Merge pull request #1 from nhammer514/drb-regex

Looks great! Thank you so much!
This commit is contained in:
Hadleigh Jae Bills 2023-03-26 22:10:37 -04:00 committed by GitHub
commit f22dc28126
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
334 changed files with 243544 additions and 0 deletions

5
docs/asciiArt.txt Normal file
View File

@ -0,0 +1,5 @@
/==\ \ / /==\ \ /== /=================================\
| | \/ | | |\ | | The Resonant Gravity Field Coil |
+==+ || | | |||| Systems Present: | (or: how to manipulate reality |
| | /\ | | | \| | in a 530 square inch area) |
===/ \=/ \=\==/=/ \ \=================================/

358
regexConsp/666_ibm.xml Normal file
View File

@ -0,0 +1,358 @@
<xml><p>
I scanned this excerpt in from the book, "The Delicate Balance" ,
written by John Zajac. 1989-1990 . ISBN Number 0-910311-57-9 .</p>
<p>** Begin Excerpt **</p>
<p> Automation
----------</p>
<p>To understand how 666 relates to this discussion, one needs to explore
technology. One pertinent contributor to this technology is the
International Business Machines Corporation. IBM developed a laser method
of information transfer that has now become universally accepted. Lasers are
used for many different applications in society today, such as measuring
distances, detecting structural flaws, determining straightness, and so
forth. You can see the IBM system at your local supermarket quickly reading
prices and controlling inventory as it prints out a list of all purchased
items. Since checkers no longer have to punch keys on a register, check-out
time and errors are reduced. This system also provides the shopper with an
itemized receipt. That receipt information is stored in a central computer,
which keeps inventory and indicates what products the store should order, as
well as which products should no longer be carried.</p>
<p>But the use of automation is going considerably further. In fact, in Fresno,
California, one of eight regional test cities, a new computer system called
Behavior Scan gives shoppers a bar code card that is read at each purchase.
The computer then keeps a detailed list of all purchases made by a family,
including brands and quantity of each product. This same computer is also
attached to the user's home television set to monitor what is being watched.
It then selects commercials to be shown to that customer to affect his
specific buying habits. While most customers claim that they are not
affected by these commercials, the advertising companies have spent a lot of
money on research proving otherwise. Is this the start of a more modern
version of George Orwell's "1984," the complete control depicted in Vance
Packard's 'The Hidden Persuaders' ? Certainly, computers are powerful and
indispensable tools. Thanks to computers, paychecks are deposited
automatically into checking and savings accounts at predefined rates while
many bills and loans are automatically paid on time every month. The system
works so well that many institutions give a discount on loans and insurance
payments if automatic payment is used (they are more confident that they
will be paid and on time). This can convenientiy save time, postage, and
worry. The world is positioned to facilitate the ever growing requirements
for increased automation and convenience.</p>
<p>The convenience of computers is everywhere. Even a simple inexpensive $3
watch contains a computer. No longer does it merely tell time; it also can
add and subtract, keep time in three different zones, give the day and the
date, and beep at predetermined intervals. Computerized voices in fancy cars
warn you if you have not fastened your seat belt, that your oil is low, or
that you are almost out of fuel. The proliferation of computers has created
a strong dependence on them, for real need and pure convenience. The average
American's name is accessed 35 times a day by computer, and this is only the
beginning as we become plugged into the ever-growing system.</p>
<p>Our credit card system is also very convenient. Carrying cash is unnecessary
and sometimes useless, for example, when renting a car or cashing a check.
With a credit card, transactions are easier, and banks are now able (and
more then willing), to deduct payment of your credit card bill automatically
from your main account.</p>
<p>In fact, paper money soon may become a thing af the past for three reasons:</p>
<p>1. The government is concerned about the advances being made in color
xerographic technology. Advanced copy machines will soon be able to produce
counterfeit bills that are indistinguishable from government issues. The
FBI reported that up to 20 percent of people having access to advanced color
copiers will produce some counterfeit bills.</p>
<p>2. The successful introduction of the Smart Card in France and U.S. test
cities such as Washington, D.C., and Norfolk, Virginia, may render cash
obsolete. This Smart Card, manufactured by Motorola and Toshiba carries a
complete history of the user, including a physical description and health
record. The card allows direct payment to the seller by instantaneously
deducting the purchase amount and any service charges directly from the
cardholder's account. Thus, not only is the seller paid immediately but,
also, the card companies save millions of dollars by eliminating bad
payments and personal bankruptcy debts. Reducing credit card fraud should
also save card companies large sums of money. For example, MasterCard could
save $25 million annually by eliminating fraudulent cards. By the end of
1990, 20 million fraud-resistant cards will be in use in France. Seventeen
other countries have agreed to a standard card for all bank machines. Visa,
Eurocheque, Eurocard and MasterCard have already agreed to a method to make
their cards, systems, and money access interchangeable. Thus, by eliminating
checks and voluntary payments, the credit card industry would save 3.2
billion dollars per year.</p>
<p>3. The Federal Government is paying close attention to methods for taxing
the $300 billion underground economy in the United States. Unreported income
costs the U.S. Treasury $90 billion per year. If cash were eliminated,
computers could keep track of all income.</p>
<p>Evidence that cards may soon replace cash (and checks) was provided by Arco
service stations and Lucky supermarkets, which announced in September 1986
that their pumps and check-out stands now accept automatic teller bank
cards. With this system, payment is deducted electronically from the user's
bank account before the user received his purchase. Within one month, 6,400
service stations and supermarkets in 23 states were fitted with the system.</p>
<p>The gentlemen who came up with the laser reader in supermarkets for IBM
also invented the means of placing the same kind of bar code beneath living
tissue in one-billionth of a second. This marking is totally invisible to
the naked eye, and it can be read only by a certain type of laser. The
writing and reading is totally harmless and painless. The inventor
demonstrated this system in 1979 by marking salmon as they swam downstream.
The fish were totally unaware of the process as the laser burned a code into
their flesh. The computer then keeps track of the codes. Years later, these
fish will be detected by the same system as they swim back upstream and are
forced through fish ladders and chutes. *</p>
<p>Just as impressive is what Walter Wriston, the chairman of CitiCorp did in
1983. He passed a rule within the bank that was later withdrawn as a result
of public outcry. His rule stated that unless you were a depositor of $5,000
or more, you were not entitled to a teller. This meant that the vast
majority of depositors would have to stand in line outside the bank and
"talk" to machines. This was an economic move, of course, because banks have
had some problems of late. But its message was that people would no longer
talk to people. If banks could establish such a policy, then they could make
the minimum deposit higher and higher. Finally everything for everyone would
be done by machines. The concern is that we are reaching a highly automated
state, which if followed to the next logical step might have profound
impacts on how we rate life.</p>
<p>Even more startling was an "off the cuff"' statement made by an other
chairman of an eastern megabank: He announced that a method is in place that
can imprint in human hands a silicon chip the size of the head of a pin.
That chip will include not only the person's identification number, Social
Security number, name and birthplace, but also his criminal background,
educational level financial worth in the community, and his political
affiliations.</p>
<p>* Such a system is currently manufactured by Taymar, Inc., Westminster, CO
The U.S. Agriculture Department uses the product for cattle. Will it be
used for people in the future?</p>
<p>With such a system, the minute someone walked through the door of the bank,
he would be sensed and the bank would know who he was, where he came from,
what he did, and how much he was worth. All this would occur before a person
could reach the counter.</p>
<p>Now this was one step further than even progressive thinkers envisioned.
There had been discussions about placing codes on the hand to be used as
identification marks, like fingerprints, similar to package bar codes in
supermarkets. With such a system you would not need cash or a validated
check or even a Smart Card. You could put your hand through a laser and be
read by the computer. The store would automatically deduct the amount of the
purchase from your account. The method would be efficient in terms of cost,
speed, thoroughness, and elimination of bad checks. * But the price of all
this automation is individual independence from nameless bureaucrats looking
over your shoulder and approving (allowing) every transaction.</p>
<p>The amount of control would be unprecedented: however, the government would
immediately know how to put this control to use. People would no longer be
able to cheat the government because every time anyone had any money, the
government would know about it. The government could collect taxes each time
you spent your money, and, thus, there would be no more filing on April
15th. It also means that advanced printing and photocopying machines could
not be used for counterfeiting. Even a law breaker who traded with stolen
goods would have his purchase and sale traced by computer as he tried to
move or "spend" funds. The government would monitor every transaction,
knowing precisely everyone's location, actions, and worth. Instant
evaluations, approval or disapproval, and tax deductions on every individual
would be made.</p>
<p>* Such systems are not in the distant future. Six thousand people in Sweden
have accepted a mark on their right hands in a test of a totally cashless
society. Tests also have been conducted in Japan and the Dominican Republic
in Latin America.</p>
<p>Small wonder that the government likes this idea.
Governments have always liked control. They would like to control
everything, even the areas they say they do not want to control, such as
business, transportation, education, religion, entertainment, and other
governments. If this sounds the least bit exaggerated just look at our
government's actions regarding the restrictions of business concerning tax
credit, labor laws, advertising, antitrust, and corporate subsidies. Even in
deregulation, transportation requires licensing, registration, inspection,
subsidies, price controls, flight approval, and government flight
controllers. Although there may be talk of eliminating the Federal
Department of Education there is no attempt to reduce control of school
curriculum, subsidies, and even school lunches. Most universities are
dependent on federal aid and research grants.</p>
<p>The government controls religion by granting tax exemption to "desired
religions" and by making it illegal to pray in school. The government
exercises control of entertainment by licensing and or censoring television,
radio, movies, and books. The Federal Government also seeks to control other
governments by rewarding or threatening them with trade concessions,
military or econonic aid, sanctions, or war. The highest people in
government, it would seem, want the government to have total control of
everything.</p>
<p>In Orwell's 1984, the government "took over," and everyone was controlled by
"Big Brother." In reality, government may take over, not through control of
transportation and censorship, but through the economy, the lending
institutions, and every financial transaction. Is it too far-fetched to
imagine that you may have to take a mark on your hand to be able to buy and
sell and exist in a modern society? The technology exists. The chairman of
the megabank was asked what it would take to motivate people to put little
pieces of silicon under their skin. He answered, "a major catastrophe." He
knew people would not do it voluntarily.</p>
<p>Of course if there was a financial or national emergency (catastrophe), the
government would exercise unprecedented control, and compliance of citizens
would be anything but voluntary.</p>
<p> Central Computing
-----------------</p>
<p>As mentioned earlier, the impact of computers on society has been enormous.
However, their likely future role may be overwhelming. As powerful as
computers are, their effectiveness is greatly multiplied when they can
communicate with other computers. For example, missile launch command
computers talk to U.S. Weather Bureau computers to update the possible
flight paths of thousands of Minuteman missiles every hour. Thus, to enhance
a system's capabilities, computers need to talk to computers. To sort out
the enormous amount of cross-references, a central computer is needed.</p>
<p>The central computer for America is in Texas, and the international computer
that ties all the national central computers together is situated in
Brussels, Belgium. The Brussels computer is housed in a 13 story building,
the first three floors of which are occupied totally by this system's
hardware. Because of its size. the Brussels computer is referred to
affectionately as "the Beast."</p>
<p>This immense computer has enough capacity to store every detail about the
lives of every human being on Earth, the information contained in the
Library of Congress, and every book ever printed. Having operated for years,
it stores a growing volume of information as additional countries tie into
it ever more heavily. This allows international banking, interstate banking,
and quick credit references. Money can be moved from New York to California
or London in minutes. If a deposit is made in a bank other than where the
check was drawn, banks usually impose a 5 to 10-day holding period.
Actually, this practice is just a means for banks to increase their "float"
and thus to increase their profits, since the money is transferred within
one day. What happens to the money for the other days? The bank uses it to
float shorter loans by which the bank earns interest. Banks typically wait
longer to issue credit because they want to use the money for as many days
as possible.</p>
<p>Daily manipulation of funds by banks is common. Many banks are forced to
move their funds around the globe with the sun to have their reserves where
they are needed-in the banks that are open. Even the CIA likes the
capability of the central computer because it can check on personnel
mobility, foreign trading, and all financial transactions.</p>
<p>Many advanced computers are available with many designations, but one is
especially interesting. NCR produced a six-core memory computer with 60
bytes per word in conjunction with six bits to the character. It is named
and advertised as the 6-60-6 which defines the size and shape of the
computer. The only way this can be pronounced is six sixty-six (666). In
computer language, 666 has a unique significance.</p>
<p>A computer is an information retrieval system, and all of its information is
stored as numbers. A computer's memory cell has only two states-on and off,
or mathematically 1 and 0. Thus, every number must be represented in 1's and
0's. We use a decimal system based on 10; thus, it has 10 symbols: 0, 1, 2,
3, 4, 5, 6, 7, 8, and 9. Computers use a binary system using two symbols (0
and 1). To manage large numbers, computers use a binary coded decimal system
(BCD) which consists of groups of four digits, to make up all numbers. By
comparing the groups of number listed below one can find each system's
equivalent symbol. Thus, 0011, 0111, 0101 in the binary coded decimal system
is equal to our decimal system number 1,375.</p>
<p> Decimal System Binary System</p>
<p> 0- 0000
1- 0001
2- 0010
3- 0011
4- 0100
5- 0101
6- 0110
7- 0111
8- 1000
9- 1001</p>
<p>(For various reasons, some computers use Base 8 (0-7) and therefore do not
use the last two symbols shown.)</p>
<p>As shown in the BCD system, the number 6 is represented by 0110. This is
unique because 0110 written backwards or upside-down is still 0110. The
only other number in the BCD system with the same property is its complement
1001, or 9. (However, not every computer counts past 7.) This consistency is
the same in every country in the world, unaffected by language because every
computer speaks the same language of "1's" and "0's." Thus, 0110,0110,0110
is 666 universally.</p>
<p>In the Book of Revelation; John said that 666 is the mark of the beast. This
number also represents the universal consistency of the computers that will
be required to control the world's finances and thus the world's people.
When John wrote 1,900 years ago, he did not know anything about the binary
number system, computers, or why computers would require binary coded
decimals. Yet, he stated emphatically that the mark of the beast is 666.</p>
<p>Is this to say that the endtime beast is merely a building located in
Belgium? No! The Brussels computer is no more the beast than a general is
an army. The significance is that computerization for financial dominance is
the financial beast. The beast is a false god and the worship of that false
god. Worship means "worth respect." A false god does not have to assume the
figure of a man: It is the physical representation of that which controls,
that which is worshipped. So, if people worship the "$" symbol too much for
what it can acquire, influence, or accomplish, then that can qualify it as
the false god. The Brussels computer is only the figurehead of a vast,
soon-to-be indispensable financial network that will control all financial
transactions and thus all business and people.</p>
<p>He who controls the system controls all. What is feared by some is that
whoever is in control wiil demand that all take the code (mark) on their
hand to be able to buy and sell. Money, credit cards, and checkbooks would
be totally eliminated. Everything would be done through the government,
through the computer, giving the government total control. The greatest fear
is that when receiving the mark, you also may be forced to pledge allegiance
to your flag and (as in the days of kings) to your ruler, but in this case
the world leader would be the Antichrist. Of course, to have allegiance with
the Antichrist is to make a pact with the Devil. If you think that this
unified system is very far away, then you have missed some intriguing news
items.</p>
<p>As you probably are aware, the government has been talking about a national
identification number for some time. It is supposed to make record keeping
easier and to provide a means of crosschecking. It will help find deserting
husbands who owe child support as well as locate tax evaders. Most people
anticipate that the Social Security number will play a part in this national
identification code.</p>
<p>The government's system for identification uses 18 digits, the last nine of
which are the Social Security number. Virtually every citizen in the country
over the age of 1 will be forced to have a Social Security number. At
present, a Social Security number is necessary to have a job or a
savings/checking account. Starting 1990, every child over one year old must
have a Sociai Security number to qualify as a dependent on tax returns.
Preceding this 9-digit Social Security number are 3 digits corresponding to
one's telephone area code. Obviously, the whole world is tied by phone; even
barren deserts with no inhabitants have area codes. In front of these
numbers is a country code; for America it is 110. From this single
universally consistent number, the government will instantly know a person's
country, region, and identity. Does that seem logical so far? But that
accounts for only 15 digits, and the system is based on 18. The missing
3-digit code specifes that you are in the system: 666.</p>
<p>All computerized companies are going to 18-digit identification codes.
According to the report '666 Is Here,' Sears Roebuck is going on this system
and is committed to changing over all its credit cards. J.C. Penney's is
reported to be switching over, as well as New York Telephone. The U.S.
Government used to prefix all the serial numbers of everything it owned with
the code 451. But that also is changing; the dog tags on every soldier in
America are to be converted to 666.</p>
<p>Is that enough to concern you? The point is that 666 is a significant and
important part of what the future is going to hold. The Bible prophesied it.
Nostradamus explained it, and we are presently at the very edge of seeing it
become enacted. Rumors abound about people receiving checks with these
marks, governments admit they need better financial control, and the
chairman of one of the largest banks says, "It's ready; we just need a major
catastrophe."</p>
<p>** End Excerpt **
</p></xml>

157
regexConsp/9dims.xml Normal file
View File

@ -0,0 +1,157 @@
<xml><p>Title: The Proven existance of 9 dimensional planes</p>
<p>Intro: In order to understand these files, one must assume the following is
completely true. If not assumed, one will be completely lost in the text of
the following files. You may laugh if you wish, but if you want to understand
the theory you must make compensations on your part. Ok, on with the file...</p>
<p>Volume I: Defining the 9 planes</p>
<p>Written by: Starmaster and Locust</p>
<p>1st dimensional plane: This plane consists of only the single dimension
of length. It is not advised to try to envision this dimension for it may
cause insanity, seriously.</p>
<p>2nd dimensional plane: This plane consists of both length and width. It
is not adviable to envision this either. The first and second planes are
not the same as the fourth dimension and are uncomprehendable except by
entities "living" in that plane of thought and sight.</p>
<p>3rd dimensional plane: This is the plane of depth. This one is easily
imagined by 4th dimensional entities, because they are so close to it, and
had just passed out of it.</p>
<p>4th dimensional plane: This is the plane that the entities that we call
beings "live" on. It consists of the forward movement of time. It is the one
we are on right now.</p>
<p>The cross-over: This is a place where the 4th dimensional entities make their
way into the 5th and above. It is often refered to as death, yet it is only a
cross-over point. At this point, all knowledge of the 4th and below
dimensions is lost.</p>
<p>5th dimensional plane: This plane consists of the backwards movement of
time. Although considered impossible by 4th dimensional entities, those
entities are only thinking in the 4th dimensional phase. Remember everything
else from here on out is done in metaphysical thinking.</p>
<p>6th dimensional plane: This is the plane of clairvoyance. Remember, all of
this you must assume, or no comprehension of the later explanations
will be understood. Not much is known about this plane, except you "inhabit"
the sense of clairvoyance.</p>
<p>7th dimensional plane: This is the plane of telekinesis. This is even less
understood than the plane of clairvoyance, yet it does exist. This
often thought of as "supernatural", when in fact it a real thing.</p>
<p>8th dimensional plane: This is the plane of perception. It is the highest any
entity can evolve to. It consists of all the planes from five and up.</p>
<p>9th dimensional plane: God. Refered to by many, but understood by few. All
cultures and beings, be it from our world or others, have this vision. God
created all life, so all life lives by him.</p>
<p>These are the explanations of all the dimensional planes. Dimensional planes
are achieved by the evolution of the mind/soul/entity, which are all the
same thing. Evolution is a continual learning process. As we evolve we
understand more, yet raise more questions. This theory is to help those
understand the answers to many questions concerning God and the
"supernatural". One thing is assumed. We are not the only lifeforms in this
universe. All lifeforms were created by God, and will evolve through the
process God laid forth unto us. The universe is infinitely large, which
shows God's power is also infinitely large.</p>
<p>-----------------------------------------------------------------------------</p>
<p>Volume II: Explanation of the Planes and their signifigance to the supernatural</p>
<p>Intro: This is the second part to the previous file on the proven existance of
9 dimensional planes. As stated in the last phile, one must assume all things
true in order to understand and comprehend the intensity of this phile. This
one will deal with the questions brought about by the theory itself.</p>
<p>One thing must be understood in this file. All the entities, in all the
dimensional planes, co-exist with one another in this one universe. There is
but one universe, in which all entities live in. There are no "outside"
universes. Everything co-exists in this one universe.</p>
<p>Explanation of "Insane Persons":</p>
<p>An insane person is thought of as a person without the ability to think clearly
and comprehend things on a 4th dimensional basis. They are not "insane". That
is a term 4th dimensional entities give to those entities which are not on the
the same thought plane that the other entities are on. Every plane is just a
level of thought process. In the past file I stated that evolution is a
continuing process of learning. The "insane" persons of a 4th dimensional
community are not on the same thought plane we consider ourselves on.</p>
<p>Explanation of "supernatural" powers</p>
<p>This deals with the idea of persons who are able to channel their psychic
powers to do physical things. This also deals with fortune tellers and People
who can see the future, i.e. Nostradameus. These occurances are also explained
by the thought level that these entities are on. They are actually 6th or 7th
dimensional beings stuck in a 4th deminsional body. Because 99.8% of the
population of the 4th dimension only thinks in 4 dimensions, they are often
considered "supernatural", "witches", "prophets", ect. You then will ask, if I
came up with this, how come I can't bend spoons with a thought. The answer is
simple. I am now just discovering this phenomenon. I have an upbringing of this
not really happening, but being a science-fiction thing. The people who do know
how to do these things have been concentrating all their lives to use this
"super" power givin to them by God. If everone thought on the 8th dimension,
there would be no use for a God. It is all a process of learning and
comprehending.</p>
<p>Explanation of "Ghosts, Spirits, and Poltergeists"</p>
<p>This is about the simplest thing to explain. As I stated above, all entities
co-exist in the same universe, for there is only one, which is infinite.
Sometimes, 4th dimensional beings see things they aren't "supposed" to see.
People are brought up with the idea ghosts are science-fiction, when in fact
they are a real thing. Sometimes these entities are accidently crossed back for
a few seconds, years, or minutes.</p>
<p>Explanation of Heaven or the Kingdom of God</p>
<p>This is fairly easily comprehended, if one thinks beyond the 4th dimension. It
is but the enternity at the other side of the cross-over. What do you think the
"light at the end of the tunnel" is? It is the "other side" or 5th dimension.
People lose their physical bodies and are "able to fly" around. This also
explains the angels 4th dimensional beings continually say are immortal.</p>
<p>Explanation of Immortality</p>
<p>Immortality is an easily comprehendable concept, if one thinks of a positive
charge and a negative charge. When thrown together, they cancel each other out.
This is the same priciple when you combine forward and reverse time together.
After you make the cross-over, your mind adapts to backwards time, yet when
backwards time collides with forward time it cancels it out. Therefore the
state of immortality is reached.</p>
<p>The one constant</p>
<p>There is but one constant in all the dimensions. Plank's constant is only
valuable in 4th dimensional science and so is the speed of light. There is only
one constant in all of the 9 dimensions. It is the emotions. No one can explain
emotions except this phile. Emotions are the only constant of the co-existant
universe. Think about it. Why do you think the "ghosts" are happy, sad, angry,
ect., ect., when you see them. It is because of the power and intensity of the
emotional constant. When emotions of the 5th and above dimensional entities
gains great intensity, it then is transfered to all other dimensions.</p>
<p>That about does it for this file. That pretty much explains everything that I
can think of dealing with the unexplainable. If you can think of any more,
leave mail on Centre of Eternity for Starmaster (#75). I will ponder for the
answer, until I can get a suitable one using this theory. None will be turned
away. Who knows, maybe I'll get enough quetions to write another phile. Slatez
dudes.</p>
<p>Greets to all metaphysical thinkers. This should answer some of your questions.
-------------------------------------------------------------------------------
Call Centre of Eternity-(615)552-5747/ 40 megs on-line/ 12/2400 baud.
HQ of The Esoteric Society and Toxic Shock
Call Ripco-(312)528-5020/ 12-9600 baud/ 60+ megs on-line
-------------------------------------------------------------------------------
</p></xml>

