,000 BCE
Building of burial mounds and chambered tombs in Western Europe
and the Mediterranean area; the Sphinx and the Great Pyramids of
Giza and Cheops of Egypt; and the ziggurat (Towers of Babel) in
Ur. Sarmoung Brotherhood founded in Babylon.
2,000 - 1,000 BCE
Reign of Thothmes III in Egypt (c. 1480). Foundation of the
Rosicrucian Order. Reign of Akhenaton (c. 1370) who establishes
the mystical Brotherhood of Aton dedicated to the worship of the
Sun as a symbol of the Supreme Creator. Erection of Stonehenge
and other megalithic stone circles in the British Isles. Reign of
Ankhenaton's son Tutankhamun who re-establishes the old pantheon
of Egyptian gods and goddesses. Moses leads Children of Israel
out of slavery in Egypt during the reign of Ramses II to the
promised land of Canaan.
1,000 - 500 BCE
Foundation of the Dionysian Artificers. The building of Solomon's
temple (c. 950). Establishment of the city states of Greece and
the Olympic pantheon of gods to replace earlier Nature worship.
First temples erected in Mexico, Peru and southwest North America.
Celts invade Western Europe. Decline of Goddess worship and rise
of patriarchal sky gods personified by priest-kings. Rome founded
in 750.
500 BCE - 001 CE
Celtic culture established in Britain. The foundation of Druidic
wisdom colleges in Gaul and the British Isles. Odin recognized as
major god in the Northern Mysteries replacing the Mother Goddess
and is credited with inventing the runes. Buddha, Lao Tze,
Confucius, Pythagoras, Plato and Zoroaster preach their new
religions and philosophies. Maya culture in South America.
Establishment of Eleusinian mystery cults. Rise of the Essene
sect in Palestine and Judea. Birth of Jesus of Nazareth.
001 - 400 CE
Jesus possibly travels to India, Tibet and Britain to be initiated
into the esoteric traditions of East and West. Crucified for his
radical political and religious ideas (c. 33). Joseph of
Arimanthea establishes first Celtic Church at Glastonbury (c. 37).
Invasion of Britain by Roman legions and suppression of the Druids
(40 - 60). Paul travels to Asia Minor and Greece preaching his
version of the gospel (50). Jewish revolt against Roman rule led
by Zealots (66). Essenes suppressed and Dead Sea Scrolls hidden
in caves. Temple in Jerusalem destroyed by Romans (70). New
testament written. The Nazarenes break away from Judasim to found
the Christian Church (c. 80). Ormus is converted to Esoteric
Christianity by Mark. Mithrasim and the Mysteries of Isis compete
with Christianity in the Roman Empire. Mani, a Persian high
priest of Zoroastrianism, is crucified (276). Emperor Constantine
declares Christianity the official religion of the Roman Empire.
The Council of Nicea defines heresy, condemns paganism and lays
the theological foundation for the Catholic or Universal Church
(325). Constantine's successor Julian the Apostate (361 - 363)
briefly re-establishes the pagan old religion. Emperor Theodosius
outlaws the worship of the pagan gods in Rome and closes the pagan
temples (378). Invasion of Rome, Greece and Europe by the
barbarians led by Atilla the Hun (395-480). Withdrawal of the
Roman legions from Britain (395). Foundation of the Order of
Comacine by ex-members of the Roman College of Architects.
500 - 1,000 CE
Mohammed founds Islam (dies 632). Celtic Church outlawed by
Council of Whitby (664). Foundation of first Sufi secret
societies (c. 700). First written translation of Emerald Tablet
of Hermes Trismegistus. Charlemagne founds alleged first
Rosicrucian Lodge in Toulouse (898). Foundation of the Cathars,
Druzes and Yezedi (900). Heretical Catholic monks found first
Rosicrucian college (1,000).
1000 - 1400 CE
Foundation of the Order of the Devoted of Assassins by
Hasan-i-Sabbah (1034-1124) and the Order of St John (1050). First
Crusade to the Holy Land (1095). Capture of the city of Jerusalem
by Godfrey de Bouillan, founder of the Priory of Sion (1099).
Assassins infiltrate Thuggee cult in India. Foundation of the
Order of the Knights of the Temple of Solomon in Jerusalem (1118).
Charter granted to the Priory of Sion by Pope Alexander II (1178).
Crusade launched against Cathars (1208). Inquistion created to
fight heresy (1215). Massacre of the Cathars at Montsegur in
Southern France (1241). Troubadours practising their cult of
courtly love. Occult schools teaching the Cabbala and alchemy
established in Spain by the Moors. Count Rudolf von Hapsburg
crowned as Holy Roman Emperor (1273). Knights Templars arrested
by King Philip of France on charges of devil worship, heresy and
sexual perversion (1307). Last official Grand Master of the
Templars, Jacques de Molay, burnt at the stake and the Order goes
underground (1314).
1400 - 1600 CE
Alleged life of Christian Rosenkreutz (1379-1482). Foundation
of the Order of the Garter by Edward III (1348). First
publication of the Corpus Heremeticum by the Medici family in
Italy (1460). Publication of Malleus Malifiracum and the papal
bull of Pope Innocent which began the medieval witch hunting
hysteria (1484 and 1486). Martin Luther begins Reformation
(1521). Henry Agrippa refers to the Templars as Gnostics and
worshippers of the phallic god Priapus (1530). Life of Dr John
Dee (1527-1608). Foundation of the British Secret Service by Sir
Francis Walsingham. Birth of Johann Valenti Andrea (1586). Life
of Sir Francis Bacon (1561-1626). Defeat of the Spanish Armada,
with magical help from the New Forest Witches (1588).
1600 - 1700 CE
Foundation of the Virginia Company by James I (1606). The
Romanovs become Czars of Russia (1613). Publication of
Rosicrucian manifesto (1614). Life of Elias Ashmole (1617-1692).
Voyage of the Mayflower to New England and the publication of Sir
Francis Bacon's novel The New Atlantis (1620). Establishment of
the pagan community of Merrymount in Massachusetts by Thomas
Morton. English Civil War begins (1642). First English Mason
guild accepts non-stonemasons into its meetings (c. 1646).
Charles I convicted of treason and beheaded (1649). Oliver
Cromwell allegedly makes pact with the Devil in order to retain
power. Introduction of Freemasonry to American colonies by Dutch
settlers (1658). Order of Pietists founded in Pennsylvania
(1694).
1700 - 1800 CE
Birth of the Comte de Saint-Germain (1710). Masonic Grand Lodge
of England and Druid Order founded (1717). First Masonic lodge
founded in France (1721)> Benjamin Franklin initiated as Mason
(1731). Chevalier Alexander Ramsey informs French Masons that
they are heirs to the Templar tradition (1736). Roman Church
condemns Masonry (1738). Birth of Count Cagliostro. Comte de
Saint-Germain involved in Jacobite plot to restore Stuart dynasty
to the English Throne (1743). Society of Flagellants and Skopski
founded in Russia (1750). George Washington initiated as a Mason
(1752). Sir Francis Dashwood founds the Hell Fire Club. Franklin
visits England to discuss the future of American colonies with
Dashwood (1758). Foundation of the Rite of the Strict Observance
by Baron von Hund based on the Templar tradition. Frederick of
Prussia founds Order of the Architects of Africa and uses the
title Illuminati to describe his neo-Masonic lodges (1768).
Franklin elected Grand Master of the Nine Sisters lodge in Paris
(1770). Grand Orient founded in France (1771). Boston Tea Party
(1773). Washington appointed Commander-in-Chief of the new
American Army (1775). Order of Perfectibilists or Illuminati
founded. American Revolution (1776). Czar Peter founds the
Secret Circle (1778). Supposed death of the Comte Saint-Germain
(1784). Grand Masonic Congress allegedly plots French Revolution.
Cagliostro involved in Diamond Necklace Affair. Illuminati banned
in Bavaria and goes underground (1785). French Revolution (1789).
Illuminist conspiracy to overthrow the Hapsburgs (1794).
1800 - 1900 CE
Count Grabinka founds secret society in St. Petersburg based on
Martinism and Rosicrucianism (1803). French republican plot to
assassinate Napoleon by placing a bomb under his coach, led by
occultist Fabre d'Olivet. Emperor Napoleon takes control of
French Masonry (1805). Revived Templar Order in France celebrates
the martyrdom of Jacques de Molay with public requiem (1808).
Foundation of the Order of Sublime Perfects (1809). Eliphas Levi
(1810-1875) reveals the secret symbolism of the Templar idol
Baphomet. Czar Alexander I and Emperor Francis von Hapsburg unite
to defeat Italian revolution incited by secret societies. John
Quincy Adams, initiate of the Dragon Society, is elected US
President (1820). Czar Alexander outlaws Masonry in Russia
(1822). Decembrist secret society attempts coup when Czar
Alexander allegedly dies (1825). AntiMasonic Party founded in US
to combat secret societies in American politics (1828). Wagner
joins the Vaterlandsverein, a secret society dedicated to the
formation of a pan-European federation of nations. Masonic
convention at Strasbourg allegedly plots second French Revolution
(1848). Napoleon III condemns Grand Orient for dabbling in
radical politics (1850). Paschal Randolph founds Hermetic
Brotherhood of the Light (1858). Abraham Lincoln is assassinated
(1865). Klu Klux Klan founded (1866). Society of Rosicrucians in
Anglia founded (1867). Foundation of the Theosophical Society by
Madame Blavasky on instructions of the Great White Brotherhood.
Birth of Aleister Crowley (1875). Mysterious suicide of ArchDuke
Rudolph von Hapsburg at a hunting lodge at Mayerling (1889).
Foundation of the Hermetic Order of the Golden Dawn (1888).
Assassination of Empress Elizabeth von Hapsburg by anarchist
(1898).
1900 - 1897 CE
Foundation of the Ordo Templi Orientis (1900). International
Order of CoFreemasonry founded in 1902. Publication of The
Protocols of the Wise Men of Zion in Russia (1905). Foundation of
the Ancient and Mystical Order of the Rose Crucis (1909). Black
Hand Society founded in 1911. Aleister Crowley accepted as head
of the British OTO. Order of the Temple of the Rosy Cross founded
in 1912. Assassination of ArchDuke Franz Ferdinand and
Archduchess Sophia von Hapsberg. Attempted murder of Rasputin.
WWI begins in 1914. Kaiser Wilhelm abdicates. Hapsburg dynasty
is overthrown. Bolshevik Revolution in Russia (1917-1918).
Foundation of German Workers Party by Thule Society (1919).
Hitler joins GWP and changes its name to the National Socialist
Party (1920). Crowley employed by MI6. Cardinal Roncalli, later
Pope John XXIII, allegedly joins Rosicrucian Order. Hitler
becomes first chancellor of the Third Reich (1933). Roosevelt
places Illuminist symbol of eye in triangle on the dollar bill
(1935). Nazi invasion of England prevented by New Forest Witches
(1940). Rudolf Hess lured to Britain on peace mission by fake
astrological data (1941). Order of the Temple revived in France
(1952). First Bilderberg meeting in 1954. Foundation of the P2
Lodge (1960). Death of Pope Paul VI, election and alleged murder
of Pope John Paul I, and election of Pope John Paul II (1978).
Exposure of P2 conspiracy. Attempt to assassinate John Paul II
(1981). L'Ordre Internationale Chevelresque Tradition Solaire
founded on instructions of the revived Order of the Temple in
France (1984).
<EOF>
5 January 1991


322
txt_files/cia-sws.txt Normal file
View File

@ -0,0 +1,322 @@
Article: 569 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: Top Secret: How To Kill--"The CIA's Secret Weapons Systems"
Keywords: our culture has lost its moral, ethical, and spiritual foundations
Organization: Silicon Graphics, Inc.
Date: Wed, 8 Apr 1992 15:56:51 GMT
Lines: 321
unless we know MUCH MORE about the atrocities committed "in the interests
and name of `national security,'" how can we possibly become sufficiently
motivated and driven to dedicate our energies towards changing this form
of "government" by lies, dissembling, expediency, profit-as-god, and
murder? we have no idea what is "done in our name." if we did, we would
no longer be able to participate in its commoditized seductiveness because
we would not be able to look ourselves in the mirror or sleep at night.
--ratitor
the following is taken from the June, 1978 issue of "Gallery" magazine:
__________________________________________________________________________
THE CIA'S SECRET WEAPONS SYSTEMS
by Andrew Stark
Exploding wine bottles, guns constructed out of pipes,
bullets made of teeth, aspirin explosives: they sound like
props from a second-rate spy story. Horrifyingly enough,
they are real. The CIA has spent a great deal of its time--
and your money--developing countless bizarre weapons for
assassination, sabotage, and mass destruction. If that's
news to you, it's because the CIA doesn't want these
products, some of which are quite easy to put together, to
fall into the "wrong hands." As for whether they are in the
right hands now--judge for yourself.
The CIA has developed many exotic and sophisticated devices
intended for use in interrogation, sabotage, and assassination.
These weapons are necessary--if you grant that what the CIA itself
does is necessary. If the CIA wants to eliminate a key KGB agent
operating in Hungary, it faces certain problems. It would be
virtually impossible to slip a deadly weapon, such as a gun or
bomb, past Hungarian customs officials. Thus, the CIA assassin
must assemble his weapon from commonly obtainable materials after
he crosses the border.
The CIA agent might decide to construct a urea nitrate
explosive, commonly known as a urine bomb. This weapon is quite
deadly, easily exploded, and consists primarily of nitric acid and
urine. The urine bomb is one of literally hundreds of murderous
weapons in the CIA arsenal.
"The New York Times" of September 26, 1975 revealed the
existence of guns that shoot cobra-venom darts. Then there was the
shoe polish compound intended to make Fidel Castro's beard fall
out, so that he would lose his "charisma." And CIA laboratories in
Fort Monmouth, New Jersey developed the famous rifle that shoots
around corners.
Some CIA weapons are designed to kill many people--deadly germs
can be released in subways; others are intended to kill a single,
specific individual--the Borgia ring contains deadly poison to be
slipped into a victim's drink; and still others are standard
weapons supplied for such missions as overthrowing the Allende
government in Chile in 1973.
The information about CIA weapons that you will read in this
article generally has not been made public before. It was not
intended to be. But your tax dollars pay for these devices; it is
your right to know about them.
There is a booklet, written in 1977 and distributed to a select
group of U.S. mercenaries, titled "CIA Improvised Sabotage
Devices." This instructional guidebook, part of "the Combat
Bookshelf," was published by Desert Publications, P.O. Box 22005,
Phoenix, Arizona 85028. If you want to know how the CIA turns a
cigar box into an explosive that can destroy a 10,000-gallon
capacity storage tank, then "CIA Improvised Sabotage Devices" is
what you should read. You will need it if you want to build the
"Water-Drip Electric Delay," a bomb that requires little more than
wood scrap, a tin can, and a battery. The "Pocket Watch Electric
Delay" requires little more than a watch, a screw, and a battery.
The "Mousetrap Electric Release" is another bomb, this one
requiring a mousetrap, a trip wire, a battery, and little else. It
is described as "an excellent device to use with bazooka rockets
against trucks, tanks, or locomotives." The "Chemical
Instantaneous Initiator" is made from a sugar-chlorate mix and is
effective in sabotaging trains. The "Martini Glass Shaped Charge"
is a bomb that also can be made out of a beer can. You might want
to try to construct the "Vehicle Booby Trap." The "Potassium
Chlorate and Sugar Igniter" and the "Sawdust, Moth Flakes, and Oil
Incendiary" can be made with only what you see in their titles.
For these and more than fifty other CIA devices, step-by-step
instructions on how to make them and illustrations of what they
should look like when completed are given. Turn a wine bottle into
a bomb. Build a land-mine rocket. Manufacture napalm in your
basement. Even the simple how-tos of causing a dust explosion can
be found in "CIA Improvised Sabotage Devices."
Why is the CIA so deeply involved in sabotage techniques? The
CIA might think it is in this country's interest to delay
scientific work being done by another nation. Or, the CIA might
want to disrupt a nation's economy in the hope that the resulting
chaos will lead to civil unrest and the overthrow of the existing
government (some of this actually happened in Chile). The original
John Rockefeller used such tactics against his competitors. He
simply had their refineries blown up.
Another pamphlet the CIA would not like you to see is titled
"How to Kill," written by John Minnery, edited by Robert Brown and
Peder Lund, and published by Paladin Press, Box 1307, Boulder,
Colorado 80306. The reason the CIA would prefer that you not see
this eighty-eight-page pamphlet, which is unavailable at bookstores
and newsstands, is because it contains a number of "ingenious"
methods of doing what the title says. Also, Paladin Press, which
published a book called "OSS Sabotage and Demolition Manual," is
widely regarded by journalists as an organization with close ties
to mercenary groups and the CIA. Paladin Press doesn't want you to
know that, but how else could they have published the "OSS Sabotage
and Demolition Manual?" The Office of Strategic Services was the
precursor of today's CIA.
This writer's call to Colorado yielded the following
conversation:
"How could you publish the "OSS Sabotage and Demolition Manual,"
I asked Peter Lund, editor and publisher of Paladin Press, "if your
organization, at the least, was not dealing with former OSS agents?
And what about "How to Kill?"
"I don't talk to journalists," Lund said.
"You're called the Paladin Press. You must publish books. Can
I order them?"
"No."
"Why not? You're a publisher, aren't you?"
"We're afraid our publications might fall into the wrong hands."
"What are the right hands?" I asked.
"I don't talk to journalists."
"Have you ever heard of Desert Publications?" I asked.
"A fine outfit," Lund said. "If they recommend you, I'll send
you our material."
"That's my problem," I said. "They don't seem to have a phone
number."
"Well, they're a good group."
"Listen," I said, "wasn't your group, and Desert Publications
besides, involved in CIA mercenary activity in Africa?"
"I don't know anything about that."
"Were you in the Special Forces?"
"July 1967 to July 1968 in Vietnam."
"Were you CIA?"
"I was MACV [Military Armed Forces Command Vietnam]."
"You weren't affiliated with CIA?"
"I didn't say that."
"What do you say?"
"We did joint operations with CIA on the Phoenix Program."
"Wasn't that a murder operation?"
"No. It was snatching people."
The Phoenix Program was designed for a job that the CIA
euphemistically described as "eliminating the Viet Cong
infrastructure." In reality, it was a rampant reign of terror run
out of CIA headquarters at Langley, Virginia. Former CIA director
William Colby later termed the program "effective." The Phoenix
Program was a naked murder campaign, as proved by every realistic
report, ranging from the Bertrand Russell Tribunal to the Dellums
Committee to admissions by CIA agents themselves. The program
killed--and *none* of these killings occurred in combat--18,000
people, mostly women and children.
But what about Peder Lund, editor and publisher of Paladin
Press? The book he edited and published, "How to Kill," outlined a
surfeit of murder methods, horrific techniques of causing people to
die. For example:
"Without getting too deeply into the realm of the bizarre,"
wrote John Minnery, the author of "How to Kill" as he proceeded to
just that, "a specially loaded bullet made from a human tooth
(bicuspid) could be fired under the jaw or through the mouth into
the head. The tooth is a very hard bone, and its enamel shell
would allow it to penetrate into the brain. The intention here is
also to hide the cause of death because the examiner in his search
for a projectile will disregard bone fragments."
One last example from "How to Kill" should give you the flavor
of the book:
Lesson Nine: Hot Wire
"Essentially, the weapon is an electrified grid in the urinal
basin. This can take the form of a screen cover for the drain
or a metal grill. If the urinal is completely porcelain, the
screen must be added by the assassin. The drain cover is
connected to the electrical system of the washroom by means of
an insulated cord that is hidden behind the plumbing.
"What happens when the subject uses the urinal should be
obvious now. The subject's urine, which is a salty liquid and
a perfect conductor of electricity, makes contact with the
charged grid, and the shock will kill him."
This reporter's investigation revealed that the "Hot Wire" was
child's play compared to certain other CIA weapons devices. For
instance, I was able to obtain Volumes One and Two of the "CIA
Black Book" on improvised munitions, volumes that are stamped "for
official use only" on almost every page. It is obvious why the CIA
would like these books to remain secret. With elaborate
instructions, they describe how to make high explosives from
aspirin, how to construct a nail grenade, and how to turn a Coke
bottle into a bomb.
Described in detail in the "Black Book" is the previously
mentioned urea nitrate explosive, or, as it is known to the pros,
"the piss bomb." Instructions for the preparation of this weapon
assure the maker that animal urine will do as well as human; the
important thing is to have ten cups of it, boil it down to one cup,
and mix it with the nitric acid.
Also described in the "Black Book" is how to construct a pipe
pistol, which, as the name indicates, is a gun constructed out of a
pipe. Other weapons include a cooking syringe filled with poison
that can be stabbed into "the subject's" stomach; a cyanide gas
pistol; a throat cutter gauntlet knife (razor sharp and only an
inch or so in length); and a mixture of fertilizer and aluminum
powder that can be made into a powerful bomb.
Why build murder weapons out of such weird material? Is the CIA
insane?
No. In its own way, the whole thing is perfectly logical.
The pamphlet "How to Kill" explained it all: "As most of these
devices are homemade, this precludes the possibility of their being
traced. They are, in effect, `sanitized' and perfect for
assassinations, where weapons are prohibited, or where customs in
the hostile country are stringent, so these can be made from local
materials."
Being a contract killer for the CIA is not all roses. You
cannot kill in just any way. A number of attempts have been made
on Fidel Castro's life--some with the CIA and the Mafia
cooperating--and some of them may have failed because of
restrictions imposed on the potential assassins. It would be
unacceptable for Castro's murder to be laid at the door of the CIA.
This would make Castro a martyr in the eyes of his countrymen.
Thus, a method that would suggest death by natural causes must be
found.
Abundant speculation and considerable evidence suggest that the
CIA or some other government agency arranged for the "natural"
deaths of David Ferrie, Jack Ruby, George De Mohrenschildt, and
other potential witnesses into the assassination of John Kennedy.
Some methods of killing, like the injection of an air bubble into
the bloodstream, will often go unnoticed by medical examiners.
Another hard-to-trace method of killing is to mail a snake to
the victim. This is known as killing by long distance. A
disadvantage to this method is that the snake might bite an
innocent third party who just happens to open the package. The
advantage is that once the snake has struck, the evidence can
simply slither away.
Sometimes, as the CIA knows, killing has to be done at close
range. For this purpose, a valuable weapon is the ice pick with a
blood arrester attached. The blood arrester is a cloth wrapped
near the tip of the ice pick. When the pick is shoved into the
victim, the spurting blood is absorbed by the blood arrester.
People who see the victim fall will probably think he has had a
heart attack. While the onlookers try to help the victim, the
assassin uses this valuable ten or fifteen seconds to escape
unnoticed.
Often it is advisable to use what is called in the trade a
"quiet weapon." Silenced weapons can include pistols, rifles, and
even machine guns.
Poison is a quiet killer. Here is a partial list of the poisons
the CIA has become expert at administering: oil of bitter almonds;
ant paste; cadmium, used in vapor form, and death is delayed four
hours; radiator cleaner, also causing a delayed death;
Cantharides (Spanish Fly); ethyl mercury; and freon, heated by a
flame. These poisons and many others are listed in "How to Kill."
The author then cautions the reader:
"Unless otherwise stated, these poisons are either to be
injected into the subject, or taken orally by him by adding it to
his food. Use common sense in the application of these potions
and, if possible, double the O.D. necessary."
W.H. Bowart, in his book, "Operation Mind Control" described the
CIA's use of drugs: "In 1953, the CIA made plans to purchase ten
kilograms of LSD for use in `drug experiments with animals and
human beings.' Since there are more than 10,000 doses in a gram,
that meant the CIA wanted 100 million doses. The CIA obviously
intended to `corner the market' on LSD so that other countries
would not be ahead of the U.S. in their potential for `LSD
warfare.'"
Dr. Albert Hoffman, an early researcher into the uses of LSD,
was horrified by what the CIA was doing: "I had perfected LSD for
medical use, not as a weapon. It can make you insane or even kill
you if it is not properly used under medical supervision. In any
case, the research should be done by medical people and not by
soldiers or intelligence agencies."
Perhaps the most frightening weapon of all is the one that can
be used to alter weather and climate. It was used with
considerable success in Vietnam. It slowed troop movements with
heavy rains, and it destroyed the rice crop, as well. The danger
is that these climatological changes may become permanent,
affecting not only enemies of the United States, but also the
entire planet.
Finally, considerable evidence exists that the United States,
through the CIA, employed germ warfare during the Korean War. A
number of captured pilots testified that germ warfare was used, but
their testimony was dismissed as brainwashing. A Marine Corps
colonel named Frank H. Schwable signed a germ warfare confession
and, according to W.H. Bowart, "named names, cited missions,
described meetings and strategy conferences."
Schwable later repudiated his confession. But the charges of
germ warfare were taken up in front of the United Nations, and a
number of countries believed them.
The United States, incidentally, was later charged with using
nerve gas in Vietnam.
What you have read on these pages is pretty revolting stuff.
Yet, if the world ought to be saved from Communism, who can say it
is not necessary? One danger, of course, is that these terrible
weapons have been introduced into our body politic and have
produced strange and terrible fruits on our own native soil. When
assassination becomes government policy, when men are trained to
kill in every conceivable way, when morality is set aside for a
"higher good," can even the President of the United States consider
himself safe?
Andrew Stark is a pseudonym for a specialist on weaponry.
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
t

321
txt_files/cia.sws Normal file
View File

@ -0,0 +1,321 @@
Article: 569 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: Top Secret: How To Kill--"The CIA's Secret Weapons Systems"
Keywords: our culture has lost its moral, ethical, and spiritual foundations
Organization: Silicon Graphics, Inc.
Date: Wed, 8 Apr 1992 15:56:51 GMT
Lines: 321
unless we know MUCH MORE about the atrocities committed "in the interests
and name of `national security,'" how can we possibly become sufficiently
motivated and driven to dedicate our energies towards changing this form
of "government" by lies, dissembling, expediency, profit-as-god, and
murder? we have no idea what is "done in our name." if we did, we would
no longer be able to participate in its commoditized seductiveness because
we would not be able to look ourselves in the mirror or sleep at night.
--ratitor
the following is taken from the June, 1978 issue of "Gallery" magazine:
__________________________________________________________________________
THE CIA'S SECRET WEAPONS SYSTEMS
by Andrew Stark
Exploding wine bottles, guns constructed out of pipes,
bullets made of teeth, aspirin explosives: they sound like
props from a second-rate spy story. Horrifyingly enough,
they are real. The CIA has spent a great deal of its time--
and your money--developing countless bizarre weapons for
assassination, sabotage, and mass destruction. If that's
news to you, it's because the CIA doesn't want these
products, some of which are quite easy to put together, to
fall into the "wrong hands." As for whether they are in the
right hands now--judge for yourself.
The CIA has developed many exotic and sophisticated devices
intended for use in interrogation, sabotage, and assassination.
These weapons are necessary--if you grant that what the CIA itself
does is necessary. If the CIA wants to eliminate a key KGB agent
operating in Hungary, it faces certain problems. It would be
virtually impossible to slip a deadly weapon, such as a gun or
bomb, past Hungarian customs officials. Thus, the CIA assassin
must assemble his weapon from commonly obtainable materials after
he crosses the border.
The CIA agent might decide to construct a urea nitrate
explosive, commonly known as a urine bomb. This weapon is quite
deadly, easily exploded, and consists primarily of nitric acid and
urine. The urine bomb is one of literally hundreds of murderous
weapons in the CIA arsenal.
"The New York Times" of September 26, 1975 revealed the
existence of guns that shoot cobra-venom darts. Then there was the
shoe polish compound intended to make Fidel Castro's beard fall
out, so that he would lose his "charisma." And CIA laboratories in
Fort Monmouth, New Jersey developed the famous rifle that shoots
around corners.
Some CIA weapons are designed to kill many people--deadly germs
can be released in subways; others are intended to kill a single,
specific individual--the Borgia ring contains deadly poison to be
slipped into a victim's drink; and still others are standard
weapons supplied for such missions as overthrowing the Allende
government in Chile in 1973.
The information about CIA weapons that you will read in this
article generally has not been made public before. It was not
intended to be. But your tax dollars pay for these devices; it is
your right to know about them.
There is a booklet, written in 1977 and distributed to a select
group of U.S. mercenaries, titled "CIA Improvised Sabotage
Devices." This instructional guidebook, part of "the Combat
Bookshelf," was published by Desert Publications, P.O. Box 22005,
Phoenix, Arizona 85028. If you want to know how the CIA turns a
cigar box into an explosive that can destroy a 10,000-gallon
capacity storage tank, then "CIA Improvised Sabotage Devices" is
what you should read. You will need it if you want to build the
"Water-Drip Electric Delay," a bomb that requires little more than
wood scrap, a tin can, and a battery. The "Pocket Watch Electric
Delay" requires little more than a watch, a screw, and a battery.
The "Mousetrap Electric Release" is another bomb, this one
requiring a mousetrap, a trip wire, a battery, and little else. It
is described as "an excellent device to use with bazooka rockets
against trucks, tanks, or locomotives." The "Chemical
Instantaneous Initiator" is made from a sugar-chlorate mix and is
effective in sabotaging trains. The "Martini Glass Shaped Charge"
is a bomb that also can be made out of a beer can. You might want
to try to construct the "Vehicle Booby Trap." The "Potassium
Chlorate and Sugar Igniter" and the "Sawdust, Moth Flakes, and Oil
Incendiary" can be made with only what you see in their titles.
For these and more than fifty other CIA devices, step-by-step
instructions on how to make them and illustrations of what they
should look like when completed are given. Turn a wine bottle into
a bomb. Build a land-mine rocket. Manufacture napalm in your
basement. Even the simple how-tos of causing a dust explosion can
be found in "CIA Improvised Sabotage Devices."
Why is the CIA so deeply involved in sabotage techniques? The
CIA might think it is in this country's interest to delay
scientific work being done by another nation. Or, the CIA might
want to disrupt a nation's economy in the hope that the resulting
chaos will lead to civil unrest and the overthrow of the existing
government (some of this actually happened in Chile). The original
John Rockefeller used such tactics against his competitors. He
simply had their refineries blown up.
Another pamphlet the CIA would not like you to see is titled
"How to Kill," written by John Minnery, edited by Robert Brown and
Peder Lund, and published by Paladin Press, Box 1307, Boulder,
Colorado 80306. The reason the CIA would prefer that you not see
this eighty-eight-page pamphlet, which is unavailable at bookstores
and newsstands, is because it contains a number of "ingenious"
methods of doing what the title says. Also, Paladin Press, which
published a book called "OSS Sabotage and Demolition Manual," is
widely regarded by journalists as an organization with close ties
to mercenary groups and the CIA. Paladin Press doesn't want you to
know that, but how else could they have published the "OSS Sabotage
and Demolition Manual?" The Office of Strategic Services was the
precursor of today's CIA.
This writer's call to Colorado yielded the following
conversation:
"How could you publish the "OSS Sabotage and Demolition Manual,"
I asked Peter Lund, editor and publisher of Paladin Press, "if your
organization, at the least, was not dealing with former OSS agents?
And what about "How to Kill?"
"I don't talk to journalists," Lund said.
"You're called the Paladin Press. You must publish books. Can
I order them?"
"No."
"Why not? You're a publisher, aren't you?"
"We're afraid our publications might fall into the wrong hands."
"What are the right hands?" I asked.
"I don't talk to journalists."
"Have you ever heard of Desert Publications?" I asked.
"A fine outfit," Lund said. "If they recommend you, I'll send
you our material."
"That's my problem," I said. "They don't seem to have a phone
number."
"Well, they're a good group."
"Listen," I said, "wasn't your group, and Desert Publications
besides, involved in CIA mercenary activity in Africa?"
"I don't know anything about that."
"Were you in the Special Forces?"
"July 1967 to July 1968 in Vietnam."
"Were you CIA?"
"I was MACV [Military Armed Forces Command Vietnam]."
"You weren't affiliated with CIA?"
"I didn't say that."
"What do you say?"
"We did joint operations with CIA on the Phoenix Program."
"Wasn't that a murder operation?"
"No. It was snatching people."
The Phoenix Program was designed for a job that the CIA
euphemistically described as "eliminating the Viet Cong
infrastructure." In reality, it was a rampant reign of terror run
out of CIA headquarters at Langley, Virginia. Former CIA director
William Colby later termed the program "effective." The Phoenix
Program was a naked murder campaign, as proved by every realistic
report, ranging from the Bertrand Russell Tribunal to the Dellums
Committee to admissions by CIA agents themselves. The program
killed--and *none* of these killings occurred in combat--18,000
people, mostly women and children.
But what about Peder Lund, editor and publisher of Paladin
Press? The book he edited and published, "How to Kill," outlined a
surfeit of murder methods, horrific techniques of causing people to
die. For example:
"Without getting too deeply into the realm of the bizarre,"
wrote John Minnery, the author of "How to Kill" as he proceeded to
just that, "a specially loaded bullet made from a human tooth
(bicuspid) could be fired under the jaw or through the mouth into
the head. The tooth is a very hard bone, and its enamel shell
would allow it to penetrate into the brain. The intention here is
also to hide the cause of death because the examiner in his search
for a projectile will disregard bone fragments."
One last example from "How to Kill" should give you the flavor
of the book:
Lesson Nine: Hot Wire
"Essentially, the weapon is an electrified grid in the urinal
basin. This can take the form of a screen cover for the drain
or a metal grill. If the urinal is completely porcelain, the
screen must be added by the assassin. The drain cover is
connected to the electrical system of the washroom by means of
an insulated cord that is hidden behind the plumbing.
"What happens when the subject uses the urinal should be
obvious now. The subject's urine, which is a salty liquid and
a perfect conductor of electricity, makes contact with the
charged grid, and the shock will kill him."
This reporter's investigation revealed that the "Hot Wire" was
child's play compared to certain other CIA weapons devices. For
instance, I was able to obtain Volumes One and Two of the "CIA
Black Book" on improvised munitions, volumes that are stamped "for
official use only" on almost every page. It is obvious why the CIA
would like these books to remain secret. With elaborate
instructions, they describe how to make high explosives from
aspirin, how to construct a nail grenade, and how to turn a Coke
bottle into a bomb.
Described in detail in the "Black Book" is the previously
mentioned urea nitrate explosive, or, as it is known to the pros,
"the piss bomb." Instructions for the preparation of this weapon
assure the maker that animal urine will do as well as human; the
important thing is to have ten cups of it, boil it down to one cup,
and mix it with the nitric acid.
Also described in the "Black Book" is how to construct a pipe
pistol, which, as the name indicates, is a gun constructed out of a
pipe. Other weapons include a cooking syringe filled with poison
that can be stabbed into "the subject's" stomach; a cyanide gas
pistol; a throat cutter gauntlet knife (razor sharp and only an
inch or so in length); and a mixture of fertilizer and aluminum
powder that can be made into a powerful bomb.
Why build murder weapons out of such weird material? Is the CIA
insane?
No. In its own way, the whole thing is perfectly logical.
The pamphlet "How to Kill" explained it all: "As most of these
devices are homemade, this precludes the possibility of their being
traced. They are, in effect, `sanitized' and perfect for
assassinations, where weapons are prohibited, or where customs in
the hostile country are stringent, so these can be made from local
materials."
Being a contract killer for the CIA is not all roses. You
cannot kill in just any way. A number of attempts have been made
on Fidel Castro's life--some with the CIA and the Mafia
cooperating--and some of them may have failed because of
restrictions imposed on the potential assassins. It would be
unacceptable for Castro's murder to be laid at the door of the CIA.
This would make Castro a martyr in the eyes of his countrymen.
Thus, a method that would suggest death by natural causes must be
found.
Abundant speculation and considerable evidence suggest that the
CIA or some other government agency arranged for the "natural"
deaths of David Ferrie, Jack Ruby, George De Mohrenschildt, and
other potential witnesses into the assassination of John Kennedy.
Some methods of killing, like the injection of an air bubble into
the bloodstream, will often go unnoticed by medical examiners.
Another hard-to-trace method of killing is to mail a snake to
the victim. This is known as killing by long distance. A
disadvantage to this method is that the snake might bite an
innocent third party who just happens to open the package. The
advantage is that once the snake has struck, the evidence can
simply slither away.
Sometimes, as the CIA knows, killing has to be done at close
range. For this purpose, a valuable weapon is the ice pick with a
blood arrester attached. The blood arrester is a cloth wrapped
near the tip of the ice pick. When the pick is shoved into the
victim, the spurting blood is absorbed by the blood arrester.
People who see the victim fall will probably think he has had a
heart attack. While the onlookers try to help the victim, the
assassin uses this valuable ten or fifteen seconds to escape
unnoticed.
Often it is advisable to use what is called in the trade a
"quiet weapon." Silenced weapons can include pistols, rifles, and
even machine guns.
Poison is a quiet killer. Here is a partial list of the poisons
the CIA has become expert at administering: oil of bitter almonds;
ant paste; cadmium, used in vapor form, and death is delayed four
hours; radiator cleaner, also causing a delayed death;
Cantharides (Spanish Fly); ethyl mercury; and freon, heated by a
flame. These poisons and many others are listed in "How to Kill."
The author then cautions the reader:
"Unless otherwise stated, these poisons are either to be
injected into the subject, or taken orally by him by adding it to
his food. Use common sense in the application of these potions
and, if possible, double the O.D. necessary."
W.H. Bowart, in his book, "Operation Mind Control" described the
CIA's use of drugs: "In 1953, the CIA made plans to purchase ten
kilograms of LSD for use in `drug experiments with animals and
human beings.' Since there are more than 10,000 doses in a gram,
that meant the CIA wanted 100 million doses. The CIA obviously
intended to `corner the market' on LSD so that other countries
would not be ahead of the U.S. in their potential for `LSD
warfare.'"
Dr. Albert Hoffman, an early researcher into the uses of LSD,
was horrified by what the CIA was doing: "I had perfected LSD for
medical use, not as a weapon. It can make you insane or even kill
you if it is not properly used under medical supervision. In any
case, the research should be done by medical people and not by
soldiers or intelligence agencies."
Perhaps the most frightening weapon of all is the one that can
be used to alter weather and climate. It was used with
considerable success in Vietnam. It slowed troop movements with
heavy rains, and it destroyed the rice crop, as well. The danger
is that these climatological changes may become permanent,
affecting not only enemies of the United States, but also the
entire planet.
Finally, considerable evidence exists that the United States,
through the CIA, employed germ warfare during the Korean War. A
number of captured pilots testified that germ warfare was used, but
their testimony was dismissed as brainwashing. A Marine Corps
colonel named Frank H. Schwable signed a germ warfare confession
and, according to W.H. Bowart, "named names, cited missions,
described meetings and strategy conferences."
Schwable later repudiated his confession. But the charges of
germ warfare were taken up in front of the United Nations, and a
number of countries believed them.
The United States, incidentally, was later charged with using
nerve gas in Vietnam.
What you have read on these pages is pretty revolting stuff.
Yet, if the world ought to be saved from Communism, who can say it
is not necessary? One danger, of course, is that these terrible
weapons have been introduced into our body politic and have
produced strange and terrible fruits on our own native soil. When
assassination becomes government policy, when men are trained to
kill in every conceivable way, when morality is set aside for a
"higher good," can even the President of the United States consider
himself safe?
Andrew Stark is a pseudonym for a specialist on weaponry.
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.