512
regexConsp/a-z-cons.xml Normal file
View File

@ -0,0 +1,512 @@
<xml><p>The A-Z of Conspiracy
As everyone knows, we are never allowed to know who is really
controlling our lives/the country/the world. But is this knowledge a
dangerous thing? To clear up this question beyond reasonable doubt
Life provides a comprehensive guide to the theoretical corridors and
sinister back offices in which true power (and general paranoia) may
(or may not) lie
02/12/95
THE GUARDIAN
Conspiracy theories are the will-o'-the-wisps of the modern
world. They provide an alternative history to the authorised
version of events, a coherent demonology in a godless, devil-less
age.
Conspiracy theories fill a human need. They make some sense of
the cruel narrative that is the 20th century. They turn the random
violence of a lone madman into an act of orchestrated malice. In
this way the loss of a figure like Kennedy becomes somehow more
comprehensible. To be angry is more bearable than to be uncertain.
This soothing function can be at odds with truth, however.
Alternative conspiracist history is as flawed as the `authorised'
version. Worse, a conspiracist view can suppress awkward pieces of
information by toying with the notion that events have been covered
up by the authorities to suit their own ends: encounters with alien
space ships, the real makers of the Lockerbie bomb and the truth
about Rudolf Hess have all been hidden from the public but the
higher officers of the state are in the know.
Some of the conspiracy theories which date from earlier this
century have more ignoble, murkier origins. Anti-semites were
behind the Protocols of the Elders of Zion, the Jewish Conspiracy
and countless others. Their modern equivalents are put about by
neo-Nazi cliques. Again, these conspiracy theories have a human
function. Failure in life is more bearable if `the truth' is that
the Jews/the blacks/the Illuminati have conspired against you, it
allows you to ignore the fact that you are a spotty social
inadequate with bad breath and too-tight lederhosen.
The conspiracy theorist is the bane of the working journalist.
The need for some sliver of evidence to support assertions is
secondary to the spell of the theory: that, for the conspiracy
theorist, is its charm. This difficulty is compounded by the fact
that not all conspiracy theories are untrue. Those in power across
the world do prefer to keep embarrassing truths secret; they do
cover up; they do, from time to time, kill people who get in the
way.
True or not, a rattling good conspiracy theory requires the
following qualities:</p>
<p> 1 it must be difficult, better still, impossible, to understand
at first glance.
2 it must contain a spaghetti-heap of leads, all of which cannot
be followed up. There must always be one more lead left to chase.
3 The story should speak to a `wider' truth about our society,
through a series of disconnected or unconnected or unfalsifiable
propositions.
4 There should be no easy way of verifying it.</p>
<p> The theories below demonstrate all of these qualities to a
greater or lesser degree. To savour our A-Z properly, we suggest
readers mull over it with deadpan credulousness in the small hours
of the morning listening to the theme music from The X-Files and
drinking black coffee.
A IS FOR ALIEN ENCOUNTERS that are being covered up by the
authorities. Perhaps the best-documented close encounter of the
third kind took place on 27 December 1980, when airmen at two RAF
stations in East Anglia witnessed something extraordinary. First
radar operators at RAF Watton in Norfolk picked up an oddity on
their screens. Then RAF Phantom pilots reported seeing intense
bright lights in the sky. Former radar operator Mal Scurrah said:
`As the Phantoms got close the hovering object shot upwards at
phenomenal speed " monitored at more than 1,000 mph.' Later, airmen
stationed at RAF Woodbridge in Suffolk investigated a mystery fire
in Rendlesham Forest. Sergeant Jim Penniston witnessed the
encounter with airman John Burroughs. Penniston said: `The air was
filled with electricity and we saw an object about the size of a
tank. It was triangular, moulded of black glass and had symbols on
it. Suddenly it shot off faster than any aircraft I have ever
observed.' The next day the object returned. Base commander Lt Col
Charles Halt saw the flying saucer himself: `I couldn't believe
what I was seeing. It looked like the rising sun with a black
pulsating centre. It appeared to be dripping molten metal.' Hall
acted coolly, taping and photographing the object engineered by `an
intelligence which didn't originate on Earth'. His tape and film
were confiscated by visiting US defence officials. Former British
Chief of Defence Staff Lord Hill-Norton has claimed: `Someone is
sitting on information that should be in the public domain.'
Believability: 9/10 (Possible explanation: what the airmen saw may
not have been a UFO, but a prototype of the Stealth bomber, which
has a black triangular shape, a strange radar print and was, in
1980, ultra-secret. Project Aurora, a new ultra-ultra-secret
Pentagon Black Budget reconnaissance aircraft, is probably
responsible for all subsequent UFO sightings.)</p>
<p> B IS FOR THE BILDERBERG GROUP, which organises semi-secret
annual three-day meetings of the European-Atlantic great and good
from the worlds of business, diplomacy and politics. The first
meetings were organised in 1954 by eminence grise Joseph Retinger,
the then secretary general of the newly fledged, CIA-funded
European Movement. Karl Otto Pohl, then president of Deutsche
Bundesbank, David Rockefeller, Lord Carrington and Governor Bill
Clinton of Arkansaswere among recent delegates. Denis Healey was at
that first meeting and, having retired, discusses Bilderberg in his
autobiography, The Time Of My Life. Bilderberg is one of the
transnational groups suspected by the European-American far Right
of being part of the secret elite power structure. Even the
Financial Times column `Lombard' has noted: `If the Bilderberg
group is not a conspiracy of some sort, it is conducted in such a
way as to give a remarkably good imitation of one.' Believability:
8/10
C IS FOR CEAUSESCU, who was tried and executed on Christmas Day
to hush up the complicity of Romania's new leaders in his crimes.
The videotape of the Christmas Day show trial of Nicolae and Elena
Ceausescu is an absorbing spectacle. Time and again, Ceausescu and
his wife turn on their interrogators and accuse them of knowing the
answers to the questions they have posed. Prosecutor: `What do you
know about the Securitate?' Elena: `They are sitting across from us
here.' The old witch was right, of course, because sitting in the
courtroom were secret police chiefs like Colonel Magureanu, who had
been party to the attack on civilians in Timisoara which had
triggered the revolution. He was later promoted by the leader of
the conspirators, Ion Iliescu " a former Ceausescu crony " to head
the renamed secret police, the `Romanian Information Service'.
Iliescu became and remains president, the tainted hero of a tainted
revolution.
Believability: 10/10</p>
<p> D IS FOR `DEEP THROAT', the mole in the Nixon administration
guiding the Washington Post journalists, Woodward and Bernstein, to
the Watergate story. `Throat' remains unidentified. In his book
Hidden Agenda (1984) Jim Hougan nominated both Nixon's chief of
staff, Alexander Haig, and National Security Agency boss, Admiral
Bobby Ray Inman, as candidates; Colodny and Gettlin also fingered
Haig in their book Silent Coup (1991). Barbara Newman, for Channel
4's Dispatches, came up with the head of the FBI field office in
Washington, the late Bob Kunkle. He was allegedly leaking for the
FBI, which was disgruntled by the Nixon cover-up.
Believability: 10/10 (Cynics suspect `Deep Throat' was merely a
dramatic device or a ploy to keep newspaper lawyers quiet.)</p>
<p> E IS FOR ELECTRICITY PYLONS, which fry our brains. A number of
protesters have complained that electro-magnetic waves in overhead
electricity pylons have led to depression, headaches, mental and
physical ill-health. No government ministry has placed much
credence on these complaints. The epidemiology of environmental
effect is notoriously hard to prove, but all good conspiracists
believe there is no smoke without a secret ray.
Believability: 7/10</p>
<p> F IS FOR FREEMASONS, who club together to better themselves in
the world. The majority of active freemasons have sworn not to
divulge the secrets of the craft, on pain of having their tongues
`cut out by the root and buried in the sand below low-water mark'.
Other masons who have tried to break ranks have come to sticky
ends, like `God's Banker' Roberto Calvi, found hanging from
Blackfriars Bridge in 1982. So it is hard to determine just how
much influence is wielded by the grown men who like to dress in
black suits, wear aprons, bare their breasts and roll up their
trouser legs. Not very much, say some sceptics, who suspect that
the masons have more control over, say, haberdashery in
Herefordshire than the British state. But freemasons still hold
some sway in the corridors of power. The Rt Hon the Lord Templeman
and Rt Hon Lord Justice Balcombe, both freemasons, are two of the
most senior judges in the land; junior Foreign Office minister Tony
Baldry, former Tory MP David Trippier and back bench MPs Sir Peter
Emery and Sir Gerard Vaughan are all on the square.
Many police officers, too, remain true to their masonic oaths of
secrecy. In 1993 at a Police Federation conference a motion urging
police officers to reveal membership of the masonic brotherhood was
debated. An officer from Merseyside said it did not matter if
officers `wore a goatskin or rolled up their trouser leg'. Another
said that freemasonry was `not all mumbo-jumbo'.
A third police officer, mocking the calls for more openness
about freemasonry in the ranks, put a paper bag over his head.
Finally a member of the Metropolitan branch came to the rostrum to
announce the vote. `I'm not telling,' he said to laughter. `It's a
secret.' The opponents of freemasonry lost the vote.
Believability: 8/10</p>
<p> G IS FOR THE GEMSTONE FILE, the conspiracy theory which first
surfaced in 1975. Originally a precis by American journalist
Stephania Caruana of allegations made in letters by American
chemist Bruce Roberts, now deceased, Gemstone attributes much of
post-war America's ills to the power of Aristotle Onassis, who had
the Kennedys and Dr King assassinated, seized the Howard Hughes
empire, did a deal with the Mafia, etc. The subject of a couple of
book-length studies to date, Gemstone has appeared in five or six
different versions, each one containing new material. Most striking
is the `Kiwi Gemstone' in which specifically New Zealand incidents
have been embedded in the original American narrative. Authorless,
floating round the world in samizdat form, Gemstone is a perfect,
small-scale disinformation vehicle for anyone who cares to use it.
Believability: 0/10</p>
<p> H IS FOR HESS, locked up in Spandau prison because he knew all
about the secret 1941 negotiations between Britain and Nazi
Germany. Rudolf Hess's flight in May 1941 remains one of the most
bizarre episodes of the Second World War. Lord James
Douglas-Hamilton, son of the Duke of Hamilton, the Scottish
landowner to whom Hess presented his plans, said: `Hess's proposals
consisted of a limited peace deal under which Germany would have
allowed Britain a free hand in her empire in return for Britain
allowing Germany a free hand in Europe and Russia. His so-called
peace plans would have meant the enslavement of Europe.' Hess was
arrested, tried to commit suicide, went mad, was sentenced to life
imprisonment and, at the age of 93, hanged himself in Spandau
prison. Or not, as the case may be.
One theory has it that the Churchill government, in a hideously
clever propaganda campaign against the Nazis, ran a double, `Hess
Two'. Evidence supporting the double theory emerged when a Dutch TV
journalist, Karel Hille, disclosed that he had got the Most Secret
file on Hess via an unnamed British historian who had been given it
by the late MI6 spymaster Sir Maurice Oldfield. Oldfield had,
allegedly, stolen the file from the MI6 archive. That the man,
`Hess Two', who killed himself in prison was not the real Hess is
backed by Hugh Thomas, a Welsh surgeon, who, in the early 1970s,
was consultant to the British Military Hospital in West Berlin.
Thomas examined `Hess Two' and found him to lack the scars the real
Hess should have had after a wound he received in 1917. MI6 had
`Hess Two' hanged because they didn't want the truth to come out.
Then the killers burnt the evidence, including an electrical flex,
with which he was murdered.
Believability: 5/10 (Hess was mad. His 1917 wound was
pea-sized.)</p>
<p> I IS FOR THE ILLUMINATI, the secret society controlling all the
other secret societies. An 18th-century masonic splinter group
begun by Adam Weishaupt, the Illimunati were said to be the hidden
force behind the French Revolution. After the First World War they
were re-launched into the English-speaking world by one Nesta
Webster who credited them with organising the Russian October
Revolution too. In 1921 the Spectator described Weishaupt as a
`Prussian with criminal instincts and lunatic perversions . . .
{who} shunted continental freemasonry on to Antinomian and
revolutionary lines.' In the demonology of the Anglo-American far
Right, the Illuminati largely replaced the Jews as the spider at
the centre of the web. These theories were brilliantly parodied in
the Illuminatus! trilogy (1976) by Robert Anton Wilson and Robert
Shea.
Believability: 0/10</p>
<p> J IS FOR JAMES JESUS ANGLETON, the orchid-growing,
poetry-writing, paranoid head of CIA counter intelligence
throughout much of the Cold War. Angleton believed the CIA and all
other spy networks to be so much gorgonzola, riddled with KGB
moles. In his search for these moles Angleton paralysed large
chunks of the CIA for years at a stretch and blighted the careers
of many senior officers.
It was Angleton who insisted in the 1960s that MI5 investigate
Harold Wilson, a task taken up enthusiastically by Peter Wright and
his circle in MI5. Angleton's overarching idiocy was to believe the
KGB defector Golitsyn, who claimed that the friction between the
Soviet Union and Mao's China in the late 1960s was a fake to
deceive the West. Despite the collapse of the Soviet Union,
Golitsyn remains convinced that it is all a black propaganda ploy.
However, the confession of top CIA man Aldrich Ames that he was a
KGB mole have proved some of Angleton's fears correct.
Believability: 6/10</p>
<p> K IS FOR KENNEDY, killed by almost anyone you care to mention.
According to Captain James T Kirk of the Starship Enterprise, the
`first rule of assassination is kill the assassins'. The killing of
Lee Harvey Oswald by Jack Ruby set a hare running that has never
stopped. Instead of Oswald's courtroom confession or denial of
guilt providing some explanation of the killing of the president,
the assassination of the assassin let conjecture reign.
So many had a hand in his murder it is too tedious to name them
all. Oliver Stone argued in his film JFK that Lyndon Baines Johnson
was the man behind the conspiracy. The KGB, the Mafia, the Cubans,
the FBI and the masons are all contenders. Perhaps the best JFK
conspiracy theory is that he is, after all, still alive, but kept a
permanent prisoner by the National Security Council.
Believability: 1/10</p>
<p> L IS FOR LOCKERBIE. On 21 December 1988, 270 people were
murdered when Pan Am 103 exploded over Scotland.
Six years later no one has been convicted of the crime, although
investigators on both sides of the Atlantic have consistently
pointed the finger at two Libyan intelligence officers who they
believe planted the bomb on a plane from Malta before it was
transferred at Frankfurt on to the fatal flight. UN sanctions are
enforced against Tripoli until Colonel Gadaffi agrees to hand over
the two for trial.
Others are not convinced by the official line. Tales of
suitcases of heroin recovered at the crash site by mysterious
American intelligence officers point to a joint CIA/Drug
Enforcement Administration operation that was fatally compromised
by Syrian and Iranian-backed Palestinian terrorists. American
spooks were running `controlled' deliveries of Lebanese heroin
through Frankfurt airport in return for information about the
whereabouts of the hostages in Beirut. The terrorists were aware of
this and switched the dope-filled Samsonite case with one
containing the bomb. Among those killed were Matthew Gannon, the
CIA's deputy head of station in Beirut, and Major Charles McKee, a
Defence Intelligence Agency officer allegedly in charge of a
hostage rescue team. Some students of the tragedy have gone so far
as to suggest that McKee was flying home to blow the whistle,
disgusted that deals were being struck with dope dealers in order
to gain intelligence on the kidnap victims.
Believability: 8/10</p>
<p> M IS FOR DAVID MELLOR, got at by Mossad after his
pro-Palestinian outburst in 1988 on the West Bank. The Israelis
were out to topple Mellor after he became the most prominent critic
in the British Government of their conduct in the Occupied
Territories.
First, they managed to secure his removal as junior Foreign
Office minister, threatening to stop passing on intelligence
information about the hostages in Beirut unless Mellor was moved.
Second, they arranged for the clandestine phone-tapping
operation which led to the highly embarrassing `toe-sucking'
allegations.
The result: Mellor was forced to quit the Cabinet.
Believability: 5/10
N IS FOR NOSTRADAMUS, the 16th- century psychic seer who
predicted Napoleon, Hitler and the killing of John Kennedy. The
seer's muddily-written quatrains have spawned more than 200 books,
a propaganda war between the Nazis and the Allies during the Second
World War, a movie, an American TV spin-off show, Monopoly-style
board games, a virtual reality game and even a watch, which ticks
down the seconds from 1 January 1995 to the millennium.
Whitstable housewife Valerie Hewitt, author of Nostradamus: His
Key To The Centuries (Heinemann, 1994), predicts that Prince
Charles will be crowned this year. `It will be something sudden
that will affect the Queen, an illness " whether it is political or
genuine it doesn't matter. And Diana will be offered the chance to
become Queen. But Charles's reign will be short and William could
be king before he's 18.' In 1993 she predicted that George Bush
would stay as president.
Rival Nostradamus buff John Hogue is more apocalyptic. He plumps
for nuclear disaster or terrorism in 1996, World War III before the
millennium and Aids " `a very great plague . . . with a great scab'
" and the ozone hole killing off two-thirds of the world population.
He quotes the prophet's vision of the future: `So many {die}
that no one will know the true owners of fields and houses. The
weeds in the city streets will rise higher than the knees, and
there shall be a total desolation of the clergy.' Believability:
0/10 (The verses of Nostradamus clearly refer to events and places
in the 16th century. For example, nowhere does he mention `Hitler',
only `Hister', the contemporary name for the Lower Danube.)</p>
<p> P IS FOR PROMIS SOFTWARE, stolen from a Washington law firm. In
1982 a Washington DC computer firm, Inslaw, developed a programme
called Promis (Prosecutors' Management Information System) which it
supplied to the US Justice Department for $10 million. A year
later, Justice stopped all payments and Inslaw went bankrupt. A
ruling in 1987 at a bankruptcy court concluded that the Justice
Department `took, converted and stole Promis software through
trickery, fraud and deceit', which is a little embarrassing for the
department charged with upholding the rule of law.
So far, so what? It is only when people started to probe into
why Justice had acted in such a way that it gets interesting,
prompting one investigator to claim that the case `was a lot
dirtier for the department than Watergate had been, both in its
breadth and depth'.
It turns out that (allegedly) the men behind the theft of the
software were all Reagan appointees who helped engineer the 1980
`October Surprise', whereby the Republicans struck a deal with the
Iranians not to release American Embassy hostages from Tehran until
after Reagan was safely in the White House. The software was then
sold on to foreign intelligence agencies across the globe, (a) to
generate revenue for covert operations not authorised by Congress;
and (b) to make it easier for US operatives to hack into the
software.
The story was chased by US freelance Danny Casolaro. A year
after making himself known to the Inslaw people he was found dead
in a motel room in West Virginia. The official verdict was suicide,
but Elliott Richardson, the Attorney General under Nixon, hired by
Inslaw to investigate the case, concluded: `It's hard to come up
with any reason for Casolaro's death other than he was deliberately
murdered because he was so close to uncovering sinister elements in
what he called `the Octopus'.' Believability: 7/10</p>
<p> Q IS FOR CARROLL QUIGLEY, the granddaddy of all modern American
conspiracists. Quigley's 1,340-page volume Tragedy And Hope "
History Of The World In Our Time (1966) included a dozen pages on
the existence of a hitherto unknown secret society, run by Alfred,
Lord Milner, Lloyd George's Chef de Cabinet, funded by Cecil
Rhodes's estate. The group, said Quigley, who claimed to have
access to its papers, organised the Round Table groups in the
Commonwealth, the Royal Institute For International Affairs in
London and its counterpart in the US betwen the wars.
For far-Right groups such as the John Birch Society these pages
were proof, from an `insider', of the great conspiracy they had
always suspected. Not the communists, not the Jews, not even the
Illuminati, but the Perpetual Hidden Government " the PHG!
Quigley's revelations are behind much of the recent talk of One
Worlders and New World Orders and are part of Republican
presidential hopeful Pat Robertson's world view. Among Quigley's
students at Georgetown University was Bill Clinton, and the
conspiracists got quite excited when President Clinton referred to
the impact Quigley made on him in his inauguration speech.
Believability: 4/10</p>
<p> R IS FOR JAMES RUSBRIDGER, killed and framed as a sex pervert by
MI5. Rusbridger was a tremendous irritant to the security services.
His letters to newspapers poured scorn on the Official Secrets Act;
his books, such as The Intelligence Game, cast doubt on the
official version of events. But where Rusbridger, aged 65 at the
time of his death, really annoyed the spooks was when he unearthed
Britain's code-cracking secrets, in particular the story that the
British had cracked Japanese naval codes in advance of the attack
on Pearl Harbour.
He was bright, hale and hearty for his age when he was
discovered in February 1994 at his home, dressed in a green
protective suit for use in nuclear, biological or chemical warfare,
green overalls, a black plastic mackintosh and thick rubber gloves.
His face was covered by a gas mask and he was also wearing a
sou'wester. His body was suspended from two ropes, attached to
shackles fastened to a piece of wood across the open loft hatch,
and was surrounded by pictures of men and mainly black women in
bondage. Consultant pathologist Dr Yasai Sivathondan said he died
from asphyxia due to hanging `in keeping with a form of sexual
strangulation'.
His death occasioned a piece by Sunday Times reporter James
Adams, whose own books boast of contacts with British intelligence.
Adams quoted senior intelligence officials as saying Rusbridger
never had any connection with any branch of British intelligence:
"His death was as much a fantasy as his life,' said one source . .
. Rusbridger's interest in intelligence seems to have coincided
with his conviction for theft in 1977.' Such an extensive
posthumous demolition job by intelligence officials would perhaps
only be merited by someone who had been a serious thorn in their
side.
Believability: 7/10</p>
<p> S IS FOR THE SUICIDES OF THE SCIENTISTS WHO WORKED FOR MARCONI.
In 1988 a host of brilliant researchers working for the defence
giant killed themselves in a variety of ways: one drove his
petrol-laden car into a disused Little Chef, another jumped off the
Clifton suspension bridge, a third electrocuted himself.
The deaths appeared to be a case of life imitating art " in this
case, an episode of the 1960s Avengers series which features a
number of brilliant scientists killing themselves. The first
problem is that there was no linkage between the deaths. Second,
suicide is 10 times more common than murder in Britain. Third, men
kill themselves more violently than women. Fourth, scientists are
more ingenious than the rest of the population, so one would expect
them to kill themselves violently and bizarrely. Fifth, the defence
business employs huge numbers of scientists, and Marconi is a big
employer.
When the numbers are crunched, there is no statistical
aberration in the number of suicides by Marconi scientists. It is
too good a story for a newspaper to kill, however.
Believability: 0/10</p>
<p> U IS FOR THE UNIFIED CONSPIRACY THEORY, or the Grand Unified
Conspiracy Theory, which knits all the other conspiracy theories
into a coherent tapestry.
Believability: 1/10</p>
<p> V IS FOR VATICAN, which knocks off the popes it doesn't like.
The markedly short reign of John Paul I has given rise to this
particular crock of conjecture.
Old men can die quite quickly, even if they are popes. However,
rumours persist in the Vatican than John Paul I was going to clean
out the Augean stables of the pontiff's finances and expose the
scandalous links between the Mafia, the freemasons and senior
cardinals in the Roman Catholic Church.
Believability: 2/10</p>
<p> W IS FOR COLIN WALLACE, who was forced to resign from the
Ministry of Defence in 1975 when he leaked information about a
covert MI5 operation, `Clockwork Orange'. Wallace, an Ulsterman,
claimed he had been involved in the operation, which had been
designed to destabilise paramilitary organisations in the Province
through disinformation. Wallace alleged that the scope of the
operation had been extended to include mainland politicians viewed
as `politically soft or leftist', a list which included Harold
Wilson, Edward Heath and Jeremy Thorpe. Wallace claims it was in
his remit to discredit these `targets' using unfounded smear
stories about sexual impropriety.
He also alleged, in a memo to army chiefs, that a Belfast boys'
home named Kincora was being used as a homosexual trap for
intelligence gathering against prominent Unionist politicians. In
1990 an inquiry conducted by James Calcutt QC found Wallace's
dismissal to be unsafe and ordered the Ministry to award him
pounds 30,000 in compensation. The inquiry was not, however,
empowered to make any judgment on Wallace's allegations.
Believability: 7/10</p>
<p> X IS FOR MR X, the third man who allegedly went to bed with two
senior Conservative politicians, now in the Cabinet, all at the
same time. This is a conspiracy theory never to be told.
Believability: 10/10</p>
<p> Y IS FOR YAKUZA, the Japanese mafia who run the world. The
Yakuza are the world's richest and most powerful gangsters. They
control many of the big-name Japanese corporations that now have
huge leverage in the major western economies. Nothing can be done
to loosen the grip of the Yakuza on the world economy.
Believability: 8/10
Z IS FOR THE ZAGREB OPERATION, when the NKVD inducted Robert
Maxwell as a Soviet double agent. Maxwell was never clear about how
he escaped from Nazi-occupied Germany. In fact, he was given secret
passage through Nazi-allied Croatia by Communist partisans, then
loyal to the Soviet Union, in return for a lifetime as a spy.
While passing through Zagreb Maxwell was recruited by an officer
of the NKVD " the forerunner to the KGB " and was told to travel to
Britain and ingratiate himself with the British Establishment.
Maxwell did brilliantly, becoming first a war hero then a respected
publisher. The NKVD and KGB helped Maxwell out from time to time,
smoothing his path in arranging deals with Eastern Bloc scientific
publishers and the like. Maxwell prospered.
It was only in 1991 that the Israeli secret service, Mossad,
came across the truth when they bought up a senior KGB archivist
who sold them the Operation Zagreb file. Maxwell " who Mossad
thought had been working for them " was terminated by a crack unit
of Israeli frogmen.
Believability: 6/10
</p></xml>

345
regexConsp/africa.xml Normal file
View File

@ -0,0 +1,345 @@
<xml><p>
WHO Murdered Africa
The Greatest Murder Mystery of all Time
There is no question mark after the title of this article because
the title is not a question. It's a declarative statement. WHO, the
World Health Organization, murdered Africa with the AIDS virus. Thats
a provocative statement, isn't it?
The answers to this little mystery, Murder on the WHO Express will
be quite clear to you by the end of this report. You will also
understand why the other suspects, the homosexuals, the green monkey
and the Haitians, were only pawns in this virocidal attack on the
non-Communist world.
If you believe the government propaganda that AIDS is hard to catch
then you are going to die even sooner than the rest of us. The common
cold is a virus. Have you ever had a cold? How did you catch it?
You don't really know, do you? If the cold virus was fatal, How many
people would be left in the world?
Yellow fever is a virus. You catch it from mosquito bites. Malaria
is a parasite also carried by mosquitoes. It is many times larger than
the AIDS virus ( like comparing a pinhead to a moose head ) yet the
mosquito easily carries this large organism to man.
The tuberculosis germ, also larger than that AIDS virus, can be
transmitted by formites ( inanimate objects such as towels ). The
AIDS virus can live for as long as 10 days on a dry plate. You can't
understand this murder mystery unless you learn a little virology.
Many viruses grow in animals and many grow in humans, but most of
the viruses that affect animals don't affect humans. There are exceptions,
of course, such as yellow fever and small pox.
There are some viruses in animals that can cause very lethal cancer
in those animals, but do not affect man or other animals. The Bovine
Leukemia Virus ( BLV ), for example, is lethal to cows but not humans.
There is also another virus that occurs in sheep called Sheep Visna Virus
which is also non-reactive in man. These Deadly viruses are " Retro -
Viruses ", meaning that they can change the genetic composition of the
cells that they enter.
The World Health Organization, in published articles, called for
scientists to work these deadly agents and attempt to make a hybrid
virus that would be deadly to humans. " An attempt should be made to
see if viruses can in fact exert selective effects on immune function.
The possibility should be looked into that the immune response to the
virus itself maybe impaired if the infecting virus damages, more or
less selectively, the cell responding to the virus."
Thats AIDS. What the WHO is saying in plain english is " Let's cook
up a virus that selectively destroys the T-Cell system of man, an
acquired immune deficiency. Why would anyone want to do this? If you
destroy the T-Cell system of man then you destroy man. Is it even
remotely possible that the WHO would want to develop a virus that would
wipe out the human race?
If there new creation worked, the WHO stated, then many terrible
and fatal infectious viruses could be made even more terrible and more
malignant. Does this strike you as being a peculiar goal for a health
organization?
Sometimes Americans believe in conspiracies and sometimes the don't.
Was there a conspiracy to kill President Kennedy? Twenty five years later
the debate still continues, and people keep changing there minds. One day
it's yes and the next it's no - depending upon what was served for lunch,
or how the stock market did the day before.
But it doesn't take a bad lunch to see an amazing concatenation of
events involving Russian and Chinesse communist nationals, The WHO, The
National Cancer Institute, and the AIDS epidemic.
But what about the green monkey? Some of the best virologist in the
world and many of those directly involved in AIDS research, such as
Robert Gallo and Luc Montagnier, have said that the green monkey may be
the culprit. You know the story: A green monkey bit a native on the ass
and, bam - AIDS all over central Africa.
There is a fatal flaw here. It is very strange. Because Gallo,
Montagnier and these other virologist know that the AIDS virus doesn't
occur naturally in monkeys. In fact it doesn't occur naturally in any
animal.
AIDS started practically simultaneously in the United States, Haiti,
Brazil, and Central Africa. ( Was the green monkey a jet pilot? )
Examination for the gene structure of the green monkey cells prove that
it is not genetically possible to transfer the AIDS virus from monkeys
to man by natural means.
Because of the artificial nature of the AIDS virus it will not easily
transfer from man to man unless it has become very concentrated in the
body fluids through repeated injections from person to person, such as
drug addicts, and through high multiple partner sexual activity such as
takes place in Africa and among homosexuals. After repeated transfer it
can become a " natural " infection for man, which it has.
Dr. Theodore Strecker's research of the literature indicates that
the National Cancer Institute ( NCI ) in collaboration with the WHO,
made the AIDS virus in there laboratories at Fort Detrick ( now NCI ).
They combined the deadly retro-viruses Bovine-Leukemia Virus and Sheep
Visna Virus, and injected them into human tissue cultures. The result
was the AIDS virus, the first human retro-virus known to man and now
believed to be 100% fatal to those infected.
The momentous plague that we now face was anticipated by the National
Academy of Sciences (NAS) in 1974 when they recommended that "Scientists
throughout the world join with the members of this committee in voluntarily
deferring experiments linking animal viruses". What the NAS is saying in
carefully guarded english is: "For God's sake. Stop this madness!" The
green monkey is off the hook. How about the Communists?
Communist are in the process of conducting germ warfare from Fort
Detrick, Maryland against the free world, expecially the United States,
even using foreign communist agents within the US Army's germ warfare
unit euphamistically called the Army Infectious Disease Unit.
You don't believe it? Carlton Gajdusek, an NIH bigshot at Detrick
admits it. " IN THE FACILITY I HAVE A BUILDING WHERE MORE GOOD AND
LOYAL COMMUNIST SCIENTISTS FROM THE USSR AND MAINLAND CHINA WORK, WITH
FULL PASSKEYS TO ALL THE LABORATORIES, THAN THERE ARE AMERICAN. EVEN THE
ARMY'S INFECTIOUS DISEASE UNIT IS LOADED WITH FOREIGN WORKERS NOT ALWAYS
FRIENDLY NATIONALS."
Can you imagine that? A UN-WHO communist trogan horse in our
biological warfare center with the full blessing of the US government?
The creation of the AIDS virus by the WHO was not just a diabolical
scientific exercise that got out of hand. It was a cold-blooded
successful attempt to create a killer virus which was then used in a
successful experiment in Africa. So successful in fact that most of
Central Africa may be wiped out, 75,000,000 dead within 3-5 years.
It was not an accident, it was deliberate. In the Federation
Proceedings of the United States in 1972, WHO said : " In relation
to the immune response a number of useful experimental approaches can
be visualized ". They suggested a neat way to do this would be to put
their new killer virus ( AIDS ) into a vaccination program, sit back and
observe the results. " This would be particularly informative in
sibships," they said. That is, give AIDS to brothers and sisters and
see if they die, who dies first, and of what, just like rats in a
laboratory.
They used the smallpox vaccine for their vehicle and the geographical
sites chosen in 1972 were Ugunda and other African sites, Haiti, Brazil
and Japan. The present and recent past of AIDS epidemiology coincides
with these geographical areas.
Dr. Strecker points out that even if the African green monkey could
transmit AIDS to humans, the present known amount of infection in Africa
makes it statistically impossible for a single episode, such as a monkey
biting someone, to have brought this epidemic to this point. The doubling
time of the number of people infected, about every 14 months, when
correlated with the first known cases, and the present known number of
cases, prove beyond a doubt that a large number of people had to be
infected at the same time. Starting in 1972 with the first case from our
mythical monkey, and doubling the number of infected from that single
source every 14 months you get only a few thousand cases. From 1972 to
1987 is 15 years or 180 months. If it takes 14 months to double the number
of cases then there would have been 13 doublings. 1 then 2 then 4 then 8..
etc...In 15 years, from a single source of infection there would be about
8000 cases in Africa, not 75 million. We are approaching World War II
mortality statistics here - without a shot being fired.
Dr. Theodore A. Strecker is the courageous doctor who has unraveled
this conundrum, the greatest murder mystery of all time. He should get
the Nobel Prize but he'll be lucky not to get "suicided." ( "Prominent
California doctor ties his hands behind his back, hangs himself, and
jumps from 20th floor. There was no evidence of foul play." )
Strecker was employed as a consultant to work on a health proposal
for Security Pacific Bank. He was to estimate the cost of their health
care for the future. Should they form an HMO was the major issue. After
investigating the current medical market he advised against the HMO because
he found that the AIDS epidemic in all probability bankrupt the nation's
medical system.
He became fascinated with all the scientific anomalies concerning AIDS
that kept cropping up. Why did the " experts " keep talking about
green monkeys and homosexuals being the culprits when it was obvious that
the AIDS virus was a man-made virus? Why did they say it was a homosexual
and drug-user disease when in Africa it was obviously a heterosexual
disease? If the green monkey did it then why did AIDS explode practically
simultaneously in Africa, Haiti, Brazil, Japan, and the United States?
Why, when it was proposed to the National Institute of Health that the
AIDS virus was a combination of two bovine or sheep viruses cultured in
human cells in a laboratory, did they say it was " bad science " when
thats exactly what occurred?
As early as 1970 the WHO was growing these deadly animal viruses in
human tissue cultures. Cedric Mims, in 1981, said in a published article
that there was a bovive virus contaminating the culture media of th WHO.
Was this an accident or a "non-accident"? If it was an accident then why
did the WHO continue to use the vaccine?
This viral and genetic death bomb, AIDS, was finally produced in 1974.
It was given to monkeys and they died of pneumocystis carni which is
typical of AIDS.
Dr. R. J. Biggar said in Lancet ( a Brittish journal ) that the AIDS
agent could not have developed de novo. That means in plain english that
it didn't come out of thin air. AIDS was engineered in a laboratory by
virologists. It couldn't engineer itself. As Dr. Stricker so colorfully
puts it: " If a person has no arms or legs and shows up at a party in a
tuxedo, how did he get dressed? Somebody dressed him. "
There are 9000 to the 4th power possible AIDS viruses. ( There are
9000 base pairs on the geneome. ) So the fun has just begun. Some will
cause brain rot similar to the sheep virus, some leukemia-like diseases
from the cow viruses, and some that won't do anything. So the virus will
be constantly changing and trying out new esoteric disease on hapless
man. We're only the beginning
Because of the trillions of possible genetic combinations there will
never be a vaccine. Even if they could develop a vaccine they would
un-doubtfully give us something equally as bad as they did with the Polio
vaccine ( cancer of the brain ), the Swine Flu vaccine ( a Polio-like
disease ), the Smallpox vaccine (AIDS), and the Hepatitis vaccine (AIDS).
There are precedents. This is not the first time the virologists have
brought us disaster. SV-40 virus from monkey cell cultures contaminated
Polio cultures. Most people in there 40's are now carrying the virus
through contaminated Polio innoculations given in the early 60's. It is
known to cause brain cancer which explains the increase in this disease
that we have seen in the past 10 years.
This is the origin of the green monkey theory. The Polio vaccine was
grown on green monkey kidney cells. 64 million Americans were vaccinated
with SV-40 contaminated vaccine in the 60's. An increase in cancer of the
brain, possibly Multiple Sclerosis, and God only knows what else is the
tragic result. The delay between vaccination and the onset of cancer
with this virus is as long as 20-30 years. 1965 + 20 = 1985. Get the
picture?
The final piece of the puzzle is how AIDS devastated the homosexual
population in the United States. It wasn't from Smalpox vaccination as
in Africa because we don't do that any more. There is no Smallpox in the
United States and so vaccination was discontinued. Although some AIDS has
been brought to the United States from Haiti by homosexuals, It would not
be enough to explain the explosion of AIDS that occurred simultaneously
with the African and Haitian epidemics.
The AIDS virus didn't exist in the United States before 1978. You can
check back in any hospital and no stored blood samples can be found
anywhere that exhibit the AIDS virus before that date. What happened in
1978 and beyond to cause AIDS to burst upon the scene and devastate the
homosexual section of our population? It was the introduction of the
Hepatitis B vaccine which exhibits the exact same epidemiology of AIDS.
A Doctor W. Schmunger, born in Poland and educated in Russia, came
to this country in 1969. Schmunger's immigration to the U.S. was
probably the most fatefull immigration in our history. He, by un-explained
process, became the head of one of the New York City blood bank. ( How
does a Russian trained doctor become the head of one of the largest blood
banks in the world? Doesn't that strike you as peculiar? )
He set up the rules for the Hepatitis vaccine studies. Only males
between the ages of 20 and 40 , who were not monogamous, were allowed to
participate in this study. Can you think of any reason for insisting that
all expermentees be promiscuous? Maybe you don't believe in the Communist
conspiracy theory but give me some other logical explanation. Schmunger
is now dead and his diabolical secret went with him.
The Centers for Disease Control reported in 1981 that 4% of those
receiving the Hepatitis vaccine were AIDS infected. In 1984 they admitted
to 60%. Now they refuse to give out the figures at all because they don't
want to admit that 100% of the Hepatitis vaccine receivers are AIDS
infected. Where is the data on the Hepatitis vaccine studied? FDA? CDC?
No, the U.S. Department of Justice has buried it where you will never see
it.
What has the government told us about AIDS?
* It's a homosexual disease-----------------------WRONG
* It's related to anal intercourse only-----------WRONG
* Only a small % of those testing positive
for AIDS would get the disease------------------WRONG
* It came from the African green monkey-----------WRONG
* It came from cytomegalovirus--------------------WRONG
* It was due to popping amyl nitrate with sex-----WRONG
* It was started 400 years ago by the Portugese---WRONG
* You cant get it from insects--------------------WRONG
* The virus can't live outside the body-----------WRONG
The head of the Human Leukemia Research Group at Harvard is a
veterinarian. Dr. O. W. Judd, International Agency for Research on Cancer,
the agency that requested the production of the virus in the first place,
is also a veterinarian. The Leukemia research he is conducting is being
done under the auspices of a school of veterinary medicine. Now, there is
nothing wrong with being a vet but, as we have pointed out, the AIDS virus
is a human virus. You can't test these viruses in animals and you can't
test leukemias in them either. It doesn't work. So why would your
government give Judd, a veterinarian, 8.5 million dollars to study
leukemia in a veterinary college? As long as we are being used as
experimental animals maybe it is appropriate.
The London Times should be congratulated for uncovering the smallpox-
AIDS connection. But there expose was very misleading. The article states
that the African AIDS epidemic was caused by the smallpox vaccine
"triggering" the AIDS in those vaccinated. Dr. Robert Gallo, who has been
mixed up in some very strange scientific snafus, supports this theory.
Whether the infection of 75 million Africians was deliberate or
accidental can be debated, but there is no room for debate whether the
smallpox shots "awakened the unsuspecting virus infection." There is
absolutely no scientific evidence that this laboratory-engineered virus
was present in Africa before the WHO descended upon these hapless people
in 1967 with their deadly AIDS-laced vaccine. The AIDS virus didn't come
from Africa, it came from Fort Detrick, Maryland, U.S.A.
The situation is extremely desperate and the medical profession is
too frightened and cowed (as usual) to take any action. Dr. Strecker
attempted to mobilize the doctors through some of the most respected
medical journals in the world. The prestigious Annals of Internal Medicine
said that his material "appears to be entirely concerned with maters of
virology" and so try some other publication.
In his letter to The Annals, Strecker said, "If correct human
experimental procedures had been followed we would not find half of the
world stumbling off on the wrong path to the cure for AIDS with the other
half of the world covering up the origination of the dammed disease. It
appears to me that your Annals of Internal Medicine is participating in
the greatest fraud ever perpetrated."
I guess they didn't like that so Stricker submitted his sensational
and mind-boggling letter with all of the proper documentation to the
British journal, Lancet. Their reply : " Thank you for that interesting
letter on AIDS. I am sorry to have to report that we will not be able to
publish it. We have no criticism" but their letter section was " over
crowded with submissions ".
They're too crowded to announce the end of western civilization and
possibly all mandkind? Doesn't seem reasonable. What can we do? The first
thing that should be done is to close down all laboratories in this
country that are dealing with these deadly retro-viruses. Then we must
sort out the insane, irresponsible and traitorous scientists involved
in these experiments and try them for murder. Then maybe, just ,maybe, we
can re-populate and re-civilize the world.
William Campbell Douglass, M.D.
P.O. Box 38 Lakemont, GA 30552
</p></xml>