811
txt_files/cia.txt Normal file
View File

@ -0,0 +1,811 @@
EX-CIA OFFICIAL SPEAKS OUT
By Greg Kaza
This article is reprinted from Full Disclosure. Copyright (c) 1986
Capitol Information Association. All rights reserved. Permission is hereby
granted to reprint this article providing this message is included in its
entirety. Full Disclosure, Box 8275, Ann Arbor, Michigan 48107. $15/yr.
Full Disclosure: I'd like to start out by talking about your well-known book,
`The CIA and the Cult of Intelligence.' What edition is that in today?
Marchetti: The latest edition came out last summer. Its the Laurel edition,
Dell paperback.
FD: Its gone through a couple of printings?
Marchetti: Yes. It was originally published by Alfred Knopf in hardback and
by Dell in paperback. That was in 1974 with Knopf and 1975 with Dell. Then a
few years later we got some more of the deletions back from the government,
so Dell put out a second printing. That would have been about 1979. Then
recently, during the summer of 1983, we got back a few more deletions and
that's the current edition that is available in good bookstores (laughs) in
Dell paperback, the Laurel edition.
Originally the CIA asked for 340 deletions. We got about half of those back
in negotiations prior to the trial. We later won the trial, they were
supposed to give everything back but it was overturned at the appellate
level. The Supreme Court did not hear the case, so the appellate decision
stood. We got back 170 of those deletions in negotiations during the trial
period. A few years later when the second paperback edition came out there
were another 24 deletions given back. The last time, in 1983, when the the
third edition of the paperback edition was published, there were another 35
given back. So there are still 110 deletions in the book out of an original
340.
As for the trial, the CIA sued in early 1972 to have the right to review and
censor the book. They won that case. It was upheld at the appellate court in
Richmond some months later, and again the Supreme Court did not hear the
case. Two years later we sued the CIA on the grounds that they had been
arbitrary, capricious and unreasonable in making deletions and were in
violation of the injunction they had won in 1972. We went before Judge Albert
V. Bryan Jr., and in that case, he decided in our favor. Bryan was the same
fourth district judge in Alexandria who heard the original case. He said that
there was nothing in the book that was harmful to national security or that
was logically classifiable. Bryan said the CIA was being capricious and
arbitrary. They appealed, and a few months later down in Richmond the
appellate court for the fourth district decided in the government's favor,
and overturned Bryan's decision. Again, the Supreme Court did not hear the
case. It chose not to hear it, and the appellate court's decision stood.
By this time, we had grown weary of the legal process. The book was published
with blank spaces except for those items that had been given back in
negotiations. Those items were printed in bold face type to show the kind of
stuff the CIA was trying to cut out. In all subsequent editions, the
additional material is highlighted to show what it is they were trying to cut
out.
Of course the CIA's position is that only they know what is a secret. They
don't make the national security argument because that is too untenable these
days. They say that they have a right to classify anything that they want to,
and only they know what is classifiable. They are establishing a precedent,
and have established a precedent in this case that has been used subsequently
against ex-CIA people like Frank Snepp and John Stockwell and others, and in
particular against Ralph McGee. They've also used it against (laughing), its
kind of ironic, two former CIA directors, one of whom was William Colby.
Colby was the guy behind my case when he was director. In fact, he was sued
by the CIA and had to pay a fine of I think, about $30,000 for putting
something in that they wanted out about the Glomar Explorer. He thought they
were just being, as I would say, ``arbitrary and capricious,'' so he put it
in anyway, was sued, and had to pay a fine. Admiral Stansfield Turner was
another who, like Colby when he was director, was the great defender of
keeping everything secret and only allowing the CIA to reveal anything. When
Turner got around to writing his book he had the same problems with them and
is very bitter about it and has said so. His book just recently came out and
he's been on a lot of TV shows saying, ``Hells bells, I was director and I
know what is classified and what isn't but these guys are ridiculous,
bureaucratic,'' and all of these accusations you hear. It is ironic because
even the former directors of the CIA have been burned by the very precedents
that they helped to establish.
FD: What are the prospects for the remaining censored sections of your book
eventually becoming declassified so that they are available to the American
people?
Marchetti: If I have a publisher, and am willing to go back at the CIA every
year or two years forcing a review, little by little, everything would come
out eventually. I can't imagine anything they would delete. There might be a
few items that the CIA would hold onto for principle's sake. Everything that
is in that book, whether it was deleted or not, has leaked out in one way or
another, has become known to the public in one form or another since then. So
you know its really a big joke.
FD: Looking back on it, what effect did the publication of the `The CIA and
the Cult of Intelligence' have on your life?
Marchetti: It had a tremendous effect on my life. The book put me in a
position where I would forever be persona non grata with the bureaucracy in
the federal government, which means, that I cannot get a job anywhere, a job
that is, specific to my background and talents. Particularly if the company
has any form of government relationship, any kind of government contract.
That stops the discussions right there. But even companies that are not
directly allied with the government tend to be very skittish because I was so
controversial and they just don't feel the need to get into this. I have had
one job since leaving the CIA other than writing, consulting and things like
that, and that was with an independent courier company which did no business
with the government, was privately owned, and really didn't care what the
government thought. They ran their own business and they hired me as their
friend. But every other job offered to me always evaporates, because even
those individuals involved in hiring who say they want to hire me and think
the government was wrong always finish saying, ``Business is business. There
are some people here who do not want to get involved in any controversial
case.'' Through allies or former employees somebody always goes out of their
way to make it difficult for me, so I never have any other choice but to
continue to be a freelance writer, lecturer, consultant, etcetera, and even
in that area I am frequently penalized because of who I worked for.
FD: The government views you as a troublemaker or whistleblower?
Marchetti: As a whistleblower, and, I guess, troublemaker. In the
intelligence community, as one who violated the code.
FD: The unspoken code?
Marchetti: Right. And this has been the fate of all those CIA whistleblowers.
They've all had it hard. Frank Snepp, Stockwell, McGee, and others, have all
suffered the same fate. Whistleblowers in general, like Fitzgerald in the
Department of Defense, who exposed problems with the C-5A, overruns, have
also suffered the same kind of fate. But since they were not dealing in the
magical area of national security they have found that they have some leeway
and have been able to, in many other cases, find some other jobs. In some
cases the government was even forced to hire them back. Usually the
government puts them in an office somewhere in a corner, pays them $50,000 a
year, and ignores them. Which drives them crazy of course, but thats the
government's way of punishing anybody from the inside who exposes all of
these problems to the American public.
FD: Phillip Agee explains in his book the efforts of the CIA to undermine his
writing of `Inside The Company' both before and after publication. Have you
run into similar problems with extralegal CIA harassment?
Marchetti: Yes. I was under surveillance. Letters were opened. I am sure our
house was burglarized. General harassment of all sorts, and the CIA has
admitted to some of these things. One or two cases, because the Church
Committee found out. For example, the CIA admitted to working with the IRS to
try and give me a bad time. The Church Committee exposed that and they had to
drop it. They've admitted to certain other activities like the surveillance
and such, but the CIA will not release to me any documents under the Freedom
of Information Act. They won't release it all -- any documents under FOIA,
period.
FD: About your time with the CIA?
Marchetti: No, about my case. I only want the information on me after leaving
the agency and they just refuse to do it. They've told me through friends
``You can sue until you're blue in the face but you're not going to get
this'' because they know exactly what would happen. It would be a terrible
embarrassment to the CIA if all of the extralegal and illegal activities they
took became public.
The most interesting thing they did in my case was an attempt at entrapment,
by putting people in my path in the hopes that I would deal with these
people, who in at least one case turned out to be an undercover CIA operator
who was, if I had dealt with him, it would have appeared that I was moving to
deal with the Soviet KGB. The CIA did things of that nature. They had people
come to me and offer to finance projects if I would go to France, live there,
and write a book there without any censorship. Switzerland and Germany were
also mentioned. The CIA used a variety of techniques of that sort. I turned
down all of them because my theory is that the CIA should be exposed to a
certain degree in the hope that Congress could conduct some investigation out
of which would come some reform. I was playing the game at home and that is
the way I was going to play. Play it by the rules, whatever handicap that
meant. Which in the end was a tremendous handicap.
But it did work out in the sense that my book did get published. The CIA drew
a lot of attention to it through their attempts to prevent it from being
written and their attempts at censorship, which simply increased the appetite
of the public, media, and Congress, to see what they were trying to hide and
why. All of this was happening at a time when other events were occurring.
Ellsberg's Pentagon Papers had come out about the same time I announced I was
doing my book. Some big stories were broken by investigative journalists. All
of these things together, my book was part of it, did lead ultimately to
congressional investigations of the CIA. I spent a lot of time behind the
scenes on the Hill with senators and congressman lobbying for these
investigations and they finally did come to pass.
It took awhile. President Ford tried to sweep everything under the rug by
creating the Rockefeller Commission, which admitted to a few CIA mistakes but
swept everything under the rug. It didn't wash publicly. By this time, the
public didn't buy the government's lying. So we ultimately did have the Pike
Committee, which the CIA and the White House did manage to sabotage. But the
big one was the Church Committee in the Senate which conducted a pretty broad
investigation and brought out a lot of information on the CIA. The result of
that investigation was that the CIA did have to admit to a lot of wrongdoing
and did have to make certain reforms. Not as much as I would have liked. I
think everything has gone back to where it was and maybe even worse than what
it was, but at least there was a temporary halt to the CIA's free reign of
hiding behind secrecy and getting away with everything, up to and including
murder. There were some changes and I think they were all for the better.
FD: So instead of some of the more harsher critics of the CIA who would want
to see it abolished you would want to reform it?
Marchetti: Yes. Its one of these things where you can't throw out the baby
with the bathwater. The CIA does do some very good and valuable and
worthwhile and legal things. Particularly in the collection of information
throughout the world, and in the analysis of events around the world. All of
this is a legitimate activity, and what the CIA was really intended to do in
the beginning when they were set up. My main complaint is that over the years
those legitimate activities have to a great extent been reduced in
importance, and certain clandestine activities, particularly the covert
action, have come to the fore. Covert action is essentially the intervention
in the internal affairs of other governments in order to manipulate events,
using everything from propaganda, disinformation, political action, economic
action, all the way down to the really dirty stuff like para-military
activity. This activity, there was too much of it. It was being done for the
wrong reasons, and it was counterproductive. It was in this area where the
CIA was really violating U.S. law and the intent of the U.S. Constitution,
and for that matter, I think, the wishes of Congress and the American people.
This was the area that needed to be thoroughly investigated and reformed. My
suggestion was that the CIA should be split into two organizations. One, the
good CIA so to speak, would collect and analyze information. The other part,
in the dirty tricks business, would be very small and very tightly controlled
by Congress and the White House, and if possible, some kind of a public board
so that it didn't get out of control.
My theory is, and I've proved it over and over again along with other people,
is that the basic reason for secrecy is not to keep the enemy from knowing
what you're doing. He knows what you're doing because he's the target of it,
and he's not stupid. The reason for the CIA to hide behind secrecy is to keep
the public, and in particular the American public, from knowing what they're
doing. This is done so that the President can deny that we were responsible
for sabotaging some place over in Lebanon where a lot of people were killed.
So that the President can deny period. Here is a good example: President
Eisenhower denied we were involved in attempts to overthrow the Indonesian
government in 1958 until the CIA guys got caught and the Indonesians produced
them. He looked like a fool. So did the N.Y. Times and everybody else who
believed him. That is the real reason for secrecy.
There is a second reason for secrecy. That is that if the public doesn't know
what you are doing you can lie to them because they don't know what the truth
is. This is a very bad part of the CIA because this is where you get not only
propaganda on the American people but actually disinformation, which is to
say lies and falsehoods, peddled to the American public as the truth and
which they accept as gospel. That's wrong. It's not only wrong, its a lie and
it allows the government and those certain elements of the government that
can hide behind secrecy to get away with things that nobody knows about. If
you carefully analyze all of these issues that keep coming up in Congress
over the CIA, this is always what is at the heart of it: That the CIA lied
about it, or that the CIA misrepresented something, or the White House did
it, because the CIA and the White House work hand in glove. The CIA is not a
power unto itself. It is an instrument of power. A tool. A very powerful tool
which has an influence on whoever is manipulating it. But basically the CIA
is controlled by the White House, the inner circle of government, the inner
circle of the establishment in general. The CIA is doing what these people
want done so these people are appreciative and protective of them, and they
in turn make suggestions or even go off on their own sometimes and operate
deep cover for the CIA. So it develops into a self-feeding circle.
FD: Spreading disinformation is done through the newsmedia.
Marchetti: Yes. Its done through the newsmedia. The fallacy is that the CIA
says the real reason they do this is to con the Soviets. Now I'll give you
some examples. One was a fellow by the name of Colonel Oleg Penkovsky.
FD: Penkovsky Papers?
Marchetti: Yes. I wrote about that in `The CIA and the Cult of Intelligence.
The Penkovsky Papers was a phony story. We wrote the book in the CIA. Now,
who in the hell are we kidding? The Soviets? Do we think for one minute that
the Soviets, who among other things captured Penkovsky, interrogated him, and
executed him, do you think for one minute they believe he kept a diary like
that? How could he have possibly have done it under the circumstances? The
whole thing is ludicrous. So we're not fooling the Soviets. What we're doing
is fooling the American people and pumping up the CIA. The British are
notorious for this kind of thing. They're always putting out phony
autobiographies and biographies on their spies and their activities which are
just outright lies. They're done really to maintain the myth of English
secret intelligence so that they will continue to get money to continue to
operate. Thats the real reason. The ostensible reason is that we were trying
to confuse the Soviets. Well that's bullshit because they're not confused.
One of the ones I think is really great is `Khruschev Remembers.' If anybody
in his right mind believes that Nikita Khruschev sat down, and dictated his
memoirs, and somebody -- Strobe Talbot sneaked out of the Soviet Union with
them they're crazy. That story is a lie. That book was a joint operation
between the CIA and the KGB. Both of them were doing it for the exact same
reasons. They both wanted to influence their own publics. We did it our way
by pretending that Khruschev had done all of this stuff and we had lucked out
and somehow gotten a book out of it. The Soviets did it because they could
not in their system allow Khruschev to write his memoirs. Thats just against
everything that the Communist system stands for. But they did need him to
speak out on certain issues. Brezhnev particularly needed him to
short-circuit some of the initiatives of the right wing, the Stalinist wing
of the party. Of course the KGB was not going to allow the book to be
published in the Soviet Union. The stuff got out so that it could be
published by the Americans. That doesn't mean that the KGB didn't let copies
slip into the Soviet Union and let it go all around. The Soviets achieved
their purpose too.
This is one of the most fantastic cases, I think, in intelligence history.
Two rival governments cooperated with each other on a secret operation to
dupe their respective publics. I always wanted to go into much greater length
on this but I just never got around to it. Suffice it to say that TIME
magazine threatened to cancel a two-page magazine article they were doing on
me and my book if I didn't cut a brief mention of this episode out of the
book.
FD: How was this operation initially set up?
Marchetti: I don't know all of the ins and outs of it. I imagine what
happened is that it probably started with somebody in the Soviet Politburo
going to Khruschev and saying, ``Hey, behind the scenes we're having lots of
trouble with the right-wing Stalinist types. They're giving Brehznev a bad
time and they're trying to undercut all of the changes you made and all of
the changes Brehznev has made and wants to make. Its pretty hard to deal with
it so we've got an idea. Since you're retired and living here in your dacha
why don't you just sit back and dictate your memoirs. And of course the KGB
will review them and make sure you don't say anything you shouldn't say and
so on and so forth. Then we will get in touch with our counterparts, and see
to it that this information gets out to the West, which will publish it, and
then it will get back to the Soviet Union in a variety of forms. It will get
back in summaries broadcast by the Voice of America and Radio Liberty, and
copies of the book will come back in, articles written about it will be
smuggled in, and this in turn will be a big influence on the intelligentsia
and the party leaders and it will undercut Suslov and the right wingers.''
Khruschev said okay. The KGB then went to the CIA and explained things to
them and the CIA said, Well that sounds good, we'll get some friends of ours
here, the TIME magazine bureau in Moscow, Jerry Schecter would later have a
job in the White House as a press officer. We'll get people like Strobe
Talbot, who is working at the bureau there, we'll get these guys to act as
the go-betweens. They'll come and see you for the memoirs and everyone will
play dumb. You give them two suitcases full of tapes (laughs) or something
like that and let them get out of the Soviet Union. Which is exactly what
happened.
Strobe brought all of this stuff back to Washington and then TIME-LIFE began
to process it and put a book together. They wouldn't let anybody hear the
tapes, they didn't show anybody anything. A lot of people were very
suspicious. You know you can tell this to the public or anybody else who
doesn't have the least brains in their head about how the Soviet Union
operates and get away with it. But anybody who knows the least bit about the
Soviet Union knows the whole thing is impossible. A former Soviet premier
cannot sit in his dacha and make these tapes and then give them to a U.S.
newspaperman and let him walk out of the country with them. That cannot be
done in a closed society, a police state, like the Soviet Union.
The book was eventually published but before it was published there was
another little interesting affair. Strobe Talbot went to Helsinki with the
manuscript, where he was met by the KGB who took it back to Leningrad, looked
at it, and then it was finally published by TIME-LIFE. None of that has ever
been explained in my book. A couple of other journalists have made references
to this episode but never went into it. It's an open secret in the press
corps here in Washington and New York, but nobody ever wrote a real big story
for a lot of reasons, because I guess it's just the kind of story that it's
difficult for them to get their hooks into. I knew people who were then in
the White House and State Department who were very suspicious of it because
they thought the KGB...
FD: Had duped TIME?
Marchetti: Exactly. Once they learned this was a deal they quieted down and
ceased their objections and complaints, and even alibied and lied afterwards
as part of the bigger game. Victor Lewis, who was apparently instrumental in
all of these negotiations, later fit into one little footnote to this story
that I've often wondered about. Lewis is (was)... After all of this happened
and when the little furor that existed here in official Washington began
dying down, Victor Lewis went to Tel Aviv for medical treatment. He came into
the country very quietly but somebody spotted him and grabbed him and said,
``What are you doing here in Israel?'' ``Well I'm here for medical treatment,
'' Lewis said. They said, ``What?! You're here in Israel for medical
treatment?'' He said, ``Yes.'' They said, ``Well whats the problem?'' ``I've
got lumbago, a back problem, and they can't fix it in the Soviet Union. but
there's a great Jewish doctor here I knew in the Soviet Union and I came to
see him.'' That sounds like the craziest story you ever wanted to hear. But
then another individual appeared in Israel at the same time and some reporter
spotted him. He happened to be Richard Helms, then-director of the CIA. He
asked Helms what he was doing in Israel, and he had some kind of a lame
excuse which started people wondering whether this was the payoff. Helms
acting for the CIA, TIME-LIFE, and the U.S. government, and Lewis acting for
the KGB, Politburo, and the Soviet government. Its really a fascinating
story. I wrote about briefly in the book and it was very short. You'll find
it if you look through the book in the section we're talking about.
Publications and things like that. When I wrote those few paragraphs there
wasn't much further I could go, because there was a lot of speculation and
analysis.
Around the time my book came out, TIME magazine decided that they would do a
two-page spread in their news section and give it a boost. Suddenly I started
getting calls from Jerry Schecter and Strobe Talbot about cutting that part
out. I said I would not cut it out unless they could look me in the eye and
say I was wrong. If it wasn't true I would take the book and cut the material
out. But neither of them chose to do that. Right before the article appeared
in TIME I got a call from one of the editors telling me that some people
wanted to kill the article. I asked why and he said one of the reasons is
what you had to say about TIME magazine being involved in the Khruschev
Remembers book. I asked him, ``Thats it?'' I had talked to Jerry and Strobe
and this was their backstab. This editor asked me if I could find somebody
who could trump the people who were trying to have the article killed.
Somebody who could verify my credentials in telling the story. I said why
don't you call Richard Helms, who by that time had been eased out of office
by Kissinger and Nixon, and was now an ambassador in Teheran. So this editor
called Helms to verify my credentials (laughing) and Helms said, ``Yeah, he's
a good guy. He just got pissed off and wanted to change the CIA.'' So the
article ran in TIME. I think you're one of the very few people I've explained
this story to in depth.
FD: Did this operation have a name?
Marchetti: It probably did but I was already out of the agency and I don't
know what it was. But I do know it was a very sensitive activity and that
people very high up in the White House and State Department who you would
have thought would have been aware of it were not aware of it. But then
subsequently they were clearly taken into a room and talked to in discussions
and were no longer critics and doubters and in fact became defenders of it.
FD: Let me make sure I am clear about the CIA's motivation...
Marchetti: The CIA's motivation was that here we have a former Soviet premier
talking out about the events of his career and revealing some pretty
interesting things about his thinking and the thinking of others. All of
which shows that the Soviet Union is run by a very small little clique. A
very small Byzantine-like clique. There is a strong tendency to stick with
Stalinisn and turn to Stalinism but some of the cooler heads, the more
moderate types, are trying to make changes. Its good stuff from the CIA's
point of view and from the U.S. government's point of view. This is what
we're dealing with. This is our primary rival. Look at how they are. And
Khruschev had to dictate these things in secrecy and they had to be smuggled
out of the Soviet Union.
Things like this are very subtle in their consistency. It's not a black and
white thing on the surface. You might say, ``Well, what's wrong with that?''
What's wrong with that is that it is a lie. The truth would have been much
more effective. Nikita Khruschev was approached by the KGB and Soviet
Politburo to dictate his memoirs, which he did under their supervision, which
means we don't know if he is telling the whole story or the complete truth
because they had an opportunity to edit it. The Russians were so anxious to
get this information out so that it could come back to the Soviet Union for
two reasons. The first was to build international pressure. The second was to
build up internal pressure against the Stalinists. They were so anxious that
they were willing to make a deal with the CIA, and give us this material. So
that we could then prepare a book. Which we did. Thats the kind of a
government we are dealing with here. These are the kinds of people they are
and the kind of lies they live.
FD: Let's turn to world affairs for a moment. One of the events of recent
years that has always puzzled me is United States support for the Vanaaka
Party in what was once the New Hebrides Islands. In the late '70s, before the
New Hebrides achieved independence, there were basically two factions
fighting between themselves to see who would maintain control when the
colonial powers left. The British and the French had governed the New
Hebrides under a concept known as the condominium, and before independence,
the British and the labor movement in Australia threw their support behind
the ubiquitous socialist faction, in this case, the Vanaaka Party. The French
offered some behind-the-scenes support to the second faction, which was
basically pro-free market and pro-West. The U.S. under Jimmy Carter went
along with the British. Do you have any idea why this might have been done?
Marchetti: Offhand, I don't. The CIA has learned over the years that you
sometimes cannot support the people you would prefer to support, because they
just do not have the popular power to gain control or maintain control
without a revolution and things of that sort. The classic example is West
Berlin. Back in the '50s we were contesting with the Russians for influence
in Berlin. This was at a time when the Russians and East Germans were putting
tremendous pressure on to have West Berlin go almost voluntarily into the
Soviet bloc. The United States was struggling mightily to keep West Berlin
free. At that point in time the strong power in West Germany were the
Christian Democrats under Konrad Adenauer, and these were the people that we
were supporting.
The Christian Democrats, however, just did not have the wherewithal to save
West Berlin. The situation was such that the Social Democrats were the ones
who could save West Berlin. Not getting into all of the whys and wherefores
and policy positions, the Social Democrats also had a very charismatic person
named Willy Brandt. So by backing Willy Brandt and the Social Democrats,
instead of putting all of our eggs in the Christian Democratic Party basket,
Brandt and the Social Democrats were able to maintain a free West Berlin and
we were able to achieve our goal. There were some people in the CIA who
thought this was terrible, we were not being ideologically pure, and one of
them happens to be E. Howard Hunt, who actually considered Willy Brandt a KGB
spy. So there are times when you have to, I guess you would call it, choose
the lesser of two evils.
It might have been a miscalculated gamble. I don't have all of the facts, but
maybe the thinking was that if we left the pro-West faction in power we may
end up with a goddamned civil war.
FD: In retrospect, the Carter administration's decision seems even more
tragic and mistaken. Since coming to power the Vanaaka Party has consolidated
power in the new country, now known as Vanuatu, and established diplomatic
relations with governments like Cuba and Vietnam. Socialist Vanuatu has now
come to serve as a beacon of sorts for other independence movements in that
part of the world, such as the Kanaks in New Caledonia, who have subsequently
adopted socialism as their ideology. When I asked Jimmy Carter about this
during an interview recently he said he was sorry, but he did not remember
the episode. Is it possible that this may have been an incompetent blunder on
the part of the U.S. government? That somebody didn't do their homework, and
as a result those responsible for the decision didn't have all of the facts?
Marchetti: Absolutely. Absolutely. Yes. Its not the kind of an issue that
draws the most attention in Washington. As you just pointed out, Jimmy Carter
doesn't even remember it. I'm sure that decision was made pretty far down the
line. If Carter ever had to make a decision he probably doesn't even remember
it because it was probably staffed down because it was considered so
inconsequential at the time by Carter and everyone involved. They considered
it so inconsequential that they don't even remember it. It's something they
signed off on. My guess from what you have told me is that it was a mistake.
FD: You mentioned E. Howard Hunt earlier. I understand that you wrote an
article for a Washington-based publication about the assassination of John F.
Kennedy and Hunt sued the publication, charging libel. Could you give us some
background on this matter?
Marchetti: The article was written in the summer of 1978 and published by
SPOTLIGHT, a weekly newspaper that advertises itself as `The Voice of the
American Populist Party.' At the time I wrote the article for SPOTLIGHT the
House Select Committee on Assassinations was getting ready to hold its
hearings reviewing the Kennedy and King assassinations. I had picked up some
information around town that a memo had recently been uncovered in the CIA,
and that the CIA was concerned about it. I believe the memo was from James
Angleton, who at the time was chief of counterintelligence for Richard Helms.
I forget the exact date, but this memo was something like six years old,
while Helms was still in office as director.
The memo said that at some point in time the CIA was going to have to deal
with the fact that Hunt was in Dallas the day of the Kennedy assassination or
words to that effect. There was some other information in it, such as did you
know anything about it, he wasn't doing anything for me, and back and forth.
I had that piece of information, along with information that the House Select
Committee was going to come out with tapes that indicated there was more than
one shooter during the Kennedy assassination and that the FBI, or at least
certain people in the FBI, believed these tapes to be accurate and had always
believed that there was more than one shooter.
I was in contact with the House Select Committee, and they were probing real
deeply into things and they were very suspicious of the Kennedy
assassination. There were some other reporters working on the story at the
time, one in particular who has a tremendous reputation, and he felt there
was something to it. So we rushed into print at SPOTLIGHT with a story
saying, based on everything we put together, that we had this information,
and we tried to predict what was going to happen. In essence we said whats
going to happen is that the committee is going to unearth some new
information that there was more than one shooter and probably come up with
this memo, this internal CIA memorandum, and there will be some other things.
Then the CIA will conduct a limited hangout, and will admit to some error or
mistake, but then sweep everything else under the rug, and in the process
they may let a few people dangle in the wind like E. Howard Hunt, Frank
Sturgis, Jerry Hemming, and other people who have been mentioned in the past
as being involved in something related to the Kennedy assassination. It was
that kind of speculative piece.
What happened is that about a week after my article appeared in SPOTLIGHT the
Wilmington News-Journal published an article by Joe Trento. This was a longer
and more far-ranging article, in which he discussed the memo too but in
greater detail. A couple of weeks after that Hunt informed SPOTLIGHT that he
wanted a retraction. I checked with my sources and said I don't think we
should retract. I said we should do a follow-up article. Now by this time
some CIA guy was caught stealing pictures in the committee, some spy, so
things were really hot and heavy at the time. There was a lot of expectation
that the committee was going to do something, some really good work to bring
their investigation around. So I said to SPOTLIGHT let's do a follow-up
piece, but the publisher chickened out and said, nah, what we'll do is tell
Hunt we'll give him equal space. He can say whatever he wants to in the same
amount of space.
Hunt ignored the offer. A couple of months later Hunt comes to town for
secret hearings with the committee, and was heard in executive session. Hunt
was suing the publisher of the book `Coup D'Etat in America,' and deposed me
in relation to that case, and then he brought in, he tried to slip in, this
SPOTLIGHT article. I was under instructions from my lawyer not to comment. My
lawyer would have me refuse to answer on the grounds of journalistic
privilege, and also on the grounds of my relationship with the CIA. My lawyer
had on his own gone to the CIA before I gave my deposition and asked them
about this, and they said to tell me to just hide behind my injunction. I
told my lawyer I don't understand it, and he told me all that the CIA said is
that they hate Hunt more than they hate you and they're not going to give
Hunt any help. So that's what I did, and that was the end of it. We thought.
Two years after it ran Hunt finally sued SPOTLIGHT over my article. SPOTLIGHT
thought it was such a joke, all things considered, that they really didn't
pay any attention. I never even went to the trial. I never even submitted an
affidavit. I was not deposed or anything. The Hunt people didn't even try to
call me as a witness or anything. I was left out of everything. Hunt ended up
winning a judgment for $650,000. Now SPOTLIGHT got worried. They appealed and
the Florida Appellate Court overturned the decision on certain technical
grounds, and sent it back for retrial. The retrial finally occurred earlier
this year. When it came time for the retrial, which we had close to a year to
prepare for, SPOTLIGHT got serious, and went out and hired themselves a good
lawyer, Mark Lane, who is something of an expert on the Kennedy
assassination. They got me to become involved in everything, and we ended up
going down there and just beating Hunt's pants off. The jury came in, I
think, within several hours with a verdict in our favor. The interesting
thing was the jury said we were clearly not guilty of libel and actual
malice, but they were now suspicious of Hunt and everything he invoked
because we brought out a lot of stuff on Hunt.
Hunt lost, and was ordered to pay our court costs in addition to everything
else. He has subsequently filed an appeal and that's where its at now. It's
up for appeal. I imagine it will probably be another six months to a year
before we hear anything further on it. Based on everything I have seen, Hunt
doesn't have a leg to stand on because the deeper he gets into this the more
he runs the risk of exposing himself. We had just all kinds of material on
Hunt. We had a deposition from Joe Trento saying, yes, he saw the internal
CIA memo. We produced one witness in deposition, Marita Lorenz, who was
Castro's lover at one point, and she said that Hunt was taking her and people
like Sturgis and Jerry Hemmings and others and running guns into Dallas.
Lorenz said that a couple of days before the assassination Hunt met them in
Dallas and made a payoff. What they all were doing, whether it was connected
to the assassination, we don't know.
I think if Hunt keeps pursuing this, all that he's doing is setting the stage
for more and more people to come forward and say bad things about him, and
raise more evidence that he was in Dallas that day and that he must have been
involved in something. If it wasn't the assassination it must have been some
kind of diversionary activity or maybe it was something unrelated to the
assassination and the wires just got crossed and it was a coincidence at the
time.
One of the key points in the mind of the jury as far as we`ve been able to
tell at SPOTLIGHT is that Hunt to this day still cannot come up with an alibi
for where he was the day of the assassination. Hunt comes up with the
weakest, phoniest stories that he can't corroborate. Some guy who was drunk
came out of a bar and waved at him. His story doesn't match with that guy's
story. Hunt says he can produce his children to testify he was in Washington.
None of his children appeared at the trial. It's a very, very strange thing.
Hunt clearly was, in my mind, not in Washington doing what he says he was
doing Nov. 22, 1963. He was certainly not at work that day at the CIA. This
subject has come up before, whether he was on sick leave, an annual leave, or
where the hell he was. Hunt just cannot come up with a good alibi.
Hunt has gone before committees. The Rockefeller Committee, I believe he was
before the Church Committee, and before the House Select Committee. Nobody
will give Hunt a clean bill of health. They always weasel words. Their
comment on Hunt is always some sort of a way that can be interpreted anyway
that you want. You can say this indicates the committee looked into it and
they feel he wasn't involved. Or you can look at it and say the committee
looked into it and they have a lot of doubts about Hunt, and they're just
being very careful about what they are saying. Hunt himself will not tell you
what happened before these committees. He says that his testimony is
classified information. Well, if the testimony vindicates Hunt and provides
him with an alibi then why can't he tell us? The mystery remains.
FD: Do you believe it possible that the CIA knows where Hunt was Nov. 22,
1963, but just do not want to release that information?
Marchetti: That's my guess. I think that subsequently, by now, the CIA may
not have known where Hunt was at the time, and they may not have even
realized what he was up to until years after and years later when his name
started to be commonly mentioned in connection with the assassination. I
think by now the CIA probably knows where Hunt was and what he was doing or
have some very strong feelings about that, and they're not too happy about
it. But whatever it was, and is, that Hunt was involved in, it seems to be,
or would appear, that he was in or around Dallas about the time of the
assassination, involved in some kind of clandestine activity. It may have
been an illegal clandestine activity, even something the CIA was unaware of.
The CIA acts very strangely about this. The CIA will not give Hunt any help.
He got no help at all from the CIA in the preparation of his case against us
or in the presentation of his case. They just left him out there. Hunt
managed to scrounge up a couple of his CIA friends who on their own were
willing to give some help, but caved in right away. One guy didn't testify.
Another guy gave a stupid deposition in the middle of the night to us
(laughs) which wasn't worth the paper it was written on.
Helms gave a deposition which said nothing. No way would he go out on a limb
for Hunt. In my own mind, I have a feeling that the CIA knows where Hunt was
and what he was doing, and while they're not going to prosecute him for a lot
of reasons, they're involved in the cover-up themselves and don't want to
bring any embarrassment upon the agency. On the other hand, they feel if he
screws around and gets his own mit in the ringer, that's his own fault, and
we can cover our ass. Hunt, for his own part, apparently feels he has some
sort of pressure on the CIA that while it might not be strong enough to bring
them forward to defend him before any committee or in a court of law, its at
least strong enough for them not to take any overt action against him. So it
seems to me to be some kind of double graymail. Hunt's graymailing the CIA on
one hand and they're graymailing him on the other hand. Its a very, very
strange thing.
FD: Did Jerry Hemmings give a deposition? I understand he is still in prison.
Marchetti: I think Jerry might still be in. He asked not to give a deposition
or be called as a witness unless it was absolutely necessary, because he was
either coming toward the end of his term, or he was up for parole. He
preferred not to get involved. This was pretty much the attitude of another
individual who was mentioned, but I was left with the feeling that if push
really came to shove, these people could be brought forward. Now what they
know, or whether they were going to risk perjury, which is a pretty big
gamble when you`re dealing with Mark Lane, particularly on this subject. He's
not only a brilliant lawyer, but this is a subject he has a lot of background
in.
FD: Did Gordon Novel fit into this at all?
Marchetti: No.
FD: You mentioned that it is possible the CIA is withholding information on
Hunt's whereabouts Nov. 22, 1963. The CIA has been accused many times in the
past of engaging in a cover-up of the JFK assassination. Do you believe they
are still covering up in a lot of ways?
Marchetti: Oh yeah, I think so, I'd think not only they and the FBI, I think
everybody is covering up.
FD: Are they covering up necessarily to just keep the American people in the
dark about the episode, or cover-up because of their own guilt and complicity?
Marchetti: I think its both. I think it all started with when it happened. I
don't think anybody was really sure in Washington who was behind the
assassination. I think they were very fearful that if they didn't come up
with a lone nut theory, and in this case a lone nut who was removed from the
scene in a matter of days, that the American people might panic. They might
lose their faith in the government. They might lose their faith in the
institutions. They might begin to point fingers at all kinds of people. The
Russians. The Cubans. Other elements of our society like the right wing and
organized crime and so on. I think there was a consensus in the minds of the
establishmentarians in our government which was that we should put this to
bed as quickly and as quietly as possible. We'll make a hero out of Kennedy
and let's forget about it. And then of course they did have to have a Warren
Commission, a blue-ribbon panel which would have the right people on it and
then we'll lay the thing to rest officially. Which is essentially what
happened. They didn't hear a lot of evidence. They ignored evidence. Evidence
was hidden. Evidence was destroyed. I think it was pretty much clear that
nobody was being absolutely forthcoming.
The former head of the CIA, Allen Dulles, even said he would lie to the
people about anything he considered to pertain to national security. Dulles
said he would lie to the people if he had to. I think the Kennedy
assassination was laid to rest by the establishment and it became just a
suspicion in the minds of the people. Then came the revelations. I think by
now everybody involved was deeply involved in the coverup, that that maybe
became even more paramount than the question of who did kill Kennedy and why.
To admit that we covered up from the very begining, and that we've been
covering up ever since, I think, would be more devastating than it would have
been a few years ago to say O.K., we've looked into it, and figured it out,
it was CIA renegades, or whoever was responsible for murdering Kennedy. I
think by now there are just too many people that feel they may have started
out originally for the most noble of motives but they cannot adjust to it. We
saw it with the Watergate affair, and see it every day in life. Once somebody
starts lying and covering up it just snowballs. It just keeps going on and on
and on and on. It keeps getting harder and harder and harder to determine the
truth. I think it's pretty difficult for somebody in 1985 to come forward and
say, yes, I was part of a cover-up, 22 years ago. What he's saying is that
I've lived a lie all of my life. I don't think we're ever going to get the
answer, frankly. I don't think we're every going to get the answer to the
story.
FD: You're pessimistic about the American people discovering the real truth
about the JFK assassination?
Marchetti: This is not to say that 50 years from now that some historian may
get access to some material when everybody is dead and buried, and might be
able to put together a pretty accurate story. But even then, with all of the
time that has gone by, the myth will have been established. You have those
people that will say, ``Ugh. Conspiracy theorists,'' while other people will
say, ``I never believe the government.'' But it will have no effect.
FD: So you believe it will only be time that will reveal the full truth about
the JFK assassination? The truth won't be revealed because of another big
government scandal like Watergate, or a president who is committed to seeing
that the case is solved?
Marchetti: One of the presidents who might have unearthed all this, actually
a potential president was Bobby Kennedy, but he got rubbed out.
FD: Bobby Kennedy made a statement three days before he was murdered that he
felt only the office of the presidency could get at the truth.
Marchetti: I'm not sure if thats possible. I wonder in my own mind if, let's
say, Teddy Kennedy would be elected president. I wonder if he, one, would
have the courage to reopen the case at this point in time knowing everything
he knows about it probably. And two, if he had the courage, would he have the
muscle to be able to resolve it completely and fully to the satisfaction of
everyone? I think there are those things in life you either resolve at the
time or never. After awhile, as the years pass by, it becomes more and more
difficult until it is impossible.
FD: The American people are told that they choose their leaders and run the
government. Is this true, or is it the invisible state within a state, the
intelligence community?
Marchetti: I don't think the intelligence community, although it is an
invisible arm of the government, runs it. I think the people who run the
country are the same people who usually run things not only here but all over
the world. The powerful economic interests, whether they are bankers, or
industrialists, or whatever. The real solid inner core of the establishment.
These are the movers and shakers, but they don't have absolute power. They
may not want a certain person to get nominated by a certain party. In some
cases they may not even be able to stop them from getting to power or using
it. Generally speaking, they have more influence on the government than the
other people do. Its manifested itself in all sorts of ways. There are all of
these forces at work.
FD: One last question: PSI. Both the CIA and the KGB had a great interest in
this area. One of the things I know the CIA did, attempt to recruit KGB
agents in the afterlife. Are you familiar with this?
Marchetti: I do know there was great interest in this whole area of
parapsychology, for whatever benefit may have been achieved. Not only the
CIA, but the Pentagon was involved, and for that matter, the KGB. Everybody
has apparently examined it. There were a lot of stories floating around the
CIA that they had tried to contact old agents like Penkovsky, who had been
captured and killed, executed by the Soviet Union, in the hope that they
could derive additional information. To my knowledge none of this stuff
really worked.
FD: Thank you, Victor Marchetti.

could derive additional information. To my knowledge none of this stuff
really worked.
FD: Tha

BIN
txt_files/cia_br.ain Normal file

Binary file not shown.

1809
txt_files/cia_info.txt Normal file

File diff suppressed because it is too large Load Diff

985
txt_files/ciabwash.txt Normal file
View File

@ -0,0 +1,985 @@
SEE NOTES AT END FOR INFO ON SOURCES OF THESE DOCUMENTS
CENTRAL INTELLIGENCE AGENCY
WASHINGTON 25, D. C.
OFFICE OF THE DIRECTOR 25 APR 1956
-------------------------------------------------------------------------------
MEMORANDUM FOR: The Honorable J. Edgar Hoover
Director, Federal Bureau of Investigation
SUBJECT : Brainwashing
The attached study on brainwashing was prepared by my
staff in response to the increasing acute interest in the
subject throughout the intelligence and security components
of the Government. I feel you will find it well worth your
personal attention. It represents the thinking of leading psy-
chologists, psychiatrists and intelligence specialists, based
in turn on interviews with many individuals who have had
personal experience with Communist brainwashing, and on
extensive research and testing. While individuals specialists
hold divergent views on various aspects of this most complex
subject, I believe the study reflects a synthesis of majority
expert opinion. I will, of course, appreciate any comments
on it that you or your staff may have.
(signed)
Allen W. Dulles
Director
ENCLOSURE
OA 53-37
-------------------------------------------------------------------------------
A REPORT ON COMMUNIST BRAINWASHING
The report that follows is a condensation of a study by train-
ing experts of the important classified and unclassified information
available on this subject.
BACKGROUND
Brainwashing, as a technique, has been used for centuries and
is no mystery to psychologists. In this sense, brainwashing means
involuntary re-education of basic beliefs and values. All people
are being re-educated continually. New information changes one's
beliefs. Everyone has experienced to some degree the conflict that
ensues when new information is not consistent with prior belief.
The experience of the brainwashed individual differs in that the in-
consistent information is forced upon the individual under controlled
conditions after the possibility of critical judgment has been re-
moved by a variety of methods.
There is no question that an individual can be broken psycholog-
ically by captors with knowledge and willingness to persist in tech-
niques aimed at deliberately destroying the integration of a personal-
ity. Although it is probable that everyone reduced to such a confused,
disoriented state will respond to the introduction of new beliefs, this
cannot be stated dogmatically.
PRINCIPLES OF HUMAN CONTROL AND REACTION TO CONTROL
There are progressive steps in exercising control over an individ-
ual and changing his behaviour and personality integration. The fol-
lowing five steps are typical of behaviour changes in any controlled
individual:
1. Making the individual aware of control is the first stage in
changing his behaviour. A small child is made aware of the physical
and psychological control of his parents and quickly recognizes that
an overwhelming force must be reckoned with. So, a controlled adult
comes to recognize the overwhelming powers of the state and the im-
personal, "incarcerative" machinery in which he is enmeshed. The in
-dividual recognizes that definite limits have been put upon the ways
he can respond.
(Approved for Release) (62-80750-2712X)
(Date: 8 FEB 1984)
OA 53-37
2. Realization of his complete dependence upon the controll-
ing system is a major factor in the controlling of his behavior.The con-
trolled adult is forced to accept the fact that food, tobacco,praise,
and the only social contact that he will get come from the very in-
terrogator who exercises control over him.
-------------------------------------------------------------------------------
3. The awareness of control and recognition of dependence re-
sult in causing internal conflict and breakdown of previous patterns
of behaviour. Although this transition can be relatively mild in
the case of a child, it is almost invariably severe for the adult
undergoing brainwashing. Only an individual who holds his values
lightly can change them easily. Since the brainwasher-interrogators
aim to have the individuals undergo profound emotional change, they
force their victims to seek out painfully what is desired by the
controlling individual. During this period the victim is likely to
have a mental breakdown characterized by delusions and hallucinat-
ions.
4. Discovery that there is an acceptable solution to his prob-
lem is the first stage of reducing the individual's conflict. It
is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror
of internal conflict would cease and that perhaps they would not,
after all, be driven insane. It is at this point that they are pre-
pared to make major changes in their value-system. This is an
automatic rather than voluntary choice. They have lost their a-
bility to be critical.
5. Reintergration of values and identification with the cont-
rolling system is the final stage in changing the behaviour of the
controlled individual. A child who has learned a new, socially de-
sirable behaviour demonstrates its importance by attempting to as-
apt the new behaviour to a variety of other situations. Similar
states in the brainwashed adult are
(SECTION DELETED BY CIA)
2
OA 53-37
pitiful. His new value-system, his manner of perceiving,organizing,and
-------------------------------------------------------------------------------
giving meaning to events, is virtually independent of his former value-
system.He is no longer capable of thinking or speaking in concepts other
than those he has adopted. He tends to identify by expressing thanks to
his captors for helping him see the light.Brainwashing can be achieved
without using illegal means.Anyone willing to use known principles of
control and reactions to control and capable of demonstrating the patience
needed in raising a child can probably achieve successful brainwashing.
COMMUNIST CONTROL TECHNIQUES AND THEIR EFFECTS
A description of usual communist control techniques follows.
1. Interrogation. There are at least two ways in which "interro-
gation" is used:
a. Elicitation, which is designed to get the individual to
surrender protected information, is a form of interrogation. One major
difference between elicitation and interrogation used to achieve
brainwashing is that the mind of the individual must be kept clear to
permit coherent, undistorted disclosure of protected information.
b. Elicitation for the purpose of brainwashing consists of
questioning,argument,indoctrination,threats,cajolery,praise,hos-
tility, and a variety of other pressures. The aim of this interrogation
is to hasten the breakdown of the individual's value system and to encourage
the substitution of a different value-system. The procurement of protected
information is secondary and is used as a device to increase pressure upon
the individual. The term "interrogation" in this paper will refer, in
general, to this type. The "interrogator" is the individual who conducts
this type of interrogation and who controls the administration of the other
pressures. He is the protagonist against whom the victim develops his con-
flict, and upon whom the victim develops a state of dependency as he seeks
some solution to his conflict.
2. Physical Torture and Threats of Torture. Two types of physical
torture are distinguishable more by their psychological effect in induc-
ing conflict than by the degree of painfulness:
a. The first type is one in which the victim has a passive role
in the pain inflicted on him (e.g.,beatings). His conflict involves the
decision of whether or not to give in to demands in order to avoid further
pain. Generally, brutality of this type was not found to achieve the
desired results. Threats of torture were found more effective, as fear
of pain causes greater conflict within the individual than does pain it-
self.
3
OA 53-37
b. The second type of torture is represented by requiring the
individual to stand in one spot for several hours or assume some other
pain-inducing position. Such a requirement often engenders in the indi-
vidual a determination to "stick it out." This internal act of resistance
-------------------------------------------------------------------------------
provide a feeling of moral superiority at first. As time passes and his
pain mounts,however, the individual becomes aware that it is his own
original determination to resist that is causing the continuance of pain.
A conflict develops within the individual between his moral determination
and his desire to collapse and discontinue the pain. It is this extra
internal conflict, in addition to the conflict over whether or not to give
in to the demands made of him, that tends to make this method of torture
more effective in the breakdown of the individual personality.
3. Isolation. Individual differences in reaction to isolation are
probably greater than to any other method. Some individuals appear to
be able to withstand prolonged periods of isolation without deleterious
effects, while a relatively short period of isolation reduces others to
the verge of psychosis. Reaction varies with the conditions of the iso-
lation cell. Some sources have indicated a strong reaction to filth and
vermin, although they had negligible reactions to the isolation. Others
reacted violently to isolation in relatively clean cells. The predominant
cause of breakdown in such situations is a lack of sensory stimulation
(i.e.,grayness of walls,lack of sound,absence of social contact,etc.).
Experimental subjects exposed to this condition have reported vivid hal-
licinations and overwhelming fears of losing their sanity.
4. Control of Communication. This is one of the most effective
methods for creating a sense of helplessness and despair. This measure
might well be considered the cornerstone of the communist system of con-
trol. It consists of strict regulation of the mail,reading materials,
broadcast materials, and social contact available to the individual. The
need to communicate is so great that when the usual channels are blocked,
the individual will resort to any open channel, almost regardless of the
implications of using that particular channel. Many POWs in Korea, whose
only act of "collaboration" was to sign petitions and "peace appeals,"
defended their actions on the ground that this was the only method of
letting the outside world know they were still alive. May stated that
their morale and fortitude would have been increased immeasurably had
leaflets of encouragement been dropped to them. When the only contact
with the outside world is via the interrogator, the prisoner comes to
develop extreme dependency on his interrogator and hence loses another
prop to his morale.
Another wrinkle in communication control is the informer system.
The recruitment of informers in POW camps discouraged communication
4
OA 53-37
between inmates.POWs who feared that every act or thought of resistance
-------------------------------------------------------------------------------
would be communicated to the camp administrators, lost faith in their
fellow man and were forced to "untrusting individualism." Informers are
also under several stages of brainwashing and elicitation to develop
and maintain control over the victims.
5. Induction of Fatigue. This is a well-known device for breaking
will power and critical powers of judgment. Deprivation of sleep results
in more intense psychological debilitation than does any other method of
engendering fatigue. The communists vary their methods. "Conveyor belt"
interrogation that last 50-60 hours will make almost any individual com-
promise, but there is danger that this will kill the victim. It is safer
to conduct interrogations of 8-10 hours at night while forcing the prisoner
to remain awake during the day. Additional interruptions in the remaining
2-3 hours of allotted sleep quickly reduce the most resilient individual .
Alternate administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression.
Fatigue, in addition to reducing the will to resist,also produces
irritation and fear that arise from increased "slips of the tongue." for-
getfulness, and decreased ability to maintain orderly thought processes.
6. Control of Food,Water and Tobacco. The controlled individual
is made intensely aware of his dependence upon his interrogator for the
quality and quantity of his food and tobacco. The exercise of this con-
trol usually follows a pattern. No food and little or no water is per-
mitted the individual for several days prior to interrogation.When the
prisoner first complains of this to the interrogator, the latter expresses
surprise at such inhumane treatment. He makes a demand of the prisoner.
If the latter complies,he receives a good meal. If he does not, he gets
a diet of unappetizing food containing limited vitamins,minerals, and
calories. This diet is supplemented occasionally by the interrogator if
the prisoner "cooperates." Studies of controlled starvation indicate
that the whole value-system of the subjects underwent a change. Their
irritation increased as their ability to think clearly decreased. The
control of tobacco presented an even greater source of conflict for heavy
smokers. Because tobacco is not necessary to life, being manipulated by
his craving for it can in the individual a strong sense of guilt.
7. Criticism and Self-Criticism. There are mechanisms of communist
thought control. Self-criticism gains its effectiveness from the fact
that although it is not a crime for a man to be wrong, it is a major crime
to be stubborn and to refuse to learn. Many individuals feel intensely re-
lieved in being able to share their sense of guilt. Those individuals
5
OA 53-37
however, who have adjusted to handling their guilt internally have dif-
ficulty adapting to criticism and self-criticism. In brainwashing ,after
a sufficient sense of guilt has been created in the individual, sharing
and self-criticism permit relief. The price paid for this relief, how-
-------------------------------------------------------------------------------
ever, is loss of individuality and increased dependency.
8. Hypnosis and Drugs as Controls. There is no reliable evidence
that the communists are making widespread use of drugs or hypnosis in
brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and "mood swings."
9. Other methods of control, which when used in conjunction with the
basic processes, hasten the deterioration of prisoners' sense of values
and resistance are:
a. Requiring a case history or autobiography of the prisoner
provides a mine of information for the interrogator in establishing and
"documenting" accusations.
b. Friendliness of the interrogator , when least expected, up-
sets the prisoner's ability to maintain a critical attitude.
c. Petty demands, such as severely limiting the allotted time
for use of toilet facilities or requiring the POW to kill hundreds of
flies, are harassment methods.
d. Prisoners are often humiliated by refusing them the use of
toilet facilities during interrogator until they soil themselves. often
prisoners were not permitted to bathe for weeks until they felt contempti-
ble.
e. Conviction as a war criminal appears to be a potent factor
in creating despair in the individual. One official analysis of the pres-
sures exerted by the ChiComs on "confessors" and "non-confessors" to
participation in bacteriological warfare in Korea showed that actual trial
and conviction of "war crimes" was overwhelmingly associated with breakdown
and confession.
f. Attempted elicitation of protected information at various
times during the brainwashing process diverted the individual from aware-
ness of the deterioration of his value-system. The fact that, in most
cases, the ChiComs did not want or need such intelligence was not known
to the prisoner. His attempts to protect such information was made at
the expense of hastening his own breakdown.
6
OA 53-37
THE EXERCISE OF CONTROL: A "SCHEDULE" FOR BRAINWASHING
-------------------------------------------------------------------------------
From the many fragmentary accounts reviewed, the following appears
to be the most likely description of what occurs during brainwashing .
In the period immediately following capture, the captors are faced
with the problem of deciding on best ways of exploitation of the prisoners.
Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological "softening-up" which
includes: limited unpalatable food rations,withholding of tobacco,possi-
ble work details,severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness,limitation of sleep such as requiring
a subject to sleep with a bright light in his eyes. Apparently the inter-
rogation and autobiographical ,material, the reports of the prisoner's be-
haviour in confinement, and tentative "personality typing" by the interro-
gators, provide the basis upon which exploitation plans are made.
There is a major difference between preparation for elicitation and
for brainwashing .Prisoners exploited through elicitation must retain suffi-
cient clarity of thought to be able to give coherent,factual accounts. In
brainwashing , on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defense, the controlled individual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes.
The most important aspect of the brainwashing process is the interro-
gation. The other pressures are designed primarily to help the interrogator
achieve his goals. The following states are created systematically within
the individual . These may vary in order, but all are necessary to the
brainwashing process:
1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.
2. An initial reaction of "surprise."
3. A feeling of uncertainty about what is required of him.
4. A developing feeling of dependence upon the interrogator .
5. A sense of doubt and loss of objectivity.
6. Feelings of guilt.
7
OA 53-37
7. A questioning attitude toward his own value-system.
8. A feeling of potential "breakdown," i.e.,that he might go crazy.
-------------------------------------------------------------------------------
9. A need to defend his acquired principles.
10. A final sense of "belonging" (identification).
A feeling of helplessness in the face of the impersonal machinery
of control is carefully engendered within the prisoner. The individual
who receives the preliminary treatment described above not only begins
to feel like an "animal" but also feels that nothing can be done about
it. No one pays any personal attention to him. His complaints fall on
deaf ears. His loss of communication, if he has been isolated, creates
a feeling that he has been "forgotten." Everything that happens to him
occurs according to an impersonal; time schedule that has nothing to do
with his needs. The voices and footsteps of the guards are muted. He
notes many contrasts,e.g.,his greasy,unpalatable food may be served
on battered tin dishes by guards immaculately dressed in white. The
first steps in "depersonalization" of the prisoner have begun. He has
no idea what to expect. Ample opportunity is allotted for him to ruminate
upon all the unpleasant or painful things that could happen to him. He
approaches the main interrogator with mixed feelings of relief and
fright.
Surprise is commonly used in the brainwashing process. The prisoner
is rarely prepared for the fact that the interrogators are usually friendly
and considerate at first. They make every effort to demonstrate that
they are reasonable human beings. Often they apologize for bad treatment
received by the prisoner and promise to improve his lot if he, too, is
reasonable. This behaviour is not what he has steeled himself for. He
lets down some of his defenses and tries to take a reasonable attitude.
The first occasion he balks at satisfying a request of the interrogator ,
however, he is in for another surprise. The formerly reasonable inter-
rogator unexpectedly turns into a furious maniac. The interrogator is
likely to slap the prisoner or draw his pistol and threaten to shoot him.
Usually this storm of emotion ceases as suddenly as it began and the in-
terrogator stalks from the room. These surprising changes create doubt
in the prisoner as to his very ability to perceive another person's moti-
vations correctly. His next interrogation probably will be marked by im-
passivity in the interrogator 's mien.
A feeling of uncertainty about what is required of him is likewise
carefully engendered within the individual . Pleas of the prisoner to
learn specifically of what he is accused and by whom are side-stepped by
8
OA 53-37
the interrogator. Instead, the prisoner is asked to tell why he thinks
-------------------------------------------------------------------------------
he is held and what he feels he is guilty of. If the prisoner fails to
come up with anything, he is accused in terms of broad generalities (e.g.,
espionage, sabotage,acts of treason against the "people"). This us-
ually provokes the prisoner to make some statement about his activities.
If this take the form of a denial, he is usually sent to isolation on
further decreased food rations to "think over" his crimes. This process
can be repeated again and again. As soon as the prisoner can think of
something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it.
Meanwhile a strong sense of dependence upon the interrogator is
developed. It does not take long for the prisoner to realize that the
interrogator is the source of all punishment , all gratification,and all
communication. The interrogator , meanwhile,demonstrates his unpredict-
bility. He is perceived by the prisoner as a creature of whim. At
times, the interrogator can be pleased very easily and at other times
no effort on the part of the prisoner will placate him. The prisoner
may begin to channel so much energy into trying to predict the behaviour
of the unpredictable interrogator that he loses track of what is happen-
ing inside himself.
After the prisoner has developed the above psychological and emotional
reactions to a sufficient degree, the brainwashing begins in earnest.
First, the prisoner's remaining critical faculties must be destroyed.
He undergoes long, fatiguing interrogations while looking at a bright
light. He is called back again and again for interrogations after min-
imal sleep. He may undergo torture that tends to create internal con-
flict. Drugs may be used to accentuate his "mood swings." He develops
depression when the interrogator is being kind and becomes euphoric when
the interrogator is threatening the direst penalties. Then the cycle is
reversed. The prisoner finds himself in a constant state of anxiety
which prevents him from relaxing even when he is permitted to sleep.
Short periods of isolation now bring on visual and auditory hallucinations.
The prisoner feels himself losing his objectivity. It is in this state
that the prisoner must keep up an endless argument with the interrogator .
He may be faced with the confessions of other individuals who "collabo-
rated" with him in his crimes. The prisoner seriously begins to doubts
his own memory. This feeling is heightened by his inability to recall
little things like the names of the people he knows very well or the date
of his birth. The interrogator patiently sharpens this feeling of doubt
by more questioning. This tends to create a serious state of uncertainty
when the individual has lost most of his critical faculties.
9
OA 53-37
The prisoner must undergo additional internal conflict when strong
feelings of guilt are aroused within him. As any clinical psychologist
is aware, it is not at all difficult to create such feelings. Military
servicemen are particularly vulnerable. No one can morally justify kill-
-------------------------------------------------------------------------------
ing even in wartime. The usual justification is on the grounds of neces-
sity or self-defense. The interrogator is careful to circumvent such
justification. He keeps the interrogation directed toward the prisoner's
moral code. Every moral vulnerability is exploited by incessant question-
ing along this line until the prisoner begins to question the very fun-
damentals of his own value-system. The prisoner must constantly fight a
potential breakdown. He finds that his mind is "going blank" for longer
and longer periods of time. He can not think constructively. If he is
to maintain any semblance of psychological integrity, he must bring to
an end this state of interminable internal conflict. He signifies a
willingness to write a confession.
If this were truly the end, no brainwashing would have occurred.
The individual would simply have given in to intolerable pressure. Ac-
tually, the final stage of the brainwashing process has just begun. No
matter what the prisoner writes in his confession the interrogator is
not satisfied. The interrogator questions every sentence of the confes-
sion. He begins to edit it with the prisoner. The prisoner is forced
to argue against every change. This is the essence of brainwashing.
Every time that he gives in on a point to the interrogator, he must re-
write his whole confession. Still the interrogator is not satisfied.
In a desperate attempt to maintain some semblance of integrity and to
avoid further brainwashing, the prisoner must begin to argue that what
he has already confessed to is true. He begins to accept as his own the
statements he has written. He uses many of the interrogator's earlier
arguments to buttress his position. By this process,identification
with the interrogator's value-system becomes complete. It is extremely
important to recognize that a qualitative change has taken place within
the prisoner. The brainwashed victim does not consciously change his
value-system; rather the change occurs despite his efforts. He is no
more responsible for this change than is an individual who "snaps" and
becomes psychotic. And like the psychotic, the prisoner is not even
aware of the transition.
DEFENSIVE MEASURES OTHER THAN ON THE POLICY AND PLANNING LEVEL
1. Training of Individuals potentially subject to communist control.
Training should provide for the trainee a realistic appraisal
of what control pressures the communists are likely to exert and what
the usual human reactions are to such pressures. The trainee must learn
10
OA 53-37
the most effective ways of combatting his own reactions to such pressures
-------------------------------------------------------------------------------
and he must learn reasonable expectations as to what his behaviour should
be. Training has two decidedly positive effects; first, it provides the
trainee with ways of combatting control; second, it provides the basis
for developing an immeasurable boost in morale. Any positive action that
the individual can take, even if it is only slightly effective, gives him
a sense of control over a situation that is otherwise controlling him.
2. Training must provide the individual with the means of
recognizing realistic goals for himself.
a. Delay in yielding may be the only achievement that can be
hoped for. In any particular operation, the agent needs the support of
knowing specifically how long he must hold out to save an operation, pro-
tect his cohorts, or gain some other goal.
b. The individual should be taught how to achieve the most favor-
able treatment and how to behave and make necessary concessions to
obtain minimum penalties.
c. Individual behavioural responses to the various communist
control pressures differ markedly. Therefore, each trainee should know
his own particular assets and limitations in resisting specific pressures.
He can learn these only under laboratory conditions simulating the actual
pressures he may have to face.
d. Training must provide knowledge of the goals and the restric-
tions placed upon his communist interrogator. The trainee should know
what controls are on his interrogator and to what extent he can manipulate
the interrogator. For example, the interrogator is not permitted to fail
to gain "something" from the controlled individual. The knowledge that,
after the victim has proved that he is a "tough nut to crack" he can some-
times indicate that he might compromise on some little point to help the
interrogator in return for more favorable treatment, may be useful in-
deed. Above all, the potential victim of communist control can gain a
great deal of psychological support from the knowledge that the communist
interrogator is not a completely free agent who can do whatever he wills
with his victim.
e. The trainee must learn what practical cues might aid him in
recognizing the specific goals of his interrogator. The strategy of defense
against elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the individual may hasten his own
state of mental confusion; whereas, to prevent brainwashing, maintaining
clarity of thought processes is imperative.
11
OA 53-37
f. The trainee should obtain knowledge about communist "carrots"
as well as "sticks." The communists keep certain of their promises and al-
ways renege on others. For example, the demonstrable fact that "informers"
receive no better treatment than other prisoners should do much to prevent
-------------------------------------------------------------------------------
this particular evil. On the other hand, certain meaningless concessions
will often get a prisoner a good meal.
g. In particular, it should be emphasized to the trainee that,
although little can be done to control the pressures exerted upon him, he
can learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about in-
ternal conflict and conflict-producing mechanisms. He should learn to
recognize when someone is trying to arouse guilt feelings and what be-
havioural reactions can occur as a response to guilt.
h. Finally, the training must teach some methods that can be utilized
in thwarting particular communist control techniques:
Elicitation. In general, individuals who are the hardest to inter-
rogate for information are those who have experienced previous interroga-
tions. Practice in being the victim of interrogation is a sound train-
ing device.
Torture. The trainee should learn something about the principles of
pain and shock. There is a maximum to the amount of pain that can actually
be felt. Any amount of pain can be tolerated for a limited period of
time. In addition, the trainee can be fortified by the knowledge that there
are legal limitations upon the amount of torture that can be inflicted
by communist jailors.
Isolation. The psychological effects of isolation can probably be
thwarted best by mental gymnastics and systematic efforts on the part of
the isolate to obtain stimulation for his neural end organs.
Controls on Food and Tobacco. Foods given by the communists will
always be enough to maintain survival. Sometimes the victim gets unex-
pected opportunities to supplement his diet with special minerals,vitamins
and other nutrients (e.g.,"iron" from the rust of prison bars). In some
instances, experience has shown that individuals could exploit refusal to
eat. Such refusal usually resulted in the transfer of the individual to
a hospital where he received vitamin injections and nutritious food. Evi-
dently attempts of this kind to commit suicide arouse the greatest concern
in communist officials. If deprivation of tobacco is the control being
exerted. the victim can gain moral satisfaction from "giving up" tobacco.
He can't lose since he is not likely to get any anyway.
12
OA 53-37
Fatigue. The trainee should learn reactions to fatigue and how to
-------------------------------------------------------------------------------
overcome them insofar as possible. For example, mild physical exercise
"clears the head" in a fatigue state.
Writing Personal Accounts and Self-Criticism. Experience has in-
dicated that one of the most effective ways of combatting these pressures
is to enter into the spirit with an overabundance of enthusiasm. Endless
written accounts of inconsequential material have virtually "smothered"
some eager interrogators. In the same spirit, sober, detailed self-
criticisms of the most minute "sins" has sometimes brought good results.
Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an individual's
duties may become mutually incompatible in this situation. Take the ex-
ample of a senior grade military officer. He has the knowledge of sensitive
strategic intelligence which it is his duty to protect. He has the respon-
sibility of maintaining the physical fitness of his men and serving as
a model example for their behaviour. The officer may go to the camp
commandant to protest the treatment of the POWs and the commandant as-
sures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another. The
officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for
any other behaviour if he does his utmost to carry out his highest priority
responsibility. There is considerable evidence that many individuals
tried to evaluate the priority of their responsibilities on their own,
but were in conflict over whether others would subsequently accept their
evaluations. More than one individual was probably brainwashed while he
was trying to protect himself against elicitation.
CONCLUSIONS
The application of known psychological principles can lead to an
understanding of brainwashing.
1. There is nothing mysterious about personality changes resulting
from the brainwashing process.
2. Brainwashing is a complex process. Principles of motivation,
perception, learning, and physiological deprivation are needed to account
for the results achieved in brainwashing.
3. Brainwashing is an involuntary re-education of the fundamental
beliefs of the individual. To attack the problem successfully, the brain-
washing process must be differentiated clearly from general education
methods for thought-control or mass indoctrination, and elicitation.
13
OA 53-37
4. It appears possible for the individual,through training,to
develop limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting in-
dividual emotional reactions to brainwashing techniques rather than to-
-------------------------------------------------------------------------------
ward thwarting the techniques themselves.
15 August 1955
14
=====================================================================
(note Declassified)
SECRET
CENTRAL INTELLIGENCE AGENCY
WASHINGTON 25, D. C.
19 JUN 1964
(Commission No. 1131)
MEMORANDUM FOR: Mr. J. Lee Rankin
General Counsel
President's Commission on the
Assassination of President Kennedy
SUBJECT : Soviet Brainwashing Techniques
1. Reference is made to your memorandum of 19 May 1964,
requesting that materials relative to Soviet techniques in mind
conditioning and brainwashing be made available to the Commission.
2. At my request, experts on these subjects within the CIA
have prepared a brief survey of Soviet research in the direction
and control of human behavior, a copy of which is attached. The
Commission may retain this document. Please note that the use
of certain sensitive materials requires that a sensitivity indicator
be affixed.
3. In the immediate future, this Agency will make available
to you a collection of overt and classified materials on these subjects,
which the Commission may retain.
4. I hope that these documents will be responsive to the
Commission's needs.
(SIGNED)
(DECLASSIFIED) Richard Helms
(By C.I.A.) Deputy Director for Plans
(letter of ___________)
(---------------------)
Attachment
CD 1131 SECRET
MEMORANDUM
SUBJECT: Soviet Research and Development in the Field of
Direction and Control of Human Behavior.
1. There are two major methods of altering or controlling
human behavior, and the Soviets are interested in both. The first
is psychological; the second, pharmacological. The two may be
used as individual methods or for mutual reinforcement. For
long-term control of large numbers of people, the former method
is more promising than the latter. In dealing with individuals,
the U.S. experience suggests the pharmacological approach (assisted
by psychological techniques) would be the only effective method.
Neither method would be very effective for single individuals on
a long term basis.
2. Soviet research on the pharmacological agents producing
behavioral effects has consistently lagged about five years behind
Western research. They have been interested in such research,
however, and are now pursuing research on such chemicals as
LSD-25, amphetamines, tranquillizers, hypnotics, and similar
materials. There is no present evidence that the Soviets have
any singular, new, potent drugs to force a course of action on
an individual. They are aware, however, of the tremendous drive
produced by drug addiction, and PERHAPS could couple this with
psychological direction to achieve control of an individual.
3. The psychological aspects of behavior control would include
not only conditioning by repetition and training, but such things as
hypnosis, deprivation, isolation, manipulation of guilt feelings,
subtle or overt threats, social pressure, and so on. Some of the
newer trends in the USSR are as follows:
SECRET CD 1131
PAGE 1
a. The adoption of a multidisciplinary approach integrating
biological,social and physical-mathematical research in attempts
better to understand, and eventually, to control human behavior in a
manner consonant with national plans.
b. The outstanding feature, in addition to the inter-
disciplinary approach, is a new concern for mathematical approaches to
an understanding of behavior. Particularly notable are attempts to use
modern information theory, automata theory, and feedback concepts in
interpreting the mechanisms by which the "second signal system," i.e.,
speech and associated phenomena, affect human behavior. Implied by this
"second signal system," using INFORMATION inputs as causative agents
rather than chemical agents, electrodes or other more exotic techniques
applicable, perhaps, to individuals rather than groups.
c. This new trend, observed in the early Post-Stalin Period,
continues. By 1960 the word "cybernetics" was used by the Soviets to
designate this new trend. This new science is considered by some as
the key to understanding the human brain and the product of its
functioning--psychic activity and personality--to the development of
means for controlling it and to ways for molding the character of the
"New Communist Man". As one Soviet author puts it: Cybernetics can be
used in "molding of a child's character, the inculcation of knowledge
and techniques, the amassing of experience, the establishment of social
behavior patterns...all functions which can be summarized as 'control'
of the growth process of the individual." 1/Students of particular
disciplines in the USSR, such as psychologist and social scientists,
also support the general cybernetic trend. 2/ (Blanked by CIA)
4. In summary, therefore, there is no evidence that the Soviets
have any techniques or agents capable of producing particular behavioral
patterns which are not available in the West. Current research indi-
cates that the Soviets are attempting to develop a technology for
controlling the development of behavioral patterns among the citizenry
of the USSR in accordance with politically determined requirements of
the system. Furthermore, the same technology can be applied to more
sophisticated approaches to the "coding" of information for transmittal
to population targets in the "battle for the minds of men." Some of the
more esoteric techniques such as ESP or, as the Soviets call it,
"biological radio-communication", and psychogenic agents such as LSD,
SECRET CD 1131
PAGE 2
are receiving some overt attention with, possibly, applications in mind
for individual behavior control under clandestine conditions. However,
we require more information than is currently available in order to
establish or disprove planned or actual applications of various
methodologies by Soviet scientists to the control of actions of
articular individuals.
References
1. Itelson, Lev, "Pedagogy: An Exact Science?" USSR October 1963,
p. 10.
2. Borzek, Joseph, "Recent Developments in Soviet Psychology,"
Annual Review of Psychology, Vol. 15, 1964, p. 493-594.
SECRET CD 1131
PAGE 3
The first letter and attachment are from DECLASSIFIED
DOCUMENTS 1984 microfilms under MKULTRA (84) 002258, published
by Research Publication Woodbridge, CT 06525. Some original
markings were not retyped, but the content is the same.
The second letter and attachment are from the Warren
Commission documents. Notice should be paid to the different
tone Helms gives to his letter, keeping in mind he was found
guilty of lying to Congress. He places greater emphasis on
"Soviet" practices and tries to diminish breakthroughs gained
by Americans. Some thought should be given as to WHY the
Warren Commission sought such documents (remembering that
ALLEN DULLES was a member of that Commission). They were
exploring the Manchurian candidate theory. It was revealed
during the Church Committee hearings of 1975 that Helms had
been in charge of Project AMLASH, a program to assassinate
Castro (Cuba),Trujillo (Dominican Republic), Diem (RVN),
Schneider (Chile) using MAFIA figures John Roselli and Santos
Trafficante to do the job.
Care was used to insure lines appear in same length and order.
Page length will have to be adjusted if you desire to print
this. Look for other specials soon. David John Moses.
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Salted Slug Systems Strange 408-454-9368
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Tomorrow's 0rder of Magnitude Finger_Man 408-961-9315
My Dog Bit Jesus Suzanne D'Fault 510-658-8078
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

574
txt_files/ciactrlf.txt Normal file
View File

@ -0,0 +1,574 @@
Article: 571 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: How the CIA turned `being directed by the NSC' into `getting approval'
Keywords: the compartmentalized "need to know" security lid locks up the govn't
Organization: Silicon Graphics, Inc.
Date: Fri, 10 Apr 1992 18:01:36 GMT
Lines: 573
. . . Control of a good share of what the Pentagon is doing is
more important to the CIA than control over the government of
Jordan or Syria. . . .
When the CIA wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the CIA to get
a favorable reading from the "Forty Committee" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the NSC intrastructure, and then,
by clamping on a security id, it makes others believe that the CIA
had orders from the NSC or perhaps even from the President, when in
fact it did not.
the following appeared in the 7/75 issue of "Genesis:"
_____________________________________________________________________
How the CIA Controls President Ford
By L. Fletcher Prouty
reprinted here with permission of the author
In this monstrous U.S. government today, it's not so much what
comes down from the top that matters as what you can get away with
from the bottom or from the middle--the least scrutinized level.
(Contrary to the current CIA propaganda as preached by William
Colby, Ray Cline, Victor Marchetti and Philip Agee, who say,
incorrectly, "What the Agency does is ordered by the President.")
As with the Mafia, crime is a cinch if you know the cops and the
courts have been paid off. With the Central Intelligence Agency,
anything goes when you have a respected boss to sanctify and bless
your activities and to shield them from outside eyes.
Such a boss in the CIA was old Allen Dulles, who ran the Agency
like a mother superior running a whorehouse. He knew the girls
were happy, busy, and well fed, but he wasn't quite sure what they
were doing. His favorites, all through the years of his prime as
Director of Central Intelligence, were such stellar performers as
Frank Wisner, Dick Bissell, George Doole, Sheffield Edwards, Dick
Helms, Red White, Tracy Barnes, Desmond Fitzgerald, Joe Alsop, Ted
Shannon, Ed Lansdale and countless others. They were the great
operators. He just made it possible for them to do anything they
came up with.
When Wisner and Richard Nixon came up with the idea of mounting
a major rebellion in Indonesia in 1958, Dulles saw that they got
the means and the wherewithal. When General Cabell and his Air
Force friends plugged the U-2 project for Kelly Johnson of
Lockheed, Dulles tossed it into the lap of Dick Bissell. When Dick
Helms and Des Fitzgerald figured they could play fun and games in
Tibet, Dulles talked to Tom Gates, then Secretary of Defense, and
the next we knew CIA agents were spiriting the Dalai Lama out of
Lhasa, CIA undercover aircraft were clandestinely dropping tons of
arms, ammunitions, and supplies deep into Tibet and other planes
were reaching as far as northwestern China to Koko Nor.
While he peddled the hard-won National Intelligence Estimates to
all top offices and sprinkled holy water over the pates of our
leaders, Dulles dropped off minor miracles along the way to
titillate those in high places. If you win the heart of the queen
and convert her to your faith, you can control the king. This
works for the Jesuits. It worked well for the CIA. Allen Dulles
was no casual student and practitioner of the ancient art of
religion. He was an expert in the art of mind-control. He learned
how to operate his disciples and his Agency in the ways of the
cloth.
But for every Saint and every Sinner in the fold there must be
an order of monks, and the Agency has always been the haven for
hundreds of faceless, nameless minions whose only satisfaction was
the job well done and the furtherance of the cause. One of the
most remarkable--and surely the best--of these was an agent named
Frank Hand.
In my book, "The Secret Team," written during 1971 and 1972, I
mentioned that the most important agent in the CIA was an almost
unknown individual who spent most of his time in the Pentagon. At
that time I did not reveal his name; but a small item in a recent
obituary column stated that:
"Frank Hand, 61, a former senior official of the CIA, died in
Marshall, Minn. . . . (he was) a graduate of Harvard Law
School. He had served with the CIA from 1950 until
retirement in 1971."
After a life devoted to quiet, effective, skillful performance
of one of the most important jobs in the worldwide structure of
that unparalleled agency, all that the CIA would publicly say of
Frank Hand was that he was a "senior official."
Ask Dick Helms, Ed Lansdale, Bob McNamara, Tom Gates or Allen
Dulles or John Foster Dulles, if they were with us today, and they
all would tell us stories about Frank Hand. They would do more to
characterize the nature and the sources of power which make use of
and control the CIA than has ever been told before. He was that
superior operative who made big things work unobtrusively.
You might have been one of the grass-green McNamara "whiz kids,"
lost in the maze of the Pentagon Puzzle Palace, who came upon a
short, Hobbit-like, pleasant man who knew the Pentagon so well that
you got the feeling he was brought in with the original load of
concrete. Thousands of career men to this day will never realize
that Frank Hand was a "Senior Official" of the CIA and not one of
their civilian cohorts. To my knowledge he never worked anywhere
else. I was there in 1955 and he was there. I left in December
1963, and he was at my farewell party. He must have spent some of
his time at the agency; but it must have been before 1955. If he
had a dollar for every trip he made in those busy years between the
Pentagon and the CIA he would have died a very wealthy man. He
popularized the Agency term "across the river" and the "Acme
Plumbers" nickname for agents of the CIA. (A term later to be
confused by Colson and John Ehrlichman, among others, with the use
of the term "White House Plumbers" of Watergate fame. Someone knew
that Hunt, McCord, the Cubans, Haig, Butterfield and others all had
CIA backgrounds and connections and therefore were "Plumbers."
Only the insiders knew about the real "Acme Plumbers.")
Frank was as much at home with Allen Dulles as he was with the
famous old supersleuth, General Graves B. Erskine, and as he was
with Helms, Colby, or Fitzgerald. Ian Fleming may have popularized
the spy and the undercover agent as a flashing James Bond type;
but in the reality of today's world the great ones are more in the
mold of Frank Hand and "The Spy Who Came In From The Cold."
There has long existed a "golden key" group of agency and
agency-related supermen. They came from the CIA, the Pentagon, the
Department of State, the White House and other places in government
or from the outside. They have kept themselves inconspicuous and
they meet in the evening away from their offices. They are the men
who open the doors of big government to industry-banking law and to
the multinational corporate centers of greed and power. Their
strength lies in their common awareness of the ways in which real
power is generated in the government, the real power that controls
activities of the government. In many instances this is the power
of being able to keep something from happening, rather than to make
it happen. For example, if the President is murdered, real power
involves the control of government operations sufficient to make
any investigation ineffective and to assure that the government
will do nothing even if the investigation should turn up something.
Real power is the ability to keep the government bureaucracy from
going into action when the price of petroleum and wheat is doubled
or tripled by avaricious international monopolies.
Some of these "gold key" members have surfaced and have accepted
publicity, as did Des Fitzgerald, Allen Dulles, Tracy Barnes and
others. Frank never did. He was so anonymous that even his
friends could not find him.
The Agency covered for Frank Hand as it did for few others. The
James Bonds of this world may be the idols of the Intelligence
coterie; but if you are a Bill Colby, Dick Helms, or Allen Dulles,
you know the real value of an indispensable agent. Frank was their
man in the Pentagon, and the Pentagon was always the indispensable
prime target of the CIA. When the chips are down, the CIA could
care less about overturning "Communism" in Cuba or Chile. What
really matters is its relative power in the U.S. Government.
Control of a good share of what the Pentagon is doing is more
important to the CIA than control over the government of Jordan or
Syria.
Once, when the CIA wanted to move a squadron (twenty-five) of
helicopters from Laos to South Vietnam, long before the troubles
there had become a war, I turned down the request from the Deputy
Director of Central Intelligence in the name of the Secretary of
Defense for no other reason than the fact that I did not find that
project on the approved list of the National Security Council's
"Forty Committee" (then called the 5412/2 committee). That meant
the agency had neither been directed by the National Security
Council to move those helicopters into Vietnam, nor had it received
authorization for such a tactical movement. In other words, the
planned intervention into South Vietnam with a squadron of
helicopters would at that time have been unlawful as an
intervention into the internal affairs of another country.
This denial then, in 1960, effectively blocked the CIA from
being able to move heavy war-making equipment into Vietnam. The
helicopters were actually U.S. Marine Corps property on "loan" from
Okinawa to the CIA for clandestine operations in Laos.
At that time my immediate superior was General Graves Erskine,
the Assistant to the Secretary of Defense for Special (Clandestine)
Operations, and the man then responsible for all military support
of clandestine operations of the CIA. Also at that time, Frank
Hand, "worked for" Erskine. Of course, this was a cover
assignment--"cover slot" as it was known to us and to the CIA.
Frank had a regular office in the Pentagon.
No sooner had the CIA request been turned down than someone near
the top of the agency called Frank and told him about it. In his
smiling and friendly way he came into my office, carrying two cups
of coffee, and began some talk about music, travel, or golf. Then,
as was his practice, he would get the subject around to his point
with such a comment as, "Fletch, who do you suppose took a call
here about the choppers in Laos?" and we would be off.
The special ability he possessed was best evidenced by the
process he would set in motion once he discovered a problem that
affected the ambitions of the agency. He would talk about the
choppers with Erskine. Then he would drop in to see the Chief of
Naval Operations and perhaps the Commandant of the Marine Corps.
He would talk with some of the other civilian Assistant
Secretaries. In other words, he would go from office to office
like a bee spreading pollen, titillating only the most senior
officers and civilian officials with the most "highly sensitive"
tidbits about the CIA's plans for Vietnam. In this manner he would
find out what the real thinking in the Pentagon might be, and where
there might be real opposition to such an idea--such as in the
Marine Corps, which knew it would never get compensation for those
expensive helicopters and for the loss of time of all their support
people. He would also find out where there would be support, as
with the ever-eager U.S. Army Special Forces, most of whose senior
officers had been with the CIA.
Then he would drop out of the picture for awhile to travel back
to the old CIA headquarters, on the hill that overlooks what is now
the Watergate complex, for a long talk with Allen Dulles or the
Deputy Director, General Cabell. On matters involving the
clandestine services he would also stop by the old headquarters
buildings, that lined the reflecting pool near the Lincoln
Memorial, to talk with Dick Helms, Desmond Fitzgerald, and other
operators. Within a day or two he would have them fully briefed on
the steps to be taken in order to win over the Defense Department;
or failing that, how to overpower and outmaneuver the Pentagon in
the Department of State and the White House.
The foregoing is a "case study" on the important subject of how
the CIA really operates and what it believes is its top priority.
The propaganda being spread around today by the CIA and its
propagandists that, "What the CIA does is ordered by the
President," is totally untrue in all but .00001 percent of actual
historical cases. It is much more factual to say that, "What the
CIA does is to find ways to initiate major foreign policy moves
without having the President find out--or at least without
discovery until it is too late."
"It is in precisely that manner that the CIA today works around,
beneath and behind the White House to effect policies that could
influence the survival of the nation and the world. "Gold Key"
operatives are, at this very moment, carrying out CIA game plans
entirely outside the power of President Ford's ability to affect
their activities. He is totally without knowledge of most of them,
and therefore powerless to stop or alter them.
In the case of the helicopters, Frank Hand was able to convince
Allen Dulles that the disapproval from the Secretary of Defense,
via my office, was real and that the Secretary would, at that time,
be unlikely to change his mind. Frank also could report that the
position of other top-level assistants was so cool to stepping up
the hardware *involvement* of the military in Vietnam, in 1960,
that none of them would likely attempt to persuade the Secretary to
change his policy of limited involvement.
Fortified with the information gleaned by Frank Hand, Allen
Dulles would have two primary options: drop the idea of moving
helicopters into Vietnam, or bypass the Secretary of Defense for
the time being by going to the White House for support. In 1960
this was a crucial decision. The huge attempt to support a
rebellion in Indonesia had failed utterly, the U-2 operations had
been curtailed because of the Gary Powers incident, the far-
reaching operations into Tibet had come to a halt by Presidential
directive and anti-Castro activities were limited to minor forays.
And at that time the large-scale (large for CIA) war in Laos had
become such a disaster that the CIA wanted no more of it. Dick
Bissell, the chief of the Clandestine Services, had written strong,
personal letters to Tom Gates, the Secretary of Defense, wondering
openly what to do about the 50,000 or more miserable Laotian Meo
tribesmen the CIA had moved into the battle zones of Laos and then
had deserted with no plans for their protection, resupply, care or
feeding. The CIA badly wanted to be relieved of the war that they
had started and then found they could not handle. They wanted to
transfer and thus preserve the agency's assets, including the
helicopters, to the bigger prospects in Vietnam.
So, in 1960, if Allen Dulles dropped the idea of moving his
assets from Laos, he would not only have lost those helicopters
back to the Marine Corps but he would have seriously jeopardized
the CIA's undercover leadership role in the development of the war
in Vietnam, which it had been fanning since 1954.
This was a crucial decision for both the CIA and for those who
wished to contain the agency. If those who wished to put the CIA
genie back in the bottle had been able at that time to prevent the
move of those CIA assets into Vietnam, Dulles would have had to
disband them: helicopters, B-26 bombers from the Indonesian
fiasco, tens of thousands of rifles and other weapons, C-46, C-54
and other Air America-supported heavy transport aircraft, U-2
operations over Indochina, radar and other clandestine equipment,
C-130's specially modified for deep Tibetan operations, and much
more. From the point of view of the CIA, the helicopters were
simply the tip of the iceberg, and the decision was its most
important in that decade.
Typically, in his unwitting Mother Superior-style, which
included bulldog tenacity, Dulles chose the route to the White
House. Here again he could rely strongly on Frank Hand. Working
with Hand in Erskine's office was the CIA's other best agent, Major
General Edward G. Lansdale, who had long served in the CIA. Like
Hand, he had unequalled contacts in the Department of State and in
the White House. In support of Dulles, they contacted their
friends there and began a subtle and powerful move destined to
prepare the way for what would appear to be a decision by President
Eisenhower. This was an important feature of the "case study":
The *apparent* Presidential decision.
When the CIA wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the CIA to get
a favorable reading from the "Forty Committee" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the NSC intrastructure, and then,
by clamping on a security id, it makes others believe that the CIA
had orders from the NSC or perhaps even from the President, when in
fact it did not.
Thus it was that, about two weeks from the day that I received
that first call requesting the movement of the squadron of
helicopters, received word from General Erskine that he had been
"officially" informed that the White House (Forty Committee) had
approved the secret operation. The helicopters were moved into
Vietnam. They were the first of thousands.
The great significance of this incident is to point out how the
CIA works powerfully, deftly, and with great assurance at any level
of our government to get anything it wants done. But the anecdote
shows only the surface coating of the application of the CIA
apparatus.
One year earlier, in 1959, Frank Hand had directed a Boston
banker to my office. At that time I worked in the Directorate of
Plans in Air Force headquarters and my work was top secret. Few of
my contemporaries in the Pentagon knew that I was in charge of a
global U.S. Air Force system created for the dual purpose of
providing Air Force support for the CIA and for protecting the best
interests of the USAF while performing that task. My door was
labeled simply, "Team B"; yet that Boston banker knocked and
entered with assurance. Somehow he knew what my work was and he
knew that I might be able to help him.
In 1959 there were very few helicopters in all of the services,
and military procurement of those expensive machines was at an
all-time low. The Bell Helicopter Company was all but out of
business, and its parent company, Bell Aerospace Corp., was having
trouble keeping it financially afloat. Meanwhile, the shrewd Royal
Little, President of the Providence-based Textron Company, had a
good cash position and could well afford the acquisition of a
loser. Textron and the First National Bank of Boston got together
to talk helicopters. Neither one knew a thing about them. But men
in First Boston were close to the CIA, and they learned that the
CIA was operating helicopters in Laos. What they needed to know
now was, "What would be the future of the military helicopter, and
would the use of helicopters in South East Asia escalate if given a
little boost--such as moving a squadron from Laos to Vietnam?" The
CIA could tell them about that, and Frank Hand would be the man who
could get them to the right people in the Pentagon.
The banker from Boston phrased his questions as though he
believed that the helicopters in Laos were somehow operating under
the Air Force, and then went on to ask about their tactical
significance and about the possible increase of helicopter
utilization for that kind of warfare. This was at a time when not
even newspapers had reported anything like the operation of such
large and expensive aircraft in that remote war. We had a rather
thorough discussion and then he left. He called me several times
after that and visited my office a month or two later.
As the record will show, Textron did acquire the Bell Helicopter
Company and the CIA did step up use of helicopters to the extent
that one of the CIA's own proprietary companies, Asia Aeronautics
Inc., had more than four thousand men on each of two bases where
helicopters were maintained. Most of those men were involved in
their maintenance--Bell Helicopters, no less!
Orders for Bel Helicopters for use in Vietnam exceeded $600-
million. Anyone wanting to know more about how the U.S. got so
heavily ($200-billion and the loss of 58,000 American lives)
involved in Indochina need look no further. This was the pattern
and the plan.
At the present time, when the White House, the House, and the
Senate are all investigating the CIA, it is important to understand
the CIA and to put it all in the proper perspective. It is not the
President who instructs the CIA concerning what it will do. And in
many cases it is *not* even the Director of Central Intelligence
who instructs the CIA. The CIA is a great, monstrous machine with
tremendous and terrible power. It can be set in motion from the
outside like a programmer setting a computer in operation, and then
it covers up what it is doing when men like Frank Hand--the real
movers--put grease on the correct gears. And in a majority of
cases, the power behind it all is big business, big banks, big law
firms and big money. The agency exists to be used by them.
Let no one misunderstand what I mean. It was President Lyndon
B. Johnson who on more than one occasion said that the CIA was
"operating a damn Murder Inc. in the Carribean." In other words,
he knew it was doing this--and he was the President! This
knowledge has been recently confirmed by Defense Secretary James
Schlesinger (who is a former head of the CIA) and others by their
admission that they told the agency to end all "terminations." But
Lyndon Johnson was powerless to do anything about it. This is an
astounding admission from a President, the very man from whom, the
CIA says, it always gets its instructions.
The present concern over "domestic surveillance" and such other
lean tidbits--most important to you and me as they are--is not
important to the CIA. It can easily dispense with a James Angleton
or even a Helms or a Colby (just look at the list of CIA bigwigs
who have been fired--Allen Dulles, Frank Wisner, Dick Bissell, Dick
Helms, and now perhaps Colby); but the great machine will live on
while Congress digs away at the Golden Apples tossed casually aside
by the CIA--the supreme Aphrodite of them all. Notice that the
agency cares little about giving away "secrets" in the form of
cleverly written insider books such as those by Victor Marchetti
and Philip Agee. The CIA just makes it look as though it cared
with some high-class window dressing. Actually the real harm to
the American public from those books is to make people believe that
certain carefully selected propaganda is true.
In the story of Frank Hand we come much closer to seeing exactly
how the CIA operates to control this government and other foreign
governments. It is still operating that way. Today it is
President Ford who is the unwitting accessory.
* * * * * * * *
the following is taken from an article Fletcher Prouty wrote
for the February 1986 issue of "Freedom" magazine, entitled,
"Why Vietnam? The Selection and Preparation of the
Battlefield For America's Entry into the Indochina War," Part
7 in a Series on the Central Intelligence Agency. i include
it to amplify on the curious visit Colonel Prouty received in
1959 from the vice president of the First National Bank of
Boston and how it demonstrates that
There was only one way that vice president of the First
National Bank of Boston could have come directly to my
office in the Pentagon. The CIA had sent him there.
This is one of the most important "truly confidential"
roles of the agency. The CIA is the best friend of the top
executives of America's biggest businesses, and it works for
them at home and abroad. It is always successful in the
highest echelons of government and finance. . . .
Translated into everyday terms, Casey's CIA, as was Allen
Dulles' CIA, is one of the true bastions of power as a
servant of the American and transnational business and
financial community.
--ratitor
______________________________________________________________________
| |
| Helicopters in Vietnam |
| |
| Toward the end of World War II, a small number of |
| helicopters made their appearance in military operations. |
| During the costly battle for Okinawa, in the summer of 1945, |
| General Joseph Stilwell--famed for his role as commander in |
| the China-Burma-India theater of the war--began to use an |
| early model of the Sikorsky helicopter as a"command car." |
| During the early 1950s, the Korean War gave the |
| helicopter industry a much needed boost and several models |
| were used there. After the Korean War, the use of |
| helicopters in all services was severely curtailed by high |
| costs of procurement and by the enormous amounts of time and |
| money required to keep them in operation. By 1959 almost |
| all helicopter manufacturers were broke, or at least on very |
| hard times. This included the Bell Helicopter Company in |
| Buffalo, New York. |
| The helicopters used on operational missions into Laos, |
| mentioned in this article, were the only military |
| helicopters anywhere in the world getting regular and |
| frequent tactical use. However, their very existence in |
| Thailand and their employment in Laos were secrets. They |
| had been moved from Okinawa to Thailand and were supported |
| by my office in the Pentagon. |
| One day, in 1959, a man entered my office to discuss |
| helicopters. |
| Because of the nature of the work my office was doing, |
| this was an infrequent event. Outside the door of the |
| office there was a small blue card that read: |
| |
| Air Force Plans |
| "Team B" |
| Chief--Lt. Col. L. F. Prouty |
| |
| That card by the door drew little attention, and it was |
| meant to be that way. Then how did this civilian visitor |
| from the outside world know that "Team B" was the place he |
| wanted to visit--for business purposes? |
| He introduced himself as a vice president of the First |
| National Bank of Boston. He said he was interested in the |
| tactical utilization of helicopters. Somehow he had been |
| directed to "Team B." "Team B" had been established in 1955 |
| to provide "military support of the clandestine activities |
| of the CIA." The use of helicopters in Laos was a |
| clandestine operation of the CIA. |
| My visitor knew quite a bit about the helicopters in |
| Thailand. He wanted to know if this utilization of large |
| helicopters on tactical missions was a harbinger of more |
| helicopters or was it simply a make-work project? Then he |
| got to the reason for his visit. |
| He said that the Textron Company of Providence, Rhode |
| Island, was a major customer of his bank. Textron was in a |
| good cash position and the bank was advising them to |
| diversify and acquire a marginally viable company for tax |
| purposes and with an eye to future value. |
| To the First National Bank of Boston the helicopter |
| business and specifically the Bell Helicopter Company in |
| Buffalo appeared to be a prime prospect on both counts. |
| Textron was interested. The only problem was the market. |
| Would there ever be an interest in and a need for |
| helicopters by the military, meaning in big numbers? The |
| Laotian operation was the only show in town. |
| Because of the role being played by my office in support |
| of the use of helicopters in Southeast Asia, I already knew |
| the Bell people well both in Washington, D.C., and Buffalo. |
| I knew Bill Gesel, the president of Bell Helicopter. I knew |
| they were competent, but in trouble for lack of orders. |
| I described the helicopter as a useful vehicle of limited |
| potential, but rather well suited for covert operations. In |
| simple terms, the helicopter was too costly for the regular |
| military budget, but, as a rule, covert operations had money |
| to burn. That was the kind of money helicopters needed. |
| Because of the trend of covert operations in Southeast Asia, |
| I believed the demand for helicopters would increase. |
| As events later transpired, the First National Bank of |
| Boston, of which this man was a vice president, was |
| instrumental in getting Textron to acquire the Bell |
| Helicopter Company. This was the beginning of the Textron |
| acquisition of Bell and of the great success Bell had in |
| selling helicopters for use in Indochina. As we all know |
| now, the Bell "Huey" helicopter was the unsung hero of the |
| struggle in Vietnam. Thousands were used there. |
| On one occasion, while I was at lunch at the Army and |
| Navy Club in Washington, Bill Gesel, still president of |
| Bell, came by my table and pulled a check out of his pocket |
| that was in the range of nine figures--hundreds of millions |
| of dollars. Needless to say, Bell was doing well. Textron |
| was doing well. The First National Bank of Boston had |
| earned its fees and, as a result, the remains of hundreds of |
| Hueys are scattered all over the countryside of Vietnam. |
| The Huey had become the famous "gun ship" of that war. |
| There was only one way that vice president of the First |
| National Bank of Boston could have come directly to my |
| office in the Pentagon. The CIA had sent him there. |
| This is one of the most important "truly confidential" |
| roles of the agency. The CIA is the best friend of the top |
| executives of America's biggest businesses, and it works for |
| them at home and abroad. It is always successful in the |
| highest echelons of government and finance. |
| This is the way things were more than 25 years ago. You |
| may be assured these successes have not diminished under the |
| current director of central intelligence, William J. Casey, |
| a true friend of business. |
| During a speech, delivered in December 1979 before an |
| American Bar Association workshop on "Law, Intelligence and |
| National Security," Casey said that he would like to see the |
| CIA be a place "in the United States government to |
| systematically look at the economic opportunities and |
| threats in a long-term perspective, . . . [to] recommend, or |
| act on the use of economic leverage, either offensively or |
| defensively for strategic purposes." |
| Translated into everyday terms, Casey's CIA, as was Allen |
| Dulles' CIA, is one of the true bastions of power as a |
| servant of the American and transnational business and |
| financial community. |
| |
|____________________________________________________________________|
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
i

98
txt_files/ciafoia.asc Normal file
View File

@ -0,0 +1,98 @@
To: activists@seurat.Eng.Sun.COM, dave
Subject: The CIA's "Openness" Is Laughable
The following article was in the "San Jose Mercury News," May 12, 1992:
The CIA's ``Openness'' Is Laughable
By David Corn
"Openness"--that's a term that Robert Gates, director of the
Central Intelligence Agency has embraced. When his nomination came
before a skeptical Senate Intelligence Committee last year, he
promised to promote Peristroika in Langley. After being confirmed,
he convened a Task Force on Openness, which recommended how the CIA
could be more forthcoming. (Only under outside pressure did the CIA
make public the task force's report, which proposed among other
things, that the agency release material about its successes, admit
when it is wrong, and "preserve the mystique".)
Gates has called for greater declassification of decades-old
documents and more background briefings for the press. From a
distance, his reforms may seem sincere.
For several years however, I have been working on a book about the
CIA. Like many researchers, I turned toward the Freedom of
Information Act for assistance and found that when it comes to the
CIA, it is almost worthless. The act allows scholars, reporters, and
just plain folks to petition various executive branch agencies for
documents. There are numerous exceptions to what the government has
to release, and amendments to the act in 1984 made it easier for the
CIA to withhold some records.
Still, the FOIA could be of some small and important value to
those seeking to understand what the CIA does, were it not for the
way the agency handles FOIA requests--a process that belies the "new"
CIA of Gates.
Agency responses to FOIA requests are routinely discouraging,
marked by long delays and puzzling answers.
Here's one example: I asked for material on the Hmong, an
indigenous tribe in Indochina, which the CIA armed and directed in
the 1960's and 1970's as part of the so-called "secret war" in Laos.
This was one of the biggest agency paramilitary operations in
history; its existence is not a secret. The CIA said that it had
searched and found not one piece of paper relevant to the request.
Operational material detailing the ins and outs of the agency's
programs is automatically exempt. But I hoped to find intelligence
reports that covered the tribes and its leaders. Surely if the
agency supported the Hmong for so long it must have at some time
looked at its ally. But there was, the agency said, absolutely
nothing.
It is hard to argue with the CIA. Who know's what's in the files?
But such responses are hard to accept at face value in light of other
Langley decisions. In 1987, the private and non-profit National
Security Archive requested under FOIA an index of all the documents
that the CIA had previously released.
After initial denials, the agency sent the archive 12 volumes of
about 450 pages each that listed the documents in completely random
order. Documents released as part of a single request were scattered
through the books. This is certainly not how the FOIA office
maintains its records, and one can reasonably surmise that it had to
program its computer to devise such a random and mean-spirited dump.
When I requested the index information in electronic form--so it
could be arranged coherently--the agency told me to get lost. The
National Security Archive is still fighting the CIA to obtain the
index in computer form.
The only way to use the index is to plow through the volumes. I
went through one book and found several documents that looked
intriguing. (Almost all the good stuff was released prior to 1981,
the year Ronald Reagan assumed office.) I filed a request with the
agency for these papers and received the material in three weeks--
Olympic speed by FOIA standards.
I then went through the rest of the set and filed subsequent
requests. When the CIA realized what I was doing it seems, it put in
what some researchers believe is the forget-you category. After six
months, only one of my other requests has been fulfilled--and that
only occurred after the intervention of a lawyer.
The FOIA calls for agencies to respond to requests within 10 days.
But that standard has become a farce. Usually it means that the
agency acknowledges the receipt of the request within 10 days. Then
the request goes to the end of the line, and is some instances years
will pass before you hear back. Such delays dilute the power of the
FOIA. Few book authors or journalists have the luxury of waiting so
long.
===========
David Corn is Washington Editor of "The Nation" magazine and is
working on a book about the CIA. He wrote this article for "The
Washington Post."
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
** End of Article **
Don
* Origin: HomeBody BBS (407)322-3592 Sanford, FL (1:363/81)


107
txt_files/ciamedia Normal file
View File

@ -0,0 +1,107 @@
Subject: CIA & the Media
Newsgroups: alt.conspiracy.jfk,alt.journalism,alt.journalism.criticism
Organization: NETCOM On-line Communication Services (408 261-4700 guest)
Summary:
Keywords:
Here's just a snippet from Carl Bernstein's famous 1977 article entitled
"The CIA & The Media" from Rolling Stone, 10/20/77. Anyone with access to
a library should try to find this - it's a truly breakthrough piece - 16
pages long in the reprint!
begin snippet:
--------------------
In 1953, Joseph Alsop, then one of America's leading syndicated
columnists, went to the Philippines to cover an election. He did not go
because he was asked to do so by his syndicate. He did not go because he
was asked to do so by the newspapers that printed his column. He went at
the request of the CIA.
Alsop is one of more than 400 American journalists who in the past 25
years have secretly carried out assignments for the Central Intelligence
Agency according to documents on file at CIA headquarters. Some of these
journalists' relationships with the Agency were tacit; some were
explicit. There was cooperation, accommodation and overlap. Journalists
provided a full range of clandestine services -- from simple
intelligence-gathering to serving as go-betweens with spies in Communist
countries. Reporters shared their notebooks with the CIA. Editors shared
their staffs. Some of the journalists were Pulitzer Prize winners,
distinguished reporters who considered themselves ambassadors without
portfolio for their country. Most were less exalted: foreign
correspondents who found that their association with the Agency helped
their work; stringers and freelancers who were as interested in the
derring-do of the spy business as in filing articles; and, the smallest
category, full-time CIA employees masquerading as journalists abroad. In
many instances, CIA documents show, journalists were engaged to perform
tasks for the CIA with the consent of the managements of America's
leading news organizations.
The history of the CIA's involvement with the American press continues to
be shrouded by an official policy of obfuscation and deception for the
following principal reasons:
- The use of journalists has been among the most productive means
of intelligence-gathering employed by the CIA. Although the agency has
cut back sharply on the use of reporters since 1973 (primarily as a
result of pressure from the media), some journalists are still posted abroad.
- Further investigation into the matter, CIA officials say, would
inevitably reveal a series of embarrassing relationships in the 1950's
and 1960's with some of the most powerful organizations and individuals
in American journalism.
Among the executives who lent their cooperation to the Agency were William
Paley of the Columbia Broadcasting System, Henry Luce of Time Inc.,
Arthur Hays Sulzberger of the New York Times, Barry Bingham Sr. of the
Louisville Courier-Journal, and James Copley of the Copley News Services.
Other organizations which cooperated with the CIA include the American
Broadcasting Company, the National Broadcasting Company, the Associated
Press, United Press International, Reuters, Hearst Newspapers,
Scripps-Howard, Newsweek magazine, the Mutual Broadcasting System, the
Miami Herald and the old Saturday Evening Post and New York Herald-Tribune.
By far the most valuable of these associations, according to CIA
officials, have been with the New York Times, CBS and Time Inc.
[...]
Appropriately, the CIA uses the term 'reporting' to describe much of what
cooperating journalists did for the Agency. "We would ask them, 'Will you
do us a favor?'" said a senior CIA official. "'We understand you're going
to be in Yugoslavia. Have they paved all the streets? Where did you see
planes? Were there any signs of military presence? How many Soviets did
you see? If you happen to meet a Soviet, get his name and spell it
right....Can you set up a meeting for us? Or arrange a message?'" Many
CIA officials regarded these helpful journalists as operatives: the
journalists tended to see themselves as trusted friends of the Agency who
performed occasional favors -- usually without pay -- in the national
interest.
[...]
Two of the Agency's most valuable relationships in the 1960's, according
to CIA officials, were with reporters who covered Latin America -- Jerry
O'Leary of the Washington Star and Hal Hendrix of Miami News, a Pulitzer
Prize winner who became a high official of the International Telephone and
Telegraph Corporation. Hendrix was extremely helpful to the Agency in
providing information about individuals in Miami's Cuban exile community.
[....]
----------------------------------
Like I said - a great article!
A note about Hendrix - he was the one who Seth Kantor, reporting on the
JFK assassination, was told to call for 'background' on Oswald after
Oswald's arrest. Hendrix, from Miami, had all the info on Oswald's
pro-Castro leafleting activities in New Orleans, details about Oswald's
defection to the Soviet Union, etc.
Only years later did Kantor realize the significance of a guy like
Hendrix, CIA, having so much info on Oswald so soon after the assassination.

1236
txt_files/ciawars.txt Normal file

File diff suppressed because it is too large Load Diff

252
txt_files/clinto_m.rus Normal file
View File

@ -0,0 +1,252 @@
From jhdaugh@a-albionic.comMon Dec 26 06:32:19 1994
Date: Sun, 25 Dec 1994 05:50:09 -0500 (EST)
From: James Daugherty <jhdaugh@a-albionic.com>
Reply to: prj@mail.msen.com
To: New Paradigms Discussion <prj@mail.msen.com>
Subject: Operation Mount Rushmore: 1992 Assa (fwd)
---------- Forwarded message ----------
Date: 24 DEC 1994 03:13:35 -0500
From: Michael Kelly <mkelly@anshar.shadow.net>
Newgroups: alt.conspiracy
Subject: Operation Mount Rushmore: 1992 Assa
[ Article crossposted from alt.conspiracy.jfk ]
[ Author was Michael Kelly ]
[ Posted on 24 Dec 1994 03:12:24 -0500 ]
This seemed rather interesting, so I'll put it up
for everyone to look at.
Anyone have any comment or additional info or hearsay regarding it?
[ Article crossposted from alt.conspiracy.jfk ]
[ Author was David Stern ]
[ Posted on Fri, 23 Dec 1994 20:09:46 -0800 (PST) ]
ONI, CIA, MOSSAD IN ASSASSINATION PLOT AGAINST BILL CLINTON?
"Operation Mount Rushmore"...Was it cancelled,
or just placed on hold?"
(COPI) San Francisco - An alleged assassination plot against
Presidential Candidate Bill Clinton, scheduled to take place
during his visit here in the summer of 1992, was foiled at the
last minute by a leak, according to sources quoted in the second
edition of Defrauding America, by Rodney Stich.
Code-named "Operation Mount Rushmore", the alleged plot invloved
agents and officials within the Central Intelligence Agency
(CIA), Office of Naval Intelligence (ONI), the Republican Party,
and the Mossad, Israel's Intelligence Service. Also alleged to
be involved in financing and planning were associates of the
Heller, Ehrman, White, and McCauluiffe law firm, a prestegious
firm that sources have claimed houses a number of Mossad agents.
Financing is alleged to have come from EIC in nearby Redwood
City, and its owner, Chan Wang.
The information in Mr. Stich's book came primarily from two
sources, both from intelligence agencies, who independantly
reported essentially the same details.
The primary source for the story is referred to in the book as
"Agent X", but the context of his story identifies "Agent X" as
Lt. Cmdr. Robert Hunt, ONI. Mr. Hunt's credentials are
rigorously documented in the book, and include a letter from
President Bill Clinton, dated November 22, 1993, ironically the
thirtieth anniversary of the assassination of JFK. The letter
addresses Lt. Cmdr. Hunt by name and agency, and appears to be
intended as a letter of support and sympathy for his
predicament. Mr. Hunt had been imprsoned for nearly a year,
allegedly for refusing to testify about a joint CIA-ONI
operation designed to test the security of submarine operations.
According to Hunt, an assassination team used for "cleanup" in
other controversial intelligence operations was assembled at the
Presidio. Hunt described the operation this way:
"I was ordered last summer [July, 1992] to go to San Francisco
by Graham Fuller, CIA; Dick Pealer, ONI; and John Kaplin, CIA.
These people were my handlers. I was told to go to the Bay
Area. I flew from NAS [Naval Air Station] Norfolk to NAS
Alameda, where I was to meet another Agent He was the C1A
station chief for SF [San Francisco]. His name is Robert
Larson. He made arrangements for me at the Presidio. The next
day the team arrived, and I wondered why this hit team was in
town. I got a call from a woman who said she was Mossad and we
needed to meet. So we did; we had lunch. I asked her, her
name, and she said it was Anna Colburn. I later found out her
real name was Yossi Jameir. We talked about why I was in town,
and I asked for what reason. She said they wanted to hit
Clinton."
When he asked for the technical details, Mr. Hunt says he was
told that, "they would be operating out of Republican
Headquarters on Van Ness Avenue, where they could monitor all
political moves by Clinton. The lady who would oversee this was
Joann Stanhope for the Republican Party. She is also CIA."
When asked who would fund the operation, he said, "A man by the
name of Chan Wang. He belongs to an organization called The
Eagles. He also owns a real estate company called EIC in
Redwood City. The man who would be his in-between was also CIA.
His name was Bok Pon. Gene Ferfethen also sponsored this
operation. He owned a winery in Napa. He is one of Wang's
friends."
"[Pok] told me that Yosi worked for a major law firm called
Heller Ehrman [Heller, Erman, White, and McCauliffe], and that
this firm would handle everything we may need, such as safe-
houses, equipment, money, travel, etc. I later found out a
major Mossad team was working from the law firm."
Describing the operation, itself, Hunt said, "Knowing Clinton
was coming to town in the next few weeks, we set up shop.
Weapons, escape routs, rendezvous, etc. Clinton was expected to
come and stay at the Ritz Carlton. That's when we were going to
do it. My men and I took up a position across the street from
the Carlton before Clinton's arrival. We photographed the whole
area for best possible results. Anyway, three weeks before he
was due to arrive, word had it there was a leak. Where, was
unknown. So my team and I pulled out in fear of being caught.
That night we were told to eliminate all factions involved,
including the Mossad agents. This order was given by Bob
Larson, [CIA] station chief; San Francisco." (Larson was later
transferred to a position in the Caribbean, and known as
"Pogo".)
"The next morning the team and I went to the law firm looking
for Yossi. She was not there. She was the first one we were to
hit from the firm. We went to her home where we found her.
Three of us: myself John Aldridge, and Phil Burgess, went in and
asked what happened. She didn't know. We told her that we were
going to kill her if she didn't talk. Well, she didn't talk.
Then you can see what happened next." (Hunt had earlier stated
that after the operation, he "never saw that Mossad Agent
again.")
Asked about Mossad reaction to the killing of one of its agents,
Hunt said, "We never had any repercussions on it. I had a list
of people. l had a guy by the name of Chan Wang I had to take
care of. I had Stanhope to take care of. I had Yossi to take
care of. I had the security guard to take care of. And if
worse came to worse, we were going to take care of the whole law
firm itself. Almost like a condor situation."
Hunt continued to describe the "cleanup": "Next target: Bok
Pan. We met him at the office of EIC, hoping to get Wang too.
Well, Wang wasn't there, but Bok was. We took him and drove
north to talk. We went to the Peppermint in Sarrnmonte just
south of Daly City. He said he knew nothing. Then we took Bok
over into Mill Valley on the other side of the Golden Gate,
where he is now buried in a hill."
"Next target: Joann Stanhope. Just as we were about to get her,
I get a call on my pager from Flashboard. When I called, they
said, 'stop operations.' When I asked the reason why, they said
they found the leak."
"The leak came from a security guard where Heller Erman had
their office. One of the Mossad agents was dating this guard.
Our job was to, of course, take care of it. So that night when
he got off work at midnight, and he went to catch the Bart train
at Market to go home, my friend and I grabbed him and threw him
in front of a BART train on Market Street. They thought he
committed suicide."
Rodney Stich, the author of the book, states, "CIA documents in
my possession establish his intelligence agency connections and
officer status. Other CIA contacts confirm Agent X was CIA. He
had nothing to gain by giving me the information that he did.
Reference to covert CIA operatives who Agent X stated were part
of the operation were confirmed as actual CIA operatives by
(Gunther) Russbacher and other CIA contacts. Russbacher
confirmed several times to me that Operation Mount Rushmore did
exist, and that several people were killed in the operation."
Russbacher's ONI and CIA credentials are also rigorously
documented elsewhere in the book. When he spoke of Operation
Mount Rushmore, he said that it was not called off, but only
placed on hold. When asked about Russbacher's intentions, Hunt
said, "Well, it could have been put on hold, (but) my part in it
was pulled out."
When contacted, Secret Service Branch of Los Angeles declined to
comment on the story, referring the inquiry to the Public
Affairs office in Washington, D.C. An official contacted there,
when told about the story, denied any knowledge of it, and
stated that if the San Francisco office were contacted, that
they too would refer back to the Public Relations Office.
Calls to the San Francisco Transit Authority were referred to
thier legal department. Repeated calls to the legal department
were not returned, though they were promised.
Suicides are fairly common on mass transit rails. When Mr.
Stich contacted the Transit Authority, he was sent two lists of
names of people who comitted suicide on the lines over a several
week period. There were more names on the second list, though
the time frame was the same. Mr. Stich has been unable to
confirm whether or not a security guard was among the victims,
due to a lack of resources. He invites activist volunteers to
assist him in this matter.
Mr. Ferfethen was not listed with directory assistance in Napa.
Mr. Wang's business is apparently closed for the weekend.
________________________________________________________________
This story (c) copyright 1994, David H. Stern, M.D., Rodney
Stich, and COPI. All Rights Reserved. The HTML version,
with supporting documentation, is available at
http://www.copi.com/articles/bc-assn.htm.
You are encouraged to copy and distribute in
any means necessary, as long as it remains unaltered, this
message is retained with it, and no profit is gained.
-----------<David H. Stern, M.D. <dstern@copi.com>----------
Home of DEEP POLITICS Bookstore
World Wide Web: http://www.copi.com/deepbook.htm
FTP: ftp.copi.com
GOPHER: comming soon!
____________________________________________________________
Did Operation X
Corrupt Military Intelligence
by Involving Organized Crime?
Or did it Corrupt Organized Crime
by Involving Military Intelligence?
____________________________________________________________
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
mQCNAy65RJEAAAEEALJUWbkUSI8P1sy8gL0YWvAQtn4QkvwpIqyM1TaX3tFbdVhv
l8BzJzrgzcJ4aXRlV2nwDj/5X0uRUJ3RA99Sj7foP8L2uEeRq0+aqZ3wYpflLkYR
WcNRCYBJV60JO0zaH5bUYQPIn87cvAQklqr66fLFiWBO0Y59NQ8yOr61NbuRAAUX
tCJEYXZpZCBIIFN0ZXJuIE1EIDxkc3Rlcm5AY29waS5jb20+
=omaR
-----END PGP PUBLIC KEY BLOCK-----
--
Mike
"To commit the perfect crime, you don't have to be intelligent,
just in charge of the investigation that follows."
--
Mike
"To commit the perfect crime, you don't have to be intelligent,
just in charge of the investigation that follows."

73
txt_files/clubs Normal file
View File

@ -0,0 +1,73 @@
From jhdaugh@a-albionic.comWed Dec 7 05:22:49 1994
Date: Mon, 5 Dec 1994 17:31:01 -0500 (EST)
From: James Daugherty <jhdaugh@a-albionic.com>
Reply to: prj@mail.msen.com
To: dbennett@crl.com
Cc: New Paradigms Discussion <prj@mail.msen.com>
Subject: Secret Societies
In article <3ble6p$50k@crl6.crl.com> you wrote:
: vanhorne@infinet.com (William VanHorne) writes:
: >Personally, I wonder about the Elks Clubs. Just what does B.P.O.E.
: >stand for anyway? Just what are they *really* up to?
: In many small towns and even large cities, the Elks include prominent
: members of the community. They get together, sometimes make business
: deals and plan political actions. They are the equivalent of the
: Masons in England which includes a large part of the "establishment"
: in its membership.
: The result is a "conspiracy" of sorts, but in communities where no
: formal club exists, groups of "power players" get together at certain
: eating spots or spas or whatever else is "in". Typically the coalitions
: formed are loose, disturbed by conflicting interests and in many cases
: the time spent cultivating such "contacts" can be better spent elsewhere.
: However in not a few cases, collectives of the (relatively) powerful
: result in unsavory behavior including outright corruption.
: The problem is that no specific organization is really the cause. Such
: organizations simply act to bring people together. If the organization
: is disrupted, then a new one will form. For example in the Italy of
: the seventies, national corruption was clustered in a pseudo Masonic
: organization known as Propaganda 2. When this was exposed, the games
: moved elsewhere and the recent scandals have shown.
: One thing that the powerful know (and this is no secret, Ben Franklin
: wrote about it) is that places and organizations which encourage people
: to meet are an important tool (often benign). Such groupings will
: always exist and cultures (eg. Jewish, Chinese) which encourage them
: will often have advantages in business. More recently, the American
: rightwing has used churches for such purposes.
: Those who feel left out by the system should remember the pragmatic
: reality that they have to build their own system. This often requires
: a substantial investment in time and money. One reason that the
: American "left" is so weak as a grassroots organization is that
: relatively few of those who wanted an "alternative culture" were
: willing to go through the sacrifice. They hoped things would
: somehow happen spontaneously.
: Every organization is a potential powerbase. And evryone is suspect
: (at least within local conditions) because power can be abused. But
: a great deal of positive accomplishment is also associated with
: such groupings because "they can get things done" (be it cleaning
: a local park or gathering votes for their favorite canidate).
Yes indeed! Conspiracy or "breathing together" is in the very nature of
things!
--
\\\\\<jhdaugh@a-albionic.com>\\\\\\\*////////<info@a-albionic.com///////////
James Daugherty, volunteer Postmaster for A-albionic Research (POB 20273,
Ferndale, MI 48220), a ruling class/conspiracy research resource for the
entire political-ideological spectrum. Quarterly journal, book sales,
rare/out-of-print searches, New Paradigms Discussion List, Weekly Up-date
Lists & E-text Archive of research, intelligence, catalogs, & resources.
^^^Net Up-date/Discussion Lists^^^^^|^^^^^^World Wide Web/Gopher/FTP^^^^^^^^
e-mail: majordomo@mail.msen.com | <http://gopher.a-albionic.com:9006/>
message: info prj | <ftp://ftp.a-albionic.com/>
get prj gopher/keytogopher | <gopher.a-albionic.com 9006>
////////////////////////////////////*\\\\\\\\\\\<ftp.a-albionic.com>\\\\\\\\

1649
txt_files/cnch0020.txt Normal file

File diff suppressed because it is too large Load Diff

1332
txt_files/cncia006.txt Normal file

File diff suppressed because it is too large Load Diff

1574
txt_files/cncia010.txt Normal file

File diff suppressed because it is too large Load Diff

1238
txt_files/cncia022.txt Normal file

File diff suppressed because it is too large Load Diff

1510
txt_files/cncia024.txt Normal file

File diff suppressed because it is too large Load Diff

1182
txt_files/cncia028.txt Normal file

File diff suppressed because it is too large Load Diff

1406
txt_files/cncja006.txt Normal file

File diff suppressed because it is too large Load Diff

2451
txt_files/cncjb017.txt Normal file

File diff suppressed because it is too large Load Diff

2174
txt_files/cncka002.txt Normal file

File diff suppressed because it is too large Load Diff

1444
txt_files/cncka003.txt Normal file

File diff suppressed because it is too large Load Diff

199
txt_files/coldfusi.txt Normal file
View File

@ -0,0 +1,199 @@
Host Element Fusion
Unpublished Work
Copyright (c) 1990
Earl Laurence Lovings
1. Proton (1 Hydrogen 1) Energy: 938.3 Mev = 1.007825 amu
2. Neutron (1 Neutron 0) Energy: 939.6 Mev = 1.008665 amu
3. Deuterium (2 Hydrogen 1) = 2.014102 amu
4. [(1 Neutron 0) + (1 Hydrogen 1) - electron] =
(939.6 Mev + 938.3 Mev - .511 Mev) = 1877.389 Mev =
2.015447128 amu
5. [(1 Neutron 0) - (1 Hydrogen 1) + electron] =
(939.6 Mev - 938.3 Mev + .511 Mev) = 1.811 Mev =
1.9441763 x 10 - 03 amu
6. (105 Palladium 46) = 104.905064 amu
7. (103 Rhodium 45) = 102.905511 amu
The host element fusion experiment begins with a Palladium
electrode submersed in Deuterium. A energy source is supplied,
which enables the fusion process to begin. My theory on this
subject is explained below:
The Deuterium atoms are allowed inside the Palladium electrode due
to the electric field on the electrode. Once the Deuterium atoms
are inside, the Deuterium causes the Palladium to become unstable.
This is done by this process:
[ (105 Pd 46 - (1 Neutron 0 + 1 Hydrogen 1 - electron) +
(1 Neutron 0 - 1 Hydrogen 1 + electron)] or,
[ 104.905064 amu - 2.015447128 amu + 1.9441763 x 10-03 amu] =
102.8916 amu.
The closest element Palladium can try to become stable is
(103 Rhodium 45).
Take Palladium's new mass and subtract it with Rhodium's mass.
(103 Rhodium 45) - 102.8916 amu, or
102.905511 amu - 102.8916 amu = 1.394653 x 10-02 amu.
To find out how many electrons that is equivalent to:
(1.394653 x 10-02 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
25.42309 electrons
This is the amount of electrons required to be ionized to enable
host element fusion with Deuterium.
That is the first process of host element fusion.
The second process begins when the ionized electrons from the
palladium atom shields the deuterium atoms to allow host element
fusion.
The Equation:
Q = [(2 Hydrogen 1) + (2 Hydrogen 1) + (25.423 e) -
(1877.389 Mev) + (1.811 Mev) - (2 Hydrogen 1)] x 931.5 Mev or,
Q = [(2.014102 amu + 2.014102 amu + .01394653 amu - 2.015447 amu
+ 1.944176 x 10-03 amu - 2.014102 amu)] x 931.5 Mev
Q = 13.55 Mev
You must realize for this process to work for host element fusion,
you have to have a host element before Deuterium will fuse.
My equation also theoretically works for known Deuterium fusion
processes.
Known Equation:
1. [(2 Hydrogen 1) + (2 Hydrogen 1)] -> (3 Helium 2) +
(1 Neutron 0)] = or,
[(2.014102 amu + 2.014102 amu - 3.016030 amu - 1.008665 amu) x
(931.5 Mev/amu)] = Q = 3.27 Mev
My Equation:
Host Element = (3 Helium 2) + (1 Neutron 0)
[(3 Helium 2) + (1 Neutron 0) - 1877.389 Mev + 1.811 Mev] =
[3.016030 amu + 1.008665 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.011192 amu
The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)
(2.014102 amu) - 2.011192 amu = 2.909899 x 10-03 amu excess mass
convert to electrons
(2.909899 x 10-03 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
5.304445 electrons
Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 5.30444e - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.909899x10-03 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu)
Q = 3.27 Mev
Known Equation:
2. [(2 Hydrogen 1) + (2 Hydrogen 1) -> (4 Helium 2)] = or,
[(2.014102 amu + 2.014102 amu - 4.002603 amu)] x
(931.5 Mev/amu) = Q = 23.85 Mev
My Equation:
Host Element = (4 Helium 2)
[(4 Helium 2) - 1877.389 Mev + 1.811 Mev] =
[(4.002603 amu - 2.015447 amu + 1.944176x10-03 amu)] = 1.9891 amu
The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)
(2.014102 amu) - 1.9891 amu = 2.500188 x 10-02 amu excess mass
convert to electrons
(2.500188 x 10-02 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
45.57585 electrons
Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 45.58 electrons - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.500188x10-02 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =
Q = 23.85 Mev
Known Equation:
3. [(2 Hydrogen 1) + (2 Hydrogen 1) -> (3 Hydrogen 1) +
(1 Hydrogen 1) = or,
[(2.014102 amu + 2.014102 amu - 3.016050 amu - 1.007825 amu)] x
(931.5 Mev/amu) = Q = 4.03 Mev
My Equation:
Host Element = (3 Hydrogen 1) + (1 Hydrogen 1)
[(3 Hydrogen 1) + ( 1 Hydrogen 1) - 1877.389 Mev + 1.811 Mev] =
[3.016050 amu + 1.007825 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.010372 amu
The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)
(2.014102 amu - 2.010372 amu) = 3.729582x10-03 amu excess mass
convert to electrons
(3.729582x10-03 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
6.798641 electrons
Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 6.799 electrons - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 3.7296x10-03 amu - 2.015447 amu +
1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =
Q = 4.03 Mev
Known Equation:
4. [(1 Hydrogen 1) + (1 Hydrogen) -> (2 Hydrogen 1) +(electron)=
[(1.007825 amu + 1.007825 amu - 2 electrons - 2.014102 amu)]
x (931.5 Mev/amu) = Q = .42 Mev
My Equation:
Host Element = (2 Hydrogen 1)
[(2 Hydrogen 1) - 1877.389 Mev + 1.811 Mev] =
[(2.014102 amu - 2.015447128 amu + 1.9441763x10-03 amu)] =
5.990302x10-04 amu
The element whose mass is closest to the new unstable "element"
is (1 Hydrogen 1)
(1.007825 amu - 5.990302x10-03 amu) = 1.007226 amu excess mass
convert to neutrinos
(1.007226 amu x 931.5 Mev/amu) / (.42 Mev/neutrinos) =
2,233.884 neutrinos
Now the fusion of 1 Hydrogen 1 atoms
[(1 Hydrogen 1) + (1 Hydrogen 1) + 2,234 neutrinos - 2 electrons
- 1877.389 Mev + 1.811 Mev - (1 Hydrogen)] x 931.5 Mev/amu =
[(1.007825 amu + 1.007825 amu + 1.007226 amu - .001097 amu
-2.015447128 amu + 1.9441763x10-03 amu - 1.007825 amu)]
x 931.5 Mev/amu = Q = .42 Mev