930
regexConsp/aids-2.xml Normal file
View File

@ -0,0 +1,930 @@
<xml><p></p>
<p>The following articles are extracted from New Dawn magazine,
Volume No. 1 &amp; 2. (C) Copyright April 1992. Subscription rates are
as follows: $30 for 12 issues, $5 sample; Foreign US$40 &amp; US$7.
New Dawn, GPO Box 3126FF, Melbourne, 3001, Australia.</p>
<p>Shocking Revelations on AIDS Research by Our North American
Correspondent</p>
<p>Dr. Abdul Alim Muhammad, national spokesman for Minister Louis
Farrakhan and the Nation of Islam, dropped a bombshell on the
nation's capital at a mass rally held at All Souls Unitarian
Church on September 8. Although the event had been planned for
some time to celebrate the 10th anniversary of the Washington,
D.C. ministry of Dr. Muhammad, he turned the event into a report
on his recent fact-finding mission to the African nation of Kenya.</p>
<p>Dr. Muhammad startled the standing-room-only audience when he
announced that a research team working out of the Kenyan Medical
Research Institute, led by the Harvard-trained immunologist Dr.
David Koech, had made dramatic advances in the treatment of AIDS.
Dr. Muhammad also charged that the U.S. government was leading a
major effort by the international medical establishment to
suppress this groundbreaking research.</p>
<p>Among those who packed the church to hear Dr. Muhammad speak on
the theme "Can We Survive Genocide," were clergy from several
denominations along the East Coast, civil rights leaders,
community activists, leaders of the Nation of Islam, elected
officials and political leaders from Maryland, Virginia, and the
District of Columbia, and hundreds of ordinary citizens. The
introduction of Washington's former Mayor Marion Barry - the man
on whom the Bush administration spent millions to remove him from
office - brought the house to its feet in an extended ovation.</p>
<p>A Policy of Genocide</p>
<p>In his remarks, Dr. Muhammad quoted extensively from a 1985
article authored by Lyndon LaRouche, "The Looming Extinction of
the 'White Race'". In that piece, LaRouche documents that the
imperial policies intrinsic to oligarchism have set into motion
the self-destruction of the population levels and economies of
those "white" nations that have complicitly tolerated oligarchical
policies - most specifically the United States and Great Britain.
LaRouche states that since what the oligarchs call the "Great
White Race" is dying out at an accelerating rate, and threatening
the supremacy of the Anglo-American financial establishment, we
witness a fanatically Malthusian commitment to a policy of
genocide directed against people of colour; a genocide consciously
implemented through the conditionalities policies of the
International Monetary Fund (IMF).</p>
<p>"That," Dr. Muhammad charged, "is one of the reasons they've got
him locked up; because he's got the guts to tell the truth."</p>
<p>Dr. Muhammad went on to present extensive evidence that the policy
of deliberate genocide is fully operational. He described the
CIA's support for the cause of population control during George
Bush's tenure as Director of Central Intelligence, and reported
the contents of National Security Memorandum 200, written during
the Ford administration, which advised that the preservation of
U.S. political and commercial interests "will require that the
President and Secretary of State treat the subject of population
growth control in the third world as a matter of paramount
importance...." To the amazement of the audience, Muhammad
identified the authors of the internal memo as Henry Kissinger and
Gen. Brent Scowcroft, now Bush's national security adviser. (See
The New Dawn Vol.1 No.1, May, 1991)</p>
<p>Dr. Muhammad used the case of Brazil, which has the second largest
black population in the world, to prove that the memorandum was
being implemented. "Today in Brazil, 40% of the women of
childbearing age have been surgically sterilized with funds
provided by the USAID," he said, "and 90% of those sterilized
women are black."</p>
<p>He insisted that this genocide was the real agenda of Bush's New
World Order; that it not only motivated the invasion of Panama and
the kidnapping of Gen. Manuel Noriega, but also the continuing
murder of the nation of Iraq. He told the audience that these were
just the opening battles in the war of the advanced sector nations
of the North against the developing nations of the South. Dr.
Muhammad denounced George Bush as a wicked man who cherished his
membership in the satanic secret society Skull and Bones. He
reminded the audience that the "skull and bones" was also the
emblem on the flag flown by the slave traders who raided Africa,
as well as of the latter day pirates.</p>
<p>AIDS and 'population control'</p>
<p>Given the Anglo-American establishment's commitment to mass
murder, the effort to suppress the promising research of Dr. Koech
and his colleagues should come as no surprise to anyone, the
Nation of Islam leader said. In fact, he contended, there is
substantial evidence to indicate that AIDS was developed as a
race-specific population control measure. Dr. Muhammad ridiculed
the theory that AIDS originated when the virus made a species jump
from the African green monkey to the African population. "We lived
with the green monkey for thousands of years and never had any
problems. The green monkey isn't our enemy. The IMF is."</p>
<p>Dr. Muhammad, who is a trained surgeon, said he traveled to Kenya
to see for himself what the alpha interferon derivative, which
goes under the trade name Kemron, was really all about. Dr.
Muhammad reported that he interviewed the research team in their
laboratory, was permitted to review their data, and to examine
AIDS patients currently undergoing treatment with Kemron and with
a new, more advanced form of Kemron, the drug Immunex, which
contains a greater number of alpha interferon components than the
original drug. Dr. Muhammad stressed that although the new drug
was only a treatment and not a cure for the deadly HIV virus, he
was tremendously hopeful and encouraged by the dramatic
improvement in the condition of those undergoing treatment.</p>
<p>Dr. Muhammad introduced Dr. Barbara Justice, a well-known New York
City-based cancer surgeon who has sent 54 AIDS patients to Kenya
for treatment over the past year. Dr. Justice reported that 97% of
her patients showed marked improvement within weeks of beginning
treatment, and that most were able to regain some degree of
normalcy in their ability to function.</p>
<p>It has been almost impossible for anyone outside of Kenya
administering Kemron on an experimental basis in the to assess the
work of the Kenyan team, which has been treatment of AIDS since
1989, since it has been systematically blacked out of the
scientific literature. Dr. Koech was to present his data, first at
the International AIDS Conference in the United States in 1987,
and then again at the 1991 AIDS Conference in Italy. On both
occasions, his invitation was inexplicably withdrawn.</p>
<p>Last year, Dr. Koech decided to take his data directly to the U.S.
medical community, and an extensive U.S. lecture tour was planned.
That tour was abruptly cancelled when the State Department refused
to issue Dr. Koech the necessary permission to enter the United
States.</p>
<p>This is certainly not the first time that important AIDS research
has been suppressed. Quite the contrary, it is part of a
continuing criminal pattern of lies and cover-up. The importance
of a rapid evaluation of Dr. Koech's work with Kemron and Immunex
is obvious. Currently, the only treatment available to AIDS
victims is the drug AZT; however, AZT therapy is prohibitively
expensive and carries with it extremely destructive side effects,
especially with prolonged use. Additionally, a recent study
conducted by the U.S. Army showed that, for unexplained reasons,
AZT therapy is not only largely ineffective in the treatment of
blacks, but that, in fact, AZT seems to aggravate symptoms in an
alarming number of black patients.</p>
<p>Kenya's President Daniel Arap Moi clearly finds the Koech team's
findings to be convincing. He recently announced that his
government was building a factory to allow the mass production of
alpha interferon.**</p>
<p>======================================================================</p>
<p>AIDS - Man-Made Holocaust</p>
<p>The fact that AIDS is a man-made virus created in U.S.
laboratories has been covered up</p>
<p>By JASON JEFFREY</p>
<p>"America should withdraw from the Mediterranean, Europe and all
foreign bases and it should save that money to create jobs for 12
million unemployed Americans, and contribute towards the
elimination of the diseases it manufactured like AIDS which was
produced by the CIA at its laboratories and tested on American
prisoners who took the virus with them to the outside world when
released from prison and then it spread throughout the world."
- Muammar Al-Qadhafi speaking at the International Conference for
Peace in the Mediterranean, 4-6 May, 1990.</p>
<p>On July 4, 1984, the Indian daily Patriot published a
horrifying report that the disease AIDS was believed to
have originated from a virus created in the laboratories
at the U.S. germ warfare research institute at Fort
Detrick, Maryland. The editor explained that the
information had come from a well-known American scientist
and anthropologist who expressed the fear that India might
face a danger from the disease in the near future. The
American had to remain anonymous. He was obviously in
danger for having disclosed so deadly a secret. At that
time, when the full horror of the incurable disease was
not known Patriot reported that the World Health
Organisation believed AIDS posed the gravest threat to the
entire population of the world. More on the World Health
Organisation later. The British Sunday Express, 26
October, 1986, with banner headlines, and an "exclusive"
label, announced "AIDS made in lab. shock." The front-page
story said that the virus was created during laboratory
experiments which "went disastrously wrong." It added that
a massive cover-up had kept the secret from the world. The
Sunday Express quoted a British expert, Dr. John Seale,
who first reported his conclusion that the virus was
man-made last August, 1986, in the Royal Society of
Medicine Journal. He said that his report was met with a
"deadly silence" from the medical profession, and that
made him very suspicious. The editor of the Journal
agreed, according to Dr. Seale, that "it sounded like a
conspiracy of silence." The second expert quoted by the
Sunday Express, was Prof. Jacob Segal, retired Director of
the Institute of Biology in Berlin. It said, "our
investigators have revealed that two U.S. Embassy
officials made a two-hour visit to Prof. Segal at his home
two weeks ago questioning him about what he knows, what he
thinks, where he got his information, and what he intends
doing with his report." The Professor told the reporters,
"one said he was a historian, and the other said he was a
political consul. But I am positive they were from the
CIA, and that they were deeply concerned that the cover-up
over the origin of AIDS was going to be exposed." I told
them I had known that in the mid-70s experiments were
being carried out at Fort Detrick, where the U.S. Army
Medical Research Command has its headquarters, on
volunteer long-term prisoners who were promised their
freedom after the tests. Almost certainly the scientists
were unaware of the extent of their terrible creation -
the AIDS virus.
WHO Involvement?
The third expert quoted in the Sunday Express was Dr.
Robert Strecker, an internist and gastroentarologist from
Glendale, California, who stated "it must have been
genetically engineered." Strecker believes, after years of
exhaustive research, that the AIDS virus is indeed
man-made. Strecker has alleged that AIDS was engineered at
the request of the World Health Organisation and other
scientific groups who, according to Strecker, injected the
disease during preventative vaccines. WHO, he says, along
with the International Agency for Research on Cancer and
The National Institute on Health, requested the production
of a virus that would attack the immune system's T-cells.
AIDS, he says, is a hybrid of two animal viruses - bovine
leukemia (found in cattle) and a sheep brain virus called
visna. This new virus was given as vaccinations in Haiti,
Brazil, Africa and the Caribbean by WHO in a 13-year
campaign against smallpox in Third World nations, reports
indicate. Strecker, in his 97-minute videotape, "The
Strecker Memorandum," cites specific documentation
supporting theories that AIDS is a result of that direct
request. For example, from Volume 47 of Bulletin of the
World Health Organisation (1972), page 259: "The effects
of virus infection of different cell types (e.g.,
Macrophages, T and B lymphocytes) should be studied in
greater detail with morphological changes perhaps serving
as an indication of functional alteration..." "The
possibility should also be looked into that the immune
response to the virus may itself be impaired if the
infecting virus damages more or less selectively the cells
responding to the viral antigens..." In fact, a May 11,
1987 frontpage article in the London Times, headlined
"Smallpox Vaccine Triggered AIDS Virus," said WHO was
investigating new evidence suggesting that "immunization
from the smallpox vaccine Vaccinia awakened the
unsuspected, dormant human immuno defense virus infection
(HIV)." Vaccinia was the actual vaccine given as smallpox
deterrents during the WHO project. Were the AIDS
infections intentional, accidental or coincidence?
According to Strecker in his "Memorandum," a key part of
the actual study "was to be the time relationship between
infection and antigen administration," which suggests WHO
officials - and other agencies who were directly dependent
on the United States government for research grants - had
to have known. The denials were not long in coming. But
the British Sunday Telegraph exposed itself. It said the
story (the Sunday Express article) was invented by the
Russians "to smear the Americans," and recalled that it
had appeared in the Soviet journal, Literary Gazette. It
said this paper based its report on the Patriot - and that
the Patriot report did not exist! Professor Segal
describes as "ludicrous and scientifically incredible" the
theory that the virus came from African green monkeys. One
thing is certain: the controversy surrounding the AIDS
virus will not die.</p>
<p>A Weapon Against Black People?
Zear Miles, a Black industrial engineer, who has studied
the AIDS virus and its origins for about six years has
stated that he has proof from various documentation and
letters from other AIDS researchers to prove that the
virus was made in an American military lab as a means to
suppress Blacks. In his document entitled "Rape Africa",
Miles researched the origin of the AIDS virus from 1952,
when the federal government had enough blood types and
characteristics of every nationality in the world up to
the King Alfred plan which called for the extinction of
Blacks in national security emergencies. Miles learned
that through National Security Council Memorandum 46,
dated 1978, which called for a possible way to gauge and
control the impact of the growing Black movement, the
government was researching possible ways to suppress Black
hostility toward the authorities. Later called the King
Alfred plan, the scheme called for the extinction of
Blacks by the year 2000 with an AIDS-like virus. Miles
said he also gauged the increasing number of AIDS cases in
which the number of Black contractors have gone up
significantly compared with Whites, citing that the AIDS
virus attacked a Black person's immune system and
destroyed it in six weeks as opposed to a White person's
time of six months.</p>
<p>The Evidence
What is the evidence available to the layman. First, the
initial cases were reported in New York and there is no
dispute that Fort Detrick was working on immunological
defence against infection. The British Guardian reported
on October 27, 1986, that in 1969 evidence was given to a
Washington Appropriation Committee that "within the next
five or ten years it would probably be possible to make a
new infective micro-organism which would differ from any
known disease causing organism. Most important, that it
might be refractory to the immunological and therapeutic
properties on which we depend to maintain our relative
freedom from infectious disease." "Refractory" means,
according to the Oxford Dictionary, "not yielding to
treatment." AIDS answers precisely to that description.
On September 24, 1986, the Daily Telegraph reported from
Washington, "Enough of a debilitating virus to infect the
whole world, disappeared from an American germwarfare
laboratory five years ago, and has never been traced, an
environment group claimed yesterday in a Washington Court
action aimed at halting biological weapons research." In
1968, the J.D. Bernal Peace Library organised a conference
on the dangers of biological warfare research. Ritchie
Calder said then that among the weapons being stockpiled
were some designed to bring about genetic changes. He said
the "doomsday bug was under wraps" and that there was a
conspiracy of silence about germ weapons because the
implications were so frightening." He told the British
Daily Mirror after his address that "somewhere in the
world a germ is being cultured to which we would have no
natural resistance and to which there would be no sure
defence." A precise description of AIDS. The British
Observer, on June 30, 1968, quoted from an article in the
Journal of General Microbiology by W.D. Lawton of Fort
Detrick, and R.C. Morris and T.W. Burrows of the British
microbiological research station at Porton. One paragraph
said, "By engineering the genetics of individual strains,
microbiologists aim to produce a single strain containing
the most deadly combination of properties." Again, a
description of AIDS. The article says that at that time
Porton, according to the government, was concerned only
with defence applications of research, but Fort Detrick
was only committed to developing microbiological weapons
for offence. The Japanese carried out germ warfare
research in occupied China during the war. Some of these
criminals were captured by the Soviets and duly tried and
sentenced. Others were given immunity by the Americans and
taken to work at Fort Detrick. In 1969, after the AIDS
virus was loose, negotiations began on a Convention
banning biological weapons, and it came into force in
1972. In its first review conference in 1980, it was
reported that 80 countries had ratified. But there is no
provision in the Convention to ban research or for
verification. Nichola Sims, who has written a book on
biological disarmament, wrote recently, "the failure of
the Convention to impose any restrictions even on
'offensive' biological warfare research, has been
frequently criticised." And she refers to popular fears
that a "super germ breakthrough in the means of waging
biological or toxin warfare is just around the corner and
may induce the possessor of such a germ to break out of
the Convention." She quotes Dr. Robert K. Mikulak of the
U.S. Arms Control and Disarmament Agency for the statement
that "there is no justification for classified military
research on the question in any country." But so far there
is no inspection or verification. A much more recent
accusation against the United States for the manufacturing
of the AIDS virus comes from the Libyan UN Ambassador, Mr.
Ali Ahmed Elhouderi. On January 9, 1992, at a press
conference, he stated that the AIDS virus was produced in
a laboratory probably as a weapon. He said, "We think it
is man-made and it was done in laboratories. And it was
not, as suggested, coming from monkeys in Africa." He also
suggested that the virus had been manufactured at the time
of the Vietnam War. These statements fit perfectly into
place as research would have been carried out at that time
at Fort Detrick for offensive purposes against the North
Vietnamese.</p>
<p>AIDS Was Man-Made
On all the circumstantial evidence, the layman will almost
certainly reject the idea that the escape of the man-made
AIDS virus was the result of a disastrous error during
innocent civilian research. We can assuredly conclude that
it was the result of germ warfare research, and the finger
of guilt points to the United States. The scientists
could not have visualised that they would let loose a
so-far incurable disease that may and possibly will wipe
out millions, particularly in the Third World, where the
majority of the world's population lives. Never was the
need greater for the nations to drop their differences and
to concentrate all their skill and resources in a
world-wide battle against this terrible threat, and to end
the horror of germ warfare research.**</p>
<p>======================================================================</p>
<p>The Mystery of Skull Valley</p>
<p>By NIKOLAI FILIPPOV</p>
<p>Because of an error made by an airman testing a new germ weapon, a
deadly virus attacks the population of a small town in highland
Utah, USA. An incurable disease begins to kill people like a
plague epidemic. In an attempt to cover up the traces of their
crime, the military authorities artificially cause a landslide
that buries the town and doom chance survivors to lifelong
isolation.</p>
<p>This is the plot of Vector, a novel by Henry Sutton, an
American author. This book is based on dramatic events
during which the victims were fortunately not people but
animals. March 14-20, 1968 was a black week for American
farmers grazing sheep in the remote pasturelands of
semi-desert Skull Valley, Utah. About 6,500 sheep died
there in those seven days under mysterious circumstances.
Even more of a mystery was that people, cattle and other
animals in the area were unscathed. Everybody - farmers,
residents of Utah, journalists - felt certain that the
accident was linked to the US Army chemical and
bacteriological testing ground in Dugway with an area of
several thousand square kilometres in the vicinity of
Skull Valley. Indeed, at that very time the thousands of
Dugway employees were carrying out large scale experiments
in preparation for further escalation of the chemical war
and the start of a germ war in Vietnam. For a whole year
the Defence Department emphatically denied that animals in
Skull Valley were being affected by the chemical or
biological agents disseminated in the atmosphere during
the test. In an attempt at a cover-up, experts at the
proving ground advanced hypotheses which must have seemed
untenable even to laymen about the sheep having been
killed by poisonous plants or a natural epizootic.
However, an inquiry by Utah authorities in collaboration
with veterinarians and health experts compelled the
Pentagon to admit its responsibility for the death of the
sheep. Even so, no one at Dugway was punished. The blame
for a terrible crime posing a real threat to people's
health due to a gross violation of safety standards in
conducting tests was placed on an unfortunate accident.
According to the official version formulated under the
direction of the U.S. military authorities, a test of
TMU-28/B spray tanks with nerve agent VX, was carried out
at Dugway on March 13, 1968. The gas was dispersed from an
F-4E jet bomber by means of two spray tanks with a total
capacity of 1,200 litres. The bomber flew at an altitude
of 40 to 45 m. During the test something went wrong with
one of the tanks (or so the version ran), and besides, the
direction of the wind varied, with the result that part of
the nerve gas was carried beyond the proving ground. A
cloud of aerosol VX allegedly contaminated pasturelands on
an area of 400-500 sq. km. Skull Valley was not the only
area where sheep died, for a cloud of aerosol VX reached
Res Valley, killing sheep 70 km away from where the poison
gas had been released. Anyone who has read publications
dealing with the accident in Skull Valley and Res Valley
is bound to detect a contradiction between the military
authorities' version and the facts. The Pentagon has yet
to explain why a whole year passed before it made up its
mind about what chemical or biological agent caused the
death of the sheep outside Dugway. If the Dugway test had
to do only with VX, then that gas was the only cause of
the sheep's death and this could have been stated at once.
There is reason to presume that over a short period
experiments were carried out at Dugway involving a whole
range of poison gases and biological agents. But it is
logical to suppose that even in such a contingency experts
should know well the properties and casualty effects of
the test materials. And this implies that researchers must