681
txt_files/compse.txt Normal file
View File

@ -0,0 +1,681 @@
The Computational Self
by Robert M. Galatzer-Levy, M.D.
180 North Michigan Avenue
Chicago, Illinois 60601
CIS PPN 72255,1101
This is a paper original delivered at the First Annual Mathematics
and Psychoanalysis Meeting in New York, N.Y. on June 6, 1988. Any
comments are very welcome.
What I have to say today is more by way of posing a problem
and indicating an area where I suspect the solution to lie than a
coherent presentation of a new theory. I am going to talk about
some elementary ideas from a branch of psychoanalysis called self
psychology and some elementary ideas from computer science that
seem to me to provide a framework for thinking about the self of
self psychology and then invite you all to let me know whether what
I have said has made sense and whether you can see directions for
the development of these notions.
Freud's effort to explain mental life on the basis of drives
that are the psychological representations of biological
disequilibria fell on hard times as he tried to work out the theory
in detail. He introduced a new entity, the ego, dangerously close
to a homunculus within the mind, that performed certain functions
and vigorously protected itself from being "overwhelmed" or
traumatized. The ego's functions included managing the persons
relation to reality, regulations of drives, object relations,
thought processing, defensive functions, perceptions and motor
activity, and integration of all other psychological functions -
its so called synthetic function.
The concept of the ego became the center of American
psychoanalytic theory in the forties ,fifties and sixties. Despite
heroic, rigorous efforts to sharpen the terms's meaning, the
confusion Freud left between the ego and the subjective experience
of the self continued. This persistent confusions was not merely
the result of intellectual sloppiness. Nor was it, as Bruno
Bettleheim proposes, the result of Freud's English translators'
discomfort the soul-like implications of the Freud's original idea.
The difficult is more fundamental. The terminologic and theoretic
confusion reflected a clinical reality.
It often happens that people who functioned badly in the areas
called "ego functions" also have major disturbances in their
experience of the self and that the two types of difficulty are
exacerbated or diminished in concert. The idea of the ego as a
unitary entity is not just as a convenient, if confusing, name for
the set of functions described earlier, a sort of waste basket for
what is neither id nor superego. The term reflect the commonly
observed covariation in these functions.
The systematic exploration of the self experience began in
psychoanalysis in the years following the second world war, though,
of course the concept of self has been the object of study since
the dawn of civilization. Although he had significant
psychoanalytic precursors, notably in the work of Paul Federn, Erik
Erikson was the first to propose that the core of much
psychopathology lies in disorders of self experience. Erikson's
concept of identity, which amalgamated the many sources of beliefs
about who one is is both evocative of common experience and proved
clinically useful. Many kinds of difficultly, as well a normal, and
supernormal psychological development can be usefully explored as
experiences of loss or diffusion of identity or attempts to
establish a satisfactory identity where one was lacking.
Erikson's work is problematic from a psychoanalytic point of
view for two reasons. First, reading Erikson carefully one
discovers that his wonderful portrayal of emotional states through
imagery, metaphor and clinical detail is not matched by explicit,
clear theoretical formulations. Second, his writings often focus
on external environmental effects rather than people's
psychological worlds and the manner of their construction.
Erikson never systematically described his therapeutic
approach to his patients. However, it is clear that he consistently
placed a positive connotation on his patients' struggles. He
demonstrated how manifest psychopathology could be understood as
potentially successful attempts to achieve valuable identities,
that while there might be difficulties in the way the patient's
basic project and his ways of attempting to accomplish it were
closer to healthy development than the patient or the society might
recognize. Erikson's psychobiographical studies of Luther, Gandhi,
Hitler and Shaw are messages to readers, many of them young, about
the value of their struggles to form workable identities. Erikson's
implicit view is that an appreciative stance toward the patients'
struggles which include or dominated by external realities is
therapeutic.
In the years following the second world war Harry Stack
Sullivan, observed that the experience of the self of many of his
schizophrenic patients was grossly disturbed. Borrowing from the
Chicago School of Sociology, most notably George Herbert Mead,
Sullivan conceptualized the self as a summation of social roles,
some of them retained without full awareness from archaic periods
of development. In this "interpersonal theory" of psychology
pathology resulted from a self system that was internal incongruent
or problematic in terms of the environment. Therapeutic
intervention consisted in understanding and appropriately revising
the self system in the light of more mature and current
understanding. What is central to our discussion is Sullivan's view
that the self system was both the product of the external
environment and made no sense whatever outside of a social system.
Several analysts, notably Klein, Winnicott, Khan, Fairburn,
Bion, Spitz, and Modell emphasized the role of holding environment,
environmental container or the "mother" in the development of the
self. From their very different perspectives each emphasized how
the self's growth required an external situation of being "held"
as the emerging and vulnerable self gained strength and autonomy.
People whose psychopathology centered in problematically self
development, a condition that all these authors equated with
difficulties in the first two years of life, could work out their
problems if provided with an analytic situation that allowed them
to reengage those phases with the analyst experienced as the
archaic maternal environment of that era. Some of these analysts
believed, like Melaine Klein, that these very early situations
involved inherent conflicts that now be resolved through
interpretation in analysis. Others like Donald Winnicott held that
new experiences, "beyond interpretation," with a good-enough object
were needed so that the developmental failure could be righted
through new development. The theoretical formulations of many of
these authors was either so inherently fantastic, or so abstruse,
or so unsystematic that their work has had relatively little
influence on psychoanalytic theory beyond the range of their
immediate followers. It is only now being integrated into the
mainstream of psychoanalytic thought.
Margaret Mahler and her coworkers also concerned themselves
with he early development of the self. They centered their
attention on the era of late toddlerhood that involved the
difficulties of the child emerging from a state they called
"symbiosis" in which the experience of the self includes the care
taking environment into a state of being an individual in one's own
right. Based on treatment experiences with youngsters and adults
who seemed to have difficulties in the area of the self experience
and observations of toddlers, which unfortunately were dominated
by their preexisting theory, Mahler and her group concluded that
much of the difficulty in self experience arose from a failure to
adequately separate from the mother of infancy. Although there are
many well informed analysts who would disagree with me, I will
assert that the overwhelming data of infant and later developmental
studies demonstrate that Mahler's symbiotic phase is not part of
normal development nor is separateness, in the sense she meant it,
characteristic of ordinary or healthy more mature psychological
function.
However the clinical observations that lead to Mahler's
thinking and that have been explained in terms of her theories are
certainly common. That is, there are many people who seem to have
shaky experiences of themselves and function with a conflicting
notions that on the one hand they desperately need other people if
they are to function at all reasonably and that some core aspect
of themselves is in danger precisely in these urgently needed
interactions.
Starting in the sixties in Chicago Heinz Kohut initiated a
psychoanalytic study of disorders of the self. His approach to
these researches was methodologically distinct and is worth a
moment's pause. First he took a radical position, that he claimed,
incorrectly at the time, to be a standard one, that psychoanalytic
data was collected in a manner different from that of the natural
sciences. He asserted that it is possible and usually to
immediately comprehend complex psychological configurations in
others and that such understanding ordinary mode of operation of
the working analyst. Empathy for other's internal states, as a mode
of comprehension, was, for Kohut, similar to the way we perceive
faces - as a complete and immediate gestalt. Analytic training and
technique are designed to maximize the analyst's ability to use
this investigative tool and to overcoming its pitfalls, just a
training in microscopy enables us to vastly extend ordinary visual
capacities. While Kohut claimed to be making explicit what everyone
did anyway, his position, right or wrong, was deeply antithetical
to Freud's view of psychoanalysis as a natural science-like
investigation and also Hartman's explicit statements that empathy
in the sense that Kohut meant it had no appropriate role in
psychoanalytic investigation.
A second, and less problematically, position about
psychoanalytic investigative method was Kohut's position on
transference. In his early writings on self psychology Kohut
assumed that the only data to be taken seriously in psychoanalysis
were the data of the transference. The various stories the patient
told, the analyst's conceptual framework and responses and all the
other stuff the analyst commonly use to frame a picture of the
patient's psychology was of minimal importance compared to the job
of describing and understanding the interaction between patient
and analyst. Kohut also believed that premature interpretations to
the effect that the patient was avoiding knowing something about
himself often interfered with the full blossoming of the
transference. According to Kohut, premature interpretations,
particularly premature interpretations of defense often resulted
in the analyst discovering evidence that confirmed their
preexisting notions because they misunderstood possibly contrary
clinical facts as representative of the patients' avoidance of
already known realities.
Using empathy and the exploration of transference as their
primary tools, Kohut and his students treated a group of patients
whose distress took three overlapping forms. One group of patients
suffered from feelings of depletion, emptiness, triviality and/or
fragmentation. These experiences often took symbolic expression in
the form of hypochondriasis. Another set of patients were engaged
in activities that seemed enormously driven or addictive such as
sexual promiscuity and perversion, shop lifting, desperately
clinging relations to other people and substance abuse. Finally,
some of the patients had chronic and acute states of tantrum like
rage.
In analysis, at least as conducted by Kohut and his followers,
these patients developed characteristic attitudes to the analyst
that Kohut labeled selfobject transferences. Characteristically,
often against considerable internal resistance, these patients came
to experience the analyst as essential to their well being. His
physical or psychological absence variously precipitated great
distress and/or the reemergence of symptoms that had been
previously remitted. For example, a young man who had entered
analysis much distressed by his promiscuous homosexual behavior
reported what for him was a major business success during a
session. The analyst, noting that the patient's anxiety had
interfered with an even greater accomplishment, made the plausible
interpretation that the patient had inhibited himself from doing
even better because he experienced his business competitor as like
the analyst and feared the analyst's reprisal if the patient beat
him in competition. The interpretation was bolstered by several
significant details that made it plausible and the patient thought
it was "right on the mark" and promised "to try to do better next
time." Retrospectively he said he had felt irritable and "headachy"
during and immediately after the interpretation was given. That
evening he returned to a gay pornographic movie theatre were there
was much sexual activity among the patrons. Before the analysis
this was one of his regular haunts but he had stopped patronizing
the theatre many months before. The patient allowed several men to
perform fellatio on him. He felt angry and painfully excited as he
thought the fallators really appreciated what he had. In response
to what he felt was the analysts inadequately appreciative response
the patient had desperately turned to a more concrete indication
that someone could appreciate his accomplishments. Another patient
experienced every weekend as "like being sent away to live in the
Sahara in a desert" and the return to the analysis as "like coming
back to the oasis."
When their feelings are not interrupted these patients like
these experience the analyst in characteristic ways that Kohut
described with oversimplifying systemticity. Some patients
idealized the analyst seeing in him the embodiment of strength and
good and feeling alive and whole in his presence. Others find
relief in the sense of being in a unity with their analyst, or
being like him or being appreciated by him. Interruptions in these
states of mind commonly bring with them inordinate distress or
symptoms which could be reasonably understood as experiences of a
fragmented or devitalized self or attempts to avoid those
experiences.
From these clinical experiences Kohut posited that there were
a group of people for whom the maintenance of a satisfactory self
experience was centrally important because it was so problematic.
The analyses of these patients was characterized by the use of the
analyst to maintain the a cohesive and vital self by using the
image of the analyst as part of the self or as a support for the
self. Any interruption in the capacity to use the analyst in this
manner lead to the reemergence of problems in this area. The
situation within the analysis was equated with postulated normal
developmental states in which the caretaker ordinarily performs the
functions for the self. These functions Kohut called selfobject
functions and he believed his patients to be suffering from
disorders of the self resultant on traumatic failures of early
selfobject functions. As in normal development small, empathically
supported, failures in the selfobject function allow patients to
identify with the image of the way the analyst should have
functioned and to make those functions more their own. However
mental health does not consist in giving up self objects. Kohut
asserted that selfobject functions normally continue across the
course of life and that it is their qualities, not their existence,
that is altered with maturity. (Having made this assertion Kohut
never elaborated or demonstrated it. Recently Bertram Cohler and
myself have undertaken the task of exploring the empirical evidence
for Kohut's position.)
Kohut's findings, and the findings of many of those who have
examined the psychology of the self from other viewpoints, have
been questioned in too apparently distinct ways, whose
interconnection I will show you in a moment.
The first objection is that Kohut's theories serve to avoid
painful psychological truths. Many of the phenomena Kohut observed
had been observed previously and classified as defensive
operations. For example, idealizations of the analyst were commonly
understood as ways both to avoid knowing of the unconscious
demeaning of the analyst and to arrange for disappointments when
the analyst fails to live up to the idealization as he inevitably
must. The idea that the patient "needs" the analyst to function in
some certain fashion lest his core being be seriously damaged could
be understood as a fantasied misunderstanding designed to
rationalize wishes whose non-fulfillment may be extremely
frustrating but not inherently, must less psychologically fatally,
damaging.
The second set of objections has to do with the theory of the
self. Kohut never clearly defines his central concept of the self.
Essentially he says that everyone knows from experience what the
self is and leaves it at that. After studying the many discussions
of the meaning of the "self" in the psychoanalytic literature one
is reminded of the Buddha's comments on the self. He said that
those who believe in the self are like "a man who says that he is
in love with the most beautiful woman in the land, but is unable
to specify her name, her family or her appearance" (Digha Nikaya
I 193, quoted in Carrithers (1983).) The essential theoretical
difficulty was clarified by Meissner who pointed out that the term
self as habitually used by Kohut and most other writers whose work
places the self at the center of psychological life, is
consistently used to refer to both a psychological representation
and also a psychological agent. Although more systematic
researchers, for example Hartman, limit the concept of self to a
psychological representation of the person, they also give the self
a markedly subsidiary role in psychology. Meissner's argument is
quite similar to Schafer's later discussions of internalization in
which Schafer observed that the elaborate analytic theories of
internalization were in fact nothing more then the translation into
psychoanalytic jargon of unconscious fantasies and did not, in his
view represent, represent actual psychological mechanism and in
fact obscured, what actually happens when we have experience that
had been described as the taking in of another person or aspects
of that person.
The two problems with self psychology, its use as a defense
against painful insight and its confusion of agent and image, are
related. Notice that if the self is "only" a psychological
representation it would follow that the patient's idea that had
will be dysfunctional as a direct result of some impairment in this
representation seems mistaken - or at least so it seemed to many
thoughtful psychoanalysts. Only the impairment of some mental
agency could really result in dysfunction. It was if the patient
complained that his car did not function because part of a picture
of the vehicle had been obliterated. The idea that the patient is
in error in this regard supports the clinical stance that the
patient's fears in these matters are not an accurate assessment of
the situation but rather fantasies motivated by their unconscious
desires to hide deeper psychological realities.
Now of course we all know that there are "mere"
representations that are very good for actually doing things and
whose faultiness causes no end of problems. These representations
are called programs.
Now, I suspect that once stated the notion that the self is
a program which like other programs is capable of change by
altering its representation and at the same time is an active agent
is neither a surprising or remarkable idea. However, when one
notices that fifty years or so of both clinical and theoretic
psychoanalytic thinking about the self has been profoundly
influenced by the idea that the existence of such an object is a
logical impossibility the point seems more worth making. The other
advantage of making this point is that it invites us to use what
we know about programs to think about the self and suggests the
systematic characterization of the self as a program.
Let us begin the selfobject function whose enemies are want
to equate it with some form of mysticism. We know, of course, that
programs have meaning and function only within computational
environments. An inappropriate computational environment can alter
the meaning and operation of the program or render it altogether
meaningless. For example a routine that calls a global variable
gives a different value depending on the value of that variable;
a program written in C for which one has no compiler is totally
useless. The use of the term "computation environment" in computer
science is relative to the process being discussed and only has
meaning once one specifies what program is being referred to. An
expression only has meaning within an environment. Having bound a
global variable that value then becomes part of the computational
environment of the programs running within that context. Of course
from a different viewpoint the program that sets up the environment
for our first program itself has an environment. Thus ordinarily
we expect that program will "need" appropriate environments in the
same way that self psychology predicts that people need
selfobjects.
What one chooses to call program and what environment
obviously effects the picture of the situation that emerges and is
a function of the interest of the investigator. Similarly the
boundaries of the self depend on the point of view we adopt based
on the focus of our interests. It is only important to notice that
the choice is ours, not intrinsic to the system under study and
that it is important not to become confused about the principles
governing the entities we have defined. A few decades ago von
Bertalanfy made a minor industry of pointing out the inappropriate
application of conservation principles to "open" systems that were
mistakenly treated as having no energy flux across their
boundaries.
The mechanics of the selfobject or the environment is
naturally important but by no means definitive in terms of its
function. In one since it is obviously of considerable importance
whether a subroutine that is called is available in RAM, is
currently located on a easily accessed storage device or is located
on a tape that the machines operator must fetch and mount before
it can be used. In another sense these mechanical considerations
are of minor importance in our understanding of the program.
Likewise whether the capacity to be soothed is a readily available
group of psychological functions represented within the cranium,
the activity of a caretaker who is but a cry away or requires some
elaborate undertaking - say a few years of psychoanalysis - can be
regarded as involving no essential difference in this function.
Although he never would have put it in this way this is an
essential aspect of what Kohut was trying to point to in the idea
of the selfobject - something that functions as an essential aspect
of the self or of the support of the self but which because of the
mechanics of its availability is at times less efficiently
accessible than other aspects of the self that we are more
accustomed to including in our idea of the self. This computational
relative inaccessablity commonly is associated with the need for
particular perceptual inputs and computational assistance.
For instance the phenomenon of "social referencing" has been
studied extensively from a social psychological point of view.
Starting at about age seven months given a novel situation or a
situation with elements that suggest danger babies look to
caregivers for cues about whether to proceed and base their actions
on the caretaker's response. Toddlers as they move away from mother
in a play ground frequently turn around, checking mother's
expression before proceeding further. In the toddlers experience
the decision does not take its basis in the issue of whether
mother, as a person approves or disapproves of the action, rather
the mother's approving response registers as an impersonal "It is
okay." The toddler has not called the person "mother" in this
situation but has rather expanding his computational resources
which happen at the moment to be located in the being we would
refer to as his mother. The child needs loves nor hates the mother
in this context but does need her to function. If she is
functioning well like any computational resource he remains unaware
of her presence. It is only her failure of availability that makes
her of interest, just as we are generally unaware of our memories
except when we have difficulty recollecting something we need to
continue our thinking.
Those of you familiar with Marvin Minsky's work recently
summarized in The Society of Mind will recognize in these ideas a
particular application of the multi-hierarchy computational model
that can be used to explore processing within many levels of human
function from neurons to societal organizations. The issue of a
non-pejorative attitude to what we call mysticism comes to mind
here. Much of what is referred to as mystical might well be
considered as attempts to comprehend hierarchically higher
computational structures within the computational world of lower
order entities.
The self as a program does two important things that are the
subject of our constant attention in our analytic work. The program
monitors its own operation and ordinarily modifies itself in
response to such monitoring. The type of programs we are familiar
with in daily work with computers generally have facilities to
monitor and modify their own execution to a limited extent. Error
trapping of one type or other is virtually universally employed so
that unexpected or undesirable situations do not result in the
continuation of "business as usual" but instead lead to some kind
of branching in the process. In an "error" situation the new
execution often takes the form of enlarging the computational
environment to include the operator who is asked how to proceed or
to correct some situation that impedes the computation or to
authorize the use of additional computational resources. For
example if the execution of a program requires more than a certain
amount of time the systems operator may be asked whether to
continue or abort the execution.
Similarly, but much more extensively, the self is engaged in
a constant process of monitoring its own function and functional
needs, arranging for them to be met or attempting to compensate for
their not being met. We have already implicitly discussed the
ongoing monitoring of computational resources and the recognition
of the need to evoke devices such as the perception of other people
to serve as selfobjects. The detailed study of the nature,
functions and situations in which these additional computational
devices are called or where calls to such devices is avoided
constitutes a major area of psychoanalytic investigation that
encompasses much of object relations theory, including self
psychology, attachment theory, the concept of the transitional
object and the role of cultural experience.
In the von Neumann architecture computer design was dominated
by the wish to avoid programming errors. This was accomplished by
carefully separating data, programs and processing functions and
forcing sequential processing so that except in terms of the
overall duration of computation the outcome of a computation was
unaffected by the time required for each computational step.
Furthermore building this basic architecture requires the
anticipation at least the basic architecture of the system from
its beginning. It cannot result of the evolutionary piecing
together of elements designed for other functions as the brain must
have evolved.
The von Neuman architecture is so excellent an environment for
humans to design programs for that it dominated computer design for
almost four decades. However as von Neumann noted from early on
this architecture is a poor model for brain functioning. The
microsecond firing times of neurons are much to slow to allow
brains to do the things they do all the time with a von Neumann
machines. Furthermore brains are the result of a bioevolutionary
process, not a unitary design and its programmer is not an
individual who sets out to explicitly specify processes but an
environment with many other things on its mind than programming
brains. Of course we know from direct study of brains that they
operate through massively parallel processing.
Fortunately for those of us interested in brains and their
productions it has become clear that the technological limitations
inherent in the von Neumann architecture make it essential that
other architectures be explored in depth to make more capable
computers. The last five years has seen an explosion of
publications about parallel processing architecture and we will be
among the beneficiaries of the resultant intellectual advances.
But, of course, the problems that von Neumann sought to avoid
in computer design are precisely the problems that emerge in
parallel processing. It is simply much more difficult to predict
what is going to happen when things do not go on sequentially, when
the distinction between memory and processing is abandoned and
simple hierarchies of bindings are abandoned. Now rather then
building the absence of these difficulties into the architecture
of the system it becomes necessary to discover ways to overcome
them. A much more elaborate system of error trapping and control
becomes essential.
Parallel systems are highly vulnerable to internal conflicts
and instabilities. Attempts to remove these features from the
system usually entail the loss of precisely what has been gained
through parallelism. To give an very elementary but quite everyday
example, when a database can be updated through several different
inputs there is considerable danger that attempting simultaneous
updating of a record will result in loss of data or undesirable
results. Suppose I am making a deposit in my savings account at the
same time that interest is being calculated and recorded in the
same record. In many database systems the entire record is
retrieved updated and stored again. So in this instance the
original record is retrieved by both the deposit and the interest
function. Each, independently updates the record and then writes
it to the storage device. Either the deposit or the interest
payment, whichever is stored last, will be recorded but not both.
A simple solution that is used in many database systems is to make
the record available to only one potential input at a time by
locking it to other users while it is in the hands of a potential
inputter. In essence one suspends parallel processing and goes to
sequential processing in the face of such potential errors. This
is an awful solution for simple database management, although as
anyone who has worked with such a system knows it can be thoroughly
annoying. But such a general solution for a massively parallel
system would slow the whole thing to a snails pace. Thus special
mechanism for recognizing, protecting against and resolving
conflicts are expected to be a central aspect of massively parallel
system.
But notice how close we have gotten to the ordinary stuff of
psychoanalytic clinical work. A lot of what we do in analysis has
to do with successes and failures to resolve conflicts between
computational results achieved through parallel processing of
situations. To give a much oversimplified instance, a young man
who might displace a supervisor by putting forward his own ideas
expresses them but muddles their presentation. Analysis reveals
that his actions result from two parallel, conflicting computations
and an attempt to resolve that conflict. On the one hand are a
variety of factors including his wish for greater prestige and
material wealth that in turn reflect a long sequence of
developmental processes and on the other his assumption (which is
outside of awareness) that he will be harmed in various ways if he
pursues these wishes results in a state of conflict. This conflict
and potential conflicts are dealt with variously by some higher
order resolutions or through the isolation of the processes from
one another by a variety of means. The resulting action,
unfortunately called a "compromise formation" in psychoanalytic
jargon is an attempt to synthesize the results of these two groups
of computations.
An even greater danger to the system than partially
contradictory computational results is its own instability.
Computational process may become chaotic, disorganized or pass
through a catastrophe as we recognize in depth when we study them
in terms of dynamical systems. It is reasonable to expect that a
computational system can only function in anything like a
satisfactory manner if such situations is rigorously limited to
lower levels of function and if the system has extensive safeguards
against higher level catastrophes or chaos.
Again this is precisely what we find clinically. The most
central concerns in disorders of the self frequently are concerns
about discontinuous and disorderly change. A typical error trapping
procedure in the area where catastrophic change seems a danger is
to avoid all change whatsoever and to attempt to isolate the
computational processes from outside influences that might result
in change. Recently I described how the process of working through
in psychoanalysis, the repeated reexamination if slightly different
versions of paradigmatic situations within an analysis, could
usefully be regarded as the reestablishment of a Boltzman
algorithm-like psychological function by which existing "solutions"
are repeatedly and automatically reexamined both to achieve greater
optimality and to integrate data that may have been unavailable at
the time they were formed. I said that much psychopathology could
be usefully characterized as the interruption of this ordinary
process in the face of a perceived threat of disruption or
disorganization and that what we often think of as the curative
factor of working through is just the resumption of normal
psychological function.
This brings us to the third way in which the self differs from
the programs we are most familiar with from the study of computers.
The self is self developing. Here my opinions are somewhat
different from many of my psychoanalytic colleagues, so let me
spell them out briefly. As she attempted to explore the concepts
of normality and pathology in childhood, Anna Freud discovered that
the presence or absence of symptoms per se was not an adequate
guide in assessing children. She concluded that childhood was
normatively a period of change and development and these were its
primary tasks. The failure of such for such development to be
ongoing was the essence of psychological disturbance in childhood.
For Anna Freud, who had a clear picture of what psychological
health was like in adulthood, the task of childhood was move toward
such mature functioning and she posited a drive to "the completion
of development."
Three groups of observation impressed me into extending her
notion. First the past quarter century has yielded a massive
demonstration that human development normal continues across the
entire life course - that the idea of a definite mature
developmental state whether occurring with the resolution of the
Oedipus complex or the end of late adolescence or whenever else is
mistaken. Second there seem to be quite diverse ways to be
psychologically healthy which becomes readily apparent if we avoid
employing a priori notions of the meaning of health. Finally the
work begun by Marsh to the effect that programs can be written not
with specific goals in mind but rather that proceed to explore and
develop in area that are vaguely defined by such criteria as
"interestingness" corresponded so well to the observations of
workers like Piaget who found that exploration and development were
self motivating that it seemed likely that the human mind is such
a system. It thus seems reasonable to posit that an ongoing
function of the self is its own reorganization and development.
Indeed it was this point that first led to my interest in a
computation model of the self because the question of how the self
could be both agent and representation and in particular how it
could be an agent acting on itself as a representation has a long
standing concrete instaniation in Lisp. Lisp, one of the two oldest
high level programming languages in common use, was specifically
designed to manipulate list of symbols. Of course lisp programs are
themselves list of symbols so that lisp programs can be operated
on my lisp programs including the program itself. The species that
seemed so internally contradictory that analysts denied there
existence have in fact been around for a long time.
Now, of course such programs are not without very serious
problems - in particular they too can be much less stable and far
less predictable than those programs were program and data are kept
strictly separate. As with parallel processing one way to protect
from the dangers inherent in such a structure is to carefully limit
in advance the changes the program can make in itself. Another
possibility is to monitor the development of the program and
introduce error trapping and correction as untoward consequences
of the rewriting occur. A combination of the two approaches would
seem to be necessary. In a sequential system for example a fatal
error occurs if a real interminable loop is introduced into a
program. Here, however, parallelism and conflict can be of
considerable help. Freud's idea of a tripartite model of mind
essentially involves the parallel processing of data, the
consequent development and resolution of conflict so that a variety
of needs can be met through these various modes of processing. In
particular aspects of the mind can monitor the ongoing process of
the development of the self - interrupting and altering it when it
comes parlously close to instability or stagnation.
The hierarchical level at which these process can proceed are
various and new levels in the hierarchy seem to develop with
greater maturity. In particular greater capacities for abstraction
both from data and process appear to be a normal part of human
development. With these capacity comes increased abilities for
metacognition. Piaget's observation of the progressive decentering
of cognition with the related capacity, for example to think about
thinking, represents such an elaboration of abstraction
hierarchies.
Among the many objections that could be raised to my
discussion is the importance I lay on introspection and
subjectivity as a source of information about psychological
processes. From a computational viewpoint consciousness is an odd,
unnecessary, or at least peculiar phenomenon, while from the point
of view of classical psychoanalysis precisely what is most
interesting about people is barred from the conscious awareness.
Thus subjective reports about experience should be relatively
uninteresting to both groups. However, following Vygotsky and
Basch, I take a different point of view about consciousness.
Consciousness is a state that we employ when automatic functioning
becomes problematic. For example we only become aware of walking
when we stumble or when we are learning how to do it and only
attend to it in detail if something impedes are ability to walk.
It is thus precisely in areas of difficulty that we expect
awareness to appear. So it is the areas of difficulty that we
should find well represented in consciousness. Freud's idea of
bringing the unconscious into awareness then is nothing more then
the extension of this normal process into areas in which it is not
employed. In particular the mechanism of repression reflects a
special procedure to keep ideas separate from each other by not
bringing them into awareness. But more generally we can use
subjective experience as at least a preliminary guide to the
computational difficulty.
I am well aware of having painted the picture of the
computational self with extremely broad strokes and having done
violence to many subtle and important issues in the process. At the
same time I am impressed that psychoanalysts having discovered that
the Freudian and ego-psychological paradigms are inadequate have
largely abandoned the attempt to develop broad theories that
encompass the particular data of the psychoanalytic field, choosing
instead to focus on smaller more tractable problems and maintaining
an unavowed theoretical agnosticism.
An exception to this abandonment of theory lies in the work
of the self psychologists. However their conceptualizations,
especially those of Kohut, while evocative remain vague. I think
it is clear that the computational properties of the mind must find
representation in personal psychology. I have suggested one
possibility for how this may occur using the computational self as
the central organizer for my thinking and attempting to show how
ideas from computer science may yield models that are congruent
with our clinical experience. Just as I believe development is the
central activity of the self so to I believe development should be
the central goal of our intellectual activities. Thus if this
paper, despite its flaws does nothing more then stimulate some of
you to think along these lines and to help me do so more cogently
I will be satisfied.

1609
txt_files/consp.txt Normal file

File diff suppressed because it is too large Load Diff

214
txt_files/conspire.txt Normal file
View File

@ -0,0 +1,214 @@
From: Alan Lustiger <alu@pruxp.pr.att.com>
Newsgroups: rec.humor.funny
Subject: 25 QUESTIONS AND ANSWERS ABOUT THE "ATOM BOMB"
Message-ID: <S4dc.13e2@looking.on.ca>
Date: Tue, 12 Jan 93 4:30:03 EST
Lines: 209
25 QUESTIONS AND ANSWERS ABOUT THE "ATOMIC BOMB"
1. Is there any evidence that a thermonuclear device exploded over
Hiroshima in 1945?
No, absolutely none. According to leading historians and physicists,
the thermonuclear bomb was not invented until years after the supposed
detonation over Japanese territory.
2. Is there any evidence that a uranium-based "atom bomb" was ever dropped
onto Nagasaki, Japan?
Absolutely not. While many historians and journalists made this claim
in the late 40's and early 50's, everyone now agrees that no such
bomb ever exploded over Nagasaki. Yet there are some who still stubbornly
cling to this supposed "fact."
3. What are the materials needed to make an "atom bomb?"
Uranium-238 and plutonium-239.
4. Aren't these materials radioactive?
Highly so. Anybody who attempts to use these materials is endangering
his/her life.
5. Is it likely that nuclear scientists in the 40's would be
handling uranium and plutonium?
This would be highly unlikely. Very few people felt so threatened
by the Japanese to be willing to risk their lives on a theoretical
chance of a superbomb that could end a far-away war a little sooner.
6. Aren't there witnesses to the atomic bomb in Hiroshima?
The only "witnesses" that could possibly survived this supposed
explosion would have been blinded by the intense flash of light,
so their testimony is quite unreliable and contradictory.
7. According to conventional historians, was the uranium bomb tested
before supposedly being dropped over Hiroshima?
No. There was no testing whatsoever of a uranium bomb in Alamogordo
or anywhere else before Hiroshima.
8. Isn't that strange?
Yes. Typical weapons are tested for months and years before deployment;
there is no other weapon that according to the accepted "facts" deployed
before any testing whatsoever.
9. How many witnesses are there for all of the atomic tests allegedly
occuring during the fifties and sixties?
Very few, perhaps a few hundred, who claimed to have seen them.
10. What did the General Advisory Committee of the Atomic Energy
Commission say in their report of October 30, 1949?
They recommended strongly against the development of what they
called the "Super Bomb," which is simply a thermonuclear
bomb. They said that "A super bomb might become a weapon of
genocide."
11. Isn't this four years after Hiroshima and Nagasaki?
Yes. Obviously development of nuclear weapons occurred well
after their supposed implementation in 1945.
12. Is radioactivity dangerous?
Everything is radioactive to some extent.
13. What was the triggering method of the bomb that supposedly
was dropped on Hiroshima?
According to the standard historical accounts, it used a gun-
assembly trigger.
14. Wasn't the gun-assembly method of triggering abandoned
in the design stage?
Yes; according to these same sources the gun method would not
work with uranium-derived plutonium-239 because some of the
plutonium-239 absorbs a neutron to become plutonium-240, which
undergoes spontaneous fission, all before supercriticality,
causing a premature and very small explosion that is unusable
for the very purpose that it was supposedly designed for!
15. How do conventional historians rectify these two "facts?"
They don't even attempt to.
16. How many books have been written about the atomic bomb?
Many hundreds, as well as thousands of articles in magazines
and newspapers.
17. Why was Hiroshima "targeted," and not Tokyo?
Perhaps because no one had heard of Hiroshima, and no one knew anyone
from there. It would be far more difficult to claim that Tokyo was bombed
than Hiroshima and Nagasaki. In fact, most world maps from before "World
War Two" do not even mention these cities at all.
18. How does Japan benefit from the "atom bomb" story?
As a direct result of the "war," Japan has received billions of dollars
worth of US aid for its defense. Japan has essentially no defense
budget, so it can pour resources through MITI into defeating the US
economically, all while playing on the emotions of anti-"nuke" activists
about the "horrors" of nuclear weapons.
19. Wow, I never thought of that. How else do the Japanese
benefit from this story?
The Japanese now own major Hollywood studios, from which many war
movies are produced. Also, they play upon our sympathy for the
supposed "atom bomb" to blind us to the fact that this foreign
nation had taken over our semiconductor industry, many California
banks and practically the entire state of Hawaii.
This is all a part of the Japanese plot to take over the world.
According to the "Protocols of the Elders of the Orient," this
is a Japanese conspiracy all foretold by their ancient texts
that very few Anglo-Saxons have the ability to read.
19. How many people are supposed to have died in the explosions?
It is hard to say. Some sources say 60,000 in Hiroshima, others say
140,000. No attempt has been made to rectify the various numbers.
20. How many people die annually from car accidents in the US?
Over 50,000.
21. So, what makes Hiroshima so special?
Nothing, especially given the contradictory evidence about it.
22. Boy, I'm mad. What should I do about this?
Glad you asked. First, send me lots of money so we can spread this
message far and wide. Maybe we'll take out ads in college newspapers
or something.
Second, direct your anger at the Japanese. We are the victims, and
they are the aggressors. Make yourself feel important again by bashing
Japan at every opportunity. Japanese people are inherently evil, and
basically subhuman. They were never bombed, and if they would have been
they would have deserved it. Who do they think they are, anyway?
Yes, we Revisionists have all the answers. Life is a lot simpler than
you thought it was. Join us, and you won't have to be bothered anymore
by any feelings of guilt for your inherent hatred. We can justify it!
Oh, it's not the Japanese you hate, but the crippled? Hey - so do we!
It's easy: we don't like feeling uncomfortable around people in wheelchairs,
either! Who do they think they are, taking all the good parking spaces
when they were stupid enough to slip on a banana peel? IT'S A
CONSPIRACY! --See how easy it is to start? Now, just mix in a few
real facts, and start converting all of the otherwise messed-up
people to OUR CAUSE!
23. Wow! You mean that I could write stuff like this, too?
Sure! It's embarrasingly easy to write what we wrote above. In fact,
it's even superior to the usual anti-Semitic revisionist garbage,
because it has a higher percentage of REAL FACTS! Most of the
apparent "contradictions" above come from the facts that Nagasaki
was bombed by a plutonium bomb, not uranium; and that hydrogen
bombs are thermonuclear, not atomic bombs. Just juggle information
about the different types of bombs and mix them up so they seem to
be contradicting each other. It doesn't take ANY INTELLIGENCE
WHATSOEVER, and you can get lots of free air time on "48 Hours"!
Oh, I forgot to mention: I have a Japanese girlfriend who agrees
with EVERY WORD I've written above. Here she is:
"Yes, I am his Japanese girlfriend. I love him very much, and I've
always been troubled by my Japanese friends claiming to know people
who died in Hiroshima."
There you have it! Just throw some unverifiable opinions on top
of ridiculous proofs to STRENGTHEN YOUR CASE!
24. Couldn't I be arrested for this?
No! This country is founded on FREE SPEECH! But, just make sure
that you mention how much you are being persecuted for saying
your version of history. (More than three email messages a day
qualify for being called harrassment. Five may merit a lawsuit.)
25. Where can I get more information?
Go to a library. Take a book at random. Skim it. Then, decide how
that book is either for you or against you. If it is for you, quote
liberally and out of context. If against you, do the same.
DON"T LET YOURSELF GET CONFUSED BY THE FACTS! We certainly don't!
------------------------------------------------------------------
Alan Lustiger INTERNET:lustiger@att.com UUCP:att!pruxp!alu
ATTMAIL:!alustiger CIS:72657,366
--
Selected by Maddi Hausmann. MAIL your joke (jokes ONLY) to funny@clarinet.com.

181
txt_files/contra.txt Normal file
View File

@ -0,0 +1,181 @@
SOLDIER OF FORTUNE DIES MYSTERIOUSLY AFTER
TALKING TO CONGRESSIONAL INVESTIGATORS
by Vince Bielski and Dennis Bernstein
A county coroner in Los Angeles has yet to announce the
cause of death of Steven Carr, a 27-year-old U.S. mercenary who
has provided Congress with much of what it knows about weapons
shipments to the contras. Had Carr lived, he was also expected to
testified in federal court against 29 contra supporters allegedly
involved in cocaine trafficking, an assassination attempt on
former contra leader Eden Pastora and a scheme to kill U.S
Ambassador to Costa Rica Lewis Tambs.
While Detective Mel Arnold of the Los Angeles Police
Department said the department is investigating the possibility
that Carr was murdered, at this point he said there doesn't
appear to be any evidence of "foul play." But in the days before
his death, Carr told several people that he feared he would be
assassinated. He was "very paranoid and frightened" because of
his role as a witness, Carr's sister Ann of Naples, Fla., said.
Here is what the police are saying about Carr's death. He
died at 4 am on December 13 in a parking lot near his friend's
apartment in Van Nuys, Calif., where he was staying. In the
predawn hours on this Saturday morning, while his friend,
Jacqueline Scott, was asleep, Carr left the apartment for an
unknown reason. After spending an undetermined amount of time
outside, Carr began making noise which awoke Scott. Arnold said
he could not describe the type of noise Carr was making. Scott
found Carr in the parking lot, who was "distressed and having
coordination problems." Soon after he died from a "probable
cocaine overdose." Asked if the police found any physical
evidence of cocaine use in the area of the apartment or parking
lot, Arnold said "no comment."
Dan Sheehan, an attorney with the Christic Institute in
Washington which filed the law suit against the 29 contra
supporter, said Carr used cocaine, but called him "an educated
user." Martha Honey, a reporter for the BBC, became friends with
Carr while he was a mercenary in Costa Rica. She said Carr was
not the type of person who would kill himself because he was
under pressure. "Stevie was a survivor. He had this ability to get
himself in trouble but he always seemed to bounce back. He had a
great sense of humor."
The source of his fears were not just the contra
supporters whose alleged crimes he revealed, but also the U.S.
government. Carr said that while he was in Costa Rica, U.S.
embassy officials threatened to jail him if he squealed on their
contra operation in Costa Rica.
In April 1985 Carr was arrested by Costa Rican authorities
for violating the country's neutrality and sent to prison. Carr
was one of several mercenaries based in northern Costa Rica on
land owned and managed by a U.S. citizen and reported CIA
operative named John Hull. Evidence from several sources suggests
that the contras operate what amounts to a military base on
property controlled by Hull as well as an airbase for the
movement of cocaine from Columbia into the United States.
While in jail, Carr spilled the beans about the contra
operation. To reporters, he claimed that Hull had told him that
Hull was the CIA liaison to the contras and was receiving $10,000 a
month from the National Security Council to help finance the
operation. Carr told Honey why he was revealing such secrets:
"Carr said that the mercenaries had been led to believe that
their mercenary activity was sanctioned by top U.S. military and
Costa Rican officials. He was extremely bitter at having been
arrested."
Honey compiled information from Carr and other sources into
a book focusing on the role of Hull and other contra supporters in
the May 1984 assassination attempt against Pastora in Nicaragua
in which a bomb explosion killed eight people and injured
Pastora. Hull sued Honey, and her colleague Tony Avirgan, for
libel in May 1986. Carr received a subpoena to appear at the
trial, where he was to be a key witness for the reporters'
defense.
On May 16, Carr was released from jail. He later described
the events which took place in his life over the course of the
next week to Honey and an U.S. congressional aide involved in an
investigation of the arms supply network to the contras.
Carr said that Hull bailed him out of jail as a way of
persuading him to testify on Hull's behalf. Hull requested that
Carr testify that the reporters forced him to make the charges
against Hull, Carr said.
That same day, Carr said he went to the U.S. embassy to
determine why he was arrested for participating in a war that the
U.S. supports. He said he met with two officials, Kirk Kotula,
the counsel general and John Jones, the acting chief of the
consulute.
According to Honey's notes of her conversation with Carr
about his meeting with the officials, Carr said: "The officials
told me they knew all about Hull's contra operation and they had
me call him. He picked up the phone instantly, as if he had been
waiting for my call.
"They said if I go to court and testify in your behalf I'll
go to jail whether I tell the truth or not. I had no choice in
the matter. The embassy told me to get the hell out of Dodge or
I'd go back to La Reforma prison. They told me that the bus to
Panama leaves at 7:30 pm and to be on it," he said.
Carr spent the next three days staying at Honey's house. On
night of May 19, Carr left the house to visit a friend, and the
following day, the U.S. embassy told the court that Carr was in
their custody and that he would appear at the trial, Honey said.
However, Carr said on May 20, following U.S. embassy orders, he
took a bus to Panama, and with the help to the U.S. embassy
there, flew to Miami a few days later. Upon his return, Carr was
put in jail in Naples, Fla., for a prior offense.
Kotula said he had talked with Carr, but denied the he had
threatened him or forced him to leave Costa Rica. "That's not
true, at least by me. I did not threaten him with any such thing.
I couldn't do that, what would be the possible motive. I can't
put people in jail and I can't get people out of jail.
"I tried to convince Steve Carr when I first met him not to
go and join up with some bunch of guys. He was nothing but a
overgrown child who had read too many John Wayne comic books."
Jonathan Winer, an aide to Sen. John Kerry D-Mass., said
the Senator's office is investigating the matter. "There are
obviously some very serious questions regarding the U.S.
embassy's role in Steven Carr leaving Costa Rica," he said.
After Carr's return to the U.S., congressional investigators
said they had planned on bringing him before Congress. His
testimony, based on his participation on a March 6, 1985 arms
shipment from Fort Lauderdale to Ilogango Air Base in El
Salvador, would have linked Felix Rodriguez--the ex-CIA agent who
reportedly met with Donald Gregg, aide to Vice President George
Bush--to that weapons shipment, Sheehan said.
"He is the guy that can prove that the March 6
shipment of weapons that flew out of the Fort Lauderdale Airport
went to Ilopango airport," said Sheehan. "He witnessed and can
identify Felix Rodriguez as the guy who off loaded the weapons to
smaller planes which were then flown to Hull's ranch in Costa
Rica."
In early 1986, Carr and two other eye-witnesses told federal
authorities that several major players in the arms supply network
were involved in the shipment, including Tom Posey, head of the
mercenary group Civilian Materiel Assistance, Robert Owen,
reportedly a liaison to fired Lt. Col. Oliver North, and Hull,
Sheehan said.
With no criminal indictment by October, Sheehan alleged
before a congressional committee that the Justice Department had
engaged in a "willfull conspiracy...to obstruct justice....A
number of telephone calls were then placed to Mr. Kellner (the
U.S. Attorney in Miami) personally by Edwin Meese...instructing
Mr. Kellner 'to proceed very, very, very slowly' in any
investigation of this case." Kellner has said he
has talked with Meese about the case, but denied Sheehan's
allegation.
A grand jury has recently formed in Miami to reportedly hear
evidence about the March 6 weapons shipment. But the one person
who could have provided the grand jury with an eye-witness
account that the weapons were transported from U.S. soil to El
Salvador--evidence which is essential in making a case that the
U.S. Neutrality Act and the Arms Export Control Act were
violated--is now dead.
"A great deal of the information Carr provided did check
out. It will now be harder for anyone to bring a prosecution with
Steven's testimony now unavailable, and I think that is very
unfortunate," Winer said.
-----------------------------------------------------------------
e, and I think that is very
unfortunate,"

206
txt_files/contrcia.txt Normal file
View File

@ -0,0 +1,206 @@
SECRET TEAM OF WEAPONS DEALERS
by Vince Bielski
A "secret team" of former CIA and military officials and
arms dealers are responsible for the covert weapons shipments to
Iran and the contras under the direction of fired White House
aide Lt. Col. Oliver North.
Members of the "secret team" came together in the secret war
against Cuba in 1961, and have since been involved in "political
assassination" programs in Laos, Vietnam, Chile and now
Nicaragua.
The "secret team," through an association with known Mafia
leaders, has resorted to opium and cocaine trafficking to
finance their operations.
Edwin Wilson, the ex-CIA operative convicted for selling
explosives to Libya's Moammar Gadhafi, was an active member.
These allegations are part of a lengthy affidavit filed this
week in a Miami federal court in support of a law suit brought
by Dan Sheehan, an attorney with the Christic Institute in
Washington. The suit names 29 alledged operatives in the contras
arms network as defendants.
The suit alleges that the defendants supplied the C-4
explosives which were used in the May 1984 assassination attempt
against contra leader Eden Pastora in Nicaragua in which eight
people were killed and Pastora injured. The plaintiffs, Martha
Honey and Tony Avirgan, are American journalists who are sueing
for personal injuries they suffered from the bombing.
The Christic Institute, a church funded public interest law
firm, has taken on controversial cases in the past, such as the
suit against Kerr McGree Nuclear Corporation on behalf of Karen
Silkwood. And it was while Sheehan was defending a sanctuary
worker that he received information which led him
into the investigation of the contra arms supply opertation.
In March 1984, he learned from a member of the Federal
Emergency Management Agency that FEMA had a highly secret plan to
"deputize" government and State National Guard personnel for the
purpose of interning 400,000 undocumented Central
Americans in detention centers in the event that President Reagan
launched "Operation Night-train"--a military invasion into
Central America.
The plan also called for the distribution from U.S. military
bases of hundreds of tons of weapons to be used by newly created
State Defense Forces, composed of civilians, who would help
enforce the "State of Domestic National Emergency" during the
invasion. Sheehan learned from a Louisiana State National Guard
Colonel that a State Defense Force in Louisiana planned to give
half of the weapons it received to the contras.
In Miami, former U.S. military personnel and active National
Guard units had organized a para-military organization, called
Civilian Military Assistance, to arm, train and fight with the
contras. The group, headed by Tom Posey, obtained "surplus"
military equipment from the 20th Special Forces Unit of the U.S.
Army in Alabama, Sheehan learned from a member of the group.
In June 1984, Sheehan was informed a man who
working with the para-military organization in helping arm the
contras also claimed to be a "personal representative to the
Contras of...Lt. Col. Oliver North." His name is Robert Owen.
One year later, Sheehan began putting this information into
a law suit when he learned that Posey, Owen and others
were allegedly involved in the bombing of the Pastora press
conference which caused physical and personal injury to the two
American reporters.
Sheehans investigation also led him to the discovery of a
"secret team" of former high ranking U.S. officials and officers
who oversaw the procurement and shipment of weapons to the
contras to to Iran. Through Posey, Owen and other they allegedly
supplied the explosives for the press conference bombing. The
"secret team" includes former high-ranking CIA officials Theodore
Shackley and Thomas Clines, ret. Air Force Gen. Richard Secord,
ex-CIA operative Edwin Wilson, and two arms dealers, Albert Hakim
(of Los Gatos) and Rafael Quintero, both of whom are U.S.
citizens.
In the affidavit, which cites 79 seperate sources, Sheehan
said he learned of the "secret team" from a former U.S.
intelligence officer who worked in Iran, a retired CIA officer,
and a former Air Force officer.
The intelligence officer discussed "the existence of a
'secret team' of former high-ranking American CIA officials,
former high-ranking U.S. military officials and Middle Eastern
arms merchants--who also specialized in the performance of covert
political assassinations of communists...(and) which carried on
its own, independent, American foreign policy--regardless of the
will of Congress,...the President,...or the (CIA)," the affidavit
reads.
The source said the "secret team" was set up in
1977 under the supervision of Shackley and Cline, who were then
with the CIA. Wilson worked with Gadhafi "to secretly train
Libyan anti-Shah of Iran terrorists in the use of deadly C-4
explosives," the affidavit reads. Wilson's real purpose was to
gather intelligence on the anti-Shah terrorist missions, and then
pass the information to Quintero, "who was responsible for the
assassination of these Libyan terrorists,"
Wilson was convicted for his dealings with Gadhafi, and
Shackley and Clines resigned under pressure from then-CIA
director Stansfield Turner. Shackley and Clines then join with
Secord and Hakim and "went private" continuing to run their
"secret team," the affidavit reads.
This group--initially through the Egyptian-American
Transport and Service Company--was "responsible for the entire
supply of weapons...to the Contras," when the CIA wasn't directly
providing them. They began arming the contras in August 1979,
after entering "into a formal contractual agreement with
Nicaraguan dictator Anastasio Somoza" despite President Carter's
order banning the sending of weapons to Somoza, the affidavit
reads.
The CIA took over in 1981, but when the 1984 ban on U.S.
support went into effect, North reactivated the private
merchants. Quintero, operating through a Florida based
corporation named Orca Supply Company--a company earlier set up
by Edwin Wilson--saw to it that the supplies were delivered to
the contras through John Hull, a U.S. citizen, who reportedly
operates a contra base in northern Costa Rica on land he owns.
Among the delivered weapons were the explosives used in the
Pastor bombing, the CIA source said.
To fund the contras, the "secret team" resorted to the
foreign military sales scheme used in Iran in which military
equipment is bought from the U.S. government at the
manufacturer's cost and sold to Iran at replacement cost. The
profits are then laundered through front companies.
The Examiner reported in July that Secord, partners with
Hakim in Standford Technology Trading Group International, was
involved in the 1981 sale of AWACS to Saudi Arabia, in which
money from that sale financed the contra operation.
In another report, the Examiner said the weapons were also
financed by an elaborate cocaine ring involing Columbia's largest
cocaine dealers in which the drug moves from Columbia,
through Hull's land, into the U.S at a level of one ton each
week.
When the Reagan Administration decided to undertake the
secret sales of arms to Iran in 1985, it was Shackley, Clines,
Hakim and Secord whom they used to carry out the mission, the
affidavit reads.
BACKGROUND
In 1961, Shackley, a CIA station chief in Miami, and his
deputy Clines, directed the covert war against Cuba. A special
unit formed to assassinate Castro, supervised by the "Mafia
Lieutenant Santo Trafficante," included Quintero--and Felix
Rodreguez and Luis Pasada Carillo--two ex-CIA agent who
reportedly operate the contras arms network at an El Salvador air
base. Pasada was involved in the 1976 mid-air bombing
of a Cuban passenger airliner.
After the covert war activists were caught smuggling narcotics
into the U.S. from Cuba, the operation was shut down, and Shackley
and Clines were transfered to Laos, where Shackley was made CIA
Deputy Chief of Station and Clines continued as his deputy.
According to the affidavit, Shackley and Clines directed a
secret program which trained and used Meo tribesmen "to
secretly assassinated over 100,000 non-combatant village mayors,
book-keepers, clerks and other civilian bureaucrats in Laos,
Cambodia and Thailand." The operation was funded by profits from
an illegal opium trade.
A commander the political assassination program was ret.
Army General John Singlaub, who has said publicly that he is
helping arm the contras. North, a Marine Corps Major at the time,
was one of Singlaub's deputies. Also involved with Shackley in
Laos was Secord, then an Air Force General, the affidavit
reads.
In 1971, Shackley and Clines, from their post the CIA's
Western Hemisphere operations, directed the "Track II" operation
in Chile which played a role in the assassination of Chilean
President Salvador Allende, the affidavit reads.
In 1974, the two directed the Phoenix project in Vietnam,
which carried out the political assassination of some 60,000 non-
Viet Cong civilians in an attempt to cripple Vietnam's political
institutions.
"With their secret CIA anti-communist extermination program
coming to a end,...(they) started their own private assassination
business..."
--------------------------------------------------------------
) started their own private assassination
business..."
-----------------------

227
txt_files/control.txt Normal file
View File

@ -0,0 +1,227 @@
RACISM, CONTROL, AND ROCK AND ROLL
By JACOB G. HORNBERGER
Civil rights laws are among the most repugnant forms of
political control in American society. Not only are they a
severe violation of the principles of freedom, they also have
totally failed to achieve their purported end -- the
elimination of racism in America.
Few intelligent people will deny that racial prejudice is
itself morally abhorrent. And being half-Mexican, I know from
personal experience that it is not pleasant to be at the
receiving end of prejudice against Hispanics (or half-
breeds!). But does the wrongful nature of racism mean that
such social conduct should be turned over to the coercive
power of government? NO!
First, how can an individual be considered free if government
officials have the power to coerce him, through fine or
imprisonment, to associate with people with whom he does not
desire to associate? It is the essence of individual liberty
to be able to choose one's friends and associates without
interference from the political authorities.
Moreover, the bedrock of freedom is private ownership of
property. How can a person be considered free if he can be
coerced, through fine or imprisonment, into selling what
supposedly belongs to him to a person to whom he would rather
not sell? It is the essence of private ownership of property
that a person have the right to do whatever he wants with his
own property, as long as it is peaceful.
Racial prejudice, of course, has long existed in American
society. No where was this better exemplified in this century
than in the segregation laws which American politicians and
bureaucrats enforced in the 1950s. Did segregation laws
guarantee the freedom and private property rights of
individuals? On the contrary! These equally offensive forms of
political control constituted the denial of individual freedom
and private property. Why? Because they prohibited blacks and
whites, through fine or imprisonment, from voluntarily
associating with each other in many social and business
contexts.
The crucial question is: Why did the politicians and
bureaucrats believe that segregation laws were necessary? Why
didn't they simply leave people free to discriminate or not on
a purely private basis? Why did they force them to
discriminate with segregation laws? Because they knew that the
market process would impose tremendous financial costs on
racists and ultimately break down racial barriers in America.
Are there any examples of where the market, rather than the
government, has accomplished this end? Yes! One of the best
examples involves one of the most controversial activities in
20th century America: rock and roll.
The story of rock and roll has been told in many books, among
which are You Say You Want a Revolution by Robert G. Pielke
and The Story of Rock by Carl Belz. From the very beginning,
it was the music of the young, and was hated and reviled by
the old. Why? Not simply because the music itself was
distasteful to adults. The animosity against rock and roll
went much deeper than that. Rock and roll shook the
foundations of values and beliefs held dear by grown-ups in
the 1950s.
One of the most important social teachings during that time
was that blacks were inferior to whites and, therefore, that
it was unacceptable for whites to associate with blacks. The
best example of this was found in government schools. With
segregation, and the battle against integration, in government
schools, American teenagers were taught by their parents and
government officials that it was socially detestable for
whites to be with blacks.
Along came rock and roll and turned that teaching upside down.
While rock and roll had its roots in various strands of
American music, i.e., country/western and gospel, its biggest
foundation was rhythm and blues or "race music" as it was
known in the 1950s. While whites were enjoying the sweet,
innocent sounds of the Big Bands, rhythm and blues, with its
especially strong sexual overtones, predominated among blacks.
It was natural for white parents to expect their children to
pursue their same musical interests. But it was not to be.
When Bill Haley's "Rock Around the Clock" was played in the
1955 movie, The Blackboard Jungle, a story of student protest
in a government school, rock and roll became the music of
choice for American teenagers.
While parents were resisting their children's growing
love for rock and roll, teenagers were listening to it on the
radio late at night (after their parents had gone to bed).
Many well-established radio stations refused to play the new
music, but teenagers would carefully search the radio band for
the few that did. (My favorite was an Oklahoma City station
more than 500 miles from my home.)
And along came Sam Phillips, the entrepreneur par excellence,
who shook the world by looking for a white man who sang like a
black man. One day the invisible hand of the market brought
into his studio the man who would become the King of Rock and
Roll, Elvis Presley. Elvis was hated and condemned by grown-
ups. But teenagers didn't care, and Elvis became the social
phenomenon of the century. (While on our way to a national
student council convention when I was in the 9th grade, a few
of us discovered that Elvis was staying in our motel. I
knocked on his door and asked if Elvis would come out to
visit. At about midnight, Elvis Presley came down to the pool
and spent some time visiting with a few of us. It did not take
long to see that he was a great person and that what grown-ups
were saying about him was untrue.)
The white racists were furious over the trend toward rock and
roll. But not just because teenagers were rejecting their
social teaching. Well-established financial interests were
getting hurt by the market process. Radio stations which
played only the "correct" music were losing market share and,
therefore, advertising revenue.
There was also a tremendous upheaval in the record business.
Small independent record companies called "indies" were
experiencing phenomenal growth rates by producing rock and
roll records. And the well-established record companies which
concentrated on the traditional music were losing a major
share of the market.
Rock and roll was providing a vehicle by which blacks could
out-compete whites and accumulate wealth. There were numerous
success stories; among the best known was Berry Gordy, Jr.,
and his Motown Records, who produced such rock and roll greats
as The Supremes, The Four Tops, Smokey Robinson and the
Miracles, and The Temptations. Blacks were getting wealthy,
and white racists were infuriated.
The market process was also bringing whites and blacks closer
together in other ways. Buddy Holly, who created some of the
most beautiful music ever written, shocked the black audience
at the Apollo Theater in New York City. (No white act had ever
played the Apollo!) And they loved him! White teenagers were
flocking to see Chuck Berry sing "Roll Over Beethoven,"
"Maybellene," and "Sweet Little Sixteen." And, horror of
horrors, white and black musicians were even travelling
together!
The world of racial separation for which adults longed in the
1950s was disintegrating among their children. And it was
occurring not as a result of government coercion but in spite
of it.
The response of the political authorities was not amusing. In
some cases, rock concerts were banned by ordinance. Musicians
were arrested on questionable charges. But the most tragic
abuse of political power came from the United States
government which, with its payola investigation, did
everything it could to destroy rock and roll.
Payola was a practice in which record companies would pay disc
jockies to promote their records. Payola was well-known and
well-established in the music business and had been going on
long before the advent of radio. But U.S. Congressmen had not
objected when musicians in the Big Band era were paid to play
a composer's music. It was only when rock and roll became
popular among the youth of America that the politicians' wrath
came in the form of a Congressional investigation of an
activity that was harming no one.
While the political investigation cast a wide net over rock
and roll, its ultimate brunt was felt by Alan Freed, a disc
jockey who was the first to coin the term "rock and roll."
Freed was one of the earliest and most successful promoters of
rock and roll, is generally recognized as the "Father of Rock
and Roll," and appeared in the rock and roll movie, Rock
Around the Clock. But all that ended with the Congressional
attempt to destroy rock and roll. In one of the ugliest abuses
of political power in American history, U.S. Congressmen
brutalized and butchered Alan Freed. He died a broken man in
1965 at the age of 43.
But the politicians and the racists, despite their fervent
hopes and valiant efforts, have never been able to destroy
rock and roll and its wonderful influence on American culture.
Reliance on the market, rather than government, to break down
racial barriers ensures that the costs of racial prejudice are
self-imposed rather than externally imposed. If the racist
radio station owner, for example, chooses not to play the
music of blacks, he foregoes the advertising revenue which
could be used to improve the lot of his family. He bears the
cost which his racial prejudice has induced him to impose upon
himself!
The market process also enables racists to vent their
prejudices by engaging in discrimination. Denying them this
opportunity does not eliminate the racism under which they
suffer; instead, it compresses it in a "pressure cooker" which
ultimately is bound to explode.
Rock and roll has been one of the most revolutionary cultural
phenomena in American history. It has produced some of the
world's most beautiful music. Of course, not all of its music
has been popular but that is the essence of a free society --
the legal protection of those peaceful activities which the
majority dislike.
But rock and roll did more than just contribute to the musical
heritage of the world. It also sent deep and profound quakes
through some of the most wrongful beliefs of American adults.
The social upheaval began with challenges to racial prejudice
but it did not end there. A few years later, appeared an
individual named Boy Dylan, one of the world's greatest poets
and ironically a product of America's government schools.
Through the message of his music, Dylan pierced the conscience
of a generation during the most controversial war in American
history.
Mr. Hornberger is founder and president of The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the October 1990 issue of FREEDOM DAILY,
Copyright (c) 1990, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.

115
txt_files/corpdem.txt Normal file
View File

@ -0,0 +1,115 @@
Subject: Corporate buyout of the Democratic Party
******************************
>From the SF Examiner, Monday July 20, 1992.
Jeff Cohen and Norman Solomon (Jeff Cohen is founder
of FAIR, a media watchdog group; Norman Solomon is
a media critic.)
The Takeover of the Democratic Party
Thousands of journalists covered the Democratic National
Convention here. Almost all of them missed the biggest
story.
The story wasn't missed because it happened in the shadows
of in some smoke-filled back room. It was bypassed because of
ideological binders worn by so many in the conformist press.
The big story was the takeover of the Democratic Party by
big business.
Of course, the Democratic Party has always included hefty
doses of corporate interests. But in past years, they were
one of many competing forces in the party, along with
representatives of labor, minorities, senior citizens, women
and others.
The significance of this convention is that corporate America
has taken undisputed control - at least for now - of both major
political parties, not just the GOP.
How did so many in the political press corps miss the story?
Most establishment journalists seem blind to the fact that
corporations are thoroughly political institutions, seeking
ever-increasing influence over parties, legislation and government
regulation. (These businesses are, after all, the folks who
underwrite the news with their advertising.)
In political reporting, corporations are treated as benign, neutral,
invisible. Their political maneuvers are generally not news.
It's not that journalists are oblivious to political wheeling and
dealing by various groups. In the days before the convention,
political reporters scrutinized teachers unions, black activists,
senior-citizen groups, feminists, gay-rights advocates - denigrating
them as ``special interests'' who could ruin ``Clinton's convention''
by ``alienating middle-class voters.''
With so much media focus on these relatively powerless grass-roots
groups, powerful corporations - the country's REAL special
interests - ran off with the party.
ITEM: Two days before the convention, a ``Victory Train'' carried
congressional Democrats from Washington to New York. Accompanying
the party elite on the train ride were corporate lobbyists who
paid $10,000 to $25,000 for the right to mingle and shmooze.
The Democratic National Committee has been raking in money from
virtually every corporate interest needing a government
favor. The message to anti-poverty or consumer-rights activists:
No need for you to come on board. You can wait at the station.
ITEM: The Clinton-Gore ticket represents the seizure of the
party hierarchy by the Democratic Leadership Council, which
is typically euphemized in the media as a group of
``moderate'' Democratic politicians who want the party to
``speak for the middle class.'' (Clinton and Gore were
founders of the DLC; Clinton was its chair in 1990-91.)
The problem is that the DLC has no middle-class constituents.
It is bankrolled by - and speaks for - corporate America:
ARCO, Dow Chemical, Georgia Pacific, Martin Marietta, the
Tobacco Institute, the Petroleum Institute, etc.
ITEM: Clinton became the media-designated ``front-runner'' in
large part because he raised so much money early in the
campaign. The cash didn't come from middle-class folks.
As reported by the weekly In These Times, most of it
came from conservative business interests; investment
bankers, corporate lobbyists and Wall Street firms which
fund both major political parties.
ITEM: Two of Clinton's key fund-raisers were Robert Barry,
a longtime General Electric lobbyist, and Thomas H. Boggs
Jr., who ears $1.5 million a year as a lawyer-lobbyist
for the Washington firm of Patton, Boggs, and Blow.
Boggs' parents were members of Congress; his sister is
media pundit Cokie Roberts. His law firm boasts a computer
program that matches corporate donors with Congress members
who seek his help in raising money; a match depends on what
legislation is pending before Congress.
ITEM: The Boggs law firm also boasts partner Ron Brown,
chair of the Democratic Party. Some pundits have suggested
that since Brown in an African-American, the Clinton-Gore
ticket has less need of Jesse Jackson to mobilize the
black vote in November. But Ron Brown is far more familiar
with corporate boardrooms and government corridors than
grass-roots organizing. His clients have included an
array of U.S. and foreign business interests, as well as
the regime of Haitian dictator Jean Claude Duvalier.
When Jerry Brown spent his campaign denouncing
``Washington sleaze,'' he was referring to these kinds of
cozy corporate-government relations.
But mainstream media have demonstrated far less animus
toward corporate influence than toward Jerry Brown, who
was routinely described by journalists covering the
convention as ``disruptive,'' ``egotistical'' and a
``party pooper.''
Aided by this media slant, corporate insiders are
laughing all the way to the bank.
*******************************************
This is the real problem with our "democracy" - the voters have
very little influence over the choices. Those decisions have
already been made for us. We should feel glad about it, now
we don't have to make the difficult decisions...

140
txt_files/cotd9311.txt Normal file
View File

@ -0,0 +1,140 @@
Subject: Conspiracy for the Day -- November 3, 1993
From: bfrg9732@uxa.cso.uiuc.edu (Brian F. Redman)
Date: 3 Nov 1993 00:02:07 GMT
Conspiracy for the Day -- November 3, 1993
=============================================
("Quid coniuratio est?")
-!---------------------------------------------------------------
The Search for the "Manchurian Candidate":
The CIA and Mind Control
by John Marks
[Excerpts]
By the 1950s, most "Americans knew something about the famous
trial of the Hungarian Josef Cardinal Mindszenty, at which the
Cardinal appeared zombielike, as though drugged or hypnotized.
Other defendants at Soviet 'show trials' had displayed similar
symptoms as they recited unbelievable confessions in dull,
cliche-ridden monotones. Americans were familiar with the idea
that the communists had ways to control hapless people, and [the
term 'brainwashing'] helped pull together the unsettling evidence
into one sharp fear."
Many Americans "saw the confessions as proof that the communists
now had techniques 'to put a man's mind in a fog so that he will
mistake what is true for what is untrue, what is right for what
is wrong, and come to believe what did not happen actually had
happened, until he ultimately becomes a robot.'"
"Given the incontrovertible evidence that the Russians and the
Chinese could, in a very short time and often under difficult
circumstances, alter the basic belief and behavior patterns of
both domestic and foreign captives, [it was argued that] there
must be a technique involved that would yield its secrets under
objective investigation."
Harold Wolff and Lawrence Hinkle "became the chief brainwashing
studiers for the U.S. government... Their secret report to [CIA
chief] Allen Dulles, later published in a declassified version,
was considered the definitive U.S. Government work on the
subject."
"The CIA built up its own elaborate brainwashing program
[which]... took its own special twist from our national
character. It was a tiny replica of the Manhattan Project,
grounded in the conviction that the keys to brainwashing lay in
technology. Agency officials hoped to use old-fashioned American
know-how to produce shortcuts and scientific breakthroughs... The
Agency's brainwashing experts gravitated to people more in the
mold of the brilliant -- and sometimes mad -- scientist."
CIA officials began to look for scientists and guinea pigs. "Some
of their experiments would wander so far across the ethical
borders of experimental psychiatry (which are hazy in their own
right) that Agency officials thought it prudent to have much of
the work done outside the United States."
Montreal hospital. One of Cameron's projects was an attempt to
"depattern" experimental subjects. "Cameron defined
'depatterning' as breaking up existing patterns of behavior... by
means of particularly intensive electroshocks, usually combined
with prolonged, drug-induced sleep... Cameron claimed he could
generate 'differential amnesia.' Creating such a state in which a
man who knew too much could be made to forget had long been a
prime objective [of CIA] programs."
Cameron's depatterning "normally started with 15 to 30 days of
'sleep therapy.' As the name implies, the patient slept almost
the whole day and night. According to a doctor at the hospital
who used to administer what he calls the 'sleep cocktail,' a
staff member woke up the patient three times a day for medication
that consisted of a combination of 100 mg. Thorazine, 100 mg.
Nembutal, 100 mg. Seconal, 150 mg. Veronal, and 10 mg. Phenergan.
Another staff doctor would also awaken the patient two or
sometimes three times daily for electroshock treatments... In
standard, professional electroshock, doctors gave the subject a
single dose of 110 volts, lasting a fraction of a second, once a
day or every other day. By contrast, Cameron used a form 20 to 40
times more intense, two or three times daily, with the power
turned up to 150 volts."
"The frequent screams of patients that echoed through the
hospital did not deter Cameron or most of his associates in their
attempts to 'depattern' their subjects completely. Other hospital
patients report beinng petrified by the 'sleep rooms,' where the
treatment took place, and they would usually creep down the
opposite side of the hall."
"The Agency sent the psychiatrist research money to take the
treatment *beyond this point*. Agency officials wanted to know
if, once Cameron had produced a blank mind, he could then program
in new patterns of behavior, as he claimed he could. As early as
1953 -- the year he headed the American Psychiatric Association
-- Cameron conceived a technique he called 'psychic driving,' by
which he would bombard the subject with repeated verbal
messages."
The CIA continued to fund Cameron's research. Then, in 1964, he
retired abruptly. "His successor, Dr. Robert Cleghorn, made a
virtually unprecedented move in the academic world of mutual
back-scratching and praise. He commissioned a psychiatrist and a
psychologist, unconnected to Cameron, to study his electroshock
work."
"The study-team members couched their report in densely academic
jargon, but one of them speaks more clearly now. He talks
bitterly of one of Cameron's former patients who needs to keep a
list of her simplest household chores to remember how to do
them... He continues, 'I probably shouldn't talk about this, but
Cameron -- for him to do what he did -- he was a very
schizophrenic guy, who totally detached himself from the human
implications of his work... God, we talk about concentration
camps. I don't want to make this comparison, but God, you talk
about ''we didn't know it was happening,'' and it was -- right in
our back yard.'"
"It cannot be said how many -- if any -- other Agency
Details are scarce, since many of the principal witnesses have
died, will not talk about what went on, or lie about it. In what
ways the CIA applied work like Cameron's is not known. What is
known, however, is that the intelligence community, including the
CIA, changed the face of the scientific community during the
1950s and early 1960s by its interest in such experiments."
-!---------------------------------------------------------------
Today's conspiracy brought to you by.......
Brian Francis Redman
...................................................
: Aperi os tuum muto, :
: et causis omnium filiorum qui pertranseunt. :
: Aperi os tuum, decerne quod justum est, :
: et judica inopem et pauperem. :
: -- Liber Proverbiorum XXXI: 8-9 :
:.................................................:
(bfrg9732@uxa.cso.uiuc.edu) (72567.3145@compuserve.com)

946
txt_files/cowtown.txt Normal file
View File

@ -0,0 +1,946 @@
THE COWTOWN CONNECTION
by
M. Duke Lane
(CIS ID: 76004,2356)
Harold Weisberg once said about his Whitewash works that "there are no
theories in my books... they're factual."[1] The sentiment about factuality
has been echoed by many respectable researchers, who insist that "the Kennedy
case ought to be treated as a homicide, which is what it is." Aren't we
pressing for a final, legal investigation of the JFK murder to view all of
the evidence, new and old, holding it to the constraints of our legal system?
A common refrain, after all, is that the Warren Commission's investigation
and "conviction" of Lee Oswald would never have held up in a true adversarial
judicial proceeding.
Interestingly, we don't seem to hold ourselves to the same constraints. If
one researcher discovers something, even in error, we are apparently
permitted to cite that person's work, without certification, as established
fact. Many people complain when their own theories are held up to the same
critical light as we hold the official investigations, as if we aren't
beholden to the same burden of proof we assign them.
There has even been recent argument on both sides of this issue regarding
whether researchers' conclusions ought to be held up to critical peer review
or whether we should be allowed to follow our intuition and reach reasonable
conclusions... which can't be anything more than speculation, by
definition.[2] That we accept such speculation and/or incomplete
investigation as "fact" is exemplified by Robert Morrow's recently published
First Hand Knowledge (FHK),[3] in which he suggests that an apparent CIA
operative was detained in Fort Worth only a couple of hours after Kennedy's
assassination.
FHK is, by most people's estimation, a reprint of Morrow's earlier Betrayal,
this time, however, naming names and adding new information. One piece of
this "new information" is that an "unidentified suspect" taken into custody
in Fort Worth, 30 miles west of Dallas, was, in fact, David Atlee Phillips, a
former CIA operative who was based in Mexico City while Lee Harvey Oswald was
purportedly visiting Soviet and Cuban embassies in that city, and/or the
"Maurice Bishop" character said to be Cubans refugees' CIA contact for the
Bay of Pigs operation. What, the reader must wonder, was this man--of all
people--doing in that place at that time? This is information with curious
implications indeed!
As evidence of Phillips' apparent complicity in the murder, Morrow includes a
photo of Phillips beside the House Assassinations Committee's sketch of
"Bishop," which many researchers agree look strikingly similar. The photo is
included with the Phillips and "Bishop" pictures. The man, Morrow asserts,
bears an "uncanny resemblance" to Phillips/Bishop. Even while the angles of
the men's faces are different, making a direct comparison difficult if not
impossible, there does indeed appear to be a resemblance between them.
What was Phillips/Bishop doing in Fort Worth? The reader is left to wonder,
for Morrow cites Gary Shaw and Larry Ray Harris' Cover-Up[4] to state that no
record of this man's arrest exists and, in fact, the negatives of the
pictures taken of the arrest have disappeared from the files of The Fort
Worth Star-Telegram. Who but the government could manage such an obvious
cover-up, one must wonder. Who indeed?
Since I live near Fort Worth, I decided to look into this. This article will
take the reader roughly through the steps of my investigation into this
question. In the end, we will find that not only was Morrow "reaching," but
also that previous information was incomplete at best. While I cannot
possibly clear Phillips from any sort of involvement in the Bay of Pigs
episode or the Kennedy hit, it is quite clear that he was NOT the man in the
photo Morrow uses to implicate him. This is perhaps an abject lesson for the
reader not to take everything he reads at face value, no matter what the
credentials of an author may seem to be....
Let us pause for a moment to consider Morrow's works. Morrow, as we know,
claims to be a former CIA contract agent who supposedly delivered four
Mannlicher- Carcano 7.65mm rifles to David Ferrie for what he later
determined to be the JFK assassination, one of which he says he kept. In both
FHK and Betrayal, he discusses the purchase and delivery of these rifles to
Ferrie, who of course, cannot confirm or deny Morrow's allegation since he is
dead. Nor can Morrow's CIA connection be affirmed or refuted; we have no
choice but to either take the man at his word or not, since it is impossible
to prove one way or the other. That is simply the nature of the beast.
Likewise, we can either believe or disbelieve his accounts of the various
newly-named people's involvement in the planning, execution and/or cover-up
of the assassination. Certainly, the dust jacket overview and the author's
own preface to his new book paint a reasonably credible picture of the man
who claims to have "first hand knowledge" of the assassination. Knowing,
however, that there is no statute of limitations against prosecution in a
murder, how is it that Morrow can publicly come forward with an admission of
having participated in the most notorious murder of our time? Even aside from
prosecution, surely one must wonder at what repercussions he might suffer at
the hands of those whom he names as his accomplices, including the CIA.
These questions are handled adroitly enough even before the reader reaches
the book's introduction. "Mr Morrow," the dust jacket states, "has now come
forward with the truth because he believes the danger to his family is
reduced due to the impending release of the Congressional files on the
assassination," thereby assuring us that Morrow doesn't expect to become
another "mysterious death."
But what of the others he names? His own preface makes this clear: "More than
half the characters about to come to life on these pages have already been
put to death, tortured, exiled or silenced in strange and horrible ways."
They are either dead or otherwise will not rise to their own defense against
Morrow's accusations. It is worthwhile to note that David Atlee Phillips is
among the former, having died of cancer at his Arlington, VA, home on July 7,
1988.[5] He will not be stepping forward to clear his name, nor will Tracy
Barnes, another of the people Morrow names in FHK and who is also dead. The
rest of the "more than half" of Morrow's characters will likewise not be
coming forward to correct the record and provide true facts since they've
either been "put to death, tortured, exiled or silenced in strange and
horrible ways." The other half, we may reasonably conclude, have but bit
parts in Morrow's narrative, and aren't connected with the assassination, and
so have nothing to "fear."
Returning to the question of Phillips (or Bishop) having been arrested in
Fort Worth, we must bear these factors in mind. Gary Shaw and Larry Harris
have already told us that no record of the arrest exists and that negatives
of the photographs taken of this man have "disappeared" from the
Star-Telegram's files. Morrow has only added to the mystery by connecting the
CIA to this man, a factor which can apparently not be proven nor disproven.
Or can it?
Tom Tilson Tells Tall Tales
===========================
One of the first things I was curious about was whether this arrest had any
connection to the black sedan chase so often related to the events in Dealey
Plaza. This connection was bolstered by an article which appeared the day
after the assassination in The Dallas Morning News which told of a man having
been arrested in Fort Worth because he was said to be driving a car "linked
to the slayer."[6] Fort Worth was the apparent destination of the driver of
the black sedan headed westbound on the DFW Turnpike and chased by an
off-duty Dallas policeman.
This incident was first reported by Earl Golz in The Dallas Morning News[7]
nearly twenty years after the fact, and repeated by Jim Marrs in
Crossfire,[8] to which the reader is referred for additional information. In
addition, rumblings of a car having been found abandoned in Fort Worth later
in the day_naturally tied to the "black car chase"_raised even more
interesting possibilities. Was the man in the FHK photo the same one who
off-duty officer Tom Tilson chased from Dealey Plaza, and who may
subsequently have abandoned the car before having been arrested?
Unequivocally not. To begin with, it is apparent that there never was a car,
black or otherwise, where Tilson claimed he initially saw it. His interview
with Golz clearly states that he was driving along Commerce Street just
beyond the Stemmons Freeway bridge but not yet as far as the Triple Underpass
(the railroad bridge) when he saw a man run down the bridge abutment, toss a
long object (a rifle?) into the back seat, run around to jump into the
driver's seat and take off.
According to his daughter who was riding with him, "seconds before she saw
the fleeing man, the presidential limousine had just sped past his parked car
on the grass... and the limousine was turning onto Stemmons Freeway."[9] This
time roughly corresponds to the time that Mel McIntire took two photographs
of the limo emerging from under the railroad bridge and, shortly thereafter,
the Secret Service follow-up car turning onto Stemmons.[10] In neither photo
is there a "parked car on the grass." With the rest of the motorcade still in
Dealey Plaza, it is impossible that a car could have gotten to that spot in
time for Tilson to have seen it before passing under the Triple Underpass. It
simply wasn't there.
Moreover, photographic evidence belies Tilson's claim that "everyone was
jumping out of their cars pulling up on the median strip" in the plaza as he
saw the man running down the abutment and jumping into his car.[11] Of the
many photographs taken in DP, none show "everyone... jumping out of their
cars [and] pulling up on the median strip," and none show cars parked on the
median even long after the motorcade had left the plaza, much less when
Tilson claims they were (before the press bus had even reached the
Underpass). Obviously, Tilson has never looked at any pictures of the
assassination and aftermath before.
If that doesn't prove the lie, then consider that the Dallas Police
Department (DPD) recorded and investigated, however cursorily, quite a number
of reports about suspicious cars in the Dallas area that afternoon.[12] Yet,
according to Tilson, his own compatriots decided to ignore his report because
"if you didn't have a big white hat on, they didn't even want you in the
office."[13] Does it make sense that detectives will credit and investigate
reports from ordinary citizens, yet ignore one from "one of their own?"
Also, is it credible that a fleeing assassin would drive a dozen or so blocks
through city streets to get on a highway when there was and is an entrance
ramp onto the same highway, going in the same direction, within 100 yards of
where his car was supposedly parked and immediately to the left of the
Stemmons Freeway entrance taken by the motorcade? I think not.
If Tilson's story is a fabrication, however, that doesn't preclude that a car
was found abandoned in Fort Worth, and in fact, one was. Almost by accident,
I met a retired Fort Worth police officer, WD Roberts, who had called in a
report of an abandoned and presumably stolen car only a few minutes after the
time that Kennedy was being shot thirty miles away.[14]
Officer Roberts, who is now retired from the force, was on patrol in the
Riverside section of east Fort Worth and had come across the vehicle. He
called it in to the dispatcher at about 12:45 to 1:00. (It was later
determined to have been stolen in Houston the previous week.) Roberts is
certain that the car was not black (ergo not related to Tilson's "black
sedan"), but only recalls it as being "a light color, perhaps even
two-toned." Since it had been parked there for a number of days, we can
reasonably conclude that it was not related to the JFK murder, thereby
removing it from consideration in relation to the arrest in question.
If At First You Don't Succeed...
================================
Between the apparent fact that Tom Tilson's black sedan never existed and
that the car found abandoned in Fort Worth wasn't connected to this
pseudo-event, it was quite certain that this avenue of inquiry would not lead
to a conclusion about the photo in FHK. Who, then, was the man in the photo,
and what could be learned about him? After all, he could be just about
anyone: how can an unidentified man be found thirty years later from his
image that is bound to have changed in the interim? There are more than two
million people in the Dallas-Fort Worth metroplex; where and how do you begin?
As anyone can see, there are in fact two men in the photograph: the
"unidentified suspect" and a police officer. Since nobody'd had any luck
finding out about the arrest from official files, I reasoned, the next-best
way would seem to be to find out what the arresting officer could remember.
And if you're trying to find out who a cop is, who're the best people to ask?
Naturally, other cops who may have worked with him. I decided to check with
Fort Worth police.
Identifying the officer in the photo proved not as easy as I'd thought, since
in the course of less than two hours, I'd gotten no less than four "positive
identifications" of the man from nearly a dozen of his fellow officers,
including the Assistant Chief of Police. Only one of them, as it turned out,
was correct. This should be instructive to anyone who attempts to identify a
person based upon the recollection of only one or two of his
contemporaries... even if they're trained observers, as police are frequently
termed.
The officer who found the abandoned car mentioned earlier, WD Roberts, also
turned out to be the arresting officer in the case of Donald Wayne House,
which many readers are familiar with. For the sake of those who aren't and
for putting Roberts' observations and impressions on the record (since
nobody's ever asked him about this before), we'll once again depart our main
focus on the FHK photo to recap the story of this arrest; interestingly, it
will lead us directly back to the photo.
In addition to the brief mention of the "2-city manhunt" in The Dallas
Morning News on the morning after the assassination, there was one (and only
one) other account of someone being arrested in Fort Worth. It appeared in
The Fort Worth Star-Telegram the day after the assassination, and related
that a 22-year-old man had been picked up as a possible suspect in the
assassination of President Kennedy.[15] While it didn't identify the man by
name, it did indicate that he was from Ranger, a small town southwest of Fort
Worth. It also identified the arresting officers (WD Roberts and BG Whistler)
and noted that the man had been arrested in the 3400 block of East Belknap
Street in the city.
Reconstructing this arrest from a variety of sources, it happened something
like this:
On the morning of November 22, Donald Wayne House left his home in Ranger, TX
bound for Mesquite (a Dallas suburb) to visit an old Army buddy, Randall
Hunsaker.[16] He had parked his car in a lot on Commerce Street at about
10:30[17] and called Hunsaker, who was apparently not home. Hearing that JFK
was due to ride through downtown, he decided to get a glimpse of Kennedy,
whom he says he had long admired.[18] After the motorcade had passed, he
headed toward Fort Worth on the DFW Turnpike to visit a cousin.[19]
Along the way, House says he stopped for gas at a station in Grand Prairie,
where two women who had heard about the assassination asked him if he knew
anything more about it. House told them that he'd heard the alleged
assassin's description, which he then related to the women. The description
he gave them of Oswald describes House as well, a resemblance that can be
clearly seen in photos taken of him that day except that House is much
shorter than Oswald.[20] It is also possible that the women had heard the
description themselves and felt that House matched it closely enough to
arouse their suspicions.
One of the two women he spoke with was apparently the "Mrs Cunningham"
identified in Dallas County Deputy Sheriff JC Watson's report who called the
Grand Prairie PD after House had left the filling station. The Grand Prairie
PD then notified the Dallas County sheriffs, who in turn made a general
broadcast including his description and that of his car and its license plate
number at 1:35 pm. A "short while" later Tarrant County officials notified
sheriffs that the car and driver had been taken into custody.[21]
The green and white Ford was heading westbound on the DFW Turnpike toward
Fort Worth.[22] At about the same time or just shortly after the Sheriff's
broadcast had gone out, FWPD officer WD Roberts had pulled into the Shady
Oaks Drive-in on Riverside Drive just after having called in his report of
the abandoned car. While waiting for a cup of coffee, he happened to glance
in his mirror and noticed the car going by. He took off after it, leaving the
carhop standing there with his order in hand.[23]
Roberts called into FWPD dispatch to verify House's license plate number, and
because he was driving an underpowered cruiser, he also requested assistance
in case the driver attempted to evade him.[24] Officer BG Whistler, who was
patrolling an adjoining sector, sped to his assistance and met up with him a
short distance away at the "Five Points" intersection of East Belknap and
Bonnie Brae;[25] officer BL Harbour also fell in behind Whistler.[26] Upon
seeing he had assistance, Roberts notified dispatch that he was going to
"curb" the car.[27]
Roberts pulled around House and forced him to pull over in the 3400 block of
East Belknap Street near Sylvania Park; Whistler came up behind House, got
out of his squad car, and trained his shotgun on House, telling him to get
out of the car and keep his hands where they could be seen. Roberts frisked
him and put him in handcuffs before putting him in the back of Whistler's
car. By this time (shortly before 1:57 pm CST, the time on House's arrest
report[28]), a number of other officers had also arrived, including Lt
Lawrence Wood who immediately took charge as the ranking officer. Harbour
joined Whistler in the latter's car and the two transported the prisoner to
city hall where they were photographed by newsmen.[29] Wood accompanied these
officers to city hall on his motorcycle[30] while Roberts remained behind to
secure the scene and inventory the vehicle.[31]
All of the officers involved described the arrest as "odd" because, during
all of this time, House never said a word. Roberts in particular thought so,
and "couldn't imagine how you could pull a man out of his car, frisk him,
handcuff him and put him in the back of a patrol car in a matter of just
seconds, all the time with a shotgun aimed at him and he never even asked why
he was being arrested!"[32]
Roberts' account was confirmed by Whistler, who added that Lt Wood had
instructed them not to ask House any questions or make any statements to him,
but to "leave that to the Feds," who had apparently been notified to meet the
officers at city hall.[33] House's arrest report also indicated that "the
subject never once appeared nervous and in fact he was unusually calm," and
that he had never asked the officers why he was being arrested or taken into
jail.
Among the police, only Wood's account differed. He told a reporter that House
was "hysterical" and that "the guy stuttered, he was so scared he couldn't
get a single word out, no matter how long he tried,"[34] descriptions the
arresting officers adamantly denied. In Wood's defense, however, that
recollection was nearly twenty years old by the time it was made.
(House's own account of it, published ten months after his arrest, says that
he'd asked why he was being arrested and was told by officers "You're being
arrested for the assassination of President Kennedy,"[35] which also
contradicts the officers' statements. I consider this to be a relatively
minor point since House was "in the spotlight" during the interview and may
have tended to meld details. He was undoubtedly told at some time why he'd
been brought in; whether it was before or after he arrived at city hall seems
more a matter of how he told the story than how it actually happened.)
Another oddity, Roberts recalled, was that House's car was "absolutely
spotless, there wasn't even a slip of paper in the glove box," although he
found an empty dynamite box in the trunk, which House claimed to have been
using as a tool chest[36] (Wood, in his account, said that "we found several
boxes of dynamite in the back seat,"[37] which the arresting officers also
disputed). Roberts was surprised to learn that House supposedly junked the
car a short while later[38], saying that he couldn't imagine why he did since
the car was "immaculate."
House was transported to city hall (which also housed police headquarters at
the time) by Officers Whistler and Harbour, and photographs[39] show the two
taking him inside. House was then put in the "shakedown" room and searched,
where the only belongings that were recorded having been taken from him was a
wallet containing $23 in cash and a knife.[40] According to House, he was
interrogated by federal officers for three hours and remained alone in his
cell for another hour before being cleared and released,[41] although the jail
report indicates the time was slightly shorter.[42]
Another apparent "oddity" came up when Roberts also recalled that, when he
arrived at city hall later in the day, he had gone to the chief's secretary
to dictate his report. About midway into his report, he says, the chief came
in and told him "not to bother" completing his report, that the man had
already been cleared by the Feds.[43] Whistler also did not recall writing a
report, corroborating Roberts' memory.
Again, there is nothing "sinister" about this. The official record of federal
agents interviewing him exists, and was published by the Warren
Commission.[44] I was also able to find an arrest report for House on file
that was compiled from "information from" the two arresting officers and BL
Harbour (who is now deceased). It was typed by a clerk and filed; it was not,
however, signed by the officers which is why I believe they don't remember
having filed it since, in reality, it was typed and filed after they'd
recounted the details of the arrest to the clerk. Considering the commotion
of the afternoon, it is hardly surprising that this occurred.
A Second Arrest in Fort Worth
=============================
While there is a relative wealth of information about Donald Wayne House
available, as we've already learned, nothing was known about the second man
who is pictured in FHK. As I've already noted, in Cover-Up, Shaw and Harris
relate that "a second Fort Worth arrest was made at the same time House was
taken into custody, but other than photographs from The Fort Worth
Star-Telegram, there is no record of the arrest." They continue that
"negatives of these photos [which include the one that appears in FHK and
also in Cover-Up] are now missing from the newspaper's files."[45] Morrow
added his opinion that the man looked like someone associated with the CIA
and/or the Bay of Pigs operation. It all sounds very mysterious, almost
sinister.
None of the newspaper articles around that period provide any indication of
who this man was, and no account of this second arrest appeared in any of the
local papers. None of the photos were published by local newspapers, although
there were at least four other photos taken of him in addition to the one in
FHK. A second picture, which appears in Cover-Up,[46] shows the man being
taken from the FWPD patrol car by Lt Wood, and a third on file at the
Star-Telegram offices depicts him being led by Wood and another officer (the
same one in the FHK photo) into city hall; two others show the back of the
man and the arresting officers as they entered the building.
Neither of the two photos in Cover-Up (one of which is the one in FHK) were
taken by Star-Telegram photographers, which explains why the negatives are
not on file there. Most likely, they were taken by its rival newspaper, The
Fort Worth Press, which ceased printing in May 1976 (although a new weekly
paper has been recently started under the same banner). The Star-Telegram, as
Shaw noted, no longer has all of the negatives of the photos they had taken,
but I was able to find photos on contact sheets (positives made directly from
the film strips) there, and most did indeed have negatives available. The
photo archives of the Press are said to be in private hands, so I have as yet
been unable to view whatever remains of them.
Some people have suggested that the Star-Telegram's negatives may have been
removed by the FBI as part of its official investigation, but there is no
evidence that this is the case. Some Star-Telegram staffers thought this
might be so, but the director of the photo archives told me that it is much
more likely that the photographers did not turn them all in, or removed them
after realizing that they may have some historical value. "We don't polygraph
them to make sure they do," he said. In any case, they were not removed by
any official body as part of either an investigation or a cover-up, nor most
certainly, to protect David Phillips.
While negatives are not available for a number of photos, there is nothing
particularly noteworthy about the ones that are missing versus those that are
not. In my estimation, it doesn't appear there is any cause to claim a
cleanup of "incriminating" photos, and certainly not with regard to this
particular arrest, since, as we shall soon see, the man had nothing to do
with either the assassination or the government. The photos on the contact
sheets can generally be viewed by the public on request, although it isn't
always easy to get copies of them.
The contact sheets turned out to be the solution to the question of who the
officer in the FHK photo actually was since, in one of the photos, I was able
to read the name plate on one of the men in one of the contact sheet photos:
it read "HW Sinclair," one of the four officers named by his associates.
After making a number of phone calls, I was able to locate Sinclair, and
phoned him an arranged to visit with him at his home in rural East Texas. Now
retired and raising cattle, he doesn't seem to have aged much in the past 29
years and looks very much the same as he did the day the photo was taken.
Both he and his wife positively identified him in the FHK photo, and also
identified Lt Lawrence Wood as the man with him in a photocopy I'd been able
to make of a Star-Telegram photo showing both officers.
(Two of the other officers who had been identified later called me and
identified Sinclair as well. It is also worth noting that, in head-on photos
of the man in custody, the similarity between him and "Maurice Bishop" and/or
David Atlee Phillips is no longer evident. One such photo can be seen in Shaw
and Harris' Cover-Up,[47] and another is on file at The Fort Worth
Star-Telegram.)
Sinclair is a private man and wouldn't allow our interview to be taped. He
was, however, very forthcoming in his recollections of that period. In
addition to arresting the man in the picture, Sinclair had also performed
security at Miller's Funeral Home while Lee Oswald was being prepared for
burial, and also at Rose Hill Cemetery when Oswald was buried. He also
pointed out that FWPD kept a guard at the gravesite for many months following
Oswald's burial, citing various threats of people digging up the body and
dragging it through the streets of the city.
It was a quirk of fate that got Sinclair involved in these events. Since he
had joined the force in 1956, he had been assigned as a patrolman in the
detective division, investigating fraud in plain clothes. Sometime in
mid-1963, however, someone decided that all patrolmen were to be assigned to
the Patrol Division, so Sinclair donned his uniform and patrolled the
streets. In January 1964, Sinclair was named the Patrol Division Officer of
the Year for 1963, and promoted to detective. He returned to plain clothes
and was assigned to the Homicide Division for the remainder of his years with
FWPD.
Sinclair remembered the arrest having taken place in the Riverside area on
the east side of Fort Worth, although he couldn't recall the exact location.
He had assisted two officers who he thought were on motorcycles to transport
the prisoner to city hall. "There were a lot of cops there," he said, adding
that he had arrived after the other officers. Lt Wood, whom Sinclair
diplomatically said was "not shy of the media," appeared "out of nowhere"
when he arrived at city hall with the prisoner. (In fact, Wood was already at
city hall, having escorted officers Whistler and Harbour with Donald House
from the arrest scene. In the NBC film footage, Wood can be seen alighting
from his motorcycle in front of the police cruiser) Wood then helped Sinclair
take the man out of the patrol car and escorted him into city hall. Wood is
also pictured taking the man out of the cruiser's front seat in one of the
photos in Cover-Up,[48] and it is his fingers that can be seen at the
prisoner's right elbow in the FHK photo.
Because he had merely assisted in the arrest, Sinclair did not believe that
he had filed an arrest report, that duty falling to the actual arresting
officers, whom Sinclair recalled having stayed behind to secure the arrest
scene and inventory the vehicle the man had apparently been stopped in. He
says he may have filled in a "call sheet," but later investigation found that
these are only kept for six months before being destroyed, so if he had, it
is no longer available. Beyond these facts and his recollection that it was
the only time in his career that he had loosed the shotgun officers carried
in their cruisers, he couldn't remember anything particularly striking about
the arrest and he was unable to remember what the man's name might have been.
He noted that Wood is now deceased, and that he didn't know who the arresting
officers might have been.[49]
The Unidentified Man
While I had successfully identified the officer in the picture, I was still
no closer to learning who the man in custody was or why he been detained.
During my many meetings with current and retired FWPD officers, however, I
had been referred to a number of others who may have had some information
regarding the case. One of these men was assigned as an officer to the
Identification Division in 1963, where he continues to work today as a
civilian employee (his associates consider him to be "the best fingerprint
guy you can find anywhere"). Sinclair thought that this individual may have
been working the afternoon of the arrests, and could provide some useful
information.
As it turned out, he had worked the evening shift on November 22, and thus
had no details of the arrest. However, he thought there might still be a
record of it on file, but shortly found that the department's worksheets of
that period were no longer on file. He felt that I wouldn't be able to find
any information without knowing the man's name, but nevertheless transferred
me to the supervisor of the Records Division. The supervisor suggested that I
come into the police station and look through some of their old microfilm
records. I went to Fort Worth later the same afternoon.
I didn't really know what I was looking for, whether it would be a jail
roster or what, but I thought I might have been able to find a name that was
out of place or couldn't be verified against other records. I was given two
rolls of microfilm covering the period, one of arrest records, and another of
the Disposition Report and Property Records of prisoners. Since I had already
read elsewhere and been told by the officers that no arrest record was made,
I didn't know how much luck I'd have, but I figured it was worth a try.
I began reading the arrest reports. It appeared that November 22, 1963
started out like any other day for FWPD (aside from the President's visit
that morning). Of the thirty or so arrests officers made that day, many were
listed as "juvenile fugitives," and a roughly equal number were for
"investigation of theft under $50 (shoplifting)." There was also a report of
a man who'd been taken into custody because the police had learned he had VD,
and one of a man who had been arrested in the men's room of the local bus
station while injecting nitroglycerine into his arm. Maybe the day wasn't so
"typical" after all....
Midway through the day's reports was the arrest report for Donald Wayne
House, which I decided to make a copy of since, after all, I'd been told it
hadn't been filed. The very next arrest report was for another man named
Kenneth Glenn Wilson, then of 6121 Broadway in Haltom City to the east of
Fort Worth. Interestingly, he had also been arrested at the 3400 block of
East Belknap Street, 23 minutes after House had been. The arresting officers
were listed as Lt LE Wood and HW Sinclair.[50]
This was an odd coincidence: nobody had mentioned two men having been
arrested in that place at that time. Who was this man, and what had he been
arrested for? That the arresting officers were the same two men who had been
photographed bringing the "unidentified suspect" into city hall made this
record all the more intriguing. (It is worth noting that Wood couldn't have
actually been an arresting officer since he'd already left the scene before
the man was taken into custody. He was, however, one of the two officers who
escorted him into city hall and booked him, and so was included in the
report.)
Wilson, an auto parts salesman, was charged as an "investigation witness." If
he was the same man in the photos, this helped to explain why he is shown
unmanacled in the photos taken at city hall: the man wasn't a suspect, but a
witness! A witness of what? The details of the arrest provided that
information:
"The above subject was arrested and charged as above [Inv. Witness] after he
came to the scene of where House was arrested. When he arrived at the scene,
he stated that he recognized the car which House was driving and stated that
he thought that it belonged to his wife's cousin. On the way to the [city]
hall, the subject stated that House was recently been discharged from the
service. He stated that he had not seen House lately and that his home is in
Ranger, Texas" [emphasis added].[51]
As noted earlier, the interview House had with the Fort Worth Press said that
he was traveling to Fort Worth to visit his cousin, in addition to mentioning
his intent to visit his Army buddy in Dallas.[52] This man Wilson--or rather,
his wife--must be who House was going to see.
When I was talking with WD Roberts earlier, neither of us could figure out
why he had gotten off of the highway and driven up Riverside Drive since his
home was a number of miles farther out the same road. I drove to 6121
Broadway, the address given on Wilson's arrest record. While the house no
longer exists, the route that House took would have led him to his cousin's
house about a mile from where he was arrested. This particular segment of the
story no longer held any mystery. The question that nagged at me, though, was
how Wilson knew House had been arrested in the first place, an answer I knew
only Wilson could provide.
I was finally able to locate and contact Wilson (he no longer lives in Fort
Worth), who verified that he was the same Kenneth Glenn Wilson who had lived
at the 6121 Broadway address nearly 30 years ago. I explained the reason I
was calling, to identify a man in a photo which I believed to be him, and
wondered if he would be willing to help me. We discussed the circumstances
which led up to the photo being taken, and as he provided me with various
details without prompting_House's name, the make and color of car he was
driving, that he was from Ranger and that House was, in fact, his wife's
cousin_it quickly became apparent that I had found the man whose arrest
report I held, but was he the same man in the photo?
In the course of our conversation, he mentioned that he had a book about the
assassination with his picture in it; did I perhaps have the same one? It
turned out to be Cover-Up, which of course, I had. I asked him to turn to
page 89 where the photos of House and the "unidentified suspect" were, and
asked him if he recognized any of them. "Sure," he said. "The three across
the top are Don, and the two below that are of me."[53] One of these two
photos is the same as that which appears in FHK, as we've already discussed.
Satisfied that Wilson and the "unidentified suspect" were one and the same, I
arranged to meet with him the following weekend when I could make the time to
travel to where he now lives. We met one Saturday afternoon at a roadside
restaurant near the interstate; he was accompanied by his wife and young
grandson, who was visiting for the weekend. We talked for nearly three hours.
Wilson now wears glasses and is, in his words, "a little fatter and deeper in
debt," but the similarity with the man in the FHK photo was unmistakable. He
parts his hair differently, but facial characteristics like the nose, chin
and forehead don't change, and_despite his denial_he still has the same slim
build he had back then. When he later posed in the same semi-profile as in
the picture, there was no doubt I was looking at the same man. Furthermore,
both he and Mrs Wilson recognized the pencil he'd always hung over his ear,
and the pocket protector he wore in those days.
How did Wilson come to be at that place and time where his cousin-in-law had
been arrested only moments before? Mrs Wilson provided most of the
details:[54]
At some point after the shooting, while House had been enroute to Fort Worth,
Dallas police had contacted his mother_with whom he was living at the time_to
determine his whereabouts. After two or three such calls, Mrs House became
concerned, and called her niece, Mrs Wilson. (Mrs House is now deceased, so I
was unable to determine what DPD had talked with her about during those
calls.) Mrs House called the Wilsons' because, whenever Don came to Fort
Worth, he would spend the night with the Wilsons and she expected he would do
so this night too. After the calls from DPD, she became worried.
Shortly after the call from her aunt, Mrs Wilson heard a radio broadcast of a
suspect, identified as "22-year-old Donald House of Ranger, Texas" having
been arrested at 3408 East Belknap in Fort Worth.[55] At first, she said, she
didn't recognize the name since "nobody called him Donald," but realized
after a moment that it had been her cousin who'd been taken into custody in
connection with the slaying.
She noted that the address was only a couple of blocks from where her husband
worked selling auto parts, and called to ask him to check on Don since it
appeared he was in some sort of trouble. He excused himself from work and
walked the short distance to where House had been arrested. There, he told
officers that he thought the car belonged to his wife's cousin, and was taken
into custody at 2:20 pm.[56] "I was looking out for Don," Ken Wilson told me,
"and they ended up taking me to jail!"
He was not charged with a crime, and as the record of his arrest shows, he
was brought in solely as a witness. He was questioned about his relationship
with Don House and released 90 minutes later, at 3:50.[57] He returned home
with his wife, where House joined them a couple of hours later (House wasn't
released until 5:15[58]).
(Mrs Wilson recalled an amusing anecdote from that day: when Don had finally
come to their house, everyone wanted to know if he'd been nervous. "Nervous?
Of course not, I didn't do anything," he said, sitting down... missing the
chair completely and sprawling on the floor. Nervous? Who me? I guess not.)
Wilson's account also clears up questions about HW Sinclair's recollection of
the event and in reconstructing the "arrest:" House had been curbed by
Roberts and hurried into Whistler's cruiser with Harbour in the back with
House. They in turn sped off to city hall with their prisoner with Lt Wood in
the lead, who may well have given orders to secure the scene before
departing. Other officers began arriving during and after this period, one of
whom was Sinclair. Whether he arrived before or after Wilson is difficult to
determine and not really important. He was nevertheless selected to transport
Wilson to headquarters, which he did. Obviously, Sinclair did not feel
threatened by the mild-mannered Wilson, who rode beside him unmanacled and
volunteering information about his wife's cousin, Don House, during the five-
or ten-minute ride downtown. From all accounts, it was a relatively pleasant
trip, if being under arrest or dealing with suspected Presidential assassins
can ever be called "pleasant!"
On arriving at city hall, the two men were met by Lt Wood, who had escorted
Whistler, Roberts and House to city hall less than a half-hour before.
Undoubtedly, Wood felt a need for additional police presence ushering Wilson
into city hall because a crowd of people had gathered,[59] and under the
circumstances, it wouldn't have been unreasonable to suspect they might have
become unruly at the sight of a "suspect" in the assassination being led
before them. In fact, Ken Wilson recalled the scene as "a little frightening
with all those people standing around yelling."[60]
Photos of both House and Wilson were taken by photographers from both the
Star-Telegram and the Press, although neither paper ever published them. TV
camera crews also captured footage of House being led into city hall and
through the corridors of the police department, but if similar footage of
Wilson exists, I haven't seen it.
Conclusion
==========
Beginning with a photograph of an "unidentified man" said to have been
arrested in Fort Worth and connected with both the Kennedy murder and the
CIA, along with a vague rumor or two of how the "black sedan" described by
Tom Tilson may have been found in Fort Worth, we've come to find that not
only is there no evidence to support such a connection, but also that it is
quite apparent that the black sedan never actually existed and is either a
figment of Tilson's imagination, a mis-recollection, or an attempt to portray
himself as having a role in the events of November 22, 1963_however
peripheral_which he in fact did not have.
While it is a fact that two men were taken into custody in Fort Worth "in
connection with the shooting," there is nothing other than speculation that
can link either of them with the murder. House had been to Dallas to visit a
friend who wasn't home when he got there. Unable to leave town because of the
heavy traffic due to the parade, he waited for the motorcade to pass before
he was able to leave to visit his cousin. A couple of women at a gas station
thought he matched the broadcast description of a suspect, and he was taken
into custody, cleared and released.
The second man, Ken Wilson, was only trying to help House, his wife's cousin.
He was taken into city hall as a witness, and not as a suspect. He wasn't
charged with any crime, and wasn't even handcuffed as he rode to city hall in
the front seat with HW Sinclair. He was questioned about his relationship to
House, released and went home. He's hardly given a second thought to these
events afterward until I spoke with him about them.
That Ken Wilson remained "unidentified" for nearly 30 years is surprising
when you consider that I was able to locate and identify him within two weeks
of the time his photo in FHK was brought to my attention, using records which
"don't exist" long after others had apparently attempted the same. None of
the police officers involved in these arrests_save Lawrence Wood, who was
interviewed by The Fort Worth Star-Telegram 20 years later_had ever been
contacted by anyone, and it's apparent that the search for the men's arrest
records was neither thorough nor tenacious since they were, in fact, quite
readily available.
I must admit I had been somewhat surprised that Ken Wilson had never
attempted to identify himself, especially having seen his photo in Cover-Up
along with what could be considered "mysterious" if not "sinister"
insinuations made about his being taken into custody. Then again, maybe I
shouldn't have been so surprised, since there are many people who are
apprehensive or skeptical, even cautious and suspicious of anything to do
with the JFK murder, and don't want their names associated with it.
On the other hand, we've also got to ask ourselves who would Wilson have gone
to even had he wished to identify himself? It's not an easy task to reach an
author through his publisher after all, and even so, once a book is published
and widely circulated, it is not an easy matter to change bits of material,
especially when it doesn't add to the story. It is unlikely that Cover-Up
will be amended, but will First Hand Knowledge be corrected because we now
know for certain that the "unidentified suspect" is no longer unidentified,
was never in fact a suspect, and was absolutely not either David Phillips or
"Maurice Bishop?" We'll have to wait for the second printing to find out.
While the underlying concern of whether it is "better" from a publishing
standpoint to maintain the intrigue and aura of mystery, or to ascertain that
mundane details_as this has turned out to be_are accurately portrayed remains
an important one, it is in truth of little consequence whether Wilson's
"story" is corrected since, to all those thousands of people who've bought
Cover-Up and FHK and not read this article, Ken Wilson will always be a
"mysterious CIA agent" involved in the assassination whose "arrest" was
"covered up" by sinister forces. Certainly, I'd like to see the record
amended, but I don't expect it will be. I just hope the same mistake won't be
made by future authors.
It is perhaps unfortunate in some respects that I have brought these men and
women to the fore, even despite the fact that it has "cleared" an innocent
man from any involvement with the crime, and set the record straight about
his detention. Wilson, for example, told me how his wife's cousin, Don House,
had been "harassed" over the peripheral role he had played in the events of
November 22, 1963, and no longer wishes to talk to anyone about it; indeed,
Cover-Up states that when the authors attempted to interview House during the
course of their research, they met with "extreme hostility." Others declined
to have their recollections recorded, voicing similar concerns.
For these reasons, I have refrained from noting too many personal details to
preserve their privacy and hopefully to prevent them from becoming part of
"the continuing inquiry," ruing the day they first heard my name: their roles
are long since finished. I enjoyed meeting each of them, and appreciate the
time they took to speak with me, the hospitality they showed me, and the
assistance they provided to close this chapter of history quickly. I hope
they never have cause to regret it.
I hope too that this experience can temper the enthusiasm, even zeal, of many
researchers who feel that the "truth" can be found by citing every lead and
"reasonable conclusion" as absolute fact. If we are ever to be successful in
our efforts to re-open an official investigation of some sort, we must come
armed with evidence, not mere theories and speculations. After all, we're
supposed to be investigating a murder, not writing novels or creating myths,
aren't we?
Copyright c 1993, M. Duke Lane
The author gratefully acknowledges the advice, assistance and encouragement
of Gary Mack, Mary Ferrell, Dave Perry, and other Dallas area researchers in
this investigation.
NOTES
-----
1. Interview with Gary Null, WBAI-FM New York, 99.5 FM, October 1992
2. See Letters to the Editor of The Third Decade, Volume 9, Number 1,
November 1992, pp 36-40; Number 2, January 1993, pp 9-11; and Number 3, March
1993, pp 27-28 (all related).
3. Robert Morrow, First Hand Knowledge, 1992, S.P.I Books/Shapolsky
Publishers, Inc, New York
4. Gary Shaw and Larry Ray Harris, Cover-Up, self-published, Cleburne TX,
1976, page 89
5. Obituary, The Washington Post, July 9, 1988, pG5
6. "Police Launch 2-city Manhunt," The Dallas Morning News, November 23, 1963,
page 2. The full account reads: "During the frantic period at the hospital,
police, Secret Service men and FBI agents had started a 2-city manhunt. They
arrested several persons, among them a Fort Worth man who was said to be
driving a car linked to the slayer." There was no additional coverage of this
event in the paper.
7. Earl Golz, "Ex-officer suspect he chased `2nd gun'," The Dallas Morning
News, August 20, 1978, p 42A.
8. Jim Marrs, Crossfire: The Plot that Killed Kennedy, 1989, Carroll & Graf
Publishers, New York, pp 325-327. This is a nearly verbatim recounting of the
aforementioned Golz article.
9. Golz, "`2nd gun'"
10. "Scenes From an Assassination" (photographic essay), The Dallas
Times-Herald, November 20, 1983
11. Golz, "`2nd gun'"
12. See Decker Exhibit 5323 (affidavits to Dallas County Sheriffs): 19H500,
Malcolm Summers, November 23, 1963; 19H497-98, Jesse James Williams, November
22, 1963; 19H501, William Clifford Anderson, November 25, 1963; 19H522-23,
November 22, 1963; and Cover-Up, p 88 (reference to DPD radio logs for
11/22/63, time not indicated)
13. Golz, "`2nd gun'"
14. Interview with WD Roberts by author, December 22, 1992
15. "Man Arrested Here Released," The Fort Worth Star-Telegram, November 23,
1963, p9
16. Warren Commission Document #301 (CD 301), pp 111-112. See also John
Moulder, "'Suspect' Seized Here Made History," The Fort Worth Press,
September 28, 1964, page 1 and Cover-Up, p 88.
17. Ibid CD 301, and CD 897, p 331
18. "'Suspect' Seized Here Made History"
19. Ibid
20. Cover-Up, p 89
21. 19H522-23, November 22, 1963.
22. Ibid, and arrest report #19560, FWPD, Donald Wayne House. November 22, 1963
23. Roberts interview
24. A six cylinder Plymouth: Roberts interview and House arrest report
25. Interview with BG Whistler, January 5, 1993
26. House arrest report
27. Roberts interview; Whistler interview
28. House arrest report. Note that this may be "official" as opposed to
actual time since an NBC newscast transcript notes the first broadcast that
"a car has been stopped at Fort Worth that may have some connection with the
shooting" at 1:49 pm CST, eight minutes earlier. WBAP radio had also
broadcast a similar statement three minutes earlier at 1:46, indicating that
House had already been pulled over and perhaps already taken to city hall.
29. Cover-up, p 89, upper row of photos
30. Wood is now deceased and surviving officers do not recall who the
motorcycle officers were, but news footage taken by KXAS-TV (then WBAP-TV)
made available to me by Fort Worth researcher Gary Mack shows Wood getting
off of his motorcycle as House is being driven up in the squad car
31. House arrest report; Roberts and Whistler interviews
32. Roberts interview
33. Whistler interview
34. Elston Brooks, "An Arrest He'll Never Forget," The Fort Worth
Star-Telegram, November 20, 1983, p 20F (Sunday special section: "Turning
Point: The Assassination of JFK")
35. "'Suspect' Seized Here Made History"
36. Ibid
37. "An Arrest He'll Never Forget"
38. Cover-Up, p 88
39. Photos can be seen in Cover-Up, top of p 89
40. House Property Record #19560, FWPD
41. "'Suspect' Seized Here Made History"
42. House disposition report #19560, FWPD. The report indicates that charges
were dropped after House was questioned, and he was released at 5:15 pm, 3
hours and 18 minutes after he'd been arrested
43. Roberts interview
44. CD 301
45. Cover-Up, page 89
46. Ibid
47. Ibid
48. Ibid
49. Interview with Mr and Mrs HW Sinclair, December 20, 1992
50. Wilson arrest record #19561, FWPD (shown on back cover), and accompanying
disposition report and property record #19561
51. Ibid
52. "'Suspect' Arrested Here Makes History."
53. Telephone interview with Kenneth Glenn Wilson, January 9, 1993
54. Interview with Mr and Mrs Kenneth Glenn Wilson, January 23, 1993
55. Live WBAP radio broadcast, November 22, 1963 at the time House was
brought into the jail. In addition to the newspaper reporters and
photographers who were at city hall, there were a number of television and
radio personnel. Footage from KXAS-TV and KTVT-TV (op cit) of House being
brought into police headquarters and being marched through the hallways and
offices clearly indicates that coverage of the arrest was immediate.
56. Wilson and House arrest records. Again, this is an official rather than
actual time.
57. At 3:50 pm; Wilson disposition report #19561
58. House disposition report #19560
59. WBAP-TV (NBC) news footage
60. Wilson interview