have had no difficulty in ascertaining the nature of the
agent which killed so many sheep. The official story of
the experiment of March 13, 1968, says that the wind
carried beyond Dugway, in the form of vapours and highly
dispersed aerosol, a mere nine kg, or 0.8 per cent, of the
total amount of VX gas to be dispersed. Field chemical
control cannot ensure such a degree of accuracy. But the
authors of the version needed to cite some figure in order
to make people believe that the sheep had been killed by a
nerve gas. At the same time, the Pentagon wanted to
conceal from the public the real danger posed by chemical
weapon tests in the atmosphere to residents of Utah and so
it withheld information about the actual amount of gas
released over Skull Valley. The Pentagon officials
suggested that the contamination level in the Skull Valley
pastureland where deaths occurred among sheep averaged a
mere 0.02 gram per hectare. Let us note by way of
comparison that to kill humans, it would be necessary
according to U.S. data available to disseminate from one
to three kilograms of VX per hectare of target, or 100
thousand times more than the contamination level in Skull
Valley given in the official version. Reports said that in
a flock totalling 2,800 sheep, 2,500 or 90 per cent, were
killed. No such effect is possible where the VX
contamination level is 0.02 gram per hectare. A
publication put out by the Dugway proving ground said that
during the test on March 13, 1968, the greatest distance
at which VX drops spilled on the ground had been 5.4 km
and not 70 km, as the official version would have it. The
Pentagon's information on one and the same fact varies
from document to document and from period to period.
Surely this shows that the version is false. A
contaminated cloud spreading wide in the atmosphere only
retains vapours and minute particles of aerosol which do
not settle on the ground and can be inhaled. It follows
that had such a cloud really floated over Skull Valley, it
would have caused inhalational casualties in other animals
as well, including cattle and horses, but no such thing
happened, according to documentary evidence. In the early
days after the accident, before the hypothesis about VX
was advanced, doubts were expressed even by Brig. Gen.
William Stone. He rightly asked why the gas had only
killed sheep without affecting people. There were also
other moot points. Why were the diseased sheep shot dead?
Why was no attempt made to save them by evacuating them to
an uncontaminated area or by treating them with atropine
or other antidotes? Marr Fawcett, a veterinarian of Utah,
refused to believe that the sheep had been poisoned with
VX, for in that case many of them could, in his opinion,
have been saved by means of antidotes. Dr. Kent Van
Kampen, a veterinary pathologist in Utah, said in April
1968, shortly after the accident, that as early as March
17, 1968, the supposition that the sheep had been hit by a
chemical poison affecting the nervous system could have
been refuted without difficulty since all symptoms of such
poisoning were lacking. The death of an animal poisoned
with a nerve gas such as VX is accompanied by spasms and
paresis of muscles in the limbs. Yet judging by what sheep
herders said in the early days of the inquiry into the
accident, dying sheep had shown no signs of spasms. True,
later on someone saw to it that a videotape recording
allegedly illustrating the Skull Valley accident was
projected widely. The tape showed the death of a single
sheep shaking with spasms as a group of civilians looked
on. One year after the accident, Kent Van Kampen and Marr
Fawcett contributed in collaboration with other experts of
Utah an article to the Journal of the American Veterinary
Medical Association setting out the causes and
circumstances of the sheep's death in Skull Valley, their
version tallying with the Pentagon's. There was a footnote
saying that in writing their article, the authors had
enjoyed expert assistance (it is easy enough to guess what
kind of assistance) in particular from Dr. Mortimer
Rothenberg, the science director at Dugway, and Dr.
Bernard MacNamara of Edgewood Arsenal, the chief U.S. Army
centre for the development of chemical and germ weapons.
We might as well note at this point that shortly after the
sheep's death in Skull Valley Dr. Rothenberg, trying to
exonerate Dugway from blame for the accident, declared
that the symptoms displayed by the sheep had nothing
whatever in common with those of nerve gas poisoning. And
so, it took the Pentagon a year to invent an explanation
for the sheep's death and make the civilian experts
mentioned above present its version as their own, thereby
striking a bargain with their conscience. The videotape
which showed a sheep's death from VX was intended to serve
the same purpose. But the forgery was too crude for
knowledgeable people to mistake it for the truth. They
realised at once that the "documentary" showed a sheep
injected with a nerve gas by means of a syringe, that is,
in the same way as this is done in demonstrating the
effect of nerve gases on animals. They deduced this from
the absence of any other living or dead sheep on the
screen as well as from the presence of people wearing no
gas masks or protective clothes, whereas safety
regulations forbid anyone to enter without taking these
precautions in an area contaminated by VX to a degree
killing livestock. There is no such ban where a poison gas
is injected into the body of an animal outside a
contaminated area. A further fact worthy of note is that
the worker's teams which buried the dead sheep had no gas
masks on, judging by other videotapes and various
photographs. This is permissible only when the nature of
an agent which has caused the death of animals is known
for certain. Furthermore, it is necessary to note that the
agent used was completely harmless to humans. This detail,
like the others cited above, indicates that the sheep in
Skull Valley were killed by something other than nerve
gas. The death of livestock so far away from the testing
ground, as in the case of Skull Valley, could only be
caused by a biological agent. Experts could establish
without difficulty that nine litres of biological agent is
enough to generate a pathogenic aerosol cloud five km
long, two km deep and 100 m high. One litre of aerosol
cloud could contain several hundred units of pathogen.
Such a cloud can sail many dozens of kilometres without
losing its casualty effects. Consideration of the death
rate of biological agents during the drift of aerosol
particles in the atmosphere makes no difference as far as
the main conclusion is concerned. Poison gas tests
according to regulations in force at Dugway are generally
conducted in the morning to ensure that enough daylight
remains for collecting data on the results of tests and
cleaning the test site. The dissemination of VX on March
13, 1968, is alleged to have been carried out one hour
before sunset. Evening experiments are particularly
typical in the case of biological agents, for researchers
are careful to preclude the disastrous impact of sunrays
on pathogens. The year 1968, when the Skull Valley
accident occurred, has gone down in history as the peak of
U.S. chemical warfare in Vietnam, Laos and Kampuchea. In
thelate 1960s, the Pentagon worked at a frantic pace to
develop new chemical and germ weapons. A report by the
House Committee on Science and Astronautics said that in
the years preceding the accident, the Pentagon had been
engaged in a vast programme for germ weapon testing. The
tests were conducted at several military testing grounds,
on ocean islands, in the Panama Canal zone, Alaska, New
York City and San Diego as well as on airfields, in
subways and on highways. The Dugway test made on March 13,
1968, or somewhat earlier could be one of those tests. It
is reasonable to suppose that during that test use was
made of biological agents based on a virus selectively
killing sheep without doing any harm to humans. It could
be visna, a virus which has been intensively studied since
the late 1950s in several research centres, including Fort
Dettrick, Maryland, then the main U.S. centre for the
development of germ weapons. No visna-caused diseases have
been recorded among humans. This virus hardly affects
cattle, horses or other animals. Its properties in this
respect coincide entirely with those of the agent
responsible for the Skull Valley accident in 1968. Visna
affects the central nervous system of sheep, robbing their
body of immunity. The symptoms are progressive weakness,
shortness of breath, a wobbly gait, sagging withers and a
drooping head. The end affect is paresis and paralysis of
the skeletal muscles and then death. Similar symptoms were
registered in sheep affected with the Skull Valley
disease. The disease caused by visna is incurable. This
explains why the epidemiological service of Utah did the
right thing by deciding to slaughter the diseased sheep.
No antidotes could have helped the animals in the least
and were not used, either. If during the March 1968 tests
at Dugway visna was used as a simultant modelling the
properties of germ weapons, it is clear why the men who
buried the dead sheep used no gas masks or protective
clothes, since visna is harmless to man. And this invites
another conclusion: at that time, the nature of the agent
which affected the sheep was known to at least a small
group of people in charge of removing the effects of the
accident. The establishment of investigation committees
was merely designed to conceal the real objectives and
tasks of the Dugway experiments from the public. The
mystery of those criminal experiments has begun to come to
light in recent years. Competent scientists consider that
visna was used in the United States for genetic
engineering work which resulted in creating HIV, a
chimeric virus causing an incurable infectious disease of
man known as AIDS. Research into HIV at the molecular
level has shown that 60 per cent of its genome is
identical with that of visna and the rest is a built-in
nucleotide sequence isolated from the genome of another
retrovirus, HLTV-I. HIV, or the pathogen of AIDS, was
designed in U.S. genetic engineering laboratories on
instruction from the Pentagon. The purpose of this virus
is to augment the U.S. germ (biological) warfare potential
by acquiring a capability for depriving an enemy
population of vitally important immunity at the threshold
of a major or local armed conflict. The conclusion about
the complicity of the U.S. military authorities in the
appearance of AIDS, the new dangerous disease which
affects humans, is shared by John Seale of Britain, Jacob
Segal of Germany, Robert Strecker of the United States and
other noted scientists and experts who have carefully
analysed available scientific data. [See New Dawn Vol.2,
No.1] For the time being, they have discounted the events
and facts connected with the Skull Valley accident.
Nevertheless, they have come to the unanimous conclusion
that in designing HIV visna was made use of. Dr. Seale has
said that a scientist who wanted to evolve a virus capable
of destroying man's immunity system and provoking a
disease similar to AIDS would have to resort to visna.
The "patent" for inventing HIV should be issued to the
United States because it was there that the virus was
developed and also because Americans were the first
victims of AIDS. The disease, which broke out in New York,
was carried to other big cities in the United States and
then to other countries and continents. Its virus was
transmitted by infected Americans serving at overseas
military bases. Besides, AIDS was contracted in the United
States by Australian and European tourists vacationing
there. HIV spread to Middle East and other Arab countries
which imported blood from donors stricken with AIDS. In
October 1986, John Seale quoted during an interview with
the Guardian an extract from a report prepared by the
Pentagon in 1969. It said that in the next five to ten
years an infective micro-organism might be evolved that
would differ substantially from all pathogens known so
far. Its most important property, the report said, would
consist in attacking the immune system and internal organs
on which the ability of the human body to resist
infectious diseases depends. Consequently, the AIDS
pathogen was deliberately created and development was
planned and funded. The test at Dugway which killed so
many sheep in Skull Valley turned out to be part of the
Pentagon's programme for designing a new biological agent,
the AIDS pathogen.**</p>
<p>======================================================================</p>
<p>AIDS: As Biological &amp; Psychological Warfare</p>
<p>By WAVES FOREST</p>
<p>It is hard to imagine that a cure for AIDS would be withheld for
economic reasons alone. Could there be some other motive?</p>
<p>Despite repeated denials from Defense Department
officials, allegations persist that AIDS is a genetically
altered virus, which has been deliberately released to
wipe out homosexuals and/or non-whites in the U.S. and
reduce populations in Third World countries. At first
glance it seems like the epitome of paranoia to accuse the
military of conspiring to exterminate citizens of their
own country, and even some of their own troops. However,
the vast majority of military personnel could be
completely unaware of such a plot in their midst, while a
relative handful of traitors in key positions could
conduct it under cover of classified operations. And the
circumstantial evidence is actually quite compelling, that
the AIDS virus was artificially engineered, and planted in
several different locations at about the same time through
vaccination programs, and possibly blood bank
contamination. At a House Appropriations hearing in 1969,
the Defense Department's Biological Warfare (BW) division
requested funds to develop through gene-splicing a new
disease that would both resist and break down a victim's
immune system. "Within the next 5 to 10 years it would
probably be possible to make a new infective
micro-organism which would differ in certain important
respects from any known disease-causing organisms. Most
important of these is that it might be refractory to the
immunological and therapeutic processes upon which we
depend to maintain our relative freedom from infectious
disease." (See A Higher Form of Killing: The Secret Story
of Chemical and Biological Warfare by R. Harris and J.
Paxman, p.266, Hill and Wang, pubs.) The funds were
approved. AIDS appeared within the requested time frame,
and has the exact characteristics specified. In 1972, the
World Health Organisation published a similar proposal:
"An attempt should be made to ascertain whether viruses
can in fact exert selective effects on immune function,
e.g. by... affecting T cell function as opposed to B cell
function. The possibility should also be looked into that
the immune response to the virus itself may be impaired if
the infecting virus damages more or less selectively the
cells responding to the viral antigens." (Bulletin of the
W.H.O., vol. 47, p.257-274.) This is a clinical
description of the function of the AIDS virus. The
incidence of AIDS infections in Africa coincides exactly
with the locations of the massive W.H.O. smallpox
vaccination program in the mid-1970's (London Times, May
11, 1987). Some 14,000 Haitians then on UN secondment to
Central Africa were also vaccinated in this campaign.
Personnel actually conducting the vaccinations may have
been completely unaware that the vaccine was anything
other than what they were told. A striking feature of
AIDS is that it is ethno-selective. The rate of infection
is twice as high among Blacks, Latinos and Native
Americans as among whites, with death coming two to three
times as swiftly. And over 80% of the children with AIDS
and 90% of infants born with it are among these
minorities. "Ethnic weapons" that would strike certain
racial groups more heavily than others have been a
longstanding U.S. Army BW objective. (Harris and Paxman,
p.265) Under the current U.S. administration biological
warfare research spending has increased 500 percent,
primarily in the area of genetic engineering of new
disease organisms. The "discovery" of the AIDS virus
(HTLV3) was announced by Dr. Robert Gallo at the National
Cancer Institute, which is on the grounds of Fort Detrick,
Maryland, a primary U.S. Army biological warfare research
facility. Actually, the AIDS virus looks and acts much
more like a cross between a bovine leukemia virus and a
sheep visna (brain-rot) virus, cultured in a human cell
culture, than any virus of the HTLV3 group. The closest
thing in this case to a "smoking test tube" so far is the
AIDS virus itself. If it was possible for such a
monstrosity to occur naturally it would have done so ages
ago and decimated mankind at that time. Some other life
form would presently be in control of this planet
(assuming that is not already the case). The Hepatitis B
vaccine study in 1978 appears to have been the initial
means of planting the infection in New York City. The test
protocol specified non-monogamous males only, and
homosexuals received a different vaccine from
heterosexuals. At least 25-50% of the first reported New
York AIDS cases in 1981 had received the Hepatitis B test
vaccine in 1978. By 1984, 64% of the vaccine recipients
had AIDS, and the figures on the current infection rate
for the participants of that study are held by the U.S.
State Department of Justice, and "unavailable." The AIDS
epidemic emerged full-blown in the three U.S. cities with
"organised gay communities" before being reported
elsewhere, including Haiti or Africa, so it is
epidemiologically impossible for either of those countries
to be the origin point for the U.S. infections. Another
indication AIDS had multiple origin points is that the
14-month doubling time of the disease cannot nearly
account for the current number of cases if we assume only
a small number of initial infections starting in the late
1970s. Before dismissing the possibility that a U.S. Army
BW facility would participate in genocide, bear in mind
that hundreds of top Nazis were imported into key
positions in the U.S. military-intelligence establishment
following WWII. U.S. military priorities were then
reorientated from defeating Nazis to "defeating" communism
at any cost, and strengthening military control of
economic and foreign policy decisions. (See Project
Paperclip by Clarence Lasby, Atheneum 214, NY, and Gehlen:
Spy of the Century by E.H. Cookridge, Random House.)
There's no proof those Nazis ever gave up their longterm
goals of conquest and genocide, just because they changed
countries. Fascism was and is an international phenomenon.
It's not as if this was a total reversal of previous U.S.
military policy, however. Hitler claimed to have gotten
his inspiration for the "final solution" from the
extermination of Native Americans in the U.S. For that
matter the first example of germ warfare in the U.S. was
in 1763 when some of the European colonists gave friendly
Indians a number of blankets that had been infected with
smallpox, causing many deaths. One indication of the
actual U.S. military priorities regarding BW was the
importation of the entire Japanese germ warfare unit
(#731) following WW II. These people killed over 3,000
POWs, including many Americans, in a variety of grisly
experiments, yet they were granted complete amnesty and
given American military positions in exchange for sharing
their research findings with their U.S. Army counterparts.
Consider also the callous attitude displayed by top
military officials toward veterans suffering from the
after-effects of exposure to Agent Orange and radiation
from nuclear weapons tests. In fact, since the end of WW
II over 200 experimental BW tests have been conducted on
civilians and military personnel in the U.S. One example
was the test spraying from Sept. 20-26, 1950 of bacillus
globigi and syraceus maracezens over 117 square miles of
the San Francisco area, causing pneumonia-like infections
in many of the residents. The family of one elderly man
who died in the test sued the government, but lost. To
this day, syraceus is a leading cause of death among the
elderly in the San Francisco area. Another case was the
joint Army-CIA BW test in 1955, still classified, in which
an undisclosed bacteria was released in the Tampa Bay
region of Florida, causing a dramatic increase in whooping
cough infections, including twelve deaths. A third example
was the July 7-10, 1966 release of bacteria throughout the
New York subway system, conducted by the U.S. Army's
Special Operations Division. Due to the vast number of
people exposed it would be virtually impossible to
identify, let alone prove, the specific health problems
resulting directly from this test. Despite the loyalty of
the vast majority of U.S. military personnel toward their
country, there are clearly some military officials who
have very different intentions, and they occupy high
enough positions to impose their priorities on military
programs and get away with it, so far. The first detailed
charges regarding AIDS as a BW weapon were published in
the Patriot newspaper in New Delhi, India, on July 4,
1984. It is hard to say where the investigations of this
story in the Indian press might have led, if they had not
been sidetracked by two major domestic disasters shortly
thereafter: the assassination of Indira Gandhi on Oct. 31
and the Bhopal Union Carbide plant "accident" that killed
several thousand and injured over 200,000 on Dec. 3.
Apparently, homosexuals were an initial target in the U.S.
because their sexual practices would help in the rapid
spread of the disease, and because it was correctly
assumed that very few non-homosexual citizens would pay
much attention during the early years of the epidemic.
Also, the stigma of a "homosexual disease" would interfere
with rational analysis and discussion of AIDS. Bear in
mind that homosexuals were among the first to be
exterminated in Nazi Germany, before Jews and other
minorities, so fewer citizens would object. The details
of precisely how the AIDS virus was synthesized, mass
cultured, and spread by incorporating it into vaccination
programs are available but fairly intricate. Evil is hard
to confront, especially on the preposterous scale we have
here. If you acknowledge the presence of those who think
their only hope for survival is to kill off two thirds of
all the other kinds, and their ability to manage it, you
then pretty much have to do something about it.</p>
<p>Abridged from Now What #1.**</p>
<p>======================================================================</p>
<p>Immunex</p>
<p>The North American-based Nation of Islam (NOI) led by Minister
Louis Farrakhan launched an offensive in its battle against the
deadly "man-made" AIDS virus during its recent Saviours' Day
weekend. The following report is courtesy of The Final Call.
From the rostrum of Christ Universal Temple here, the
Honorable Louis Farrakhan announced that the NOI has
acquired exclusive distribution rights to the AIDS
fighting drug Immunex, an oral alpha-interferon treatment
developed in Kenya. "I just got a call from our chief of
staff 3 minutes before I came on the rostrum," Minister
Farrakhan said, regarding the confirmation of the Immunex
agreement that came from Leonard Muhammad in Kenya. "The
Nation of Islam is announcing to you that we have the
exclusive distribution rights of Immunex throughout the
United States of America. "As of this day," he continued,
"Min. Alim will still teach, but he is now the Minister of
Health and Human Services for the Nation of Islam." Dr.
Alim told the cheering audience that the war against AIDS
is being won but total victory will not come "until we
deal with those responsible for making the AIDS virus."
Since the early 1970s under the Nixon administration, he
said, the official policy of this government has been to
commit genocide against non-white people around the earth.
That policy continues under the administration of
President George Bush, he said. Dr. Muhammad and former
Final Call Editor-in-Chief Abdul Wali Muhammad were sent
to Kenya by Minister Farrakhan last year on a fact-finding
tour regarding the drug Kemron. While there, the NOI
representatives learned about Immunex. Both drugs have
shown remarkable effects in relieving AIDS symptoms, but
the drugs have received very little media coverage in the
U.S. "We would like FDA approval," said Min. Farrakhan,
"however we can't wait. We will take any risk, bear any
burden to free our people of a man-made disease designed
to kill us all." The Minister added that the drug will be
offered to all who need it "regardless of race, creed or
colour."**
</p></xml>