337
txt_files/crashir.hum Normal file
View File

@ -0,0 +1,337 @@
The following newsletter is reprinted by the author's permission.
Insider Report P.O. Box 39895 Phoenix, AZ 85069 (602) 252-4477
Outside Arizona (800) 528-0559 6 Months $80 One Year $145 Two Years $275
THE PLANNED CRASH
The world changed forever on October 19, 1987. What happened on that Monday is
every bit as significant to the future of our world as the dropping of the
A-bomb was on August 6, 1945.
This bomb led directly to the greatest stock market crash in history. And the
folks who dropped it were our central bankers- the people who run the Federal
Reserve System (and the Insiders who run them).
The full reasons for the manipulations and machinations that took place during
the past three weeks are known only to a small handful of people. The vast
majority of Americans are still confused, bewildered, worried, alarmed, and
just plain old scared to death.
There is an old saying which goes, "A few people make things happen, a greater
number watch things happen, and most people ask, 'What happened?'" So let me
tell you what happened.
For months, even years, the liquidity of the investing public has been growing
by leaps and bounds. The causes for these mountainous increases of cash were
basically three things: (1). Increased productivity (a good thing); (2).
Increased debt at all levels (a bad thing); (3). Continued inflation, over and
above productivity and debt service (a terrible thing). Standing astride this
whole universe of money-in-motion were the central banks of the world- our own
Federal Reserve System and its sister megabankers in the United Kingdom, West
Germany, and Japan.
After the high inflation of the Carter years, the Reagan Administration slowed
the printing presses and instead turned to borrowing, in order to feed
government's voracious appetite for revenues. The result was an historic
increase in the federal debt, which ultimately led to a corresponding increase
in private debt. Everything from maxed- out VISA cards to billion-dollar "junk
bond" offerings bore witness to the credit mania.
While the orgy of debt and credit expenditures grew, the stock markets of the
world, led by the NYSE, became superbulls. During all this, the real Insiders
were busily putting their game plan in place.
By the real Insiders, I mean the leaders of the world money-center banks; the
men who shape the destinies of nations; the men who select the Paul Volckers
and Alan Greenspans; the men who have as their objective what Montigue Norman,
former governor of the Bank of England, once called "the hegemony of the
world." Now it's known as the New World Order.
To build a New World Order, you first need what the "Insiders" themselves call
a New Economic Order. How do you justify a New Economic Order? You need a
crisis; in fact, several of them.
Now they've got one. Boy, have they got one.
What we are seeing today is as planned as the building of a house. Each
timber, each nail, each joint and joist is doing its designated job. And
believe me, when the house is finally finished, the rooms will look and feel
very much like a cell.
Longtime readers of Insider Report know that the "secret" of anticipating
market moves is to keep your eye on the Federal Reserve. The Fed has planned
and orchestrated every stock market move, up or down, since 1929. This
situation was no different. Once the Fed announced, as it did on October 14th,
that it was raising the rediscount rate, the dominoes started to fall. By
Monday, October 19th, the herd mentality had grabbed hold, and all Hell broke
loose.
Granted, there were other factors which contributed mightily to the chaos. But
when you push the first domino, cause and effect will take care of the rest.
Insider Report subscribers were warned what would happen and what they should
do about it, well in advance of the crash. Here are some examples:
From the January '87 Insider Report:
"When in doubt, always take a profit. With the stock market hitting new highs
and volume on the New York Stock Exchange going through the roof, it's
essential that we not develop a 'crowd' mentality.
"I certainly don't know when this critter will exhaust itself. But it will.
And when it does, it's going to drop like a bull in a Barcelona bullring. So
in spite of all the hoopla you hear today, I think that moving into cash,
especially when you've got profits to show for it, makes eminently good sense.
"Eliminate the margin account on your oil stocks, and any other NYSE stocks you
own; place trailing sell stop orders, 'good 'til cancelled.' behind each stock
you own."
From the May '87 Insider Report:
"This stock market has become a real circus. Up 50 points one day, down 50
points the next. It is a portfolio manager's nightmare.
"But then, we knew it would be. As ia said back in February (right after the
big January runup), 'as long as interest rates stay at current levels or lower,
and as long as the dollar continues to decline, the market should continue to
move ever higher.'
"Then I added this warning: 'But once the monetary picture changes, and
interest rates start rising and truly reflecting the real rate of inflation,
look out!"
From the August '87 Insider Report:
"The time has come to pick up some marbles. We have seen some tremendous
profits accumulate in our portfolios and now is not the time to be greedy...
"Let's get out!
"As I write this, the Dow Jones Industrials are just under 2700 and have gained
200 points in record time on record volume. And in spite of all the bullish
news out of the Persian Gulf, the oil stocks have slowed and are not leading
the market, as they did for months on end. This tells me the Insiders are now
going to let the public and the mutual fund managers take them out at or near
the top. These stocks will retrench dramatically before the Insiders cover
their shorts. (Those guys make it coming and going!)"
Let me now tell you what to expect from this point on. In a word, confusion.
In fact, confustion compounded by confusion. As any serious student of history
knows, all major world-shaping changes have grown out of great crisis periods.
I'll not recount the numerous cases which would prove the point, but believe
me, they are there.
Today is no exception. What will come out of this confusion is a "New World
Order" which will have as its first priority the surrender of our monetary
sovereignty. On sunday, October 18th, there appeared in the New York Times an
article headlined, "Gold shines in new economic order." written by Peter T.
Kilborn, the piece starts off as follows:
"Despite the turbulence in the financial markets and the barbs of skeptics,
many economists find that the United States and other leading countries are
making headway in a fit-and-start effort to regain control of the world
economy.
"Some 16 years ago the major nations gave up their battle to keep the dollar's
value tied to gold and abandoned their old system. But they have since decided
that the wide-open markets and often frenzied exchange rates that took gold's
place have not served them very well either. As a result, they have been
devising a new order that most likely will resurrect gold, although probably
not to a role as powerful as before."
Note very carefully two phrases- "new order" and "not to a role as powerful as
before." Those two speak volumes.
The piece continues in part, "The new arrangement was two years in the
making...while still far from complete, economists contend that the new order
has begun to yield some tangible results. Ralph C. Bryant, economist at The
Brookings Institution and formerly a top official at the Federal Reserve
System, said, 'the process of economic policy making is a little better than it
was.'"
Referred in the article as the chief proponent of this new order is none other
than our own Treasury Secretary, James A. Baker, III. Baker, commenting on
the turmoil in the U.S. stock and bond markets, asked a question and then
answered it: "Are we considerably better off in terms of our chances of
obtaining better coordination as a consequence of it? Yes, we are."
Follow this carefully. Here you have the Secretary of the Treasury admitting
that all this confusion and all this economic hurt is helping to bring about a
plan which by its very nature will reduce his country to economic subservience
for all time. And this, my friends, was in an article that appeared the day
before Black Monday! Imagine Baker's delight with what has transpired since.
Then today, November 3rd, along comes CFR mouthpiece Anthony Lewis, in his
syndicated column, calling for the return of Paul Volcker. After first
suggesting Volcker for the treasury post, Lewis then gets to where he really
wanted to go in the first place. "Or he...(Volcker) could be a special
ambassador to organize an urgent international meeting on the financial
crisis."
Lewis then tells us what this conference would do: "The purpose of a
conference would be to demonstrate that the political leaders of Europe, Asia,
and America understand their countries' interdependence(!) and are ready to put
aside narrow self-interest and ideology for common goals." Translated, that
means West Germany, Japan and the United States must surrender their national
sovereignty for a new world economic order.
If you follow these people, and understand the Aesopian language with which
they write and speak, they tell you flat out what they want and what they are
going to do. Here is an outline of their current game plan:
(1) Create crises.
(2) Use the contrived crises as the excuse to justify implementing
one-world socialist schemes.
(3) Use gold and other things of value as carrots, to entice us into
accepting this New Economic Order. The carrots, of course to be
followed by sticks.
(4) Promote more government controls over every aspect of the
economy
(5) Blame the free market as "the culprit" that has "failed."
Our challenge is to protect ourselves, by knowing what the Insiders are
planning and not falling prey to it. To this end, I urge you to buy gold coins
of various sizes and quality gold stocks.
Don't be buffaloed into running with the herd and thinking that the current
pandemonium is going to be normalized quickly. It won't be. What we are
living through now is what is called, in the street, "the gut check."
I wish I could tell you things are going to get better in the near term.
They're not. But we can do something about it, beyond protecting ourselves and
our families. Helping to inform our fellow citizens is step one. Please
photocopy this special report and distribute it far and wide. people who
wouldn't pay attention to any of these possible scenarios just two short weeks
ago are today scared to death and looking for some answers. Once they have
them, we can help them find solutions as well.
Electronic reprint courtesy of Genesis 1.28 (206) 361-0751
Some comments: I have not studied things in the depth that Mr. Abraham (the
author of the preceeding article) has studied. I am not clear wether he means
that the "domino" was pushed within weeks of the crash or if it was planned and
put into action some time before.
The talk in the newspapers and news magazines about the mutual funds and the
computer trading is totally misleading. They did not cause the crash. That
was prepared by the actions of the Federal Reserve System. The mutual funds
were only part of the "herd."
"Many would have you believe there is some great cosmic mystery to why the
market rises or falls. Nonsense! Nothing could be further from the truth. If
you know what the Fed is doing, you will know where the market is going.
"Let me explain briefly how and why it works. The rediscount rate is nothing
more than the rate which the Federal Reserve System charges its member banks
for borrowed money. When the Fed raises that rate, what happens?
"Naturally, one of the first places that impact is felt is in what the banks
charge the brokerage houses. They in turn reflect this cost of money in what
are called 'corporate broker loans.' Put another way, the brokerage houses must
necessarily charge their customers more interest on margin accounts. These
fundamental applications are as true today as they have been since before the
stock market crash of 1929.
"(You might note that the changes in the rediscount rate are an almost
infallible barometer of what will happen to inflation as well.)" Insider Report
Vol. V No. 4
I heartily agree that the Federal Reserve System works to the detriment of the
average American citizen. We are used to thinking of Federal Reserve Notes as
money, which is not correct. Look at the paper sometime and you will see "THIS
NOTE IS LEGAL TENDER FOR ALL DEBTS, PUBLIC AND PRIVATE". Until relatively
recently I did not know that "note" had a financial meaning, citing Webesters:
"A written promise to pay a debt." You are carrying certificates of debt, not
as in earlier days when paper money was representative of some amount of gold
(or later silver). In those days the paper money had wealth backing it, not
debt.
Also, tender is "something that may be offered in payment." Over the course of
time the government forced the population to accept paper as payment of debts,
rather than something of real value (such as gold). Part of this is due to the
fact that the civil government is the biggest debtor of all and they use
inflation to defraud their creditors.
Again, until relatively recently I did not know what inflation REALLY was, as
the newspapers imply that inflation is rising prices. This, I have
subsequently learned, is NOT true. Inflation is any increase in the supply of
money or credit. Some dictionaries confuse this definiton by adding "relative
to the available goods resulting in a substantial and continuing rise in the
general price level". That is misleading. Inflation is ONLY the increase
supply of money or credit, and with this definiton in mind, it is possible to
have inflation even if gold is used as the commodity of exchange. Spain had
inflation when they brought all that gold back from the New World.
The Federal Reserve System has control over the amount of inflation we
experience. If they inflate the system, prices (remember there is a time delay
for this to occur, which is one reason why most people don't recognize what is
happening) will rise. What is happening is NOT that goods and services are
becoming more expensive. What is taking place is that your "money" is losing
it's value. By debauching the currency, those who control it can enrich
themselves at others expense.
Think of this. What is a dollar? A piece of paper with George Washington's
face on it. And if they change engravings it could be 5 dollars or ten dollars
or even 100 dollars. It's the same paper. The same ink. It is said that
during the Hyperinflation that Germany experienced in the 1920's that they were
printing money so fast that it was only printed on one side because they did
not have time to wait for the ink to dry.
By the way, some of you may be unaware. I don't remember the exact date, I
think it was October of last year, but the U.S. Government has begun minting
gold coins again. These are legal tender, but will not be spent as such since
they are sold for bullion value. At the time I first heard about this the
"$50" gold coin, which had one ounce of gold, was selling for about $450 as
that was the bullion price. The U.S. is not the only nation to have begun
minting gold coins again. Red China along with quite a few other nations,
sorry but I don't remember them all now and I can't think of where I have the
list of nations, also began minting coins. Mr. Abraham, along with several
others I've seen, suspects that these coins will be used to induce the citizens
of the various nations to accept a one world currency. Ostensibly the currency
will be backed by gold, to gain the publics confidence, but once in place the
restrictions of gold (ie you can't print gold on the printing press) will be
removed. For those who would gain power, it is difficult to direct the
economies of nations when you have so many different standards, of currencies,
to deal with. One currency would make things a lot easier for them, but worse
for us (ie those who love their freedom).
Now to some of you this will seem far fetched. It is certainly not what I was
taught in school. So below you will find some books I reccomend if you would
like to study this further. These will help you gain a better understanding
about how the Federal Reserve System controls your (and my) actions, and about
economics and politics in general.
Larry Abraham is the author of the preceeding article. Murray Rothbard is one
of the "Austrian" economists. Ludwig Von Mises is their most distinguished
representative. They are free market economists, who come from a secular
perspective.
Henry Hazlitt was a journalist who was inspired by the writings of the Austrian
school (as it has come to be known), especially Von Mises.
If you have trouble locating any of these books let me know and I will help you
find copies. I hope that this has helped you grow in knowledge and
understanding. Together we stand, divided we fall.
Economics in One Lesson by Henry Hazlitt
Arlington House, Inc.
173 Main Street
Norwalk, Connecticut 06851
America's Great Depression by Murray Rothbard
Richardson & Snyder
25 Broad Street
New York City
Call it Conspiracy by Larry Abraham
Double A Publications
18000 Pacific Highway South, Suite 1105
Seattle, WA 98188


959
txt_files/crybaby.txt Normal file
View File

@ -0,0 +1,959 @@
I notice the now-ancient Gauquelin "Mars Effect" affair continues to
crop up, perennially, with considerable time-honoured but still-fuzzy
rhetoric about an alleged CSICOP "cover up", including copious
laudatory mentions of Dennis Rawlins's ALSO-ancient jeremiad
"sTARBABY", which appeared in "Fate" magazine. Essentially all
treatments of the affair since then have been loose (and even MORE
careless) descendants of the Rawlins article, often committing gross
distortions, such as confusing the test of European athletes with the
later one based on U.S. data.
The ONLY proper rejoinder I've ever seen to Rawlins was a reply piece
by CSICOP Fellow P. J. Klass, which "Fate" refused to publish, and
which far too few have seen, over the years since. Robert Sheaffer
and I have now scanned in the text, and are attempting to distribute
it more widely. The full text may be downloaded or File REQuested,
but not FTP'd from my BBS as CRYBABY.ZIP (as Robert mentions in his
comments, which follow), and I'll be mailing it to other skeptics'
groups on diskette, as well as uploading it to CompuServe.
-- Rick Moen
Vice-Chair, Bay Area Skeptics
Sysop, The Skeptic's Board BBS, San Francisco
(also reachable at 76711.243@CompuServe.com)
"CRYBABY"
by Philip J. Klass
Philip J. Klass is a member of the Executive Council, Committee
for the Scientific Investigation of Claims of the Paranormal
(CSICOP).
[Note: This article, written in 1981, was submitted for
publication to FATE Magazine, in reply to Dennis Rawlins'
accusations against CSICOP in his Oct., 1981 FATE article
"sTARBABY". FATE adamantly refused to publish this article.
Meanwhile, Rawlins was given the opportunity to make a
rambling, six-page statement in the SKEPTICAL INQUIRER
(Winter, 1981-82, p.58), which was published exactly as
received, presenting his accusations of a "coverup." This
was in addition to the 5 1/2 page article he earlier had on
the "Mars Effect" in the Winter, 1979-80 issue (p.26). To
this day, supporters of the paranormal still charge CSICOP
with perpetrating a "coverup" on this matter. Only a
relatively few people ever saw Klass's "CRYBABY", the long
and detailed answer to Rawlins' "sTARBABY" charges. Now that
you have the opportunity to read Klass's rebuttal, you can
make up your own mind.
Klass's original text has been reproduced below, exactly as
typed, with the author's permission. Spelling and
punctuation have not been changed. Text that was underlined
in the original appears in capital letters.
- Robert Sheaffer, Bay Area Skeptics, 1991.
This article is brought to you courtesy of the Bay
Area Skeptics' BBS, 415-648-8944, from which it is
available for downloading, although not via FTP.]
"They call themselves the Committee for the Scientific
Investigation of Claims of the Paranormal. In fact, they are a
group of would-be-debunkers who bungled their major
investigation, falsified the results , covered up their errors
and gave the boot to a colleague who threatened to tell the
truth." Thus began a 32-Page article in the October 1981 issue of
FATE magazine, which a a press release headlined: "SCIENTIST
BLOWS THE WHISTLE ON PARANORMAL COVERUP."
Since CSICOP was formed in the spring of 1976, it has been a
thorn in the side of those who promote belief in "psychic
phenomena," in astrology, UFOs, and similar subjects and it has
been criticized sharply by FATE whose articles generally cater to
those who are eager to believe. However, this FATE article was
written by skeptic Dennis Rawlins, who was one of the original
Fellows in CSICOP and for nearly four years had been a member of
its Executive Council. This would seem to give credence to
Rawlins' charges -- except to those of us with first-hand
experience in trying to work with him and who are familiar with
his modus-operandi.
Because Rawlins proposed my election to CSICOP's Executive
Council I cannot be charged with animosity toward him, except
what he later engendered by his actions. And in a recent letter
to me, Rawlins volunteered that I "was less involved than any
other active Councillor" in the alleged misdeeds.
The FATE article, entitled "sTARBABY" prompted my own
investigation into Rawlins' charges. But unlike Rawlins, who
relies heavily on his recollection of conversations several years
earlier, I chose to use hard evidence - published articles,
memoranda and letters, some of which Rawlins cites in his
article. When I requested copies of these letters and memoranda
from the several principals involved, all of them responded
promptly and fully except for one -- Dennis Rawlins, who had
accused the others of "cover-up" and "censorship." RAWLINS
REFUSED MY REPEATED REQUESTS TO SUPPLY HARD DATA THAT MIGHT
CONFIRM HIS CHARGES, AND WHICH ALSO COULD DENY THEM!
The results of my investigation, based on hard data,
prompted me to conclude that the Rawlins article should have been
entitled "CRYBABY," and that an appropriate subtitle would have
been: "A wounded ego is the root of much evil."
If the editors of FATE had spent only a few hours reading
published articles cited in the Rawlins article they could not in
good conscience have accused CSICOP of "cover-up" or of having
"falsified the results." Instead, FATE chose to ignore the
traditional journalistic practice of investigating both sides of
a controversial issue and publishing both sides, as those accused
by Rawlins had done.
Rawlins' charges result from two tests intended to assess
whether the position of the planet Mars at the time of a person's
birth has a significant influence on whether he/she becomes a
"sports champion." This "Mars effect" hypothesis was first
proposed by France's Michel Gauquelin, who directs the laboratory
for the Study of Relations between Cosmic and Psychophysiological
Rhythms, based on a study of European champions.
The first of the two tests was performed by Gauquelin
himself, with results that generally were supportive of the Mars
effect hypothesis by eliminating a possible objection that first
had been raised by others, i,e, not CSICOP. The only way in which
CSICOP, or persons affiliated with it, could be guilty of
Rawlins' charges would be if they had refused to publish
Gauquelin's results or had intentionally altered the data in his
report. NEITHER OCCURRED. Nor did Gauquelin accuse CSICOP or its
members of trying to "cover-up" his results or altering the data
of this first test whose calculations he himself performed,
although there were some differences of interpretation of the
implication of these results.
HOWEVER, GAUQUELIN DID PUBLICLY ACCUSE RAWLINS OF DISTORTION
AND MISREPRESENTATION, with implied criticism of CSICOP because
Rawlins then was a member of its Executive Council. There would
be other occasions when CSICOP would be criticized because of
Rawlins' intemperate statements and actions.
This criticism was published by CSICOP in the Winter l978
issue of its publication, THE SKEPTICAL INQUIRER (p. 80). In it
Gauquelin wrote: "How, in spite of all this data could one
distort and misrepresent the effect in question and sow doubts on
the subject? Dennis Rawlins, a member of CSICP ... has done just
this in a polemic which appeared in the Fall-Winter 1977 issue of
that (CSICOP's) journal." In "sTARBABY," Rawlins tries to shift
the blame for his transgressions to CSICOP.
According to "sTARBABY," CSICOP Chairman Prof. Paul Kurtz
was the principal architect of the alleged cover-up. Yet in
reality it was Kurtz, then editor of THE HUMANIST magazine
(published by the American Humanist Assn.) who printed the
lengthy paper by Gauquelin describing the seemingly favorable-
for-him results of the first test in the Nov/Dec,l977 issue (p.
30). What kind of doubletalk is this when Rawlins and FATE charge
that Kurtz's decision to publish test results favorable to an
"adversary" represents a "cover-up"? Rawlins might better have
waited until "l984" to resort to such "double-speak" accusations.
Because the issues are complex and because two different
publications and organizations were involved, it is useful to
recount briefly the events that led to the first Mars effect
test, which is at the root of the Rawlins/FATE charges, and the
second tests performed using data for outstanding U.S. athletes.
Based on calculations performed by Rawlins himself, the U.S.
champions test showed a very UNFAVORABLE result for the claimed
Mars effect, which Rawlins confirms in "sTARBABY." And these
Rawlins-computed results were published, without change, by
CSICOP.
The Sept/Oct. l975 issue of THE HUMANIST carried an article
by L.E. Jerome that was critical of astrology in general and of
the Mars effect in particular. When Gauquelin sought an
opportunity for rebuttal, Kurtz provided it in the Jan./Feb. 1976
issue of THE HUMANIST, which also carried several other articles
on astrology. Because Gauquelin's article claimed that the
Mars effect had been confirmed by Belgian Committee for the
Scientific Investigation of Alleged Paranormal Phenomena (created
some 25 years earlier), that group also was invited by Kurtz to
submit an article for publication. Belgian Comite Para, as it is
called, confirmed Gauquelin's calculations. But it questioned his
statistical assumption "that the frequency distribution of the
hours of birth during the day (the nych-themeral curve) is a
constant distribution...", i.e. that there is an equal
probability of a person being born during any hour of the day.
This seemed important because the Mars effect hypothesis
holds that persons born during an approximately two-hour period
just after Mars has "risen" or during a comparable period after
Mars is at upper culmination (zenith), are more likely to become
sports champions than persons born during other hours of the day.
If there is an equal probability of a person being born in any
one of the 24 hours, then 4/24, or l6.7%,of the general
population should be born when Mars is in one of these two "key
sectors." (Because of combined orbital motions of Earth and Mars,
the percentage of the day in which Mars is in two key sectors is
approximately l7%. But Gauquelin reported that 22% European
champions in his data base had been born when Mars was in the two
key sectors, significantly higher than the l7% "benchmark."
Because of the issue raised by Comite' Para, Kurtz
consulted statistics professor Marvin Zelen who in turn proposed a
control test that could resolve the statistical issue raised by
Comite' Para. This Zelen proposed test, also published in the
same (Jan./Feb. 1976) issue of THE HUMANIST, suggested that
Gauquelin should gather birth data for "non-champions" who had
been born in the same local areas and within three days of a
RANDOMLY SELECTED sub-sample of Gauquelin's "champions" who
seemed to show the Mars effect.
If only 17% of these NON-champions were born when Mars was
in the two key sectors, this would void the issue raised by
Comite Para. But if roughly 22% of the NON-champions also were
born when Mars was in the two key sectors, this would undercut
the Mars effect hypothesis. Zelen's article concluded that the
proposed test offered "an objective way for unambiguous
corroboration or dis-confirmation." In retrospect it would have
been more precise had he added: "...of the issue raised by
Belgian Comite Para." If Gauquelin's sample of "champions" data
was "biased," as Rawlins first suspected, this could not possibly
be detected by the Zelen-proposed test.
The same issue of The Humanist carried another article, by
astronomy professor George O. Abell, which was very skeptical of
astrology in general. But unlike Rawlins who dismissed the Mars
effect out-of-hand and "didn't believe that it merited serious
investigation yet" (FATE: p. 74), Abell wrote that if Gauquelin's
findings were correct, they were "extremely interesting."
However, Abell included the following note of caution: "If
all of Gauquelin's work is re-checked, and his results hold up,
then it is necessary to repeat the experiment with a new sample,
say in the United States. If that sample should give the same
result, then further verification is in order, until it is
absolutely certain that the effects are real and reproducible.
That is the way science works; reproducibility of results is
necessary before fundamental new laws can be inferred." This sage
advice clearly indicated the limits of what conclusions could be
drawn, and could not be drawn, from the results of the upcoming
Zelen test, and even from a complete re-check of Gauquelin's
original data on European champions, which was not attempted. It
should be stressed that at the time this first (Zelen) test was
proposed, CSICOP did not yet exist. Several months later, when it
was formed (initially under the auspices of the American Humanist
Assn.), Kurtz became its co-chairman and later its chairman.
Zelen and Abell were named Fellows, but not to CSICOP's Executive
Council. In l980, Abell was elected to replace Rawlins on the
Council.
The results of this first (Zelen) test were published in the
Nov./Dec., l977 issue of THE HUMANIST, where the issue first was
raised, although by this time CSICOP had its own publication.
Gauquelin and his wife Francoise were given nearly six large-size
magazine pages to present their findings without censorship.
Gauquelin reported having difficulties in obtaining data for non-
champions born within several days of champions in small towns,
so he said that non-champions birth data had been obtained only
from the large cities in France and Belgium, The Gauquelins
reported that these data showed that only l7% of the non-
champions had been born when Mars was in the two sectors which
seemed to resolve the issue earlier raised by Belgium's Comite
Para in favor of the Mars effect.
The same issue of THE HUMANIST carried an article jointly
authored by Zelen, Kurtz, and Abell, that began: "Is there a
'Mars Effect'? The preceding article by Michel and Francoise
Gauquelin discusses the experiment proposed by Marvin Zelen and
its subsequent outcome. Their conclusions come out in favor of
the existence of a 'Mars effect' related to sports champions. It
is the purpose of this article to discuss the analysis of the
data and to point out the strengths and weaknesses of the
evidence in favor of the 'Mars effect.'"
The Zelen/Kurtz/Abell article raised some questions about
the results. For example, that "the 'Mars effect' only appears in
Paris, not in Belgium or in the rest of France." The article
concluded: "lf one had a high prior 'belief' that there is a Mars
effect, then the Gauquelin data would serve confirm this prior
belief. In the other hand, if the prior belief in the existence
of a Mars effect was low, then this data may raise the posterior
belief, but not enough to accept the existence of the Mars
effect."
Rawlins charges that publication of this article, following
the uncensored Gauquelin paper,"commited CSICOP to a cover-up."
(FATE: p.76) Yet is characteristic of scientific controversy for
one party to question or challenge another's interpretation of
the data. And Gauquelin would do so following the second test
without being accused of a "cover-up" in "sTARBABY."
In the same issue of THE HUMANIST, in a brief introduction
written by Kurtz, the first "linkage" with CSICOP occurred. Kurtz
wrote: "Thus, members of CSICOP involved in this inquiry believe
that the claim that there is a statistical relationship between
the position of Mars at the time of birth of individuals and the
incidence of sports champions among them has not been established
.. to further the cause of scientific inquiry, the committee has
agreed (with Gauquelin) to make an independent test of the
alleged Mars effect by a study of sports champions in the United
States."
In "sTARBABY," Rawlins charges that the U. S, champions test
was a "diversion." Clearly the Gauquelins themselves did not view
it in this light, judging from the concluding statement in their
article which said: "Let us hope that these positive results may
induce other scientists to study whether this effect, discovered
with the European data, appears also with the U.S. data."
On March 28, 1978, SEVERAL MONTHS AFTER THE RESULTS OF THE
FIRST TEST WERE PUBLISHED, Rawlins sent Kurtz a copy of a three-
page memorandum he had prepared a year earlier (March 29, 1977).
It contained a very technical analysis of the issue raised by
Comite Para, which prompted Rawlins to conclude that the 22%
figure reported for European champions was not the result of a
disproportionate share of births of the general population during
the early morning hours when Mars often was in one of the two key
sectors. In this analysis, Rawlins concluded that Gauquelin had
"made fair allowance for the effect."
But Rawlins had not written this three-page memo until
several month AFTER the Zelen test had been proposed in THE
HUMANIST. Shortly after preparing the analysis, Rawlins had sent
a copy to Prof. Marcello Truzzi, then editor of CSICOP's
publication. Truzzi had decided not to publish it but sent a copy
to Gauquelin. IF the Rawlins analysis of 1977 took account of all
possible demographic factors -- and there is some disagreement on
this question -- it was much too technical to be understood by
persons without expertise in statistics and celestial mechanics.
When Rawlins finally got around to sending this analysis to
Kurtz on March 28, 1978, his letter of that date did NOT
criticize Truzzi or CSICOP for not having published it earlier.
Rather, Rawlins admitted, "I should not have kept my (Mar. 19,
1977) memo..private after all." He did suggest that perhaps it
might now be published in THE HUMANIST. But by this time Kurtz no
longer was its editor. More important, the results of the first
(Zelen) test already had been published several months earlier.
If, as Rawlins would later charge in "sTARBABY," the
Zelen/Kurtz/Abell article published several months earlier in THE
HUMANIST amounted to a "cover- up," Rawlins did not make such an
accusation to Kurtz when he wrote him April 6, 1978. Instead,
Rawlins wrote; "I think our best bets now are 1. The main
European investigation might seek to discover how the Eur. samp
(of Gauquelin) was (hypothetically) fudged -- check orig. records
microscopically for some sort of Soal trick. 2. Proceed with the
U.S, test, where we know we have a clean (unbiased) sample."
This April 6, 1978, letter clearly shows that while Rawlins
suspected that Gauquelin had manipulated his European champions
data ("Soal trick") he found no evidence of wrong-doing by
Zelen/Kurtz/Abell. On April 26, 1978, in another letter to Kurtz,
following his visit with Rawlins in San Diego, Rawlins wrote that
he "was certain" that Gauquelin's original data "was biased, but
not sure how." Rawlins concluded this letter on a cordial note:
"Now, wasn't it great visiting sunny, funny, California -- and
getting to see a real live nut religion launch itself in San
Diego? ... hope you'll get back this way soon again."
It was at about this time that CSICOP came under fire for
Rawlins' actions in another matter. In the summer of 1977,
Rawlins and Abell had been invited to be panelists in a symposium
on astrology to be held March 18, 1978 at the University of
Toronto at which Gauquelin, among others, would participate. The
invitation came from Dr. Howard Eisenberg on the stationary of
the University's School of Continuing Studies. Both Rawlins and
Abel had accepted. Then, in late September, 1977, Eisenberg
withdrew the invitations on the grounds that "the response from
potential speakers...has yielded an incredible acceptance rate of
100%. This places us in the embarassing position of not being
able to sponsor all of you," i.e. pay travel expenses and allow
formal presentations.
On Feb. 6, 1978, Rawlins wrote to the president of the
University of Toronto, protesting what he said were "a number of
oddities" associated with the symposium, including an imbalance
between the number of astrology supporters and skeptics. The
Rawlins letter charged that "this conference looks to be a pretty
phoney confrontation, which will therefore give the irrational
pseudo-science of astrology an evidentially-unmerited 'academic'
boost in public credibility..." Rawlins sent a copy of his letter
to another university official.
Rawlins' suspicion of a loaded panel may have been
justified. But the letter of protest was written on CSICOP
stationery and signed "Dennis Rawlins, Executive Council,
CSICOP." Another regretable action was a Rawlins telephone call
late at night to a university astronomy professor, Robert
Garrison, which gave the impression that Rawlins was speaking in
behalf of CSICOP. In fact, Rawlins had taken these actions
without consulting other Council members and without official
approval to use CSICOP's name. In early April 1978, a copy of the
Rawlins letter had reached Truzzi, who also had been invited and
dis-invited to participate in the conference. The Rawlins letter
claimed that Truzzi had co-authored "an astrology-supporting
paper...and so rates as a strange sort of skeptic." Truzzi sent
Kurtz a copy of this Rawlins letter with a note that said: "Since
Dennis' letter is on Committee stationery, would appear he is
writing on behalf of the Committee, I trust that will not happen
again."
Rawlins' actions were reported in the Canadian magazine
SCIENCE FORUM July/August 1978, in an article written by Lydia
Dotto. The article, entitled "Science Confronts 'Pseudo-
Science'", began; "It was after midnight on a Saturday night when
University of Toronto astronomer Bob Garrison was awakened by a
phone call. The caller identified himself as a member of the
Committee for the Scientific Investigation of Claims of the
Paranormal, and according to Garrison, he spent the best part of
the next hour urging the U of T scientist not to participate in
the conference on astrology...Dennis Rawlins, a California
astronomer and science writer and a member of the Committee,
acknowledged in an interview that he made the call, but denied he
was trying to talk Garrison out of attending the
conference...this and other incidents surrounding the conference
have become something of a cause celebre, particularly since the
event was cancelled shortly before it was to have taken place in
mid-March. Predictably, ACCUSATIONS BEGAN TO FLY THAT SCIENTIFIC
OPPONENTS OF ASTROLOGY WERE ENGAGED IN A CAMPAIGN TO SUPPRESS
FREEDOM OF SPEECH." (Emphasis added.)
Indeed they did, much to CSICOP's embarassment. Britain's
New Scientist magazine, in its June 29, 1978, issue, quoted the
Canadian magazine in an article that began: "Earlier this year an
astronomer at the University of Toronto, Dr. Bob Garrison, was
awakened by a phone call from a member of Committee for the
Scientific Investigation of Claims of the Paranormal. The caller
allegedly spent most of the next hour trying to dissuade Garrison
from taking part in a conference on astrology."
This New Scientist account was picked up by FATE magazine,
which in turn attributed the action to CSICOP rather than to one
Council member. FATE commented: "If you have difficulty
understanding their (CSICOP) motives, remember that here is a
dedicated group of witch-hunters seeking to burn nonbelievers at
the stake." (How ironic that FATE now is promoting the views of
the same person whose intemperate earlier actions had provoked
FATE's harsh criticism.) The same criticism of CSICOP, because of
Rawlins' actions surfaced again in a feature article in THE
WASHINGTON POST (Aug. 26, 1979). The article, syndicated and
published elsewhere, was written by Ted Rockwell who was
identified as a member of the Parapsychological Association.
When I learned of the Rawlins incident, I was shocked as
were others on the Council. But all of us hoped that Council
members had learned an important lesson from the incident and
that it would have a maturing effect on Rawlins. Yet before
another year had passed Rawlins would once again demonstrate his
inability to distinguish between official CSICOP actions and
those of its individual members.
Originally it was expected that the required calculations of
Mars' position at the time of birth of U.S. champions (for the
second test) would be performed by Prof. Owen Gingerich of
Harvard University. But during the summer of 1978 the Harvard
astronomer was on an extended leave so Kurtz asked Rawlins to
perform the celestial mechanics computations. Rawlins did so and
found in sharp contrast to Gauquelin's findings that 22% of the
European champions were born when Mars was in the two key
sectors, and compared to the "chance" benchmark figure of 17%,
only 13.5% of the U.S. champions were born when Mars was in the
two key sectors. Thus, Rawlins' calculations showed that if Mars
had any effect on champions, it was a pronounced NEGATIVE effect
for U.S. athletes.
On Sept, 18, 1978, Rawlins prepared a four-page report
describing the procedures he had used in his calculations and a
summary of the results. But Rawlins could not resist including
some denigrating charges against Gauquelin. For example:
"Gauquelin was well known in his teens for his casting of
horoscopes (a practice he has since disowned)..." The comments
were both gratuitous and inappropriate.
Relations between Rawlins and Gauquelin had been strained
since CSICOP published a long, rambling Rawlins attack
(Fall/Winter 1977) in which he accused Gauquelin of "misgraphing
the results of the Belgian Comite Para check on his Mars-athletes
link..." Gauquelin had responded with the charge that Rawlins had
distorted and misrepresented the facts in a letter which then was
scheduled to be published shortly in the Winter 1978 issue of THE
SKEPTICAL INQUIRER. The same issue also would carry a sharp
rejoinder from Rawlins.
Thus it is hardly surprising that Kurtz decided that it
would be best if the upcoming summary report on the results of
the U.S. champions test should be written by Zelen, Abell and
himself -- especially since the three of them had jointly
authored the earlier article and Abell had proposed the U.S.
test. If Kurtz instead had suggested that the U.S. champions test
report be jointly authored with Rawlins instead of Abell,
"sTARBABY" might never have been published. This is evident from
numerous Rawlins complaints in "sTARBABY." For example, Rawlins
complains that the day after Kurtz received his Sept. 18, 1978,
report (with the ad hominem attack on Gauquelin) "Kurtz wrote
Abell to suggest KZA (Kurtz, Zelen and Abell) confer and prepare
the test report for publication (EXCLUDING ME)." (Emphasis
added.) (P.79.)
Rawlins also complains that Kurtz asked Zelen and Abell "to
verify the work," i.e. Rawlins' calculations. (P.80.) Because of
the importance of test, it was good scientific protocol to ask
other specialists to at least spot-check Rawlins' computations.
Then Rawlins reveals he was angered because "Abell asked
countless questions about my academic training." (P. 8O.)
Inasmuch as Rawlins lists his academic training as being in
physics rather than astronomy, Abell's questions seem justified.
Further evidence of Rawlins' wounded ego is his complaint
that "not only was Abell being invited to the press conference
(at the upcoming Council in Washington, D.C.), he was to be the
CSICOP spokesman on astrology in Washington." (P.81) Rawlins said
he "strongly protested the high-handedness of the choice of Abell
as the speaker at the annual meeting...I emphasized that CSICOP
had plenty of astronomers associated with it (Carl Sagan, Bart
Bok, Edwin Krupp and others), all of them nearer Washington than
Abell who lived all the way across the country, in the Los
Angeles area." (In fact, Krupp also lived in Southern California,
Bok lived Arizona, and Sagan then was working in California on
his "Cosmos" television series.)
In "sTARBABY," Rawlins claims that Abell had been invited to
speak because "Kurtz was trying to suppress my dissenting report
(of Sept. 18, 1978) and (by not paying my travel fare) to keep me
from the December Council meeting while inviting to Washington as
a prominent CSICOP authority the very person whose appointed task
I HAD MYSELF PERFORMED" (his italics, p. 81). In reality, there
was no question that Rawlins' Sept, 18, 1978, report, describing
his analytical procedures, needed to be published. The only
question was whether it should include the ad hominem attack on
Gauquelin.
It was not until approximately one year AFTER the results of
the Zelen test were published in THE HUMANIST that Rawlins first
charged the use of "bait-and-switch" tactics--what he calls
"BS"--had been employed. This allegation was contained in his
letter of Nov. 2, 1978, to Zelen, with a copy to Kurtz. BUT
RAWLINS STILL DID NOT CHARGE THAT THIS AMOUNTED TO A "COVER-UP,"
OR THAT CSICOP WAS INVOLVED. Quite the opposite. A few weeks
later when the Winter 1978 issue of THE SKEPTICAL INQUIRER was
published, there was a Rawlins response which said: "It SHOULD BE
CLEARLY UNDERSTOOD THAT CSICOP AS A BODY NEVER HAD ANYTHING TO DO
WITH THE HUMANIST ZELEN TEST 'CHALLENGE'...PUBLISHED BEFORE THE
COMMITTEE WAS FOUNDED"(Emphasis added.)
Like most members of CSICOP's Executive Council who had not
been involved either in the first (Zelen) test or the subsequent
U.S. champions test, and who were not sufficiently expert in
celestial mechanics, statistics or astrology to take a prior
interest, my first exposure to the controversy came during the
Council meeting in Washington in early December, 1978, when
Rawlins unleashed a rambling harrangue. Understandably I was
confused by Rawlins' charge that CSICOP somehow was involved in a
Zelen test-results cover-up that had occurred more than a year
before which contradicted his just-published statement in THE
SKEPTICAL INQUIRER stating that the original Zelen test was NOT a
CSICOP-sponsored effort.
Despite my efforts to understand Rawlins' allegations, it
was not clear to me (and to many other Council members) just what
it was that he now was claiming had been"covered-up." After three
years of working with Rawlins I was well aware of his proclivity
for making harsh, exaggerated charges. Most often these were
directed against supporters of the para-normal, but sometimes
also against Council members who disagreed with his proposals for
intemperate actions against "the believers." For example, Rawlins
had charged that Truzzi was involved with the "Church of Satan."
Beyond having difficulty in understanding the specifics of
Rawlins' charges, I failed to grasp what he thought should be
done to correct the alleged problem. Because the hour was getting
late and Council members had to leave to catch flights back home,
I suggested to Rawlins that he write a memorandum that clearly
and concisely set forth the basic issues and that he recommend
appropriate corrective action. In this way Council members could
better comprehend the matter and consider corrective action if
such were justified. Rawlins cites this in "sTARBABY" and claims
he was the only party who had put the issues in writing. BUT HE
DID NOT SEND COPIES OF SUCH MEMORANDA TO COUNCIL MEMBERS. ONE
LOGICAL EXPLANATION FOR THIS IS THAT PREVIOUSLY HE DID NOT
BELIEVE THE MATTER INVOLVED CSICOP OR REQUIRED COUNCIL MEMBERS'
ATTENTION.
Rawlins was the last one to leave my apartment (where we had
been meeting that night) and he continued his earlier harrangue
but without clarifying the issues. Later, he called me from the
airport to continue the discussion. Again I asked that he clarify
the issues for me and other Council members by preparing a
memorandum. I assured Rawlins that since I had not been involved
in either of the two tests and since he had recommended my
election to Council, he could expect me to be at least neutral if
not sympathetic.
Rawlins never responded to my request. About six weeks later
(Jan. 17, 1979), he did circulate a five-page memo to CSICOP
Fellows and Council members. It was a "baby sTARBABY" which cited
a number of ALLEGED mistakes that had been made by OTHERS
involved in the tests and in CSICOP's operations. I replied on
Jan. 31 saying that his memo was "for me an unintelligible
jumble." I added: "without meaning to give offense to a friend, I
once again urge you -- as I did at our meeting here -- to outline
the problem...then outline your recommendations. And please do
not assume, as you have done, that all of us follow the G-affair
as closely as you have done." My letter concluded: "Skip the
invective...outline the problem clearly, concisely, and offer
your recommendations."
Rawlins never responded to this request. Today, following my
recent investigation, I know why. There was no cover-up, except
in Rawlins' troubled mind, fed by the fires of a wounded ego and,
perhaps, by embarassment over his unauthorized intervention in
the University of Toronto symposium. Rawlins was unable to
recommend specific corrective action because nothing could have
saved his wounded ego unless it were possible to turn back the
clock and to have invited Rawlins to be the CSICOP speaker on
astrology in Washington and to replace Abell in writing the
report on the results of the U.S. champions test.
Readers of "sTARBABY" might easily conclude that Rawlins
believes that Zelen/Kurtz/Abell, in the Nov/Dec. 1977 issue of
THE HUMANIST, should have conceded "Gauquelin has won" and
cancelled plans for the U.S. champions test. Yet had they done
so, Rawlins would have been outraged because such a concession
would imply that the Zelen test had proved the Mars effect beyond
all doubt and this was not true. Had Zelen/Kurtz/Abell even
contemplated such a concession, I am certain that Rawlins would
have urged that they be ousted from CSICOP.
"sTARBABY" reveals that Rawlins imagines many things that
simply are not true, such as his charge that I was involved in a
plot to suppress his discussions of the Gauquelin test at the
1978 Council meeting. His article implies that Council meetings
are characterized by attempts to suppress dissenting views. In
reality one usually hears almost as many different viewpoints as
there are Council members present. And Kurtz is the most
unconstraining group chairman I have ever known in the many
organizations of which I have been a member.
Even on easily ascertainable matters, Rawlins chooses to
rely on his vivid imagination or recollections rather than take
time to check the facts. For example, in "sTARBABY," Rawlins
claims that he was an "associate editor" of THE SKEPTICAL
INQUIRER, as well as being a member of its editorial board --
which he was [not]. Rawlins makes that claim in seven different
places in his article. One would expect that a person who
imagines himself to be an associate editor of a publication over
a period of several years would at least once look at that
publication's masthead, where its editorial staff is listed. Had
Rawlins done so he would not have made this spurious claim.
This is not an error of great consequence. But when I
pointed it out to him, his response was revealing, especially
because he accuses others of being unwilling to admit to error
and of resorting to "cover-up." Rawlins' letter of Sept. 21,
1981, explained that at a Council meeting HELD FOUR YEARS EARLIER
he remembers that "Kurtz called all Ed. Board members 'Associate
Editors'...I adopted to save syllables." Rawlins tries to justify
his misstatement of fact on the grounds that he was able to save
approximately 42 characters in his 75,000-character-long article!
In "sTARBABY," Rawlins claims that the full-day meeting of
the Council in Washington was held at the National Press Club
because this was "the temple of CSICOP's faith." (P. 86.) Had
Rawlins asked me, I would have informed him that I had selected
the National Press Club because it was the lowest-cost facility
in downtown Washington that I could find. But Rawlins decided he
knew the answer without bothering to investigate. This is neither
good science nor good journalism.
In the previously cited Rawlins memorandum of Jan. 17, 1979,
following the Washington meeting, he wrote that he planned to
reduce his involvement with CSICOP. He added that there was no
reason to "hide" CSICOP's problems "from the public. So I may
inform a neutral, responsible, unsensational member of the press
re the foregoing." In reality Rawlins already had taken such
steps at the December Council meeting whose press seminar was
attended by an experienced journalist with a known empathy for
some paranormal claims. During the early afternoon Rawlins and
this journalist left the meeting together and returned together
several hours later. But this journalist never published anything
on the matter, possibly because he has as much difficulty in
understanding Rawlins' charges as did Council members.
According to "sTARBABY," in mid-1979, Rawlins received a
letter from Jerome Clark of FATE magazine, expressing an interest
in learning more about Rawlins' complaints against CSICOP.
Rawlins claims that shortly afterward "I told the Council I'd be
open with FATE." I question the truthfulness of his statement
because Rawlins did not bother to attend the next Council meeting
in December, 1979, nor have I been able to locate any Rawlins
letter or memorandum to substantiate this claim.
"sTARBABY" claims that "as the FATE-story realization set
in, Council reacted like the White House when it learned that
John Dean had sat down with the prosecution (during the Watergate
scandal). (P.91) This claim I know to be false. The prospect of a
Rawlins article in FATE was never discussed at the 1979 or 1980
Council meetings, nor by memorandum during the two intervening
years. Otherwise CSICOP would have prepared a response which it
could have released immediately following publication of
"sTARBABY," preventing Rawlins from boasting that failure of
CSICOP to respond quickly to his many charges indicated an
inability to do so.
Returning, chronologically, to the fall of 1979, CSICOP was
preparing to publish the results of the U.S. champions test in
the Winter 1979-80 issue of THE SKEPTICAL INQUIRER. Rawlins
demanded the right to revise and expand his original Sept, 18,
1978, paper, and was given that opportunity. Furthermore,
according to "sTARBABY," Rawlins informed Ken Frazier, editor of
THE SKEPTICAL INQUIRER, "that if there were any alterations not
cleared with me, I wanted a note printed with the paper stating
that deletions had occurred over the author's protest and that
the missing portions could be obtained directly from me." (P.
92.)
Frazier (who had been recommended for the position by
Rawlins himself), acting on the recommendation of Prof. Ray
Hyman, a Council member who reviewed the Rawlins paper and the
others, and on Frazier's own long editorial experience, decided
to delete the sentence referring to Gauquelin's earlier interest
in traditional astrology. Frazier also opted to delete another
sentence that read: "In this connection I must also say that,
given the self piekill upshot (sic) of their European
(nonchampions) adventure plus their failure to perform
independently the U.S. study's technical foundations (sector
position, expectation curve), I find it amusing that ZKA (Zelen,
Kurtz, Abell) are the main commentators on this test in THE
SKEPTICAL INQUIRER." Once again Rawlins' wounded-ego had
manifested itself.
On Nov, 6, 1979, Rawlins sent a memo to other members of the
Editorial Board complaining that his article "has been neatly
censored here and there, so I have asked to add a statement
saying so and suggesting that readers who wish to consult the
original version may do so by contacting me. This sentence has
itself been bowdlerized (so that it reads as if no tampering
occurred)." Frazier had proposed an alternative sentence, which
was published at the end of the Rawlins paper, that read:
"Further commentary on the issues raised in this paper and in
these notes is available from the author." Rawlins' address also
was published.
This is the basis for Rawlins' harsh charges of "censorship"
against Frazier, the man whom he had so highly recommended for the
position. If Rawlins' complaint were justified, every working
journalist could make the same accusations regularly against
those who edit his/her copy to assure clarity and good taste and
to avoid libel. In response to Rawlins' charges, Frazier wrote to
members of the Editorial Board explaining what had transpired.
Frazier noted, "Dennis seems to believe his position as a member
of the Editorial Board gives his writings special status exempt
from normal editorial judgment. None of the rest of you has ever
suggested this," i.e. demanded privileged treatment. So because
Rawlins was not given privileged treatment, he charges
"censorship."
In the same Nov. 6, 1979, letter charging censorship,
Rawlins complained that he alone among Council members had not
been reimbursed for his travel expenses of $230 to the previous
Council meeting in Washington. Rawlins said that he would need
$400.00 for travel to attend the upcoming Council meeting in New
York and added "I won't do that unless all 63O dollars are here
beforehand." Kurtz promptly sent Rawlins a check for $350 as a
travel advance and assured him he would be reimbursed for
previous travel expense as soon as he submitted an expense
account--which Rawlins had never done (In "sTARBABY," Rawlins
characterizes this as a "ridiculous excuse" for failure to
reimburse him earlier.) Rawlins cashed the $350 check but did not
attend the New York Council meeting, nor did he inform the
Council that he would not attend. Rawlins never refunded the $120
difference between $230 he claimed was due him and the $350 he
received. Yet Rawlins professes to have been shocked and
surprised when the Council voted unanimously not to reelect
Rawlins at its New York meeting. (Since Rawlins seems so easily
shocked and surprised, I suspect he was equally surprised at the
resignation of Richard M. Nixon.)
Two months later, Rawlins wrote to Frazier saying he wished
to resign from the Editorial Board. But he insisted that the
resignation should not take effect until his statement
complaining about not being reelected "in absentia" was
published. This Rawlins statement claimed that he had not been
reelected solely because he had criticized "CSICOP's conduct
during ITS FOUR YEAR INVOLVEMENT in testing Gauquelin's neo-
astrology..." (Emphasis added.)
Had Frazier opted to publish this grossly inaccurate
statement, which he did not, readers might well have wondered if
there were really two different Dennis Rawlins, recalling barely
a year earlier when a Rawlins letter had been published which
said: "It should be clearly understood that CSICOP as a body
never had anything to do with the Humanist Zelen test
'challenge'..." When Frazier accepted Rawlins' resignation, this
prompted Rawlins to complain that he had been removed from the
Editorial Board without "cause or written notice." Later,
following a mail ballot of Council members, CSICOP dropped
Rawlins from its list of Fellows. (The vote against Rawlins was
6:1.)
The foregoing highlights the key issues and actions that
prompted FATE and Rawlins to charge that CSICOP "bungled their
major investigation, falsified the results, covered up their
errors and gave the boot to a colleague who threatened to tell
the truth." (After my investigation, a re-reading of "sTARBABY"
gives me the feeling that I am reading a Pravda account
explaining that the Soviets moved into Afghanistan to help the
Afghans prevent an invasion by the U.S. Central Intelligence
Agency.)
Were it possible to turn back the clock, undoubtedly Kurtz,
Zelen and Abell would try to be more precise in defining test
objectives and protocol and would do so in writing. And more time
would be spent in more carefully phrasing articles dealing with
such tests. But all CSICOP Council members and Fellows have other
full-time professions that seriously constrain time available for
CSICOP efforts.
Were it possible to turn back the clock, the Council should have
insisted in the spring of 1978 that Rawlins issue a public
statement that he had erred in using CSICOP's name in support of
his personal actions connected with the University of Toronto's
planned astrology symposium. Failure to do this has resulted in
an unjustified blot on CSICOP's modus-operandi. Also at that time
the Council should have developed a policy statement, as it
recently did, that more clearly delineates activities that
members perform officially in behalf of CSICOP and those carried
out as private individuals.
When a small group of persons met in Buffalo in May, 1976,
to create CSICOP, their motivation was a concern over the growing
public acceptance of claims of the paranormal. CSICOP was created
to provide a counter-balance to those who espouse a variety of
claims, ranging from UFOs to astrology, from the "Bermuda
Triangle" to psychic phenomena. With the benefit of experience,
it was apparent that there was an extreme spectrum of viewpoints
on the Council. Rawlins was at the "hit-'em-hard" extreme, while
Truzzi was at the opposite pole and resigned after a couple
years, partially as a result of behind-the scenes plotting by
Rawlins which he admits in "sTARBABY." Now Rawlins has departed
and, in my view, CSICOP is much the better for it.
CSICOP never has tried to destroy those organizations that
promote belief in paranormal causes. But individuals in these
organization have tried to discredit CSICOP, even going so far in
one instance as to circulate a forged letter.
FATE magazine made wide distribution of the Rawlins
"sTARBABY" article in reprint form, together with its press
release. Prof. R.A. McConnell, University of Pittsburgh, founding
President of the Parapsychological Association, also distributed
copies to CSICOP Fellows and Council members, among others. In
his accompanying letter, McConnell said he believed the "Rawlins
report is certainly true in broad outline and probably true in
every detail...He has created a document of importance for the
history and philosophy of science." McConnell quoted an "unnamed
scientist" as claiming that "Rawlins has uncovered the biggest
scandal in the history of rationalism." McConnell characterized
CSICOP as "an intellectually dishonest enterprise."
FATE and McConnell have demonstrated the intrinsic flaw in
the basic approach of those who promote claims of the paranormal
-- THEIR EAGERNESS TO ACCEPT CLAIMS OF EXTRAORDINARY EVENTS
WITHOUT RIGOROUS INVESTIGATION. Neither FATE nor McConnell
contacted CSICOP officials to check out Rawlins' charges. This
demonstrates why CSICOP is so sorely needed.
The late President Harry Truman phrased it well: "If you
can't stand the heat, stay out of the kitchen." CSICOP is "in the
kitchen" by choice and intends to remain there despite the heat.
The response of CSICOP's Council and its Fellows to recent events
shows that the Committee is not an easy victim of heat-
prostration.
If the Mars effect, or any other paranormal hypothesis,
should ever be demonstrated using rigorous scientific procedures,
there simply is no way in which the small group of individuals
involved in CSICOP could ever hope to suppress such evidence. Nor
have I found any CSICOP Council member or Fellow who is so
foolish as to try.
(end)
[In the years following "sTARBABY", Rawlins has continued to
receive publicity by making sensational charges of
scientific coverup and fraud. In 1988 he made national
headlines by renewing an earlier charge he had made before
CSICOP's founding, this time supposedly supported by a new-
found document: that Admiral Peary never actually reached
the North Pole during his famous expedition in 1909, but
instead fabricated his navigational records to make it
appear as if he had. A New York Times article of October 13,
1988 carries the headline: "Peary's Notes Said to Imply He
Fell Short of Pole." It begins: "New evidence based on
navigational notes by Robert E. Peary indicates that the
Arctic explorer fell short of his goal and deliberately
faked his claim in 1909 that he was the first person to
reach the North Pole, according to an analysis by a
Baltimore astronomer and historian ... Dennis Rawlins, an
independent scholar who trained as an astronomer and who has
a long-standing interest in Peary's expedition, said
yesterday that his analysis of the navigational notes,
mainly sextant readings of the sun to establish geographic
position, indicated that Peary knew that he had come no
closer than 121 miles from the Pole." Officials of the
National Geographic Society promised to examine Rawlins'
data, but added "We believe Mr. Rawlins has been too quick
to cry fake."
After a three-month investigation of Rawlins' charges, a
press conference was sponsored by The Navigation Foundation
at which they dismissed his "sensational claims". As
reported in a Baltimore Sun story syndicated Feb. 2, 1989,
"Since October [Natl. Geographic] Society President Gilbert
M. Grosvenor and others had quietly endured Rawlins' public
calls for debate and unconditional surrender on the Peary
issue." The Society was willing to take seriously an
analysis by the British explorer Wally Herbert, based on
other evidence, that a navigation error may have caused
Peary to miss the pole by about 45 miles. "Suggesting that
Peary might not have reached the Pole is one thing," said
Grosvenor. "Declaring Peary a fraud is quite another."
Rawlins held his own "informal press conference" afterwards,
reports The Sun, in which Rawlins "admitted he had confused
time readings for chronometer checks with altitudes of the
sun and had mistaken serial numbers on the chronometers for
navigational observations." Rawlins conceded, "My
interpretation has some problems, and I acknowledge that.
It's fair to say that, if I'm saying Peary was a fraud, I
think I have not yet met the burden of proof."
Finally, in December, 1989, a 230-page report commissioned
by the National Geographic Society was released, concluding
that Peary actually did reach the Pole. As reported in a
story on p.1 of the New York Times, Dec. 12, 1989, a new
analysis of Peary's records by professional navigators
concluded that Peary's final camp was not more than five
miles from the Pole. "The report said, there was no evidence
of fraud and deception in the explorer's records. But one
critic, Dennis Rawlins, a Baltimore astronomer and
historian, said he remained convinced, despite the new
study, that Admiral Peary did not reach his goal and had
faked his claim."
Robert Sheaffer, Nov., 1991]
--
Rick Moen - via RBBS-NET node 8:914/201
INTERNET: moen@f207.n914.z8.RBBS-NET.ORG

Robert Sheaffer, Nov., 1991]
--
Rick Moen - via RBBS-

344
txt_files/cryonics.th Normal file
View File

@ -0,0 +1,344 @@
From: hkhenson@cup.portal.com (H Keith Henson)
Newsgroups: sci.cryonics
Subject: Selling Cryonics (was ICE DWARFS)
Message-ID: <71938@cup.portal.com>
Date: Thu, 17 Dec 92 19:41:54 PST
Organization: The Portal System (TM)
References: <1992Dec15.125933.42625@urz.unibas.ch>
Lines: 335
A Theoretical Understanding
By
H. Keith Henson
and
Arel Lucas
The March '89 Cryonics carried Dave Kekich's article "A
Practical Memorial." It was about Oz, Dave's friend who did not make
it into suspension when he needed it--despite many qualities you would
think predisposed him to consider cryonics. Not the least of these
predispositions was having a close friend long active in cryonics. In
the article, Dave focused on his sense of failure as a cryonics
salesman in his effort to understand why Oz did not make suspension
arrangements. The article has prompted us to spend some time in front
of our word processors on another way to view the problem of "selling
cryonics"-- in terms of the genetic origin of humans and the memetic
origin of culture. In this discussion, there are deep connections to
evolution, which itself is well rooted in our understanding of the
physical world around us. Because of the need for background, we will
wander a long way from the immediate problem of getting people to make
cryonic suspension arrangements, but by the time we get back, you
might have a deeper appreciation of the difficulties of "selling" the
cryonics concept.
Most readers of Cryonics understand that we arrived at our
current physical structure (which includes everything--genes, jawbones
and brains) through the process of evolution, that is through random
variation and very non-random survival. About 4.5 million years ago
our branch of the primate tree split from our nearest relatives the
chimpanzees when the climate changed, and the shrinking forest left
them "high and dry." (All this is current best guess, but there is a
large collection of evidence.) An entire suite of physical and
behavioral changes seems to have happened together.
Chimpanzees today have behaviors, such as sharing meat, that
our common ancestors are likely to have had. This tendency seems to
have been elaborated by our male ancestors into a steady provisioning
of the females and young by bringing food to them from the
encroaching, but highly productive, protein-rich plains. (As opposed
to the chimps' way of life where the females provide virtually all
food for the young and the males guard the territory.) Incidentally,
compared to forest, grasslands provide a *lot* of meat per square
mile.
It is likely our common ancestor could walk upright for a
short distance since chimps can do it. Walking upright for ever
further distances had an advantage because the males who could free
their hands for carrying food in this changed situation were more
successful in the number of children who carried their genes in the
next generation. Of course this took place in social groups, so there
was continual selection for: genes that made cooperative behavior
more likely; genes to exploit others cooperation; and genes to resist
being suckered. Computer evolution simulations (see Selfish Gene) of
such situations lead to stable mixes of reproductive strategies
similar to what are actually observed in human populations.
As genes became more common which (through the process of
embryogenesis) constructed males more and more likely to work (mostly
in groups) to feed *their* mates and children, other traits became
advantageous. Sequestered estrous (as opposed to the flamboyant
chimpanzee event), continual sexual receptivity, and a tendency toward
monogamy (and jealousy) all tend to genetically reward provisioning
males. All of this culminated in the several- million-year old
institution of the human family.&
[footnote & An alternate scenario could be constructed, a sex-for-meat
swap, starting with females who were somewhat receptive even when not
in estrous. Same result.]
The net effect of all these changes was to about double the
reproductive rate of proto-humans compared to the chimpanzees. Our
ancestors needed the high reproductive rate because the plains were
*Dangerous* places (no trees to climb). A lot of them seem to have
been eaten by leopards and the other large predators of the time.
Some 2.5 million years ago we find the first evidence of
worked stone. While even chimpanzees pass cultural knowledge, such as
how to catch termites, from generation to generation, worked stone is
the first surviving evidence that our ancestors started passing down
the generations complex, non-genetic, behavior- influencing
information. This information can be said to program high level
"agents" in the mind which are invoked to do or make things. About
the same time, the brain size of our forebears started to increase
substantially over the chimpanzee's. Tool making and larger brains
probably influenced each other in a positive feedback cycle.
Those able to learn the more complex tasks from those around
them must have had a significant survival advantage, in spite of the
increased maternal and infant mortality from getting those larger
brains delivered.
As the *information* of how to chip rock and other such
discoveries was passed on to larger numbers of the very people whose
survival it enhanced, a new evolving entity, the "meme" or replicating
information pattern became increasing significant.
(footnote ref--first defined in The Selfish Gene by Richard
Dawkins 1976)
Genes are totally dependent on cells; complex memes are no
less dependent on large human brains. Memes run the gamut from
essential symbionts to dangerous parasites. They evolve, and, in
particular, they have *co-evolved* with the human line. In the
aggregate, they constitute culture. The memetic information passed
down from generation to generation exceeded our genetic data some time
ago.
As human brains enlarged they improved in the ability to
anticipate changes, making plans to hunt, to move with the seasons,
and, later, to plant seeds for a future harvest. These and similar
"smart" behaviors have obvious survival advantages, but they may have
disadvantages as well. Alas, it seems that it is quite possible to be
too smart for "the good of one's genes." A contemporary example is the
statistical fact that highly intelligent people have significantly
fewer children than the norm. For very different reasons, people of
*subnormal* intelligence also have lower-than-average reproductive
success.
Many traits of populations that have a bell curve distribution
are trimmed by some form of selection on both ends. If they were not,
natural selection on individuals on one end of the curve would cause
the population norm to drift until a new norm was reached where
individuals far out from the norm in either direction suffered reduced
reproductive success in about the same amounts.
Being able to anticipate the future may not have been an
unmixed blessing for early humans. Besides worrying about what to eat
in the morning, and how to get through the night without being eaten,
our ancestors could worry about existential angst, and ponder
questions of the "Where Was I Before I Was Me?" and "What Happens
After I Die?" kind. It may sound silly, but such questions, prompted
by frequent deaths among those around you may have been a barrier for
hundreds of thousands of years to the emergence of smarter people with
enhanced ability to anticipate and plan for the future. It is not
good for your genes to be dwelling on such questions while something
large, furry, and not in the least concerned about angst, sneaks up
and nips off your head!
(footnote --at least if it does it before you have lots of
kids, and have helped raise lots of grandkids. The recognition of
this fact is reflected in the Chinese tradition that those who would
attempt to understand the I Ching--a contemplative task bound to
invoke troubling questions--are traditionally warned off doing so
until they have completed the parental phase of life, and secured the
future of their grandchildren.)
We know that eventually smarter people did emerge, and came to
dominate the world. This started about 200,000 years ago, roughly the
same time that DNA studies indicate that one woman was the common
ancestor of us all. Like chipped rock and larger brains emerging
together, it is possible that some meme mutated out of more primitive
ones, or arose from observations to form a "religious belief" that
provided "answers" to such questions and had the effect of
compensating for genes that otherwise would made us too smart for our
own (genetic) good. Beliefs that could fit this description are known
to go back to the very beginning of written history, and
archaeological digs produce physical evidence (flower grave offerings)
of such beliefs back at least 70,000 years. (The actual timing is not
important to this argument, but objects believe to be "religious" in
nature became common by about 35,000 years ago.)
"Religious" memes compensating for too-smart-for-their-
own-good brains is rank speculation, but Marvin Minsky argues that
more complex brains are inherently less stable. It is true that our
more remote relatives (such as cows) seem to have fewer mental
problems, perhaps just because they have less "mental." His
thought
(footnote--- personal communication through Eric Drexler)
is that certain "agents" built with patterns from outside
could enhance the stability of a complex mind. He discussed a variety
of mental "agents" in Society of Mind, reviewed in Cryonics some time
ago. One class, censors, would be especially useful if kept someone's
mind from spiraling down into a blue funk over unanswerable questions.
Ideas that when a family member died he had gone to "the happy hunting
grounds," and that you would see him again might make a big difference
in the survival of grief- stricken relatives. Jane Goodall's report
of a case where a chimpanzee seems to have died of grief gives this
model some credibility. (The chimp was believed to have had an
abnormally strong attachment to his mother.)
This is very speculative, but "religious" memes could have
"functions" such as reducing the effects of grief or answering
philosophical questions about which it was (genetically) unprofitable
to ponder. These memes would be favored in a causal loop if they
improve the survival of people carrying genes which tend to destablize
a person's mental state, but otherwise improve their survival.
Such genes might (for example) contribute to intelligence,
sensitivity, and forming strong emotional attachments. After a few
millennia, religious memes and conditionally advantageous genes would
become quite dependent on each other. In an environment saturated
with religious memes, there would be little pressure for minds to
evolve that could get by without stabilizing memes.
In turn, the religious memes that originated long ago have had
plenty of time to split into varieties, compete for hosts, and
themselves evolve in response to a changing environment. (An
occasional variation may kill its hosts, a la Jim Jones.) A lay
observer looking for similarities over such a period might not
recognize much common ritual. (Joseph Campbell devoted his life to
discovering common threads in ritual.) Both modern and ancient
religions seem to "fit" into similar places in the mind, and have the
similar functions of providing "answers" to the unanswerable, and
comfort to the grief stricken.
The environment in those minds (mostly the result of other
memes) has greatly changed as people accumulated more observations
about the world around them and got better at manipulating it. There
are known changes in the history of religion, such as the tendency for
monotheistic religions (in the western cultural tradition) to replace
polytheistic ones, and the well known tendency for religions (and
similar belief patterns) to mutate into new and competing varieties.
We can see some (the written part) of the accumulated variation. For
example, the religion of the Old Testament is recognizably the
ancestor of the more recent New Testament.
Because humans learn from other adults as well as parents,
religious beliefs that are "better suited" to infect human minds could
spread, even (if it survived translation) across language boundaries.
(Islam simply imposed Arabic on its converts.) In Europe during early
historical times, we can see the displacement of older religions with
Christianity. Within Christianity we can see in recent historical
times competing varieties mutate from earlier versions (a classic
example would be the Mormons) and within the US in the last decades we
have seen the arrival of both new "religions" such as Scientology, and
the repeated importation of eastern religions. (Almost all new and
transplanted religions fail--we only see the ones which grow large
enough to notice.)
Because human minds usually hold only one religion at a time,
religious memes are in "competition" for a limited number of human
minds. This sets up the conditions for a powerful "evolutionary
struggle" between religious memes. You should expect the memes which
survive this process to resist being displaced, and to induce their
hosts to propagate them.
How (at long last!) does this relate to the difficulty of
selling cryonics? We submit that the long term mental changes that
happen to people who make cryonics arrangements have a lot in common
with religious conversions.
[footnote We doubt many realize it at the time. When we made
arrangements with Alcor it was just the logical thing to do, given our
understanding of nanotechnology. It was only with the threats to
Alcor, and its patients, over the Dora Kent affair that made us
realize how important cryonics had become to us.]
Logically, cryonics should be
considered a low tech way to reach high tech medicine, no more
exciting than iron lungs, or pacemakers. Alcor, of course, is *not* a
religion; it doesn't aspire even to be a cult. However, the mental
"agents" the cryonics idea constructs in people's minds have the same
"deflect or modify thoughts about death" effect as some of the mental
agents most religious memes build. The cryonics memes seem to "fit"
into the "mental space" in people that is often occupied by a
religion. As a result people class it as one, or something closely
related. Unfortunately, this is a hotly contested spot in the mind!
Memes of this class usually include a submeme, "this is the only true
belief, listen to no others."
(Footnote. Douglas Hoffstadter and one of us (Arel) prefers to look
at a meme as complex as a religion as "a scheme of memes," that is,
evolutionary bound cooperating groups of memes similar to the way
mutually advantageous genes are sometimes grouped on cronosomes.
Dawkins discussed the mutual propagation of the God/Hellfire memes in
the Selfish Gene.)
Religious memes (including such beliefs as reincarnation)
build lasting, often lifelong, agents in human minds. This part of
human minds where these agents are located seems to be particularly
resistant to change,
[footnote As an aside, there actually seems to be a very small chunk
of brain tissue that might be called a "religious stabilizing module."
In rare cases where this area was destroyed, the victims could change
what seemed to be deeply held religious beliefs several times a week!
The reference to this is in The Social Brain by Michael Gazzaniga]
perhaps because the "function" of
these memes is not much related to the way "this world" operates.
That is, one belief in this category is about as good for you (and
your genes) as the next. If this is the case, switching holds little
advantage, and the process of modifying anything close to this area
may be dangerous to mental stability. Cryonics (if it works) is very
much of an exception to the rule.
On the other hand, the stability of religious beliefs may have
little to do with human survival. It simply may be a characteristic
of the surviving (and therefore observable) religious memes.
The difficulty of changing from one religion to another, or
adding cryonics to your meme set may be compounded by "censor agents"
(as Minsky calls them) that keep deflecting your thoughts away from
thinking about anything to do with death. As much as anything censor
agents may lie at the root of the remarkable degree of procrastination
that you often see in the cryonics signup process. (The complexity of
the paperwork does not help either!)
We wish we could use the memetic model to make specific
suggestions which would allow us all to go out and sign up the world,
or even to save our parents. We can't. The best we can do is suggest
that since most of the mental environment in which the cryonic meme
may take root is determined by other memes, getting the word out about
related subjects may be critically important to the "selling" of
cryonics. A person who knows about nanotechnology/cell repair
machines is much more likely to be infectable by the cryonics meme.
So are the people who hold the computer viewpoint of minds and brains.
Another possibility is that our friends or relatives may
eventually become more responsive. They are likely to be among that
majority, "not the first by whom the new is tried, nor yet the last to
lay the old aside." Frequent exposure to an idea lessens the
outrageousness of it. Cryonics is, after all, becoming more
respectable. Being dismissed by "most scientists" as the newspaper
stories state is properly interpreted as being accepted by "some
scientists." On the other hand, part of the fear factor about cryonics
is the possibility that it would *work*, and you would be revived all
alone in a future without friends. This may be a large part of the
problem of signing up our parents. Though we may respect them, the
world has changed so much over a single generation that it is hard to
have much in common with them. (And for that matter, it is hard to
have much in common with your children either!) Perhaps we should get
our oldest signed up members (the ones I have met are *really* nice
people) to travel about and talk to our parents.
The memetic model gives some insight into the difficulty the
idea of cryonics faces in a world of competing memes, but the picture
is far from bleak. While cryonics has grown slowly, the growth rate
has increased in the last few years. It would not surprise us for the
cryonics "movement" to experience spectacular growth (Alcor has been
growing at about 30% per year) over the next decade or two, especially
if noticeable progress is made on our *real* goal, life extension
which eventually eliminate the need for cryonic suspension.

1041
txt_files/dallas.txt Normal file

File diff suppressed because it is too large Load Diff

96
txt_files/dark.suc Normal file
View File

@ -0,0 +1,96 @@
THE THEORY OF DARK SUCKERS
==========================
as presented by Paul Holmgren
with additions and corrections by Holly Stowe
For years it was believed that light wes emitted from an electric
bulb; recent information has proven otherwise - dark is sucked into the
bulb - therefore, the bulb is a dark sucker.
There are many types and sizes of dark suckers. The largest
manufacturers of dark suckers are General Electric and Sylvania. Some
modern dark suckers utilize solid power to operate properly. Solid
power units can be purchased from Eveready, Exide, and Duracell.
The dark sucker theory proves the existance of dark suckers as well
as proving that dark is heaver than light. Some examples are as
follows:
Electric bulbs: There is less dark near the electric bulb than at a
distance of 100 feet when it is operating; therefore, it is sucking dark
and can be classified as a dark sucker. The larger the dark sucker, the
greater the distance it can suck dark. The larger the dark sucker the
greater its capacity of dark. The dark sucking capabilities are evident
when the dark sucker has reached its capacity and will no longer suck
dark. At that point you may notice the dark area on the inside portion
of the dark sucker. The larger the dark sucker, the larger the area of
dark found within. This type of dark sucker can be made directional by
placing a shield around a portion of the unit or behind it. This will
prevent dark from entering the dark sucker from that side thereby
extending the range of the dark sucker on the unprotected/unshielded
side.
Candles - primitive dark suckers: There is more dark 30 feet from a lit
candle then there is at a distance of 3 feet. Proof of it's dark
sucking capabilities is relatively simple. Examine a new unused candle,
notice that the center core is not dark. Ignite the center core. Allow
the center core to burn for about 5 minutes. Notice the lack of dark
around the candle. Extinguish the candle flame. Notice that the center
core of the candle is now dark. The center core is a dark sucker
protected by a soft insulator to extend it's life expectancy and
maintain rigidity to verify that this primitive dark sucker is operating
properly. Ignite the center core and allow it to burn for a minimum of
2 minutes. Pass a clean pencil over the top of the flame, left to right,
approximately 3 inches above the center core. Notice that there is no
dark on the pencil. Pass the pencil over the center core now about 1/2
inch. Notice that the pencil now has a dark area. The pencil blocked
the path of the dark being sucked to the core of the dark sucker. This
type dark sucker is very primitive and does not suck dark any great
distance nor does it have a large capacity.
Dark sucker solid power units may be purchased locally at a variety
of outlets. Size does not determine the life expectancy of the dark
sucker solid power unit. These solid power units wring dark hours. Two
(possibly four) large dark suckers are located on the front. On the
rear there are two (or 3) smaller dark suckers with red filters. You
may also notice several dark suckers with yellow filters. These filters
are required to remove a percentage of red and yellow from total dark so
as to energize the solid power unit. The solid power unit permits the
auto to be utilized during hours of no dark by the dark it has absorbed.
The number of dark suckers varies with the age of the automobile. Newer
automobile solid power units require a greater percentage of red
filtered dark. Older units generally require more non-filtered dark.
The solid power unit of the automobile has a dark interior. This can be
proved by cutting the solid power unit in half.
Dark is heavier than light. Dark always settles to the bottom of a lake
and/or river. Submerge just below the surface of a lake and you will
notice an absence of dark. Lower yourself to 15 feet below the surface
and you will notice a degree of darkness even on a sunny, bright day.
Lower yourself to 50 feet (or more) below the surface and you are in
total dark. Ergo, the dark has settled to the bottom; therefore, dark
is heavier than light. Modern technology has allowed us to utilize the
dark that has settled to the bottom of large rivers through the creation
of turbines which push the dark downriver to the ocean, which has a
larger holding capacity for dark and is a common safe storage location.
As the dark is passed through the turbine, a percentage of solid power
is removed and transmitted to various short term storage plants for many
usages. Prior to turbines, it was much more difficult to move the dark
>from rivers to storage areas such as deep lakes or the ocean. The
Indians would paddle their canoes very little and not very deeply if
they were going in the direction of flow of dark so as not to slow it
down. However, if they were traveling opposite the natural flow of
dark, they would dig their paddles very deep and rapidly to assist the
flow of dark to its ocean storage place.
Dark is faster than light. If you would open a drawer very slowly, you
will notice that the light goes into the drawer. (You can see this
happen.) You cannot see the dark leave the drawer. Continue to open
the drawer and light will continue to enter the drawer; however, you
will not see any dark leave the drawer. Therefore, dark is faster than
light. Go into a closet, close the door, and turn off the dark sucker.
Have a friend open the door about 1 inch. Your friend will not see any
dark leave the closet, nor will you. Have your friend open the door
until half the closet is dark and half is light. Since 2 objects cannot
occupy the same space at the same time, and you do not feel any change
in pressure, by compressing the dark, it is logical to assume that dark
is faster than light.
One last proof.
What is a by-product of movement of dark? Heat. What is a by-
product of dark suckers? Heat, again.
Therefore a dark sucker generates heat during its operation, sucking
dark from the surrounding area.


146
txt_files/dark1.txt Normal file
View File

@ -0,0 +1,146 @@
***************************************************************************
***************************************************************************
DARK CONSPIRACY INVOLVING ELECTRICAL POWER COMPANIES SURFACES
Rewritten by the Quantum Mechanic
(Author Unknown)
Updated 8/7/88 W0PN
***************************************************************************
***************************************************************************
For years the electrical utility companies have led the public to believe
they were in business to supply electricity to the consumer, a service for
which they charge a substantial rate. The recent accidental acquisition of
secret records from a well known power company has led to a massive
research campaign which positively explodes several myths and exposes the
massive hoax which has been perpetrated upon the public by the power
companies.
The most common hoax promoted the false concept that light bulbs emitted
light; in actuality, these 'light' bulbs actually absorb DARK which is
then transported back to the power generation stations via wires. A more
descriptive name has now been coined; the new scientific name is for the
device is DARKSUCKER.
This newsletter introduces a brief synopsis of the darksucker theory,
which proves the existence of dark and establishes the fact that dark has
great mass, and further, that dark is the fastest known particle in the
universe. Apparently, even the celebrated Dr. Albert Einstein did not
suspect the truth.. that just as COLD is the absence of HEAT, LIGHT is
actually the ABSENCE of DARK... light does not really exist!
The basis of the darksucker theory is that electric light bulbs suck dark.
Take for example, the darksuckers in the room where you are. There is much
less dark right next to them than there is elsewhere, demonstrating their
limited range. The larger the darksucker, the greater its capacity to suck
dark. Darksuckers in a parking lot or on a football field have a much
greater capacity than the ones in used in the home, for example.
It may come as a surprise to learn that darksuckers also operate on a
celestial scale; witness the Sun. Our Sun makes use of dense dark, sucking
it in from all the planets and intervening dark space. Naturally, the Sun
is better able to suck dark from the planets which are situated closer to
it, thus explaining why those planets appear brighter than do those which
are far distant from the Sun.
Occasionally, the Sun actually oversucks; under those conditions, dark
spots appear on the surface of the Sun. Scientists have long studied these
'sunspots' and are only recently beginning to realize that the dark spots
represent leaks of high pressure dark because the Sun has oversucked dark
to such an extent that some of actually leaks back into space. This
leakage of high pressure dark frequently causes problems with radio
communications here on Earth due to collisions between the dark particles
as they stream out into space via the black 'holes' in the surface of the
Sun.
As with all manmade devices, darksuckers have a finite lifetime. Once they
are full of dark, they can no longer suck. This condition can be observed
by looking for the black spot on a full darksucker when it has reached
maximum capacity... you have surely noticed that dark completely surrounds
a full darksucker because it no longer has the capacity to suck dark at
all.
A candle is a primitive darksucker. A new candle has a white wick. You
will notice that after the first use the wick turns black, representing all
the dark which has been sucked into it. If you hold a pencil next to the
wick of an operating candle, the tip will turn black because it got in the
way of the dark flowing into the candle. Unfortunately, these primitive
darksuckers have a very limited range and are hazardous to operate because
of the intense heat produced.
There are also portable darksuckers called flashlights. The bulbs in these
devices cannot handle all of the dark by themselves, and must be aided by a
dark storage unit called a battery. When the dark storage unit is full, it
must be either emptied (a process called 'recharging') or replaced before
the portable darksucker can continue to operate. If you break open a
battery, you will find dense black dark inside, evidence that it is
actually a compact dark storage unit.
The darksuckers on your automobile are high capacity units with great
range, thus they require much larger dark storage units mounted under the
hood of the vehicle. Since there is far more dark available in the winter
season, automobile dark storage units reach capacity more frequently than
they do in the summer, requiring 'recharging', or in severe cases, total
replacement.
Dark has great mass. When dark is drawn into a darksucker, friction caused
by the speed of the dark particles (called anti-photons) actually generates
substantial heat, thus it is unwise to touch an operating dark sucker.
Candles represent a special problem, as the dark must travel into a solid
wick instead of through clear glass. This generates a great amount of
heat, making it very dangerous to touch an operating candle.
Because dark has such great mass, it is very heavy. If you swim just below
the surface of a lake, you see a lot of 'light' (absence of dark, to be
more precise). As you go deeper and deeper beneath the surface, you notice
it gets darker and darker. When you reach a depth of approximately fifty
feet, you are in total darkness. This is because the heavier dark sinks to
the bottom of the lake, making it appear 'lighter' near the surface.
The power companies have learned to use the dark that has settled to the
bottom of lakes by pushing it through turbines, which generate electricity
to help push the dark into the ocean where it may be safely stored for
their devious purposes.
Prior to the development of turbines, it was much more difficult to get the
dark from the rivers and lakes to the ocean. The Indians recognized this
problem, and developed means to assist the flow of dark on it's long
journey to the ocean. When on a river in a canoe travelling in the same
direction as the flow of dark, they paddled slowly, so as not to impede the
flow of dark; but when they travelled against the flow of dark, they
paddled vigorously to help propel the dark along its way.
Scientists are working feverishly to develop exotic new instrumentation with
which to measure the actual speed and energy level of dark. While such
instrumentation is beyond the capabilities of the average layman, you can
actually perform a simple test to demonstrate the unbelievable speed of
dark, right in your own home.
All that is required for the simple test is a closed desk drawer situated
in a bright room. You know from past experience that the tightly shut
drawer is FULL of dark. Now, place your hand firmly on the drawer's
handle. Quickly yank the drawer open.. the dark immediately disappears,
demonstrating the blinding speed with which the dark travels to the nearest
darksucker!
The secrets of dark are at present known only to the power companies. Dark
must be very valuable, since they go to such lengths to collect it in vast
quantities. By some well hidden method, more modern power 'generation'
facilities have devised methods to hide their collection of dark. The
older facilities, however, usually have gargantuan piles of solidified dark
in huge fenced in areas. Visitors to these facilities are told the huge
black piles of material are supplies of coal, but such is not the case.
The power companies have long used code words to hide their activities;
D.C. is Dark Conspiracy, whole A.C. is Alternate Conspiracy. The intent of
the A.C. is not yet known, but the D.C. is rapidly yielding it's secrets to
the probing eyes and instruments of honest scientists around the world.
New developments are being announced every day and we promise to keep the
public informed of these announcements as they occur via this newsletter.
Les Dark, Editor

593
txt_files/deaths.txt Normal file
View File

@ -0,0 +1,593 @@
From "CROSSFIRE" by Jim Marrs
ISBN 0-88184-524-8
Copyright (c) 1989 by Jim Marrs
First published by Carroll & Graf 1989
Reprinted without permission
CONVENIENT DEATHS
In the three-year period which followed the murder of President
Kennedy and Lee Harvey Oswald, 18 material witnesses died - six by
gunfire, three in motor accidents, two by suicide, one from a cut
throat, one from a karate chop to the neck, five from natural causes.
An actuary, engaged by the London Sunday Times, concluded that on
November 22, 1963m the odds against these witnesses being dead by
February 1967, were one hundred thousand trillion to one.
The above comment on the deaths of assassination witnesses was published in
a tabloid companion piece to the movie _Execution Action_, released in 1973.
By that time, part of the mythology of the Kennedy assassination included the
mysterious deaths of people who were connected with it.
By the mid-1960s, people in Dallas already were whispering about the
number of persons who died under strange or questionable circumstances. Well
into the 1980s, witnesses and others were hesitant to come forward with
information because of the stories of strange and sudden death that seemed to
visit some people with information about the assassination.
Finally, in the late 1970s, the House Select Committee on Assassinations
felt compelled to look into the matter.
But aside from discrediting the London Sunday Times actuarial study, the
Committee was unable to come to any conclusions regarding the growing number
of deaths. The Committee said it could not make a valid actuarial study due
to the broad number and types of persons that had to be included in such a
study.
In response to a letter from the Committee, London Sunday Times legal
manager Anthony Whitaker stated:
Our piece about the odds against the deaths of the Kennedy witnesses
was, I regret to say, based on a careless journalistic mistake and
should not have been published. This was realized by The Sunday Times
editorial staff after the first edition - the one which goes to the
United States... - had gone out, and later editions were amended.
There was no question of our actuary having got his answer wrong: it
was simply that we asked him the wrong question. He was asked what
were the odds against 15 named people out of the population of the
United States dying within a short period of time, to which he replied
- correctly - that they were very high. However, if one asks what are
the odds against 15 of those included in the Warren Commission Index
dying within a given period, the answer is, of course, that they are
much lower. Our mistake was to treat the reply to the former question
as if it dealt with the latter - hence the fundamental error in our
first edition report, for which we apologize.
This settled the matter for the House Committee, which apparently made
little or no attempt to seriously study the number of deaths that followed
the JFK assassination.
Jacqueline Hess, the Committee's chief of research for the JFK
investigation, reported:
Our final conclusion on the issue is that the available evidence does
not establish anything about the nature of these deaths which would
indicate that the deaths were in some manner, either direct or
peripheral, caused by the assassination of President Kennedy or by
any aspect of the subsequent investigation.
However, an objective look at both the number and the causes of death
balanced against the importance of the person's connection to the case, still
causes raised eyebrows among those who study such a list.
In this section, people who were connected - no matter how tenuously -
with the assassination and who are now dead are listed according to date of
death.
This is dealing only with deaths, not with the numerous persons - such as
Warren Reynolds, Roger Craig, and Richard Carr - who claim to have been shot
at or attacked.
This chapter has been entitled "Convenient Deaths" because these deaths
certainly would have been convenient for anyone not wishing the truth of the
JFK assassination to become public.
The CIA has gone to some lengths to discredit the idea of mysterious
deaths plaguing assassination witnesses.
A 1967 memo from CIA headquarters to station chiefs advised:
Such vague accusations as that "more than 10 people have died
mysteriously" can always be explained in some rational way: e.g., the
individuals concerned have for the most part died of natural causes;
the [Warren] Commission staff questioned 418 witnesses - the FBI
interviewed far more people, conducting 25,000 interviews and
reinterviews - and in such a large group, a certain number of deaths
are to be expected.
Testifying before the Church Committee in 1975, CIA technicians told of a
variety of TWEP technology - Terminate With Extreme Prejudice - that cannot
be detected in a postmortem examination.
One recently declassified CIA document, a letter from an Agency consultant
to a CIA officer, states:
You will recall that I mentioned that the local circumstances under
which a given means might be used might suggest the technique to be
used in that case. I think the gross divisions in presenting this
subject might be:
(1) bodies left with no hope of the cause of death being determined by
the most complete autopsy and chemical examinations
(2) bodies left in such circumstances as to simulate accidental death
(3) bodies left in such circumstances as to simulate suicidal death
(4) bodies left with residue that simulates those caused by natural
diseases.
The letter goes on to show that undetected murders do not have to be the
result of sophisticated chemicals. It states:
There are two techniques which I believe should be mentioned since
they require no special equipment besides a strong arm and the will to
do such a job. These would be either to smother the victim with a
pillow or to strangle him with a wide piece of cloth such as a bath
towel. In such cases, there are no specific anatomic changes to
indicate the cause of death...
While it is obvious that the CIA - and hence the mob through operatives who
work for both - has the capability of killing, it is less well known that the
Agency has developed drugs to induce cancer.
Recall that Jack Ruby died of sudden lung cancer just as he had been granted
a new trial.
A 1952 CIA memo reported on the cancer-causing effects of beryllium:
"This is certainly the most toxic inorganic element and it produces a
peculiar fibrotic tumor at the site of local application. The amount
necessary to produce these tumors is a few micrograms."
Local law-enforcement officers and coroners are not equipped, either by
training or by inclination, to detect deaths induced by such sophisticated
means. They look for signs of a struggle, evidence of a break-in, bruises,
or marks on the victim.
With no evidence to the contrary, many deaths are ruled suicide or accident.
Others are ruled due to natural causes, such as heart attack.
It is interesting to note how the deaths are grouped. Many of the
earliest deaths came during the time of the Warren Commission investigation
or just afterwards.
More deaths took place in the late 1960s as New Orleans District Attorney
Jim Garrison was launching his investigation. Other suspicious deaths
occurred during the mid-1970s, as the Senate Intelligence Committee was
looking into assassinations by U.S. intelligence agencies. And finally,
another spate of deaths came around 1977, just as the House Select Committee
on Assassinations was gearing up its investigation.
These deaths are listed below in chronological order. An asterisk means
the death is a particularly suspicious one. They are also grouped according
to which investigation was being conducted at the time.
The possibility of convenient deaths leads one into a well of paranoia, yet
this long list cannot be summarily dismissed.
Obviously, many of these deaths - particularly in recent years - can be
ascribed to the passage of time. But others cannot - especially when viewed
in the context of the assassination inquiries taking place at the time.
Read for yourself and consider... When does coincidence end and conspiracy
begin?
List of Deaths
Date Name Connection with Case Cause of Death
11/63 Karyn Kupcinet* TV host's daughter who was Murdered
overheard telling of JFK's
death prior to 11/22/63
The Warren Commission Investigation
12/63 Jack Zangretti* Expressed foreknowledge of Gunshot victim
Ruby shooting Oswald
2/64 Eddy Benavides* Look-alike brother to Tippit Gunshot to head
shooting witness, Domingo
Benavides
3/64 Betty McDonald* Former Ruby employee who Suicide by hanging
alibied Warren Reynolds in Dallas jail
shooting suspect
3/64 Bill Chesher Thought to have information Heart attack
linking Oswald and Ruby
3/64 Hank Killam* Husband of Ruby employee, Throat cut
knew Oswald acquaintance
4/64 Bill Hunter* Reporter who was in Ruby's Accidental shooting
apartment on 11/24/63 by policeman
5/64 Gary Underhill* CIA agent who claimed Gunshot in head,
Agency was involved Ruled suicide
5/64 Hugh Ward* Private investigator working Plane crash in
with Guy Banister and David Mexico
Ferrie
5/64 DeLesseps Morrison* New Orleans mayor Passenger in Ward's
plane
8/64 Teresa Norton* Ruby employee Fatally shot
6/64 Guy Banister* Ex-FBI agent in New Orleans Heart attack
connected to Ferrie, CIA,
Carlos Marcello and Oswald
9/64 Jim Koethe* Reporter who was in Ruby's Blow to neck
apartment on 11/24/63
9/64 C.D. Jackson Life Magazine senior vice Unknown
president who bought Zapruder
film and locked it away
10/64 Mary Pinchot Meyer* JFK mistress whose diary was Murdered
taken by CIA chief James
Angleton after her death
1/65 Paul Mandal Life writer who told of JFK Cancer
turning to rear when shot in
throat
3/65 Tom Howard* Ruby's first lawyer, was in Heart attack
Ruby's apartment on 11/24/63
5/65 Maurice Gatlin* Pilot for Guy Banister Fatal Fall
8/65 Mona B. Saenz* Texas Employment clerk who Hit by Dallas bus
interviewed Oswald
?/65 David Goldstein Dallasite who helped FBI Natural causes
trace Oswald's pistol
9/65 Rose Cheramie* Knew of assassination in Hit/run victim
advance, told of riding to
Dallas with Cubans
11/65 Dorothy Kilgallen* Columnist who had private Drug overdose
interview with Ruby, pledged
to "break" JFK case
11/65 Mrs. Earl Smith* Close friend to Dorothy Unknown
Kilgallen, died two days
after columnist, may have
kept Kilgallen's notes
12/65 William Whaley* Cabdriver who reportedly Motor Collision
drove Oswald to Oak Cliff (the only Dallas
taxi driver to
die on duty)
1966 Judge Joe Brown Presided over Ruby's trial Heart attack
1966 Karen "Little Lynn" Ruby employee who last talked Gunshot victim
Carlin* with Ruby before Oswald shooting
1/66 Earline Roberts Oswald's landlady Heart attack
2/66 Albert Bogard* Car salesman who said Oswald Suicide
test drove new car
6/66 Capt. Frank Martin Dallas police captain who Cancer
witnessed Oswald slaying,
told Warren Commission,
"There's a lot to be said,
but probably be better if I
don't say it."
8/66 Lee Bowers, Jr.* Witnessed men behind picket Motor accident
fence on Grassy Knoll
9/66 Marilyn "Delilah" Ruby dancer Shot by husband
Walle* after one month
of marriage
10/66 William Pitzer* JFK autopsy photographer Gunshot, ruled
who described his duty as suicide
"horrifying experience"
11/66 Jimmy Levens Fort Worth nightclub owner Natural causes
who hired Ruby employee
11/66 James Worrell, Jr.* Saw man flee rear of Texas Motor accident
School Book Depository
1966 Clarence Oliver D.A. investigator who Unknown
worked Ruby case
12/66 Hank Suydam Life magazine official in Heart attack
charge of JFK stories
The Garrison Inquiry
Date Name Connection with Case Cause of Death
1967 Leonard Pullin Civilian Navy employee who One-car crash
helped film _Last Two Days_
about assassination
1/67 Jack Ruby Oswald's slayer Lung cancer (He
told family he
was injected with
cancer cells.)
2/67 Harold Russell* Saw escape of Tippit killer Killed by cop in
bar brawl
2/67 David Ferrie* Acquaintance of Oswald, Blow to neck,
Garrison suspect, and ruled accidental
employee of Guy Banister
2/67 Eladio Del Valle* Anti-Castro Cuban associate Gunshot wound,
of David Ferrie being sought ax wound to head
by Garrison
3/67 Dr. Mary Sherman* Ferrie associate working on Died in fire
cancer research (possibly shot)
1/68 A.D. Bowie Assistant Dallas D.A. Cancer
prosecuting Ruby
4/68 Hiram Ingram Dallas deputy sheriff, close Cancer
friend to Roger Craig
5/68 Dr. Nicholas Chetta New Orleans coroner who ruled Heart attack
on death of Ferrie
8/68 Phillip Geraci* Friend of Perry Russo, told of Electrocution
Oswald/Shaw connection
1/69 Henry Delaune* Brother-in-law to coroner Murdered
Chetta
1/69 E.R. Walthers* Dallas deputy sheriff who Shot by felon
was involved in Depository
search, claimed to have found
.45-cal slug
1969 Charles Mentesana Filmed rifle other than Heart attack
Mannlicher-Carcano being taken
from Depository
4/69 Mary Bledsoe Neighbor to Oswald, also Natural causes
knew David Ferrie
4/69 John Crawford* Close friend to both Ruby and Crash of private
Wesley Frazier, who gave ride plane
to Oswald on 11/22/63
7/69 Rev. Clyde Johnson* Scheduled to testify about Fatally shot
Clay Shaw/Oswald connection
1970 George McGann* Underworld figure, connected Murdered
to Ruby friends; wife, Beverly,
took film in Dealey Plaza
1/70 Darrell W. Garner Arrested for shooting Warren Drug overdose
Reynolds, released after
alibi from Betty McDonald
8/70 Bill Decker Dallas sheriff who saw bullet Natural causes
hit street in front of JFK
8/70 Abraham Zapruder Took famous film of JFK Natural causes
assassination
12/70 Salvatore Granello* Mobster linked to Hoffa, Murdered
Trafficante, and Castro
assassination plots
1971 James Plumeri* Mobster tied to mob-CIA Murdered
assassination plots
3/71 Clayton Fowler Ruby's chief defense attorney Unknown
4/71 Gen. Charles Cabell* CIA deputy director connected Collapsed and
to anti-Castro Cubans died after
physical at Ft.
Myers
The Church Committee Investigation
Date Name Connection with Case Cause of Death
1972 Hale Boggs* House majority leader, member Disappeared on
of Warren Commission who began Alaskan plane
to publicly express doubts flight
doubts about findings
5/72 J. Edgar Hoover* FBI director who pushed "Lone Heart attack (no
assassin" theory in JFK autopsy)
assassination
9/73 Thomas E. Davis* Gun runner connected to both Electrocuted
Ruby and CIA trying to steal
wire
2/74 J.A. Milteer* Miami right-winger who Heater explosion
predicted JFK's death and
capture of scapegoat
1974 Dave Yaras* Close friend to both Hoffa Murdered
and Jack Ruby
7/74 Earl Warren Chief justice who reluctantly Heart failure
chaired Warren Commission
8/74 Clay Shaw* Prime suspect in Garrison Possible cancer
case, reportedly a CIA
contact with Ferrie and E.
Howard Hunt
1974 Earle Cabell Mayor of Dallas on 11/22/63, Natural causes
whose brother, Gen. Charles
Cabell, was fired from CIA by
JFK
6/75 Sam Giancana* Chicago Mafia boss slated to Murdered
tell about CIA-mob death plots
to Senate Committee
1975 Clyde Tolson J. Edgar Hoover's assistant Natural causes
and roommate
7/75 Allan Sweatt Dallas deputy sheriff involved Natural causes
in investigation
12/75 Gen. Earl Wheeler Contact between JFK and CIA Unknown
1976 Ralph Paul Ruby's business partner Heart attack
connected with crime figures
4/76 James Chaney Dallas motorcycle officer Heart attack
to JFK's right rear who said
JFK "struck in the face" with
bullet
4/76 Dr. Charles Gregory Governor John Connally's Heart attack
physician
6/76 William Harvey* CIA coordinator for CIA-mob Complications of
assassination plans against heart surgery
Castro
7/76 John Roselli* Mobster who testified to Stabbed and
Senate committee, was to stuffed in metal
appear again drum
1977 - A Terrible Year for Many
The year 1977 produced a bumper crop of candidates for listing under
convenient deaths connected with the JFK assassination - including the deaths
of six top FBI officials all of whom were scheduled to testify before the
House Select Committee on Assassinations.
Topping this list was former number-three man in the FBI, William C.
Sullivan, who had already had a preliminary meeting with the investigators
for the House Committee. Sullivan was shot with a high-powered rifle near
his New Hampshire home by a man who claimed to have mistaken him for a deer.
The man was charged with a misdemeanor - "shooting a human being by
accident" - and released to the custody of his father, a state policeman.
There was no further investigation of Sullivan's death.
Louis Nichols was a special assistant to J. Edgar Hoover as well as
Hoover's liaison with the Warren Commission. Alan H. Belmont also was a
special assistant to Hoover. James Cadigan was a document expert with access
to many classified assassination documents, while J.M. English headed the FBI
laboratory where Oswald's rifle and pistol were tested. Donald Kaylor was
the FBI fingerprint expert who examined prints found at the assassination
scene. None of these six Bureau officials lived to tell what they knew to
the House Committee.
Other key assassination witnesses, such as George DeMohrenschildt and
former Cuban president Carlos Prio Soccaras, died within weeks of each other
in 1977, just as they, too, were being sought by the House Committee.
The ranks of both organized crime and U.S. intelligence agencies were
thinned by deaths beginning in 1975, the time of the Senate Intelligence
Hearings, and 1978, the closing months of the House Committee.
Charles Nicoletti, a mobster connected with the CIA-Mafia assassination
plots, was murdered in Chicago, while William Pawley, a former diplomat
connected with both organized crime and CIA figures, reportedly committed
suicide.
Adding to rumors that "hit teams" may have been at work, a Time magazine
article reported that federal agents had initiated a nationwide investigation
into more than 20 gangland assassinations constituting what agents believed
was an "open underworld challenge to governmental infiltration of Mafia
activities."
One FBI source was quoted as saying: "Our main concern is that we may be
facing a revival of the old `Murder, Inc.' days."
A New York News story concerning this official fear of roving
assassination squads even mentions the death of Sam Giancana, who was killed
one day before he was scheduled to testify about mob-CIA connections and
while under government protection.
Prior to the House Committee investigation into the JFK assassination,
the news media reported the following deaths:
Date Name Connection with Case Cause of Death
1/77 William Pawley* Former Brazilian ambassador Gunshot, ruled
connected to anti-Castro suicide
Cubans, crime figures
3/77 George Close friend to both Oswald Gunshot wound,
DeMohrenschildt* and Bouvier family (Jackie ruled suicide
Kennedy's parents), CIA
contract agent
3/77 Carlos Prio Former Cuban president, Gunshot wound,
Soccaras* money man for anti-Castro ruled suicide
Cubans
3/77 Paul Raigorodsky Business friend of George Natural causes
DeMohrenschildt and wealthy
oilmen
5/77 Lou Staples* Dallas radio talk show host Gunshot to head,
who told friends he would ruled suicide
break case
6/77 Louis Nichols Former number-three man in Heart attack
FBI, worked on JFK
investigation
8/77 Alan Belmont FBI official who testified to "Long illness"
Warren Commission
8/77 James Cadigan FBI document expert who Fall in home
testified to Warren Commission
8/77 Joseph C. Ayres* Chief steward on JFK's Shooting accident
Air Force One
8/77 Francis G. Powers* U-2 pilot downed over Russia Helicopter crash
in 1960 (he reportedly
ran out of fuel)
9/77 Kenneth O'Donnell JFK's closest aide Natural causes
10/77 Donald Kaylor FBI fingerprint chemist Heart attack
10/77 J.M. English Former head of FBI Forensic Heart attack
Sciences Laboratory
11/77 William Sullivan* Former number-three man in Hunting accident
FBI, headed Division 5,
counterespionage and
domestic intelligence
1978 C.L. "Lummie" Lewis Dallas deputy sheriff who Natural causes
arrested Mafia man Braden in
Dealey Plaza
9/78 Garland Slack Man who said his target was Unknown
fired at by Oswald at rifle
range
1/79 Billy Lovelady Depository employee said to be Complications
the man in the doorway in AP from heart attack
photograph
6/80 Dr. John Holbrook Psychiatrist who testified Heart attack, but
Ruby was not insane pills, notes found
1/81 Marguerite Oswald Mother of accused assassin Cancer
10/81 Frank Watts Chief felony prosecutor for Natural causes
Dallas D.A.
1/82 Peter Gregory Original translator for Natural causes
Marina Oswald and Secret
Service
5/82 Dr. James Weston Pathologist allowed to see Died while
JFK autopsy material for jogging, ruled
HSCA natural causes
8/82 Will H. Griffin FBI agent who reportedly Cancer
said Oswald was "definitely"
an FBI informant
10/82 W. Marvin Gheesling FBI official who helped Natural causes
supervise JFK investigation
3/84 Roy Kellerman Secret Service agent in charge Unknown
if JFK limousine
--- end

201
txt_files/democ-pr.txt Normal file
View File

@ -0,0 +1,201 @@
PRODUCER INTERESTS VS. THE PUBLIC INTEREST: THE ORIGIN OF
DEMOCRATIZED PRIVILEGE
By RICHARD M. EBELING
In The Wealth of Nations, Adam Smith constructed some of the
most devastating arguments against the then-prevailing system
of economic policy--mercantilism. In practically every country
in Europe, governments regulated, controlled and planned the
economic activities of their subjects. In France, the
regulations were so detailed that they specified how many
stitches should be used in attaching a button to a shirt. In
Austria, the state limited the period in which people could be
in mourning so that the dye-makers would not lose the business
of selling colored cloth.
Adam Smith demonstrated that rather than bringing prosperity,
mercantilism had retarded economic progress. Governments, he
argued, had neither the wisdom nor the ability to plan the
economic affairs of a multitude of people. If governments
primarily limited themselves to the protection of life,
liberty and property, Smith said, men could be trusted to
manage their own affairs. And when left to do so in an open,
competitive market, the natural forces of supply and demand
would generate a rising prosperity for all. Free men in free
markets were the ultimate source of the wealth of nations.
But having presented the case for free markets, Adam Smith was
not optimistic about the future. To expect that a regime of
free trade would ever be established was, he said, as likely
as the establishment of a utopia. "Not only the prejudices of
the public," he despaired, "but what is much more
unconquerable, the private interests of many individuals
irresistibly oppose it."
Governments had turned over many industries and trades to
private monopolies, whose interests were clearly opposed to
open competition. Special-interest groups, with their
government-bestowed privileges, were too strong ever to be
defeated.
Within one lifetime, however, Smith was proven to be wrong. By
the middle of the 19th century, England was a free-trade
nation and many other nations were following its path.
But in our century, governments once again use their power to
regulate the marketplace, protect various industries from
foreign and domestic competition, and limit entry into markets
through licensing procedures. Mercantilism has returned; and
it has returned stronger than ever. The older mercantilism was
a system that benefited a few privileged producers at the
expense of most of the society. But in our era of democratic
government, it is the many who lobby and politick in the
political arena. Almost every group in society now does battle
for a piece of the economic pie--not through open competition
for consumer business, but through the political process to
gain a greater share by manipulating the market. Ours is the
era of democratized privilege.
Why have free societies all around the world become
battlegrounds for political privilege and economic plunder?
The answer is to be found in one of Adam Smith's most famous
ideas: the division of labor. "The division of labor," Smith
explained, "so far as it can be introduced, occasions in every
art, a proportionate increase of the productive powers of
labor." By specializing in various lines of production, the
members of society are able to improve and increase their
skills and efficiency to do various things. Out of these
productive specializations comes an increased supply of all
kinds of goods and services. The members of society trade away
the large quantities of each commodity they respectively
produce for all the other goods offered by their fellows in
the market arena.
Society's members give up the independence of economic self-
sufficiency for the interdependence of a social system of
division of labor. But the gain is a much higher standard of
living than any one of them could ever hope to attain just by
using his own capabilities to fulfill all his wants and
desires through his own labor.
Each individual is now dependent upon others in the society
for the vast majority of the goods and services he wishes to
use and consume. But in a competitive market setting, this
works to his advantage. Sellers vie with one another for his
consumer business.
They underbid each other and offer him attractively lower
prices; they devise ways to produce and market new and
improved products. As consumer, the individual is the master
of the market, whom all sellers must serve if they are to
obtain his business.
Viewed from the perspective of the consumer, the competitive
market serves the public interest. The resources of society
are effectively applied and put to work to satisfy the various
wants and desires of the individuals of that society. The
products which are manufactured are determined by the free
choices of all of the demanders in the marketplace.
Production serves consumption.
But the market looks totally different from the perspective of
the individual producers. They, too, are dependent upon the
market: they are dependent upon buyers willing to purchase
what they have for sale. While the market serves every one as
a consumer, no one can be a consumer unless he has been
successful as a producer. And his success as a producer
depends upon his ability to market and sell his products or to
find willing buyers for his particular labor skills and
abilities.
As a consequence, for each producer the price of his own
product or labor service tends to be more important than the
prices of all of the multitude of consumer goods he might
purchase. Because unless he earns the necessary financial
wherewithal in his producer role, he cannot be a consumer.
Being the consumer of many things, but the producer of usually
one thing, each seller tends to view competition as a
financial threat to his position in the market as well as to
his specific share of the market. The incentive for each
producer, therefore, is to want to limit entry into his corner
of the market, or to reduce the amount of competition
currently existing in his industry or profession.
The only avenue for limiting competition, however, is the
government. Only the government has the ultimate authority to
permanently prohibit those who think they could do better in
the market and who desire to try. Producers, therefore, have
incentives to use portions of the resources and wealth at
their disposal in the political arena to gain or protect the
market position that they feel themselves unable to obtain or
maintain in an open field of competition. And as long as the
costs of acquiring political privileges and protections from
the government to secure profits are less than the costs of
earning profits by making better and less expensive products,
producers will resort to lobbying and politicking to achieve
their ends.
The dilemma for the society is that when producers lobby in
the political process for profits via government privilege,
this results in a using-up of resources that otherwise could
have been invested in making products desired by consumers.
Furthermore, existing producers, sitting behind their walls of
political protections and privileges, have fewer incentives
for making product improvements. Therefore, the normal,
competitive forces that over time would result in better
and greater supplies of goods are retarded,
When government is viewed as the means for acquiring income
"entitlements," job "guarantees" and "fair" (rather than open)
markets, producer interests will always win over the public,
i.e., consumer, interest. Because most individual sellers will
view that they have more to lose from competition as producers
than they have to gain from competition as consumers.
Unfortunately, the pursuit of producer-protection policies
through government has a perverse outcome: the society as a
whole is poorer than it otherwise would be. Every privilege
and protection raises the prices, narrows the variety and
lowers the quality of the goods available to all of us as
consumers.
How, then, do we reverse our age of democratized privilege, in
which politics is reduced to a free-for-all for mutual plunder
and economic power? The answer is not an easy one nor one that
offers a "quick fix."
A turn from our era of neo-mercantilism, with its philosophy
of privileges for all who can win on the political battle
field, requires a moral revolution on the part of each of us.
It requires each and every one of us to apply the rules of
personal conduct to the arena of politics.
In our personal conduct, few of us would feel morally right in
forcibly preventing a buyer from leaving our respective
business establishment until he paid the price we wanted him
to pay. Nor would we feel morally correct in taking a sum of
money out of another's pocket without his consent simply
because he considered our price for our products or labor
services too high.
Yet this is done all of the time through the political
process. Not until we come to accept that the rules of
morality that apply in personal conduct must be the same rules
we follow in politics will the age of democratized privilege
and plunder come to an end. And, alas, we seem a long way off
from seeing that day!
Professor Ebeling is the Ludwig von Mises Professor of
Economics at Hillsdale College, Hillsdale, Michigan, and also
serves as vice-president of academic affairs for The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the March 1991 issue of FREEDOM DAILY,
Copyright (c) 1991, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.