732
regexConsp/aids-war.xml Normal file
View File

@ -0,0 +1,732 @@
<xml><p>
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150</p>
<p> August 16, 1990
AIDSPLOT.ASC</p>
<p> AIDS as a Weapon of War</p>
<p> by Dr. William Campbell Douglas, M.D.</p>
<p> Introduction &amp; Comments by Jim Shults</p>
<p> INTRODUCTION AND COMMENTS</p>
<p> I must admit I am just a little gun shy of doing this
particular article. The reason is pretty obvious. Who in hell is
going to plead guilty to inventing the AIDS virus. Do I think it
was invented? Absolutely and without a doubt.</p>
<p> Firstly, where in hell has it been during the last 5000 years?
Why haven't we had exposure to it sooner, like in the last 50 years?</p>
<p> All of a sudden certain countries and entire continents are
coming down with the AIDS virus and no organization, body, group, or
whatever you care to call it has even a clue to the real source, and
it sure as hell isn't some monkey in Africa, that's for sure.</p>
<p> Over the last twenty years the genetic scientists have been
having a filed day inventing all kinds of new "life." Some have
even been granted patents for their creatures, which are usually
various types of bacteria, etc.</p>
<p> One patent was granted for the invention, or more accurately
put, creation, of a type of bacteria that eats oil, handy for oil
spills I guess. Now do you think for even a second that a virus
like the AIDS virus couldn't be created with all the genetic
engineering that is going on around the world?</p>
<p> There are certain types of bacteria that are living in test
tubes in labs around the world that if released would cause the end
of mankind in less than a year.</p>
<p> The real question is why we allow these bozos to play in labs,
making all kinds of new and artificial life in the first place. It
is going to backfire, in fact the author already feels it has,
through the deliberate release of the HIV (human immunodeficiency
virus); that's what AIDS is really called.</p>
<p> Something extraordinary happened last June (88'), in fact it
was so extraordinary that nothing like it has ever happened before.</p>
<p> The Surgeon General of the United States had mailed to every
mail box and address in the United States a brochure attempting to
explain AIDS, its danger, myths and means of transmission. The</p>
<p> Page 1</p>
<p> absolutely amazing thing about this was that it was done at
all.
Think of this for a minute: the U.S. Government mailed this
information to every address in America. That in itself should tell
all of us something that the media has somehow missed -- that this
is a population-destroying virus.</p>
<p> That really means that we all are in shit city, race fans, and
the Government know it. It is significant that they did the
mailing, and that should be very significant to anyone who knows
how our government works and what kind of very real panic those
who really know are experiencing.</p>
<p> When something like this brochure is made available as it was,
you can be very sure that the boys at the top, including the
scientific folks, are up against something they may not beat before
it has a very real chance of destroying at least half of mankind!</p>
<p> In fact, the fastest time even guessed at, for some kind of
beginning cure for some types of AIDS is at least five years and
that's thought to be impossible by medical people.</p>
<p> The author comes up with a very plausible scenario for how
rapidly AIDS has been distributed. (We are not blaming the
World Health Organization. In the author's scenario he simply
indicates that the WHO was used by others.)</p>
<p> Let's face it, we are in very real trouble. There are several
types of new AIDS viruses and more to be discovered, and who is to
say how the new ones, not yet mutated, will spread -- a sneeze
perhaps?</p>
<p> Our government and others around the world are not telling us
the truth about this stuff in order to protect our poor little dumb
minds. I suspect that if we know the truth, an enormous citizen
effort could be martialed worldwide which would probably shut down
the arms race for the time being.</p>
<p> Again, at the bottom line, we are in big trouble and "they"
know it....Many scientists predict we will lose half the world's
population (including U.S.) by the year 2000.</p>
<p> -- Jim Shults</p>
<p> Page 2</p>
<p> ABOUT THE AUTHOR</p>
<p> William Campbell Douglass, M.D.</p>
<p> Age: 62</p>
<p> Education: BS, University of Rochester, New York;
MD, University of Miami School of
Medicine; Graduate, U.S. Navy School of
Aviation and Space Medicine</p>
<p> Career: U.S. Navy, 7 years -- Flight Surgeon.
In practice for over 25 years. Former
state president, Florida, American
College of Emergency Physicians.
Former Editor of the Journal of the
Sarasota County Medical Society.
Consulting Editor, Health Freedom News.
On Board of Governors of the National
Health Federation. Regular speaker at
the National Health Federation meetings
around the United States. Appears
regularly on radio and television
programs on health.
Doctor of the
Year: National Health Federation, 1985.</p>
<p> Dr. Douglass has studied in England with Dr. Katharina Dalton,
discoverer of the premenstrual syndrome. He was one of the
first doctors in the United States to diagnose and treat PMS.
He opened his PMS Clinic in 1981.</p>
<p> Page 3</p>
<p> AIDS as a Weapon of War</p>
<p> William Campbell Douglass, M.D.</p>
<p> The great powers renounced chemical and biological warfare 20
years ago -- but kept right on experimenting. The germ warfare
experiments on Seventh Day Adventist soldiers,</p>
<p> 1) the Tuskeegee syphilis experiments on prisoners,
2) the San Francisco Bay attack by the U.S. Army using
serratia marcescens bacteria,
3) the New York City subway germ attack
4 and many other experiments on humans, largely unknown to
the victims, continue in the free world.</p>
<p> In Novosybirsk, at the Ivanofsky Institute and other Soviet
centers of biological warfare, you can be sure that similar
diabolical experiments on humans continue at a frantic pace.</p>
<p> The Soviet press, always masters of the half truth, accused
the U.S. Army of having engineered the AIDS virus in the biological
warfare laboratories at Fort Detrick, Maryland.</p>
<p> This was a clever psy-war ploy which, for a while anyway,
neutralized those of us who were saying essentially the same thing,
that the AIDS virus was probably created through recombinant genetic
engineering (the rearranging of genes between two or more species of
plants or animal) and/or serial passage: the growing of a virus in
a series of generations of tissue culture cells or live animals,
thus adapting the virus to a new species, using human tissue culture
cells in the top security labs at Fort Detrick.</p>
<p> People started accusing us of spreading the communist line, not
a comfortable position for a dedicated anti-communist like myself.</p>
<p> What the Soviet propagandists didn't say was that their agents
had been working in our top security biological warfare laboratories
for over 20 years.</p>
<p> In a burst of brotherly love they were invited in by President
Nixon. The astounded communist scientists from Russia, the Eastern
Bloc and Communist china, who had been trying to penetrate this
vital security area for 40 years, quickly accepted.</p>
<p> They have been snickering in their beakers ever since, while
they prepare for our demise.</p>
<p> "It's no secret that they are there," Dr. Carlton Gajdusek,
Nobel Prize winner, a top official at the Fort Detrick Army
laboratory in Maryland, said in Onmi Magazine (March 1986): "In
the facility I have a building where more good and loyal communist
scientists from the USSR and mainland China work, with full passkeys
to all the laboratories, than there are American. Even the Army's
infectious disease unit is loaded with foreign workers who are not
always friendly nationals."</p>
<p> This answer to an interview question refers to the high number
of Soviet bloc scientists in this U.S. facility who act as</p>
<p> Page 4</p>
<p> inspectors to ensure that we are not producing bacteriological
weapons in violation of treaties with the Soviets.</p>
<p> You can't put it more plainly than that. Even the Trojans
weren't that stupid: at least they didn't KNOW the Trojan horse
was full of soldiers.</p>
<p> When it became obvious to the Communist press that we were
getting the truth out about who was running things at Fort Detrick,
they completely reversed themselves and said it was all a mistake.
Everything was just fine at Fort Detrick.</p>
<p> To understand the enormity of our betrayal you must know about
the origin of the AIDS virus. The virologists of the world, the
sorcerers who brought us this ghastly plague, have a united front in
denying that the virus was laboratory-made from known, lethal animal
viruses.</p>
<p> The scientific party line is that a monkey in Africa with AIDS
bit a native on the butt. The native then went to town and gave it
to a prostitute who gave it to the local banker who gave it to his
wife and three girlfriends and what!</p>
<p> 50 to 75 million people became infected with AIDS in Africa and
throughout the world. This is an entirely preposterous story, and
it is preposterous because:</p>
<p> 1. The green velvet monkey of Africa doesn't get human AIDS. You
can't reproduce the disease in monkeys even by injecting AIDS
virus directly into them.</p>
<p> 2. After injecting the virus into monkeys, you can't transmit it
to other monkeys, much less to humans.</p>
<p> 3. Genetically, AIDS (HIV-1) is not even close to the monkey form
of immunodeficiency virus.
[Ed. Note: For references on the three items above,
see: Seale, Dr. John J.,
Royal Society of Medicine, Sept. 1987,
Seale, Dr. John J.,
The Origin of AIDS -- International
Conference on AIDS, Cairo, March 1988.]</p>
<p> 4. AIDS started not in the villages but in the cities of Africa,
where there are no wild monkeys.</p>
<p> 5. The doubling time of AIDS infection being about 12 months, one
monkey biting one native and then spreading the disease would
have taken 20 years to reach a million cases. Seventy-five
million Africans became infected practically simultaneously.
At the same time, the disease became rampant in the U.S.,
Haiti and Brazil.</p>
<p> It is obvious that one monkey couldn't have done that (or one
homosexual, either). There had to be some sort of simultaneous
seeding process.</p>
<p> The only worldwide simultaneous seeding going on at the same
time was the smallpox vaccine program of the World Health
Organization (the WHO).
Page 5</p>
<p> The early epidemiology of the AIDS pandemic fits the smallpox
vaccination project of the WHO -- AND NOTHING ELSE -- with the
exception of the U.S., which we will examine subsequently.)</p>
<p> The AIDS virus was created in a laboratory by combining lethal
animal "retroviruses" in human cancer (HeLA) cell cultures. These
viruses have never before caused infection in man.</p>
<p> The "species barrier" has always been nature's way of keeping a
deadly virus from wiping out the entire animal kingdom, including
man. The myxoma virus of rabbits, for example, wiped out the rabbit
population of Europe, but man and other animals were not affected.</p>
<p> The sheep visna virus completely decimated the flocks of
Iceland, but no other animal was affected.</p>
<p> The virologists deny that the AIDS virus, HIV-1, is of animal
origin. I am sure that you see the paradox here. Aren't monkeys
animals?</p>
<p> They are also united in saying that it's not possible for the
virus to have been engineered in a laboratory. If it didn't come
from other animals and it didn't come from a laboratory, and they
now admit privately that the monkey couldn't have done it, then it
must have come out of thin air. That's a theological position and
hence beyond argument. It's certainly not scientific.</p>
<p> These scientists who have created this monstrous problem in
their sorcerer's retrovirology laboratories are constantly caught in
their own lies.</p>
<p> The line goes: "The AIDS virus could not have been engineered
in a laboratory because the technology wasn't available until
recently."</p>
<p> Icelandic scientists combined the sheep visna virus with human
tissue cells over 20 years ago. The technology has been refined in
recent years, but the basic process has been actively used in labs
all over the world for long before the AIDS virus made its dramatic
appearance.</p>
<p> But the scientists hold fast in their denial of culpability.
Professor William Jarrett said, when asked about the possibility of
AIDS arising from animal retroviruses, "That is like someone saying
babies come out of cabbages."5</p>
<p> Dr. Robert Gallo said that people who claim AIDS was
manufactured artificially are "either insane or communists."6</p>
<p> Dr. Luis Montagnier, the discoverer of the AIDS virus, said,
"In 1970 there was not enough knowledge in genetic engineering to
make such a virus starting from already existing viruses."7 (See
Icelandic experiments mentioned above.)</p>
<p> This tower of lies must eventually fall of its own weight.
Then what? Where do we look for a solution? Certainly not from
the people who caused the disaster.</p>
<p> But where? -- the Pentagon? The Pentagon is supporting</p>
<p> Page 6</p>
<p> research on biological warfare in over 100 federal and private
laboratories, including those at many prominent universities.8 Yet,
Neil Levitt, who worked for 17 years at the Army Infectious Disease
Institute, says, "It's a joke...there's no defense against these
kinds of organisms. And if you can't defend against something, then
why are we pouring more and more money in it? There's something
else going on that we don't know about."9</p>
<p> Some joke.</p>
<p> A short virology lesson will help you understand that AIDS is
indeed an animal virus and that it was laboratory-made as a weapon
of biological warfare against the free world.</p>
<p> A basic rule of virology is that if two viruses have the same
shape, design and size, then they are almost certainly the same
virus (a very simple and easy to understand rule).10</p>
<p> For example, this virus:</p>
<p> -----------
|==| ||| |
-----------</p>
<p> ... a virus of bacteria (bugs have diseases, too), doesn't look
anything like this virus:</p>
<p> ___________
/ \
/ ~~~~~~~ \
\ /
\___________/</p>
<p> ... a virus of ticks that's transmitted to pigs, or this virus:</p>
<p> __________
____/ ~~~~ \
/ ______/
\________/</p>
<p> ... which is found in horses.</p>
<p> The AIDS virus, which "couldn't have come from animal
viruses" is almost certainly a recombinant virus from fusing a
cattle virus, bovine leukemia virus:</p>
<p> =
*
=* *=</p>
<p> =* ++++ *=</p>
<p> =* *=
*
=</p>
<p> Page 7</p>
<p> ...with sheep visna virus:</p>
<p> *
* *</p>
<p> * ==== *</p>
<p> * *
*</p>
<p> You combine the two in human tissue culture cells and you get bovine
visna virus:</p>
<p> =
*
=* *=</p>
<p> =* ==== *=</p>
<p> =* *=
*
=</p>
<p> ... A VIRUS THAT HERETOFORE DID NOT EXIST -- a product of man,
engineered in a laboratory.</p>
<p> Now, if you isolate the AIDS virus from an infected human, it
looks like this:</p>
<p> =
*
=* *=</p>
<p> =* ==== *=</p>
<p> =* *=
*
=</p>
<p> It doesn't look like this (the tick virus):</p>
<p> __________
____/ ~~~~ \
/ ______/
\________/</p>
<p> ... or this (the cattle virus):</p>
<p> =
*
=* *=</p>
<p> =* ++++ *=</p>
<p> =* *=
*
=</p>
<p> Page 8</p>
<p> It looks like THIS:</p>
<p> =
*
=* *=</p>
<p> =* ==== *=</p>
<p> =* *=
*
=</p>
<p> ... the recombinant virus from cattle and sheep AND ITS CALLED
AIDS. You don't have to be a genius to understand this. Any
properly instructed 10-year-old can understand it ....</p>
<p> But, some alert reader will say, we don't give smallpox
vaccinations in the U.S., so how do you explain the simultaneous
outbreak of AIDS in Africa, Brazil and Haiti, where they did indeed
give the vaccine, and in the U.S., where they didn't give the
vaccine?</p>
<p> Simple. The homosexual community was used as a large group of
experimental animals through the hepatitis-B program. It didn't
take many infected homosexuals among the I.V. drug users to quickly
spread the disease among a large percentage of the addicts due to
the near certainly of infection through direct intravenous insertion
of the virus.</p>
<p> To understand the seeding of AIDS among homosexuals (and
eventually to the rest of us through bisexuals unless drastic action
is taken), you must know about a character with the strange name of
Wolf Szmuness. His life story will seem bizarre to you unless, like
me, you have a conspiratorial turn of mind.</p>
<p> Dr. Szmuness was a Polish Jew who supposedly ended up in a
Siberian labor camp during World War II. But after the war he
somehow became a privileged person, was sent to medical school in
Tomsk, Russia, and married a Russian woman. Hardly typical
treatment of an enemy of the Soviet state [under Stalin.</p>
<p> Szmuness' biographer said that Wolf was always reluctant to
discuss "those dark years in Siberia." Maybe he wasn't in Siberia.
If he [actually] was, he certainly wasn't shoveling salt.</p>
<p> In 1959 the Soviet government "allowed" him to practice in
Poland in a public health capacity. Standard policy in all
Communist countries is never to allow all members of a family to
travel out of the country to the West at the same time.</p>
<p> This eliminates 98 percent of all defection attempts. I have
physician friends in Hungary, for example. He can go to a meeting
anywhere in the world if she stays home. She can go if he stays
home. They can both go if the children are left at home. But in
1969, the entire Szmuness family was allowed by communist Poland to
go to a medical meeting in Italy. At that time they "defected" and
moved to New York City.</p>
<p> WITH NO AMERICAN CREDENTIALS WHATSOEVER, he immediately got a</p>
<p> Page 9</p>
<p> job as a "lab technician" at the New York City Blood Center. Within
a very few years this Polish immigrant was GIVEN HIS OWN LAB, a
separate department of epidemiology was created for him at the blood
bank and he, like the chrysalis turning into a butterfly, changed
into a FULL PROFESSOR OF EPIDEMIOLOGY AT THE COLUMBIA MEDICAL
SCHOOL!</p>
<p> In six years this "lab tech" became a full professor AND THEN
WENT BACK TO MOSCOW for a scientific presentation and was received
as a dignitary, not a defector.</p>
<p> We tell you this amazing story because in retrospect it is
obvious that Wolf Szmuness was a carefully groomed ... agent,
planted here after years of preparation, to instigate biological
warfare against the American people.</p>
<p> Szmuness, with the full cooperation and financial support of
the U.S. Center for Disease Control and the National Institutes of
Health,11 masterminded the hepatitis-B vaccine experimental program
used on homosexual men.</p>
<p> He insisted that only young, promiscuous homosexuals be allowed
to participate in the experiment. The experiment started in New
York at the blood bank in November 1978.</p>
<p> THE EXPERIMENTAL VACCINE WAS PRODUCED in a government
supervised laboratory.12 The study was completed in October 1979.
Within 10 years, most of these young men would be dead or dying from
AIDS.</p>
<p> In 1980 the program was expanded to major cities all across the
U.S. In the fall of 1980 the first AIDS case was reported in San
Francisco. Eight years later most of the homosexuals in San
Francisco are infected, dead or dying.</p>
<p> Szmuness did not live to see the fruition of this larger
experiment. He died of cancer in 1982.</p>
<p> In 1986 Dr. Cladd Stevens, one of Szmuness's collaborators,
penned an astonishing report that did not make your local newspaper.</p>
<p> She reported that the majority of the homosexuals in the
experimental program were infected with the AIDS virus.13 The AIDS-
laced vaccine, through the bridge of bisexual men, now infects as
many as three million Americans. Mission accomplished.</p>
<p> AIDS was not the first germ warfare attack against Americans.</p>
<p> In the early '60s, millions of unsuspecting Americans took
either Salk injected polio vaccine or the live Sabin polio vaccine,
which was taken by mouth.</p>
<p> BOTH WERE LACED WITH S.V.-40, A CANCER-CAUSING MONKEY VIRUS.14</p>
<p> With an incubation period of 20 years, we are only now seeing
the grim results of this bio-attack against Americans, largely in
the form of brain tumors and leukemia.</p>
<p> Page 10</p>
<p> Salk didn't like the Sabin vaccine and Sabin didn't like the
Salk vaccine. I think they are both right. It is interesting to
note that polio was rapidly disappearing WITHOUT a vaccine (J. Trop.
Pediat, env. Child. Health 21, 11) ....</p>
<p> Our Soviet enemies not only instigated the AIDS epidemic
through clandestine agents within our government, but they now
control, through the World Health Organization, the AIDS policies of
the free world.</p>
<p> You are probably not aware that the international AIDS
prevention program of the World Health Organization (WHO) is run by
the Soviets.</p>
<p> You don't believe it? Call WHO and ask them who is in charge
in Europe. If you want to save your nickel I'll tell you. He's a
Russian named Bysencho and he operates out of Copenhagen....</p>
<p> The Soviets control the response to AIDS of the entire free
world at many levels, including the top. Dr. Sergei Litvinov,
the coordinator of all task forces on AIDS at the WHO, is a high
official in the Soviet Ministry of Health. Allegedly Litvinov
gave out the order to our scientists and medical organizations in
the western world not to discuss the real cause of the epidemic.</p>
<p> At a secret meeting (information supplied the author from a
confidential source) between the editors of Lancet, the highly
respected British medical publication, and a group of the leading
retrovirologists of the world, it was decided not to publish any
academic discussion about the possible artificial creation of the
AIDS virus in a laboratory.</p>
<p> They particularly agreed not to make any mention of world-
renowned biologist Isaac Farlane Bernet's published remarks that
molecular biology may get out of hand like atomic physics and be
used for evil purposes and "practical applications of molecular
biology to cancer research might be sinister."</p>
<p> Other medical journals such as Science and JAMA have
lockstepped with Lancet and put all references to the man-made
origins of AIDS down the memory hole.</p>
<p> Did Comrade Litvinov have a little talk with the
retrovirologists? They, of course, wouldn't need any encouragement
from the Soviet [WHO] bosses to attempt a little coverup of their
own heinous crime, but Lancet, the British Medical Journal, and the
New England Journal of Medicine are another matter.</p>
<p> It took some powerful and sinister forces indeed to get these
respected publications to cover up the crime of the millennium.</p>
<p> The notable exception to this appalling censorship of mass
murder is Professor Harding Rains, Editor of the Journal of the
Royal Society of Medicine. Rains refers to "a conspiracy of
silence" covering the allegation that AIDS was man-made. I hope
Dr. Rains is watching his backside.</p>
<p> Dr. Zhores Medvedev, unlike Bysencho and Litvinov, supposedly
is a Russian exile. Medvedev operates out of London at the National</p>
<p> Page 11</p>
<p> Institute for Medical Research. He's a senior research scientist
who continues to communicate freely with his supposed enemies in the
Soviet biowarfare laboratories, but we lack the space to catalog all
the details [here].</p>
<p> Medvedev is spreading the disinformation that AIDS is rampant
in Russia due to the escape of the virus from a laboratory, a sort
of biological Chernobyl.</p>
<p> This tends to divert suspicion away from Litvinov, Szmuness and
the other reds that President Nixon allowed to penetrate our
biological warfare laboratories at Fort Detrick, Maryland.</p>
<p> Having the Soviets "control" the spread of AIDS in the West has
let to some interesting paradoxes. Our masters in the U.S. tell us
that there shall be absolutely no restrictions on travel between
various parts of the non-Communist world by persons who test
positive for AIDS.</p>
<p> Surgeon General C.E. Koop supports this Soviet policy of
biological suicide. (Are those the instructions he received when he
made his trip to Moscow, where the WHO has set up its main AIDS
research center?)</p>
<p> But, our Soviet masters in the WHO tell us, this open policy of
international travel does not apply to the communist bloc of
nations. If you or I were to visit Moscow and tested positive for
the AIDS virus, POW! -- out on the next plane!</p>
<p> If they stay clean through their immigration policies and we
die because of the immigration policies imposed on us through the
U.N.-controlled World "Health" Organization, who needs atomic bombs
for world conquest?</p>
<p> Cuba, Dr. John Seale informs me, has a strict asylum system for
the AIDS-infected. When their troops come back from "liberating"
Africans, they are tested as they get off the boat.</p>
<p> If tested positive the soldier goes directly to hell --
euphemistically called a sanitarium. He can visit his family
occasionally, but only in the presence of a commissar called a
"health official (no hanky-panky).</p>
<p> Unless the West gets its act together and closes down the U.N.
genocide division called the WHO, freedom and decency will disappear
from planet Earth for a thousand years. But the problem goes much
deeper.</p>
<p> How do you close down the U.S. government laboratories such as
the Centers for Disease Control (CDC), the National Institute of
Health (NIH) and the Fort Detrick bio-warfare lab when the
perpetrators of the crime are in control at all levels?</p>
<p> I don't know the answer. *****</p>
<p> _________________________</p>
<p> Page 12</p>
<p> 1 Project Whitecoat, to be published in Health Freedom News,
P.O. Box 688, Monrovia CA 91016/Subscription $20.00 per year.</p>
<p> 2 Bad Blood, J.H. Jones, MacMillan, NY, 1982.</p>
<p> 3 Common Cause Magazine, Jan./Feb. 1988.</p>
<p> 4 First aids Report, March/April 1988.</p>
<p> 5 Private communication, John Seale, M.D., 1988</p>
<p> 6 Ibid.</p>
<p> 7 First International Conference on the Global Impact of aids,
London, March 8-10, 1988.</p>
<p> 8 New Scientist, London, 5/19/88.</p>
<p> 9 Science News, 133:100, 2/13/88.</p>
<p> 10 Joklik, Virology, 2nd edition, pp. 36 ff.</p>
<p> 11 AIDS and the Doctors of Death, Cantwell, Aries Rising Press,
Los Angeles,p.76.</p>
<p> 12 Ibid.</p>
<p> 13 Ibid.
14 Salk/Sabin s.v.-40 Proc. Nat'l Acad. Sci., vol. 77, #8,
p. 4861, and Atlantic Monthly, 2/76.</p>
<p> --------------------------------------------------------------------</p>
<p> If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
Sciences address as listed on the first page. Thank you for your
consideration, interest and support.</p>
<p> Jerry W. Decker...Ron Barker.....Chuck Henderson
Vangard Sciences/KeelyNet
--------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 484-3189
--------------------------------------------------------------------
</p></xml>