169
txt_files/depass1.thd Normal file
View File

@ -0,0 +1,169 @@
Message #9963 - New Of The US And World
Date: 03-23-92 00:34
From: David Stanley
To: All
Subject: Common Ground interview with KC dePass
Common Ground: So would you say the American people are asleep or
apathetic?
dePass: Well it's tremendously discouraging. But I don't believe they're
asleep at all, and I don't think it's apathy. If you watch the speed and
skill with which they drive on the freeways you know they're not asleep, and
if you damage their property or kick their dog or kick them off a business
deal, then there's a tremendous amount of high energy in the American
people. Just watch a football game. The energy is there. The strength is
there. The will is there. It's just directed at self-interest. And I think
that's because, quite simply, it's an affluent society and it's made us a
very arrogant society.
People only worry about things that affect them directly, personally. You
have to learn to care about your neighbor-black, white, male, female,
homosexual, heterosexual, you have to care about something other than
yourself. Because what the government is doing presently is destroying
the infrastructure of a people, a nation. They're taking your neighbors to
camps, tight now as we speak. And I can't stand that.
CG: What do you mean by work camps?
dePass: This isn't a myth, it's in public law. It isn't a supposition, it
isn't a left wing or spot light newspaper analysis It is a fact of our own
public administration. What's happened is the federal government has
passed laws going back 1986 to close military bases. Public law #99570.
Two years later in the '88 drug law, #101690, they authorized studies to look
at the involuntary confinement of the mentally ill, then redefined drug use
as being a sign of mental illness, so if you smoke marijuana they can
confine you. In the 1989 defense authorization act, they turned the drug war
over to the Pentagon. And they culled from the '88 drug law to give the
Pentagon the power to establish work details for those people put on the
military bases under "boot camps." While this is going on in federal law,
states are being coerced in the 1986 and '88 drug laws: if they don't adopt
these laws at the state level, they will lose highway funding. So 19 states
established boot camps before it became legal at the federal level to
actually close the military bases and establish the boot camps, which they
only did seven months ago--in the new drug and crime bill that just passed
in the House and Senate. The Senate bill number was 1241 and the House bill
was 3371. Well they just passed it in a joint conference committee. They're
going to close ten military bases, turn them into federal boot camps and
turn the prisoners over to the Pentagon for work programs. Now there are
congressmen and senators saying let's put the homeless there. They want to
put the homeless there; they want to put illegal aliens in separate camps.
They are also looking very seriously at AIDS camps, in the future. If the
AIDS epidemic runs it's course, by the year 2000 approximately one and a
half million to three million people will have died of AIDS, and they plan
on taking the remainder, which may be as many as ten million HIV positive
that are dying, and putting them in separate camps. In the end, it's a
tremendous cross-section of our American culture, and your personal
opinions and biases are not what matters here. We are literally talking
about a Weimar Republic conversion of America into the Fourth Reich. And
nobody gives a damn.
... The 12 Steps! There are 12 steps between my computer and the toilet!
--- Blue Wave/TG v2.05 [NR]
* Origin: Information Laboratories --- Seattle, WA. (1:343/96.0)
Message #9964 - New Of The US And World
Date: 03-23-92 00:35
From: David Stanley
To: All
Subject: KC dePass interview part 2
CG: Are you suggesting selective depopulation? What is the purpose of these
camps?
dePass: Well, they're not converting these military bases into work camps
out of Some benign aspect of rehabilitation. They're taking the anti social
element of society, in George Bush's own vernacular, and place in them in
concentration camps. Now I'm not calling them death camps. I'm calling them
a concentration, in camps, of a population that has become undesirable to
the American people. And this is not a conspiracy theory. It's in the laws.
I presented this on Mike Siegel's radio show and the vast majority of people
in Seattle said I was out of my mind. But Mike would tell them, he's reading
from federal law, he's not making this up, he's reading it from the law
itself, laws to close military bases and to then into detention centers.
CG: What will happen in the camps?
dePass: Well, who do you think is going to plant George Bush's one billion
trees? You're going to pay for them as taxpayers and these people are going
to plant them. Immediately an environmentalist will say, "Well I don't
have a problem with that." What a minute. We're talking about slavery here,
people. Arresting people for a first time drug offense, marijuana, putting
them in a work camp, making them work for the Pentagon to plant trees and
you say it's OK? I like the idea of planting trees. You go plant them.
But it gets worse. In the New York Time, August 5th, 1991, headline, front
page: "Military has new strategic goal in clean-up of vast toxic waste.~
Well,who do you think is going to be cleaning up, on site, the toxic waste?
G.E. employees? Central forces personnel? The highly trained civil
engineers? Of the military? I don't think so. Somebody's got to be on-sight,
wearing the machinery and collecting the glowing purple sludge. There's no
technology that does it, people have to do it. Well who's gonna do it.'
Nobody wants to hear it because that's an incredibly ugly prophesy, but I
didn't see it in a crystal ball. It was on one front page of the NEw York
Times. And to me that means this has to stop.
The worst part of it is the American people aren't paying attention. The
military has been turned inward against the American people. It's us that
are the enemy now. Drug users, AIDS victims, the homeless, cleaning up toxic
dumps. We're the enemy. There's now an internal enemy of the state just as
the Jews were the Internal enemy of the German Republic. Well we have an
internal enemy and the army can now be used against the American people,
legally, by law. And they're doing it. That's where we're at. That's the
empire. That's George Bush's new world order.
Common Ground: How did this come about? Has it just happened so slowly that
we didn't notice or has it been veiled in rhetoric?
KC dePass: The work camps were outlined in the 1988 drug law, #101690. The
U.S. military was given the job of fighting the drug war under the National
Defcnse Authorization act of 1989, because the government says there's a
national emergency, we have a drug epidemic. Well, epidemic by definition
means it's on the rise, not on the decline. And every single category of
drug usage in America, every single category... is off sharply and down
drastically. 2.8 million fewer people use cocaine than before. What is my
source? The national drug control strategy report of 1989, '90, and '91.
Bill Bennett's office, the drug czar.
Every category of drug usage has been off sharply since 1979 to '85, then
room 1985-88. SO if drug usage is off sharply, down drastically and fewer
people than ever are using cocaine, why are we locking everyone up in boot
camps? We've been solving the problem socially, as a people, all by
ourselves, no government intervention. Those statistics are before the
1986 and 188 drug laws, by the drug laws' own admission in Appendix D. I was
sitting in a hotel room at two in the morning after I'd given a lecture in
Portland--and I'm reading the appendix to the drug czar's report and I'm
going, "There's no epidemic." They're saying there's no epidemic, it's on
the decline.
But the government says there's a state of national emergency, we have an
epidemic.
And there is none. By their own admission But it gives them the opportu-
nity to pass laws, to establish boot camps, work camps, concentration camps,
and give first time drug offenders five years with no chance of parole. They
can pass these laws under the perception that we have an increasing epidemic
and we must do something. Now you can't tell me that the congressmen and
senators don't know this. Congress is lying and the people are
ignorant.
Now that the bases have either been closed or designated to be closed,
they're coming back at us the congressmen and senators very quietly
saying, "Well hey, for the sake of efficiency and to save money, we don't
have to build new prisons. We can take these military bases, put huts and
tents on them and house the homeless, house the AIDS patients, we can house
the illegal aliens, and by golly while we're at it, we can house the drug
users. We don't have to spend taxpayers' money to build new prisons."
They're Iying through their teeth. They always knew they were going to do
this. I can prove it, with their laws.
... Protect rare coprolites, they're an endangered feces.
--- Blue Wave/TG v2.05 [NR]
* Origin: Information Laboratories --- Seattle, WA. (1:343/96.0)

68
txt_files/deskgen.txt Normal file
View File

@ -0,0 +1,68 @@
Desktop genetic engineering.
By Kevin Kelly
I spent a day recently a biotechnology trade show, snooping around the
aisles of plumbing and lob gear to see how close we ore to having gene
equipment that would work in a suburban garage. was looking for
off-the-shelf components that could be assembled by a dedicated individual
into o lob for homebrewed DNA. / was surprised by how close it has come.
While most of the equipment for biotechnology is either delicate but
cumbersome laboratory research instruments, or massive industrial/chemical
plumbing for production purposes, there are o couple of items that hove
miniaturized the research methods into o suggestive desktop space. The
leader in self-contained DNA coding gear is Applied Biosystems. Their star
contraption is a table-top box linked to a Macintosh computer that will
assemble a short string of DNA from the order that you type into the Mac.
The unit generates the DNA sequence from the some four amino acids that
cellular DNA does. in this case the amino acids are provided in small
bottles in the front of the box, along with bottles of solvent to drive the
process. The DNA is outputted" into a tiny capillary tube. While the
machine is 99.8% accurate in what it constructs, the major (and it is major)
drawback is that it con assemble sequences that are no more than 180 units
long, which would make one short gene, at most. (Genes, like words, vary in
length.) Since human genes come in the order of about one billion units,
there is a way to go in improvements. On the other hand, since the
alteration of even one gene con make a big difference in a living organism
(many congenital diseases are due to a single gene), there is still power in
being able to rewrite o couple of hundred units. A complementary box made by
Applied Biosystems works in reverse. Rather than going from code to DNA, it
goes from DNA to code. It takes a bit of existing DNA and reads" its
sequence out as a display on the computer - ATTCGGACA, etc., for instance.
Not only con this verify a sequence one builds, but its main purpose is to
unravel the genetic code encrypted in all living things. It too is severely
limited in the amount of DNA it con handle at one time. But the task of
deciphering chromosomes that are 5 million genes long would be o bummer
without it. The two machines work as a pair. Both together would fit onto a
kitchen countertop. These units by themselves are not enough to do
biotechnology research. Sundry other hi-tech items, as well as low-tech ones
like incubators, cold rooms and basic labware, are essential. But these two
systems ore the heart of the hard work; they automate what was tedious and
unpredictable toil just a few years ago. I'd guess that true basement
biotechnology is still at least a decade away, if only because of the price
$50,000 for each of these machines alone)aond the expertise Ph.0) needed to
get them going. -Kevin Kelly Information from: Applied Biosystems, inc.,
850 Lincoln Center Drive, Foster City, CA 94404.
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

184
txt_files/dictator.txt Normal file
View File

@ -0,0 +1,184 @@
-------------------------------------------------------------------------------
BLUEPRINT FOR U.S. DICTATORSHIP PLACES INDIVIDUAL RIGHTS AT RISK
By Mike Blair
Exclusive to The SPOTLIGHT
Washington, DC -- During the Persian Gulf war and the military buildup
leading to it, President George Bush began using the term "New World
Order," often suggesting that the commitment of so-called multinational
forces involved in the military effort was the beginning of this alleged
worldwide utopia.
Supposedly using the vehicle of the United Nations, Bush's New World
Order would be the arbitrator of all world problems and the apparatus to
enforce globalist dictates through the use of armed forces combined from
the armies of member nations. The UN law would be, regardless of the
nationalist interests of individual countries, the final word.
Actually, even the mention of a New World Order would normally be
anathema to thinking Americans and, in particular, conservative political
leaders and civil libertarians.
SINISTER TECHNOLOGY
It is also surprising to many critics of the move toward one-world
government that Bush would even dare choose the term "New World Order" to
define his globalist schemes. However, most Americans alive today were
born after World War II, when propaganda of the so-called Allied powers
used the terms of "New Order" or "New World Order" to describe in a
sinister way the military efforts of Japan and, in particular, Germany
under Adolf Hitler.
Few, it seems, have taken the time to analyze just what Bush has in
mind for his New World Order, of which America is to become an integral
part, starting with supplying about 90 percent of the muscle, and young
lives, that tackled and defeated Iraqi strongman Saddam Hussein's Arab
legions.
However, patriotic Constitutional scholars know that Bush's New World
Order is the worst attack ever on America as a sovereign, independent and
free nation.
BEGAN WITH WILSON
Efforts to form a global government are certainly nothing new.
American political leaders, who were concerned with America first, were
able to overcome the internationalist, one-world government machinations of
President Woodrow Wilson following World War I. Wilson was prevented from
realizing his visions of a New World Order, through the League of Nations,
by a powerful Senate opposition, which refused to rubber-stamp for Wilson
U.S. membership in the world body.
A few decades later, however, President Franklin Delano Roosevelt,
near the end of World War II, was able to get his one-world plans under way
by laying the groundwork for today's United Nations, which was completed
under his successor, Harry S. Truman.
A few years later, that membership in an UN-mandated war in Korea cost
America 35,000 young lives.
The problem that one-worlders have always encountered, of course, is
the U.S. Constitution, which has stood as a bulwark against any globalist
schemes.
Nevertheless, American presidents since Roosevelt have insidiously
chipped away at the great powers of the people, written into the
Constitution by America's immortal Founding Fathers, with the use of so-
called executive orders.
CAUSE FOR ALARM
Americans should be deeply alarmed that those presidents have signed a
series of executive orders (EOs) which, under the guise of any national
emergency declared by the president serving at the time, can virtually
suspend the Constitution and convert the nation into a virtual
dictatorship. Dissent, peaceful or otherwise, is eliminated.
Those backing efforts to circumvent the Constitution may have gotten
the idea from President Abraham Lincoln, whose use of various extraordinary
powers of his office -- which many Constitutional scholars still insist was
illegal -- suspended various civil rights to curb such problems as draft
riots during the Civil War.
In 1862, Congress enacted the Enrollment Act to allow the drafting of
young men for the Union Army. The act was rife with inequities, such as
the provision which allowed a man to pay $300 or hire a substitute to take
his place. This hated "Rich Man's Exemption," as it was called, angered
the average American of military age and in particular young Irish
immigrants in New York City.
A riot erupted in New York in 1863, and it resulted in Lincoln using
some extraordinary powers of his office to keep the Union from falling
apart from within.
But over the years, presidents have used these powers for purposes
never intended by the Founding Fathers.
INDIANS VICTIMIZED
President John Tyler used such powers in 1842 to round up Seminole
Indians in Georgia and Florida and force-march them -- men, women and
children -- to Arkansas. This was probably the first use of internment in
America to deal with unpopular minorities. It was not the last.
In 1886, the Geronimo Chiricahua Apache Indians surrendered to U.S.
troops in the West, were rounded up by order of President Grover Cleveland,
and shipped to internment in Florida and Alabama.
Earlier, during the War Between the States, Sioux Indians in
Minnesota, when there was a delay in paying them their yearly allowance,
began attacking nearby white settlements. Lincoln sent in a hastily raised
force of volunteers under Col. H. H. Sibley. Little Crow, leader of the
Kaposia band, was decisively defeated by the Union troops on September 23,
1862, and more than 2,000 Sioux were taken captive, although Little Crow
himself and a few followers escaped.
Through the process of a military tribunal, sanctioned by Lincoln, 36
Sioux leaders were publicly hanged. Whether the Sioux executed were
innocent or guilty was apparently immaterial. The revolt was quelled, and
the Minnesota Sioux were all moved to reservations in Dakota.
These instances of the nation's executive branch taking extraordinary
measures to confine, or intern, American Indians are just a few of many
examples.
More recent examples of interning minorities by executive order
occurred during World War I and World War II.
During World War I, an unknown number of German-Americans were rounded
up by federal authorities and interned until after the war. In addition,
regardless of the First Amendment of the Constitution, which guarantees
freedom of speech and of the press. German-language newspapers, published
within German-American communities in the United States, were banned.
WW II INTERNMENTS
After the Japanese attack on Pearl Harbor on December 7, 1941, within
days the FBI rounded up tens of thousands of Japanese-Americans, guilty
only of being of Japanese ancestry, under the authority of an executive
order issued by President Franklin Delano Roosevelt. The lists of those to
be apprehended had been drawn up months earlier, before the war.
Held in concentration camps, the perimeters guarded by U.S. soldiers
armed with machine guns, the mostly innocent and patriotic Japanese-
Americans were not released until after the war.
Congress has recently passed legislation extending the nation's
apologies to the Japanese-Americans and extending them compensation for
their years of confinement.
However, no apology or compensation has ever been extended to the more
than 8,000 German-Americans who were confined in dozens of jails and camps
across the United States, also by order of Roosevelt.
Many were not released until 1947, a full two years after the end of
the war, in total violation of the Geneva Conventions.
"What happened to me and thousands of others is old history," said
Eberhard Fuhr of Cincinnati, who was interned at 17 years of age, "but the
next time it could be any other group, which is then not politically
correct, or out of favor for any other reason (SPOTLIGHT, May 20, 1991).
Fuhr's warning, of course, had already been proved correct just
several months earlier when, under orders of Bush, the FBI hounded
thousands of innocent Arab-Americans as the U.S. prepared for the Persian
Gulf conflict.
Only the efforts of a handful of irate U.S. Congressmen halted the
harassment but not until after a number of U.S. military bases were
selected as sites of internment camps for Arab-Americans and war
dissenters.
-----------------
Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:
The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003

101
txt_files/dicthere.txt Normal file
View File

@ -0,0 +1,101 @@
-------------------------------------------------------------------------------
DICTATORSHIP POSSIBLE HERE
By Lawrence Wilmot and Martin Mann
Exclusive to The SPOTLIGHT
Washington, DC -- Hidden in the bureaucratic maze Washington politicians
call "our Constitutional system of government," a little-known federal
agency is quietly making plans to turn the United States into a
dictatorship.
There are "stacks of blueprints" in the top-secret safe of the Federal
Emergency Management Agency (FEMA) designed to convert American society
into a "command system," a former deputy administrator of the agency has
told The SPOTLIGHT's investigative team.
In a private interview, allowing him to remain anonymous, this highly
placed source confirmed that the procedures developed by FEMA to "suspend"
the Constitution and to round up thousands of dissenters nationwide can be
activated by a simple phone call from the White House.
"Even people who have become aware of FEMA's existence and know
something about its activities -- not many do -- think the word `Emergency'
in its designation means it will go into action only in case of a natural
disaster or perhaps a surprise nuclear attack," related this expert.
"In reality, however, this outfit can be mobilized whenever the
politicians occupying the White House decide they need special -- and
extra-Constitutional -- powers to impose their will on the nation."
As Liberty Lobby first revealed, FEMA's bureaucrats can then proceed
to:
* Take over all farms, ranches or timberland in order to "utilize them
more effectively" as decreed in Executive Order (EO) 11490, the so-
called omnibus emergency preparedness decree promulgated by President
Richard Nixon on October 28, 1969.
* Seize all sources of public power: electric, nuclear, petroleum, etc.
* Freeze all wages, prices and bank accounts.
* Take over all communications media.
A FORCE OF FACELESS FEDS
Such totalitarian measures can be imposed by bureaucrats under FEMA's
direction, not just in the face of a cataclysmic upheaval, but "[w]henever
necessary for assuring the continuity of the federal government in any
national emergency type situation," decreed a subsequent White House ukase,
EO 11921, issued by President Gerald Ford in April 1976.
Can such a blueprint for tyranny be clamped on the United States by a
force of faceless federal officials? It is the role of FEMA has been
preparing for most intensively, says the former high agency administrator.
"In recent years, despite talk of spending cuts, FEMA's budget has
been steadily increasing," revealed this knowledgeable source. "It now
stands at somewhere around $3 billion annually. I say `somewhere' because
part of this agency's funding is appropriated under so-called black
programs, submitted to Congress with the defense budget without an
explanation of its purpose, aping the secret CIA appropriation."
FEMA can draw on the defense budget and on the protection of the
secrecy reserved for national security projects because it came into being
under President Jimmy Carter in a move that merged the civil defense and
disaster relief responsibilities formerly shared by the Pentagon, the
Commerce Department and the General Services Administration under a single
powerful agency.
WHAT'S FEMA REALLY UP TO?
But FEMA's real focus is not on disaster relief, knowledgeable sources
say. An investigation of this little-known agency, conducted earlier this
year by the General Accounting Office (GAO), the congressional watchdog
unit, has found that less than 10 percent of FEMA's staff -- 230
bureaucrats out of an estimated 2,600 -- are assigned full-time to
preparing for and dealing with major natural disasters such as storms or
earthquakes.
What, then, is FEMA really up to? The SPOTLIGHT's investigative team
has obtained an advance copy of the GAO report on this secretive agency.
The study's surprising findings have been reviewed with the help of
well-placed confidential sources, in order to bring into full view, for the
first time, the federal bureaucracy's secret blueprint for tyranny in
America.
-----------------
Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:
The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003

66
txt_files/diplomat.txt Normal file
View File

@ -0,0 +1,66 @@
(word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150
October 17, 1990
listed on KeelyNet as FOOD1.ZIP
--------------------------------------------------------------------
FBI License Plate Codes
Somewhere in the vicinity of 2500 Soviet and Eastern European
officials live in the United States at any given time. The U.S.
State Department estimates that 30% to 40% of them are spies.
This comes to about 900 working spies in the diplomatic corps.
It is a very difficult job to keep track of the comings and goings
of these "diplomats", so the government has developed coded
diplomatic license plates.
The code applies ONLY to diplomatic plates which are conspicuously
red, white and blue with the word DIPLOMAT printed at the top.
All diplomatic licenses have a D. The other two letters indicate
the nation. SX for example, indicates that the car carries diplomats
from the Soviet Union.
FBI counter-intelligence agents are given wallet-sized cards listing
the codes for eighteen "problem" nations.
These nations are identified by the following codes :
Albania CP Libya FM
Bulgaria OM Nicaragua QU
China CY North Korea GQ
Cuba DC Poland QW
Czechoslavakia PH Romania ND
East Germany TJ South Africa FY
Hungary KH Soviet Union SX
Iran DM Syria AQ
Iraq TS Vietnam LD
The Washington Post published the code against the wishes of the
State Department. They feared RAMBO types might attack diplomatic
vehicles of countries they did not like.
--------------------------------------------------------------------
If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
Sciences address as listed on the first page. Thank you for your
consideration, interest and support.
Jerry W. Decker.........Ron Barker...........Chuck Henderson
Vangard Sciences/KeelyNet
--------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
--------------------------------------------------------------------

395
txt_files/diseas.txt Normal file
View File

@ -0,0 +1,395 @@
Carolee Boyles-Sprenkel About 2650 words
Route 3, Box 2180 Copyright 1989
Quincy, FL 32351 Carolee Boyles-Sprenkel
(904) 627-2254 Second Serial Rights
WILD DISEASES
By
Carolee Boyles-Sprenkel
A few days after Patsy M. returned home from a trip to
Hawaii, she came down with what she thought was intestinal flu.
After a week of nausea and vile-smelling diarrhea she went to her
doctor. He couldn't find anything wrong with her and put her on
a liquid diet. Two weeks and ten pounds later she was becoming
anemic.
Three stool samples, a sigmoidoscopy and a proctoscopy could
not establish the cause of her illness. Finally she mentioned
her symptoms to a colleague at work who recognized them as
something he'd heard of before. A little research turned up
information on an organism that parasitizes the human digestive
tract, Giardia. After only 24 hours on the antibiotic Flagyl,
Patsy knew she'd solved the problem. She recovered without
further incident.
Patsy was only one of a number of people who bring back more
from their outdoor experiences that they bargain for. Any time
we go into the woods, we run the risk of encountering illnesses
and discomforts our urban neighbors don't ever run into. Few
physicians even think about testing for these "exotic" diseases.
Untreated, some will run their course in a few days or a few
weeks. But not all are so benign.
According to epidemiologist Dr. Lisa Conti, doctors term
these diseases "zoonotic." That means they're caused by
organisms that infect both animals and humans. Though most
affect humans only rarely, a few are relatively common.
This is definitely not a case of "what you don't know won't
hurt you." What you don't know about some of these ailments
will, in some cases, kill you.
Lyme Disease
Lyme Disease may be the most visible of the little shop of
horrors found in the woods. Unlike some other diseases, Lyme
Disease is not rare. Dr. Robert Craven, a Centers for Disease
Control researcher studying Lyme, says doctors reported more than
2400 cases during 1988. He believes it's spreading throughout
the country.
A bacterium carried by deer mice and deer causes Lyme
Disease. Ixodid ticks can pass the organism from infected
animals to people.
The first symptom of the disease is a little red area where
the tick attached itself to you. The spot grows. Then fever,
headache, and muscle aches start. The spot increases in size
until it become a red ring several inches across with a light-
colored center. "It's kind of like a bull's-eye," says Craven.
If you don't get treatment, the effects can be severe. "It
can eventually cause cardiac problems, usually rhythm
disturbances," Craven says. "It can cause arthritis, which can
be fairly severe and debilitating. It can cause a whole host of
neurologic problems - encephalitis, meningitis type problems,
paralyses, that sort of thing."
Lyme Disease is easy to treat with antibiotics. According
to Craven, researchers are trying to produce a vaccine, but none
is available at this time.
Rocky Mountain Spotted Fever
Another bacterium transmitted exclusively by tick bites is
Rocky Mountain Spotted Fever. Infected ticks can pass the
organism from generation to generation without feeding on a sick
animal.
According to Dr. Michael Wilder, a state public health
clinician, the first symptoms are fever, cramping stomach pain
and rash. "Stomach-ache seems to be a common early symptom," he
says. "There may be some vomiting, but no diarrhea." The rash
looks like measles but it appears on the wrists and palms of the
hand, which measles rarely does.
Antibiotics will cure Rocky Mountain Spotted Fever. Of the
patients who are not treated, though, a few die from either shock
or hemorrhaging.
Encephalitis
Several different types of encephalitis cause problems from
time to time. St. Louis Encephalitis follows a 10-year cycle in
the Mississippi Valley, according to Craven. Eastern Equine
Encephalitis and Western Equine Encephalitis appear in small
scattered outbreaks each summer.
Birds carry the viruses that cause encephalitis, which
mosquitoes spread from the birds to humans and other mammals.
Early symptoms include confusion and fever. Some varieties of
the ailment cause nausea and vomiting. Then, Craven says,
convulsions, coma, and other neurologic involvement may occur.
"Eastern Equine is a particularly virulent form of
encephalitis in humans," he says. "It frequently kills, and the
people who do survive are usually brain damaged to a greater or
lesser degree for life."
Antibiotics are useless against encephalitis, he says.
Researchers have developed a vaccine against both Eastern and
Western Equine, but officials recommend using it only during
epidemic conditions.
Tularemia
According to Dr. Thomas Quan with the CDC's Fort Collins,
Colorado unit, most people acquire tularemia infections from
rabbits and hares, and the ticks associated with them. He says
people can pick up the versatile organism in a number of ways.
"Most human cases occur through the bite of a tick or
through direct contact with rabbits that are infected," he says.
"There are other modes of infection, such as deer fly bites and
mosquito bites." Sheep-shearers have acquired it from working
with infected sheep in Colorado. Some people have become ill
from drinking contaminated water. Farm workers can inhale the
organism from hay dust.
Early symptoms are fairly vague. You'll develop a bit of a
fever, and generally not feel too good. If you've inhaled the
organism, you'll have respiratory symptoms; if you've swallowed
it, you'll think you'll have intestinal flu. Swelling of the
armpits - called buboes - and other plague-like symptoms will
follow a tick bite or infection through a cut. For untreated
cases, the fatality rate is about 5 to 7 per cent. With
antibiotic treatment, patients can expect complete recovery.
"The people who get sick with it wish they'd die, but they
usually don't," Quan says. "But eventually they overcome it."
Giardia
CDC worker Dr. David Addiss says the biggest source of
Giardia is contaminated water. Biologists have found the
organism from many streams and rivers. "It's found fairly
commonly throughout the United States in untreated surface
water," he says. "You don't find it very much in wells or big
lakes, but you do see it in streams."
A number of different animals, especially beavers, may carry
the protozoan that causes the illness. Symptoms include loose
stools or full-blown diarrhea, cramping, gas and burping, and
rarely nausea and vomiting. The disease may be more chronic than
acute. Giardia attaches itself to the wall of the small
intestine, where it lives and reproduces. Untreated, the ailment
may go away on its own. In many people, through, the infection
persists until it's treated with a course of antibiotic.
Don't rely on iodine or chlorine tablets to treat stream
water. They may work if the water is warm and only contains a
few Giardia cysts. But in cold or heavily infested water,
they're not particularly effective.
Relapsing Fever
Craven also works with relapsing fever another tick-borne
disease related to Lyme Disease. He says it's fairly rare in the
United States.
The last big epidemic of Relapsing Fever occurred in the
Grand Canyon in the 1970s, and was related to squirrels nesting
in cabins where Canyon staff people were living. Generally,
though, the cases are fairly scattered.
The disease produces flu-like symptoms, including fever and
muscle aches. If it's not treated, the symptoms subside, and
patients think they're well. Then it comes back. This cycle
continues until the disease is treated. Fortunately, it doesn't
seem to produce any serious long-term effects like Lyme Disease
does.
Brucellosis
Unless you hunt wild hogs in the southeastern United States,
brucellosis is one problem you probably don't need to worry
about. This is not to say the disease isn't found in other
species; biologists have reported it in desert rats and other
rodents, hares, foxes, goats, sheep, deer, elk and bison, and
even dogs and cats. But Dr. Arnold Kaufmann, a physician with
the CDC in Atlanta, says he's never heard of hunters contracting
brucellosis from any animal except hogs.
The organisms which cause brucellosis are a group of
bacteria that live in the blood, bone marrow and lymphatic
system, including the liver and spleen. You can become infected
in a couple of ways. If you clean a hog without wearing gloves,
bacteria can enter through small cuts and scratches on your
hands. As you cut into the carcass of the animal a number of the
organisms are released into the air, where you can inhale them.
Heat kills the bacteria, so you're not at risk if you eat
well-cooked meat from a sick animal. In fact, when domestic
animals such as cattle are found to have brucellosis, one cure is
to send the animals to the slaughterhouse.
In humans, brucellosis is a vague sort of illness, according
to Kaufmann. It causes headache, fever, and exhaustion. You may
have achy joints and in general feel like you have a severe case
of the flu.
"It goes on and on and doesn't go away," says Kaufmann.
"It's a very complex disease. It can involved a variety of
organs." Untreated, most patients eventually recover; for a few,
though, it continues as a chronic illness. Treatment is simply a
course of antibiotics.
Q Fever
Q or Query Fever may be under reported, according to CDC
microbiologist Russell Regnery. As a result, the CDC doesn't
have any good data on how many cases occur in this country each
year.
"I think it's an important disease, but one for which very
little data can be found," says Regnery. In his opinion,
hunters and fishermen in sheep country need to be aware of the
disease as a potential long-shot ailment. "If, for example, you
were to shoot a sheep that had Q Fever and you butchered it out,
especially if that animal is a pregnant female, you would really
be asking for the possibility of exposure," Regnery says. The
organism reaches its highest concentration in amniotic fluid and
fetal tissues.
The agent is a specialized bacterium. It can infect humans
through cuts on the hand, but it's very infectious if inhaled.
As a result, clothes and other items can become contaminated by
the organism.
Symptoms include headache and fever, plus muscle pain.
Pregnant women may suffer complications. Untreated, the disease
usually resolves itself after a few days or a few weeks. A few
people, though, develop Q Fever endocarditis, or inflammation of
the heart. This can be a chronic problem, hard to treat, and
sometimes leading to death. Q-fever has been associated with
rabbit hunting in Canada.
Rabies
Despite modern vaccinations, rabies is still a potential
threat. Unlike most of the other diseases you can acquire in the
woods, rabies has no treatment - if you get it, you die. It's
that simple.
"Any warm-blooded animal can get rabies," says Wilder. "But
certain animals seem to play a more important role as a
reservoir. The main ones throughout most of the country are
insectivorous bats, skunks, foxes, and of course raccoons." Even
deer and antelope can become infected if a rabid animal bites
them.
You're only at a slight risk to pick up rabies if you dress
an infected deer or other ungulate without gloves on.
Theoretically, though, it's possible for you to get it,
especially if you skin out the head and get saliva on your hands.
Direct contact is not the only way you can acquire rabies.
In rare cases, spelunkers have become infected from inhaling the
virus in bat caves.
If you're bitten by a rabid animal, the first symptom of the
disease is what Wilder terms "an unusual sensation" at the site
of the bite. "It's an increased sensitivity, a feeling of
prickliness, just an odd sensation arising from the healing
wound." A fever and stiffening of the neck follow. Then you'll
have convulsions. You'll salivate because you're unable to
swallow. Death will follow in of days or weeks.
A post-exposure vaccine for people has been available for
many years. Recently, scientists have developed a pre-exposure
vaccine. Wilder says whether or not you need to get vaccinated
depends on what you're hunting. Most people don't need to worry
about it. But if you're a woodchuck or raccoon hunter, he
recommends it. At a cost of about $100, it's cheap insurance.
Wilder also stresses that hunters need to have their dogs
vaccinated against the disease. Some raccoon hunters in
particular fear the inoculation will affect the dogs' ability to
hunt, and so don't have them vaccinated.
Don't do the vaccination yourself. In Florida and perhaps a
few other state, rabies vaccine is available over the counter at
feed stores. "We've been most fortunate that no identified cases
of rabies have occurred from this practice," Wilder says.
Plague
Remember the bubonic plague, the disease that decimated
Europe in the Middle Ages? It's still with us in the western US.
Any rodent in the west can harbor the plague organism.
"Most people in the United States who acquire plague are getting
it from ground squirrels," Quan says. "On the west coast, it's
the California Ground Squirrel. In the Rocky Mountains it's the
Rock Squirrel. Then you have other smaller squirrels and
chipmunks." Even if you don't have direct contact with rodents,
you're still not immune. Your dog and cat may catch a squirrel,
pick up the fleas carrying the organism, and bring it home to
you.
Plague is transmitted to humans through flea bites. Early
symptoms are similar to those of tularemia: high fever, muscle
aches, fatigue. You'll have pain, sometimes quite severe, in the
area where the buboes, or swollen lymph glands, are going to
develop.
Untreated, plague kills. The organism produces toxins that
cause problems with blood clotting, and eventually gangrene.
Fifty-five to sixty per cent of patients die. Even treated,
plaque kills 15 to 20 per cent of patients.
As dreadful as plague is, it's easily treated. A variety of
antibiotics, including Tetracycline and sulfa drugs, will knock
it out.
"People who see a physician early on after symptoms, and who
have the savvy to know they were possibly exposed tend to
survive," Quan says. "A large percentage of those who die have
septicemic plague, which does not have a bubo." These cases look
like a lot of other diseases, are hard to diagnose, and as a
result often don't get treated early enough.
Fortunately, plague is rare. Quan says in 1983 doctors
reported a high of 40 cases, but in general the number is 10 to
20. This compares to 200-plus for tularemia each year.
Prevention
Most members of this hall of villains are easy to prevent
with little effort. First, don't drink untreated water. Carry
water or soft drinks with you.
Second, any time you dress game, don't do it bare-handed;
wear gloves. "If you don't wear gloves, you're really taking
your chances," Quan says.
Third, avoid contact with mosquitoes, ticks and fleas.
"Most of these things can be prevented with repellents," Craven
says. He notes especially Permanone, a permethrin compound that
is both an insecticide and a repellent useful for ticks.
If, after being in the woods, you begin to show symptoms
like any of the ones described here, go straight to the doctor.
Don't wait to see if you get better on your own. And be sure you
tell him or her what you suspect.
"Be sure you tell the physician you had the contact," Quan
says. "It's one way we have of making an early, proper
diagnosis. Tell the doctor you had contact with such-and-such an
animal. Then the physician is at least alerted that tularemia is
as possibility, or in the western states, plague."
These are only some of the weird and exotic diseases you may
encounter on a hunting or fishing trip. Others include
Leptospirosis, Anthrax, and a variety of fungal organisms. But
by following some common-sense preventive techniques, you can
avoid bringing home these unwanted freeloaders from the woods.
-End-
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

462
txt_files/dnamast.001 Normal file
View File

@ -0,0 +1,462 @@
A New Understanding of Aging and Disease
based on subtle electrical phenomena in DNA and RNA
This paper is intended for distribution among all those interested in
Aging and Disease. It puts forth intriguing observations regarding the
operation and formation of DNA and RNA in human systems.
The source of the root document must remain protected for the moment
although a great majority of information can be released with no mention
of names or places.
We of Vangard Sciences continually collect, analyze and distribute
information covering a wide range of topics. Our activities include
research for increasing understanding and the development of practical
devices. We do not sell or endorse any product, book or device.
We firmly believe and practice the precepts associated with the New Age
which stress service to mankind and planet Earth. Our activities and
research directly reflect these precepts. We urge all our fellow
researchers, including businesses to help where and in any way they can
all those who are working for a better world.
If you find this document of interest or direct use, we would appreciate
anything you might contribute to Vangard Sciences which we can use to
further our work. All our work is shared at no fixed cost to anyone.
Our sole income to carry on our activites and research is borne by your
contributions and our spare personal funds.
If you have information you might wish to share with our network or
comments or insights on this paper, please feel free to write, call or
link up to our KeelyNet BBS. (214) 324-3501 ring back system i.e, let it
ring once, hang up, then call back and let it ring until the computer
answers. If you let it ring on the first call, you will get our voice
answering machine.
Our KeelyNet Bulletin Board System will be online no later than July
1st. It is a public domain sourceboard which will list activities and
provide information to all users. There is no charge other than your
telephone toll charges.
You may write to us at Vangard Sciences
PO BOX 1031
Mesquite, TX 75150
KeelyNet BBS (214) 324-3501 (ring-back
system)
Home number (214) 324-8741
Thank you for your support and assistance.
Page 1
A New Understanding of Aging and Disease
based on subtle electrical phenomena in DNA and RNA
DNA is composed of simple chemicals strung together like beads which
form molecules known as bases. There are only four types of these bases
and they are :
Thymine - Adenine - Cytosine - Guanine
Hereafter called T A C G
Each base is attached to a sugar molecule (deoxyribose) and a phosphate
molecule in the DNA. The base is directly attached to the sugar.
These base-sugar-phosphate units of DNA are called nucleotides.
When nucleotides are linked together, they form the chain we call DNA.
DNA chains are stupefyingly long. A virus consists of about 200,000
nucleotides, a bacterium about 2 million and a human cell about 1
BILLION (1,000,000,000)!
Human DNA is broken up into 46 chromosomes in each of our 6.3 trillion
body cells. Chromosomes are microscopic rod-shaped bodies which carry
genes. Genes carry hereditary information and are made up of DNA.
Genes make proteins and control enzymes. Enzymes in turn control all
cellular functions.
All the DNA in a cell is contained in the chromosomes.
If all DNA of one human cell were laid out straight, it would be about 1
yard long.
If this DNA string is imagined as a flexible ladder, it would have about
6 billion steps. The rails which form the ladder are composed of 70%
sugar and 30% phosphate.
Each of the steps is composed of the four bases, A-G-T-C. These steps
are secured to the rails by atoms of hydrogen, known as hydrogen bonds
(the hydrogen atom has only one electron and one proton).
The electrons orbit in a clockwise direction if contacting a phosphate
section and counter-clockwise at a sugar section.
At the end of A-Adenine and T-Thymine, the electrons spin clockwise
where it connects with the hydrogen atoms.
At the end of G-Guanine and C-Cytosine, the electrons spin counter-
clockwise where it connects with the hydrogen atoms.
This 4-based section which is analogous to a stair step is called a base
pair. This means the DNA is formed by 12 billion nucleotides which form
stairsteps held together by two flexible rods.
These rods twist to form a circular staircase which is termed the double
helix of the DNA molecule.
Every one of the 6.3 trillion human cells has at least one DNA.
Page 2
When a new cell is formed, the DNA must make a perfect pattern of
itself.
This is thought to be done by splitting the ladder along the middle of
the step and reforming two DNA's absolutely identical and with the same
coded sequence.
In order to form a new DNA, another 12 billion nucleotides are required.
A cell nucleus has at least 8 different types of virus, either RNA or
DNA. There are 4 RNA types which have an overall negative charge.
There are 4 DNA types which have an overall positive charge.
Each pair of virus (one negative RNA and one positive DNA) attract each
other to establish a bipole.
This bipole must be adequately established to provide protection from
external electric, magnetic, or acoustic fields. The bipole can also be
affected by internal fields generated from excessive stress or loss of
systemic vitality due to illness, lack of rest or a multitude of other
causes.
The bipole also provides a means for the accumulation and storage of
electrical energy by making use of the properties of a virus.
Viruses which are inactive take a crystalline form. This crystalline
form possesses piezoelectric properties which makes it sensitive to
electric and acoustic waves, much as a microphone or antenna. They can
therefore either receive or transmit electrical or pressure (acoustic)
waves.
If a virus is in an active mode as is found in the cell nucleus, either
one DNA or one RNA will be covered with protein. Even in an active
status, a virus will possess the characteristics of a crystal which
allows it to be sensitive to very high sound frequencies.
An acoustic frequency up to 5 MHZ (yes, acoustic pressure waves can be
generated up to and beyond 4 million cycles as shown in the Olympus
Acoustic Scanning Microscope) causes the two viruses to continuously
vibrate against each other to produce a strain effect.
When this strain effect is created in two crystals, electrical energy is
produced which adds to the cellular vitality of all affected cells.
If an ultrahigh acoustic frequency (over 5 MHZ) is applied, an isolated
inactive virus can be so excited as to cause a rapid temperature
transition. This brings about disintegration on a cellular level.
This is much like the resonance effect of the Rife Frequency Generator.
In the case of Rife, energy is applied to cell structures either
acoustically or inductively from an external source. This causes the
cell membranes to extend beyond their eleastic recovery limit which
results in disruption and cellular death.
The technique described in this paper develops the energy directly
within the cell using its own "batteries".
Page 3
A one meter long Yagi antenna is a direct analog for human DNA. This
calculates to a tuned radio emission with a bandwidth from 375 MHZ to
385 MHZ.
Sound frequencies are used in the body for several purposes.
1) used by the DNA to acoustically scan for the determination
of what type of RNA is required
2) maintain the virus as an active bipole by the piezoelectric
effect brought on by the strain of the high frequency waves
between the two viruses of RNA and DNA
The DNA is under the constant bombardment of charged ions traveling
through the nervous system. These charged ions serve to modulate the
system frequencies which develop a high frequency sound in the range of
1.9 MHZ to 2 MHZ. Since a resonant structure will absorb a frequency
identical in phase and amplitude to itself, then a non-resonant
frequency will be reflected as an echo. The detection of this returning
echo effectively determines what type of protein (nucleotide) is missing
in the cell.
The complexities multiply at this point, so for the duration of this
paper, we will use the principle of K.I.S.S. (keep it simple stupid).
There are basically 3 controlling factors which involve the successful
reproduction of an identical DNA molecule :
1) The amount of kinetic energy associated with the electron in the
Hydrogen bonds. (acts as the glue which holds the base pairs
(stair steps) together and secured to the helix sugar/phosphate
rails)
2) The number of base pairs per turn in the double helix of DNA.
(controls the amount of electrical energy or cellular vitality by
acting as the secondary of a Tesla coil which has the ability to
alter its length and therefore its electrical potential)
3) The kinetic energy and frequency of the charged ions which travel
along the nervous system. (controls the ability of DNA/RNA to
precisely map the DNA pattern and duplicate it without error)
Aging and the reproduction of defective DNA is caused by a lack of
cellular vitality which is brought about by a twisting of the DNA helix
as the organism ages. Since the DNA molecule only has a given number of
base pairs (stair steps) due to its fixed length, this twisting adds
more turns which consequently reduces the number of base pairs in each
turn. Effectively, # YEARS/# TURNS = # BASE PAIRS.
As the organism goes through the birth, maturation and death cycle, the
DNA helix twists to "squeeze" out the number of base pairs (stair steps)
per turn, this can be shown by the following :
The DNA of the embryo cell in a mothers womb contains 46 base pairs
per turn.
In the 6th week of pregnancy, the DNA in the embryo cell has 34
base pairs per turn.
Page 4
In the 10th lunar month, a single DNA (half from the mother, half
from the father) has reproduced itself more than 6 trillion times.
When the baby is born, the process of reproduction decreases due to
the rapid twisting of the DNA helix.
At the age of 2 years, the DNA has twisted to reduce the number of
base pairs to 22 per turn.
At the age of 21, the base pairs are 14 per turn.
From the age of 35 to about 55, the base pairs stabilize somewhat
at 10 per turn.
At around 55 years of age and beyond, the 10 base pairs per turn
reduce to 6 and continue to decrease until the organism achieves
death.
The kinetic energy of the electrons in the Hydrogen bonds coupled with
the reduced energy of the charged ions from the nervous system are so
weak that the DNA stops reproducing itself and the aging process begins
to wreak havoc with the body.
In addition, the steadily reducing number of base pairs as life
progresses acts to slowly reduce the vitality of the system on a
cellular level.
This makes the "scanning" of the RNA by the DNA increasingly sensitive
to outside sources of interference.
If these outside sources of interference are applied while the
"scanning" process is occurring, the resulting pattern will be more or
less distorted from the original. If this occurs en masse, cancer and a
host of other diseases can occur.
Using Synergetic concepts, we can understand how a collective behavior
could be established in the body to force maverick tissues such as
cancer or other diseases resulting from distorted DNA, to become
enslaved to a ruling order parameter for the establishment of optimum
health and youth.
Indications are that there are two beneficial effects which result from
application of these concepts.
1) Disease can be halted and the body restored to optimum health
by the restoration of the DNA to the maximum vitality. The
DNA pattern is no longer subject to outside distortion and
therefore becomes self-optimizing.
2) Aging can be halted and reversed by as much as 30 years
dependent on the desired cellular vitality based on the number
of base pairs per turn. Hair darkens, skin tightens,
digestion improves, hormones and enzymes resurge, etc..
The technique would involve the application of an inductive field to
irradiate the body for a short time. The longer the body is within the
field, the more DNA replications will occur due to the natural birth,
life and death of all bodily tissues as proven by Dr. H.S. Burr of Yale.
Page 5
Each replication will create a DNA which possesses successively higher
vitalities. This ever increasing cellular energy slowly "untwists" the
DNA which increases the number of base pairs per turn.
The result is the reversal of aging and the restoration of the DNA to an
optimum pattern. This restoration dissipates the patterns which allow
disease to exist in the body.
During the time of the exposure, the natural replication of DNA under
the influence of an inductive energy field would cause the "new" DNA to
be copied with the desired number of base pairs.
This is brought about by an artifically induced lengthening of the Tesla
coil secondary which increases the amount of electical potential.
The increased electrical potential on a cellular level "untwists" the
DNA helix which allows more base pairs (stair steps) per turn to be
duplicated for each duplication.
This gradual increase in cellular vitality automatically gives the
DNA/RNA scanning process more energy to both record and duplicate the
old pattern onto a fresh duplicate. This in turn, increases the rate of
duplication for the removal of dead and dying tissues in the body.
Thus wrinkles, toxins and various other problems which degrade the
efficiency of the organism are removed. Youth and maximum health is
restored and maintained through periodic application of the inductive
field.
Thinking in Tesla coil terms, a primary coil with a winding of 10 turns
is inductively coupled to a secondary winding of 100 turns. If a
current of 1 ampere at 10 volts is applied to the primary, a voltage of
(10:100 or 1:10) 100 volts at 100 milliamps will be developed at the
secondary.
If the DNA is thought of as being a secondary and the number of base
pairs (stair steps) per turn is equivalent to the windings in a
secondary, we can see how a reduction in windings or stair steps would
result in less electrical potential (cellular vitality).
This in turn making the DNA progressively sensitive to outside stimuli
for an eventual mix-up and distortion in the DNA pattern. These DNA
distortions directly affect the formation of the genes which control
enzymes which control all cellular functions. Without intelligent
control of the duplication process, aging, disease and or death are
inevitable.
In order to retard the aging process and reduce the possibility of
disease, what factors must we take into consideration?
1) We must find a means of stretching or untwisting the DNA so that
we can increase the number of base pairs per turn to a level of
approximately 10 or more dependent on the desired age.
2) We must find a means of increasing the kinetic energy in the
electron of the Hydrogen bonds.
Page 6
3) We must increase the energy of the charged ions which flow
through the nervous system. This is best done by proper diet and
exercise.
What safety precautions must we also take into consideration?
1) The more devitalized, old or weak the body is, the more subject
is the DNA to outside influences, therefore, the applied energy
must be of sufficiently low amplitude to prevent repelling the
weakened hydrogen bonds. As the system is progressively
strengthened, the field magnitude can be gradually increased for
further strengthening.
2) We must experiment to determine the duration and magnitude of
induced energies acceptable to increase the number of base pairs
per turn in order to determine the limits of regression.
What are some avenues to investigate beyond those already tested?
1) Magnetics, refer Davis and Rawls work with monopolar fields.
North pole energies cause an increase in surface tension and an
increased life span, South pole energies cause a decrease in
surface tension and a burnout due to excess vitality in the
system which leads to premature aging and death.
2) Lakhovsky Multi-Wave Oscillator uses electrostatic induction for
a wide range of frequencies into the body. A duplication of the
original version as designed by Tesla would directly saturate the
body with scalar type energy.
3) Secondary coupling using electro-magnetics which treats the DNA
as a Tesla coil. This would directly add energy to the system.
If you have comments, suggestions or questions regarding this paper,
please contact Vangard Sciences. Your input is appreciated.
As we learn through our own efforts and the information shared with us,
it will be made available through our Bulletin Board or through requests
for photo-copies.
Please forward whatever you feel this information is worth to you.
All contributions are applied to physical research, maintenance &
provision of our KeelyNet Bulletin Board or collection of further
materials and information.
If you have unusual books, contacts or information you might wish to
donate or sell, please contact us at PO BOX 1031, Mesquite, TX 75150.
Thank you for your attention and your support.
Page 7

Some files were not shown because too many files have changed in this diff Show More