207
regexConsp/aids02.xml Normal file
View File

@ -0,0 +1,207 @@
<xml><p>Title : AIDS: The Facts</p>
<p>Source : American Red Cross</p>
<p> AIDS:
Spread Facts
Not Fear</p>
<p>What Is AIDS?</p>
<p>Acquired immune deficiency syndrome (AIDS) is a serious condition that affects
the body's ability to fight infection. A disgnosis of AIDS is made when a
person develops a life-threatening illness not usually found in a person with a
normal ability to fight infection. The two diseases most often found in AIDS
patients are a lung infection called Pneumocystis carinii pneumonia and a rare
form of cancer called Kaposi's sarcoma. It is these diseases, not the AIDS
virus itself, that can lead to death. To date, more than 50 percent of the
persons with AIDS have died.</p>
<p>What Causes AIDS?</p>
<p>Researchers have discovered the cause of AIDS - a virus that is called either
HTLV-III or LAV. This virus changes the structure of the cell it attacks.
Infection with the virus can lead to AIDS or to a less severe condition known
as AIDS-related complex (ARC). Some of those persons infected with the virus
will develop symptoms of AIDS or ARC. Other people who carry the virus may
remain in apparent good health. These carriers can transmit the virus during
sexual contact, or an infected mother can transmit the virus to her infant
before, during, or after birth (probably through breast milk).</p>
<p>Who Gets AIDS?</p>
<p>Since 1981, the Centers for Disease Control has been collecting information
on AIDS. Approximately 95 percent of the persons with AIDS belong to one of the
following groups:</p>
<p>* Sexually active homosexual or bisexual men (73 percent)</p>
<p>* Present or past abusers of intravenous drugs (17 percent)</p>
<p>* Patients who have had transfusions with blood or blood products (2 percent)</p>
<p>* Persons with hemophilia or other coagulation disorders (1 percent)</p>
<p>* Heterosexuals who have had sexual contact with someone with AIDS, or at risk
for AIDS (1 percent)</p>
<p>* Infants born to infected mothers (1 percent)</p>
<p>Approximately 5 percent of persons with AIDS do not fall into any of these
groups, but researchers believe that they came in contact with the virus in
similar ways. Some died before complete histories could be taken, while others
refused to provide any personal information.</p>
<p>What Are the Symptoms?</p>
<p>Most individuals infected with the AIDS virus have no symptoms and feel well.
Some develop symptoms that may include -</p>
<p>* Fever, including "night sweats."</p>
<p>* Weight loss for no apparent reason.</p>
<p>* Swollen lymph glands in the neck, underarm, or groin area.</p>
<p>* Fatigue or tiredness.</p>
<p>* Diarrhea.</p>
<p>* White spots or unusual blemishes in the mouth.</p>
<p>These symptoms are also symptoms of many other illnesses. They may be symptoms
of AIDS if they are unexplained by other illness. Anyone with these symptoms
for more than two weeks should see a doctor.</p>
<p>How is the AIDS Virus Spread?</p>
<p>The AIDS virus is spread by sexual contact, needle sharing, or rarely through
transfused blood or its components. Multiple sexual partners, either homosexual
or heterosexual, and sharing needles by drug users increase the risk of
infection with the virus.</p>
<p>Is the AIDS Virus Spread Through Casual Contact?</p>
<p>No. Casual contact with AIDS patients or people who carry the virus does NOT
place others at risk for getting AIDS. The AIDS virus is NOT spread by-</p>
<p>* Casual contact, such as hugging or hand shaking with an AIDS patient or a
person carrying the virus.</p>
<p>* Use of bathroom facilities, such as toilets, sinks, or bathtubs. Use of
swimming pools.</p>
<p>* Sneezing, coughing, or spitting.</p>
<p>* Dishes, utensils, or food handled by a person with AIDS.</p>
<p>The AIDS virus is not spread through normal daily contact at work, in school,
or at home. No cases have been found where the virus has been transmitted by
casual contact with AIDS patients in the home, workplace, or health care
setting. This statement is based in part, on studies of more than 300
households where people with AIDS were present. Not a single case of AIDS or
transmission of the virus was found except from sexual contacts or from
infected mothers to their infants. Many of those tested were children who had
shared bottles, beds, toothbrushes, and eating utensils with infected brothers
and sisters.</p>
<p>Is There a Test for AIDS?</p>
<p>There is an AIDS virus antibody test that detects antibodies to the AIDS virus
that causes the disease. The body produces antibodies that try to get rid of
bacteria, viruses, or anything else that is not supposed to be in the blood
stream. The test tells if someone has been infected with the AIDS virus. Most
people with AIDS have a positive test and some people with a positive test
will develop AIDS. The test does not tell who will develop AIDS.</p>
<p>What Does a Positive Test Mean?</p>
<p>It means that a person has been infected with the AIDS virus. It is estimated
that more than one million Americans have been infected by the AIDS virus. Some
of these people will develop AIDS. Others who have the virus may stay well,
without any symptoms, but can transmit the virus to others.</p>
<p>Why Do We Have a Test?</p>
<p>The test was first used in blood donation centers to prevent the AIDS virus
from getting into the blood supply. We have always used tests to make the
blood supply as safe as possible. For example, all blood is tested for the
hepatitis B virus. This is to make sure that the person does not get hepatitis
B.</p>
<p>Is the Blood Supply Safe?</p>
<p>YES. The blood supply is well protected from the AIDS virus. People who may be
at risk of having AIDS are told that they should not donate blood. For example,
men who have had sex with another male since 1977 are told not to donate blood.
Also, the test is used to screen all donated blood and plasma for signs of the
virus that causes AIDS.</p>
<p>Can I Get AIDS by Donating Blood?</p>
<p>NO. All of the needles, syringes, tubing, and containers used by blood donation
centers are sterile and are used only once and thrown away, so there is no
chance of infection.</p>
<p>Is the Test Available to the Public?</p>
<p>YES. The test is available at a variety of test sites in most states. It is
also available through private doctors and clinics. Information about where to
get the test is available from state or local health departments, sexually
transmitted disease clinics, doctor's offices, and community blood services.
Anyone planning to take the test should get advice before the test and
understand what the results may indicate. It is important to have counseling
after the test.</p>
<p>How Can I Protect Myself From AIDS?</p>
<p>* Do not have sexual contact with AIDS patients, with members of the risk
groups, or with people who test positive for the AIDS virus. If you do, use
a condom and avoid sexual practices such as anal intercourse that may injure
tissue.</p>
<p>* Do not use IV drugs. If you do, do not share needles. Do not have sex with
people who use IV drugs.</p>
<p>* Women who are sex partners of risk group members or who use IV drugs should
consider the risk to their babies before pregnancy. These women should have
an HTLV-III antibody test before they become pregnant. If the become pregnant
they should have a test during pregnancy.</p>
<p>* Do not have sex with multiple partners, including prostitutes (who may also
be IV drug abusers). The more partners you have, the greater your chances of
contracting AIDS.</p>
<p>What Should I Do if I Have a Positive Test?</p>
<p>* Have a regular medical checkup and get counseling.</p>
<p>* Do not donate blood, sperm, or organs.</p>
<p>* Do not share drugs with others, and avoid exchanging bodily fluids during
sexual activity (a condom should be used). Avoid oral-genital contact and
intimate kissing.</p>
<p>* Do not share toothbrushes. razors, or anything that could be contaminated
with blood.</p>
<p>* Consider postponing pregnancy.</p>
<p>Further information about AIDS can be obtained from your Red Cross chapter,
local or state health department, other community agencies, or the Public
Health Service Hotline. The hotline number is 1-800-342-AIDS. Atlanta Area
callers should dial 329-1290.</p>
<p>______________________________________________________________________________</p>
<p>Developed in cooperation with the Washington Business Group on Health, based
upon Public Health Service/U.S. Department of Health and Human Services
pamphlet "Facts About AIDS"</p>
<p>Funding provided by the American Council of Life Insurance and the Health
Insurance Association of America.
______________________________________________________________________________</p>
<p>AIDS-1 Rev. May 1986</p>
<p></p></xml>

263
regexConsp/aidsconsp.xml Normal file
View File

@ -0,0 +1,263 @@
<xml><p>
:::::::::::::::::::::::::::::::::::::::::
:: AIDS: A U.S.- Made Monster? ::
:::::::::::::::::::::::::::::::::::::::::
:: PREFACE ::
In an extensive article in the Summer-Autumn 1990 issue of "Top Secret", Prof
J. Segal and Dr. L. Segal outline their theory that AIDS is a man-made disease,
originating at Pentagon bacteriological warfare labs at Fort Detrick, Maryland.
Top Secret is the international edition of the German magazine Geheim and is
considered by many to be a sister publication to the American Covert Action
Information Bulletin (CAIB). In fact, Top Secret carries the Naming Names
column, which CAIB is prevented from doing by the American government, and
which names CIA agents in different locations in the world. The article, named
"AIDS: US-Made Monster" and subtitled "AIDS - its Nature and its Origins," is
lengthy, has a lot of professional terminology and is dotted with footnotes.
The following is my humble attempt to encapsulate its highlights. It is
recommended that all interested read the original, which is available at some
bookstores, or can be ordered for $3.50 from:
Top Secret/Geheim Magazine P.O.Box 270324 5000 Koln 1 Germany
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
:: AIDS FACTS ::
"The fatal weakening of the immune system which has given AIDS its name
(Acquired Immuno-Deficiency Syndrome)," write the Segals, "has been traced back
to a destruction or a functional failure of the T4-lymphocytes, also called
'helper cells`, which play a regulatory role in the production of antibodies in
the immune system." In the course of the illness, the number of functional T4-
cells is reduced greatly so that new anti-bodies cannot be produced and the
defenseless patient remains exposed to a range of infections that under other
circumstances would have been harmless. Most AIDS patients die from
opportunistic infections rather than from the AIDS virus itself.
The initial infection is characterized by diarrhea, erysipelas and intermittent
fever. An apparent recovery follows after 2-3 weeks, and in many cases the
patient remains without symptoms and functions normally for years. Occasionally
a swelling of the lymph glands, which does not affect the patient's well-being,
can be observed.
After several years, the pre-AIDS stage, known as ARC (Aids- Related Complex)
sets in. This stage includes disorders in the digestive tract, kidneys and
lungs. In most cases it develops into full-blown AIDS in about a year, at which
point opportunistic illnesses occur. Parallel to this syndrome, disorders in
various organ systems occur, the most severe in the brain, the symptoms of
which range from motoric disorders to severe dementia and death.
This set of symptoms, say the Segals, is identical in every detail with the
Visna sickness which occurs in sheep, mainly in Iceland. (Visna means tiredness
in Icelandic). However, the visna virus is not pathogenic for human beings.
The Segals note that despite the fact that AIDS is transmitted only through
sexual intercourse, blood transfusions and non- sterile hypodermic needles, the
infection has spread dramatically. During the first few years after its
discovery, the number of AIDS patients doubled every six months, and is still
doubling every 12 months now though numerous measures have been taken against
it. Based on these figures, it is estimated that in the US, which had 120,000
cases of AIDS at the end of 1988, 900,000 people will have AIDS or will have
died of it by the end of 1991. It is also estimated that the number of people
infected is at least ten times the number of those suffering from an acute case
of AIDS. That in the year 1995 there will be between 10-14 million cases of
AIDS and an additional 100 million people infected, 80 percent of them in the
US, while a possible vaccination will not be available before 1995 by the most
optimistic estimates. Even when such vaccination becomes available, it will not
help those already infected. These and following figures have been reached at
by several different mainstream sources, such as the US Surgeon General and the
Chief of the medical services of the US Army.
Say the Segals: "AIDS does not merely bring certain dangers with it; it is
clearly a programmed catastrophe for the human race, whose magnitude is
comparable only with that of a nuclear war." They later explain what they mean
by "programmed," showing that the virus was produced by humans, namely Dr.
Robert Gallo of the Bethesda Cancer Research Center in Maryland. When
proceeding to prove their claims, the Segals are careful to note that: "We have
given preference to the investigative results of highly renowned laboratories,
whose objective contents cannot be doubted. We must emphasize, in this
connection, that we do not know of any findings that have been published in
professional journals that contradict our hypotheses."
:: DISCOVERING AIDS ::
The first KNOWN cases of AIDS occurred in New York in 1979. The first
DESCRIBED cases were in California in 1979. The virus was isolated in Paris in
May 1983, taken from a French homosexual who had returned home ill from a trip
to the East Coast of the US. One year later, Robert Gallo and his co-workers at
the Bethesda Cancer Research Center published their discovery of the same
virus, which is cytotoxic, i.e poisonous to cells.
Shortly after publishing his discovery, Gallo stated to newspapers that the
virus had developed by a natural process from the Human Adult Leukemia virus,
HTLV-1, which he had previously discovered. However, this claim was not
published in professional publications, and soon after, Alizon and Montagnier,
two researchers of the Pasteur Institute in Paris published charts of HTLV-1
and HIV, showing that the viruses had basically different structures. They also
declared categorically that they knew of no natural process by which one of
these two forms could have evolved into the other.
According to the professional "science" magazine, the fall 1984 annual meeting
of the American Association for the Advancement of Science (AAAS), was almost
entirely devoted to the question of: to what extent new pathogenic agents could
be produced via human manipulation of genes. According to the Segals, AIDS was
practically the sole topic of discussion.
:: THE AIDS VIRUS ::
The Segals discuss the findings of Gonda et al, who compared the HIV, visna
and other closely-related viruses and found that the visna virus is the most
similar to HIV. The two were, in fact, 60% identical in 1986. According to
findings of the Hahn group, the mutation rate of the HIV virus was about a
million times higher than that of similar viruses, and that on the average a
10% alteration took place every two years. That would mean that in 1984, the
difference between HIV and visna would have been only 30%, in 1982- 20%, 10% in
1980 and zero in 1978. "This means," say the Segals, "that at this time visna
viruses changed into HIV, receiving at the same time the ability to become
parasites in human T4-cells and the high genetic instability that is not known
in other retroviruses. This is also consistent with the fact that the first
cases of AIDS appeared about one year later, in the spring of 1979."
"In his comparison of the genomes of visna and HIV," add the Segals, "Coffin
hit upon a remarkable feature. The env (envelope) area of the HIV genome, which
encodes the envelope proteins which help the virus to attach itself to the host
cell, is about 300 nucleotides longer than the same area in visna. This
behavior suggests that an additional piece has been inserted into the genomes
of the visna virus, a piece that alters the envelope proteins and enables them
to bind themselves to the T4-receptors. BUT THIS SECTION BEHAVES LIKE A
BIOLOGICALLY ALIEN BODY, which does not match the rest of the system
biochemically. (emphasis mine)
The above mentioned work by Gonda et al shows that the HIV virus has a section
of about 300 nucleotides, which does not exist in the visna virus. That length
corresponds with what Coffin described. That section is particularly unstable,
which indicates that it is an alien object. According to the Segals, it
"originates in an HTLV-1 genome, (discovered by Gallo-ED) for the likelihood of
an accidental occurrence in HIV of a genome sequence 60% identical with a
section of the HTLV-1 that is 300 nucleotides in length is zero." Since the
visna virus is incapable of attaching itself to human T4 receptors, it must
have been the transfer of the HTLV-1 genome section which gave visna the
capability to do so. In other words, the addition of HTLV-1 to visna made the
HIV virus. In addition, the high mutation rate of the HIV genome has been
explained by another scientific team, Chandra et al, by the fact that it is "a
combination of two genome parts which are alien to each other BY ARTIFICIAL
MEANS rather than by a natural process of evolution, because this process would
have immediately eliminated, through natural selection, systems that are so
replete with disorders."
"These are the facts of the case," say the Segals. "HIV is essentially a visna
virus which carries an additional protein monomer of HTLV-1 that has an epitope
capable of bonding with T4 receptors. Neither Alizon and Montagnier nor any
other biologist know of any natural mechanism that would make it possible for
the epitope to be transferred from HTLV-1 to the visna virus. For this reason
we can come to only one conclusion: that this gene combination arose by
artificial means, through gene manipulation."
:: THE CONSTRUCTION OF HIV ::
"The construction of a recombinant virus by means of gene manipulation is
extraordinarily expensive, and it requires a large number of highly qualified
personnel, complicated equipment and expensive high security laboratories.
Moreover, the product would have no commercial value. Who, then," ask the
Segals, "would have provided the resources for a type of research that was
aimed solely at the production of a new disease that would be deadly to human
beings?"
The English sociologist Allistair Hay (as well as Paxman et al in "A Higher
Form of Killing"-ED), published a document whose authenticity has been
confirmed by the US Congress, showing that a representative of the Pentagon
requested in 1969 additional funding for biological warfare research. The
intention was to create, within the next ten years, a new virus that would
not be susceptible to the immune system, so that the afflicted patient would
not be able to develop any defense against it. Ten years later, in the spring
of 1979, the first cases of AIDS appeared in New York.
"Thus began a phase of frantic experimentation," say the Segals.
One group was working on trying to cause animal pathogens to adapt themselves
to life in human beings. This was done under the cover of searching for a cure
for cancer. The race was won by Gallo, who described his findings in 1975. A
year later, Gallo described gene manipulations he was conducting. In 1980 he
published his discovery of HTLV.
In the fall of 1977, a P4 (highest security category of laboratory, in which
human pathogens are subjected to genetic manipulations) laboratory was
officially opened in building 550 of Fort Detrick, MD, the Pentagon's main
biological warfare research center. "In an article in 'Der Spiegel`, Prof.
Mollings point out that this type of gene manipulation was still extremely
difficult in 1977. One would have had to have a genius as great as Robert Gallo
for this purpose, note the Segals."
Lo and behold. In a supposed compliance with the international accord banning
the research, production and storage of biological weapons, part of Fort
Detrick was "demilitarized" and the virus section renamed the "Frederick
Cancer Research Facility". It was put under the direction of the Cancer
Research Institute in neighboring Bethesda, whose director was no other than
Robert Gallo. This happened in 1975, the year Gallo discovered HTLV.
Explaining how the virus escaped, the Segals note that in the US, biological
agents are traditionally tested on prisoners who are incarcerated for long
periods, and who are promised freedom if they survive the test. However, the
initial HIV infection symptoms are mild and followed by a seemingly healthy
patient.
"Those who conducted the research must have concluded that the new virus
was...not so virulent that it could be considered for military use, and the
test patients, who had seemingly recovered, were given their freedom. Most of
the patients were professional criminals and New York City, which is
relatively close, offered them a suitable milieu. Moreover, the patients were
exclusively men, many of them having a history of homosexuality and drug abuse,
as is often the case in American prisons. 1111
It is understandable why AIDS broke out precisely in 1979, precisely among men
and among drug users, and precisely in New York City," assert the Segals. They
go on to explain that whereas in cases of infection by means of sexual contact,
incubation periods are two years and more, while in cases of massive infection
via blood transfusions, as must have been the case with prisoners, incubation
periods are shorter than a year. "Thus, if the new virus was ready at the
beginning of 1978 and if the experiments began without too much delay, then
the first cases of full- blown AIDS in 1979 were exactly the result that
could have been expected."
In the next three lengthy chapters, the Segals examine other theories,
"legends" as they call them, of the origins of AIDS. Dissecting each claim,
they show that they have no scientific standing, providing also the findings
of other scientists. They also bring up the arguments of scientists and
popular writers who have been at the task of discounting them as "conspiracy
theorists" and show these writers' shortcomings. Interested readers will have
to read the original article to follow those debates. I will only quote two
more paragraphs:
"We often heard the argument that experiments with human volunteers are part of
a barbaric past, and that they would be impossible in the US today... We wish
to present one single document whose authenticity is beyond doubt. An
investigative commission of the US House of Representatives presented in
October 1986 a final report concerning the Manhattan Project. According to this
document, between 1945 and 1975 at least 695 American citizens were exposed
to dangerous doses of radioactivity. Some of them were prisoners who had
volunteered, but they also included residents of old-age homes, inmates of
insane asylums, handicapped people in nursing homes, and even normal patients
in public hospitals; most of them were subjected to these experiments without
their permission. Thus the 'barbaric past` is not really a thing of the past."
"It is remarkable that most of these experiments were carried out in university
institutes and federal hospitals, all of which are named in the report.
Nonetheless, these facts remained secret until 1984, and even then a
Congressional committee that was equipped with all the necessary
authorization needed two years in order to bring these facts to life. We are
often asked how the work on the AIDS virus could have been kept secret. Now,
experiments performed on a few dozen prisoners in a laboratory that is
subject to military security can be far more easily kept secret than could
be the Manhattan Project."
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Black Crawling Systems @ V0iD Information Archives
( 6 1 7 ) 4 8 2 - 6 3 5 6
</p></xml>

331
regexConsp/air-rail.xml Normal file
View File

@ -0,0 +1,331 @@
<xml><p> Info pulled from the Usenet. Air (atmosphere) Railway Systems.</p>
<p>Today and Yesterday
-------------------------</p>
<p>The ultimate responsibility for this thread :-) belongs to George
Medhurst (1759-1827), of England. During a period of a few years
about 1810, he invented three distinct forms of air-propelled
transport. None of them was implemented during his lifetime;
but all of them saw use eventually, reaching their greatest extent
in the reverse order of their original invention.</p>
<p>Medhurst's first method involved moving air through a tube a few
inches in diameter, pushing a capsule along it; this simple idea
was the pneumatic dispatch tube. Next he realized that if the same
system was built much larger, it could carry passengers (or freight
items larger than letters); it was natural to run the vehicle on
tracks, and so this became known since the vehicle would be large
enough to require tracks, this became known as a pneumatic railway.</p>
<p>But would anyone actually want to ride along mile after mile inside
an opaque pipe? Not likely. So he then thought of having only a
piston moving within the pipe, somehow dragging along a vehicle
outside it. He proposed several versions of this idea; in most of
them the vehicle ran on rails, so this became known as an atmospheric
railway (though a distinction between that term and the pneumatic
railway was not always observed). The key feature of all versions
of the system was a longitudinal valve: some sort of flexible flap
running the length of the pipe, which would be held closed by air
pressure except when the piston was actually passing. Medhurst
did try to raise capital to implement this system, but failed.</p>
<p>Now, while the first operable steam locomotive was built about 1804,
steam-powered trains did not see regular use for passengers for some
25 years after that. It was in the 1830's and 1840's that the steam
railway was shown to be practical in both engineering and financial
senses.</p>
<p>But the same technical developments that made possible the practical
steam railway also made the atmospheric railway, if not certainly
practical, at least worth a try. And it offered the prospect of
considerable advantages. Since the trains wouldn't have to carry
their prime mover, they would be lighter; therefore the track could
be built cheaper, and the trains' performance would be better.
The trains wouldn't trail smoke wherever they went (and into the
passenger cars in particular), and they would also be quiet.
And if one section of the route was hilly and required more motive
power, all that were needed would be more or larger pumping stations
along that section; no need to add extra locomotives. In short,
very much the same advantages that electricity gave a few decades
later. (Plus one more: a derailed train would tend to be kept near
the track by the pipe and piston.)</p>
<p>The success of the 1830's railways gave rise to the Railway Mania
of the 1840's, when interest in railway shares reached absurd levels.
In that climate the proposers of atmospheric lines could find the
backing they needed, and four atmospheric lines opened in a period
of about 3 years. In order of opening, these were:</p>
<p> * The Dublin &amp; Kingstown, from Kingstown to Dalkey in Ireland,
1.5 miles long; operated 1844-54.
* The London &amp; Croydon, from Croydon to Forest Hill in London,
England, 5 miles, then extended to New Cross for a total
of 7.5 miles; operated 1846-47.
* The Paris a St-Germain, from Bois de Vezinet to St-Germain
in Paris, France, 1.4 miles long; operated 1847-60.
* The South Devon, from Exeter to Teignmouth in Devonshire,
England, 15 miles, then extended to Newton (now Newton Abbot),
20 miles altogether; operated 1847-48.</p>
<p>I note in passing that while I (as a fan of his) might like Isambard
Kingdom Brunel to have invented the atmospheric system used on the
South Devon, it is wrong to say that he did so. He did choose it
and actively promoted it (well, "actively" is redundant with Brunel).
It was actually developed by Samuel Clegg and Joseph and Jacob Samuda.</p>
<p>Both of the longer, if shorter-lived, English lines used atmospheric
propulsion in both directions of travel, whereas the French and Irish
lines were built on hills and their trains simply returned downhill
by gravity. Since all were single-track lines, the one-way system
simplified the valves needed to let the pistons in and out of the
pipes at their ends (possibly while traveling at speed).</p>
<p>All four lines were converted to ordinary steam railways in the end,
and for the next 130 years the atmospheric system appeared dead.
For one thing, steam locomotive technology had too much of a head
start in development over the atmospheric system; steam railways
might have delays due to engine failure but they never had to shut
down for 6 weeks while a new design of longitudinal valve was
installed along the entire length of the route!</p>
<p>(The valve involved metal and leather parts and a greasy or waxy
sealant "composition". Although stories were told about rats
eating the composition, and this probably did happen sometimes,
it wasn't really a serious thing; the biggest problems in fact
were freezing and deterioration of the leather, and corrosion
of the metal parts.)</p>
<p>Also, the atmospheric system was inflexible, in that if the power
requirements for a section of route were greater than estimated,
very little could be done short of splitting the section and adding
a whole new pumping station. (All the lines used vacuum rather
than positive pressure in the pipes, which limited the pressure
differential to about 0.9 atmosphere in practice; but the valve
designs were marginal anyway and likely wouldn't have stood up
to greater pressures if they could have been used.)</p>
<p>What today might be seen as the most serious disadvantage of all,
the requirement for long interruptions of the motive power at
junctions, was not so noticeable in those days. If the train
didn't have enough speed to coast across the gap, well, the
third-class passengers could always get out and push, or maybe
there would be a horse conveniently at hand. At some stations
a small auxiliary pipe was used to advance the train from the
platform to the start of the main pipe.</p>
<p>There were many other proposals in those days for atmospheric
lines, but in view of these early failures, none of them were
ever built as atmospheric railways. The next atmospheric railway
to open actually appeared in 1990!</p>
<p>While the atmospheric railways were vanishing, the first
pneumatic dispatch tubes were beginning to appear; I'll get
into that later. But from that start, the pneumatic railway
idea began to return also. At first these were designed for
freight. Engineers J. Latimer Clark and T. W. Rammell formed
the Pneumatic Despatch Company, which built a demonstration tube
above ground in Battersea in 1861. This line successfully carried
loads up to 3 tons... and even a few passengers, lying down in
the vehicles in the 30-inch tunnel! The pressure used was up
to 0.025 atmosphere, and speeds up to 40 mph were reached.</p>
<p>The Post Office became interested in the system and had several
tunnels built for it. They were used from 1863 to 1874, though
interrupted for a time by the financial crisis of 1866.</p>
<p>(At this point they decided that the system didn't gain enough time
to be worth the cost, not to mention the risk of a vehicle becoming
stuck in the tube. In the 1920's, when electricity was available,
they returned a driverless trains system, using tunnels of similar
size to the old pneumatic tubes. This is the Post Office "tube"
Railway, which continues in use to this day. Such systems also
exist in Switzerland, which had it first, and in West Germany.)</p>
<p>Meanwhile, while these lines were moving the mail from the streets
of London to tunnels underneath, the first underground railways
were doing the same with passenger traffic. The first section of
the Metropolitan Railway (from Farringdon, now Farringdon Street,
to Paddington station) opened in 1863. It was promptly followed
by extensions, as well as competition in the form of the Metro-
politan District Railway, a subsidiary that got away. (Their
routes in central London today form the London Underground's
Metropolitan, District, Circle, and Hammersmith &amp; City Lines.)</p>
<p>Now there was no thought of operating the Metropolitan with
anything but steam locomotives, despite the line being mostly
in tunnel. Sir John Fowler, who later co-designed the Forth Bridge,
did have the idea of a steam locomotive where the heat from the fire
would be retained in a cylinder of bricks, and therefore the fire
could be put out when traveling in the tunnels. One example of
this design, later called Fowler's Ghost, was tried in 1862.
It was thermodynamically absurd: as C. Hamilton Ellis put it,
"the trouble was that her boiler not only refrained from producing
smoke, it produced very little steam either".</p>
<p>In the end both the Met and the District were worked with condensing
steam locomotives: these emitted smoke as usual, but their exhaust
steam, while running in tunnels, was directed back into the water
tanks and condensed. The tanks were drained at the end of the run
and refilled with cold water.</p>
<p>So people were not only willing to travel in what amounted to an
opaque tube after all, but in one filled with smoke at that!
Why not one *without* smoke? And so the pneumatic railway was
now tried; but it never got past the demonstration stage.</p>
<p>The longest line to carry passengers was opened at the Crystal
Palace in London in 1864. It used a tunnel about 9 by 10 feet,
1800 feet long. The driving fan was 22 feet across, generating
about 0.01 atmosphere of pressure -- the larger the tube, the
lower the pressure you need. The vehicle was a full-size broad
gauge railway car ringed with bristles; it carried 35 passengers.
The trip took 50 seconds, thus averaging about 25 mph. Another,
smaller demonstration line was built at a fair in the US in 1867
by Alfred Ely Beach.</p>
<p>Beach then formed the Beach Pneumatic Transit Company, which
obtained permission to build a freight-carrying pneumatic line
under Broadway in New York. But what he actually opened in 1870
was a passenger-carrying pneumatic subway, the only one to
actually operate under a city street. It was only 312 feet long,
from Warren Street to Murray Street. The tunnel was 9 feet in
diameter, and was worked by a single car with a capacity of
18 passengers.</p>
<p>Beach tried but failed to get permission to extend the line.
It closed after a few months, and New York did not get a subway
again until 1904, when the first Interborough Rapid Transit route
was opened (from City Hall station along the present Lexington
Avenue, 42nd Street shuttle, and 7th Avenue lines to, um, initially
somewhere around 120th Street). This route was electric and so
have been all its successors.</p>
<p>Beach's tunnel had been almost forgotten when the crews
constructing the new subway broke into it in 1912.</p>
<p>In London, a pneumatic underground line was started *with* permission,
but construction was never completed. This was the Waterloo and
Whitehall Railway, which planned to connect Waterloo station to Great
Scotland Yard, 1/2 mile away, with a 12'9" diameter tunnel passing
under the Thames. Considering that the Thames Tunnel project of
Sir Marc Brunel and Isambard Kingdom Brunel -- now now part of
the Underground's East London Line -- had faced massive technical
and financial difficulties before its long-delayed completion only
about 20 years previously, this was no mean undertaking.</p>
<p>The Waterloo &amp; Whitehall was halted by the financial crisis of 1866;
and it was never revived. The tunnel had been started from the
Great Scotland Yard end, and had just reached the river; work on
the underwater section was beginning. There were other proposals
for passenger-carrying pneumatic lines, but none saw construction
in that form. (At least one, under the Mersey at Liverpool, England,
was eventually opened as an ordinary railway.)</p>
<p>The next type of underground line to open in London was the Tower
Subway, which also passed under the Thames. It was a short route,
just under the river, worked by a small cable car. It opened in
1870 and was short-lived. (The tunnel served as a footway for a
while after that, then was taken over for pipes. The Thames Tunnel,
conversely, had been used first as a footway, then converted to
railway use.)</p>
<p>After this time, electric railways began to become practical.
The next underground line to open was the City &amp; South London,
now part of the Underground's Northern Line. Its first section
(from Stockwell to a now disused terminus at King William Street,
replaced by the present Bank station) opened in 1890. It used
the new deep-level tube tunnels, with more limited ventilation
than on the Metropolitan Railway, so steam was out of the question
in any case. The original plan was for cable haulage, but instead
the new electric locomotives were tried and the line has always
been operated electrically. The line was first built with 10'2"
diameter tunnels, forcing use of rather small cars. (The cars
also had only tiny windows, on the grounds that there was nothing
to see -- so they got the nickname of "padded cells".)</p>
<p>All of the later lines in London, opened from 1900 onwards, were
built on the same general pattern as the C&amp;SL, with deep-level
tubes and electric traction -- first by locomotives and then by
multiple-unit trains. The other tube lines vary from 11'6" to
12-foot diameter tunnels, and the C&amp;SL was enlarged in the 1920's
to match. This is still rather small compared to most other
subways in the world, and is the reason for the distinctive
shape of the tube trains.</p>
<p>With the success of the electric lines, the Metropolitan and
District faced the loss of traffic, and they too were converted
to elecricity -- at least for the underground sections in central
London in 1905. The first line of the present New York subway
system opened in 1904 and this, too, has always used electricity.
(This was the original Interborough Rapid Transit route, from City
Hall station along the present Lexington Avenue, 42nd Street shuttle,
and 7th Avenue lines to, um, somewhere around 120th Street). Beach's
tunnel had been almost forgotten when the crews constructing the
new subway broke into it in 1912.</p>
<p>Meanwhile, the humble original concept of the pneumatic dispatch tube
continued to develop. The first of them, 1.5 inches in diameter,
had been built in 1853 by J. Latimer Clark; it connected the
Electrical and [sic] International Telegraph Company's office in
Telegraph Street, London, with their branch 675 feet away at the
Stock Exchange.</p>
<p>The key invention was J. W. Willmott's double sluice valve of 1870,
which allowed rapid dispatching of successive capsules. It was also
possible, as had been done on the pneumatic railways, to use both
positive pressure (on the order of 1 atmosphere) and vacuum, to
drive the capsules both ways from a single pumping station. The
tubes became quite common; many miles were built in various European
and North American cities. By 1886 London had over 34 miles of them
for the Post Office's telegraph service alone. In the Paris system
a person could pay a fee for a message to be sent specifically by
the tube.</p>
<p>They were also used within large buildings, and some survive in
use to this day.</p>
<p>Finally, in 1990, the Brazilian company Sur Coester stunned the
world by opening at a fair in Djakarta, Indonesia, a demonstration
line of their Aeromovel system. This is nothing more nor less
than an elevated atmospheric railway. The structure is concrete,
with steel rails and a rectangular concrete air pipe larger than
those on the 19th century lines. The longitudinal valve is made
of heavy cloth-reinforced rubber. Computerized remote control
is used.</p>
<p>Oh yes.</p>
<p>Pneumatic dispatch tubes were depicted in the 1985 movie "Brazil";
Beach's tunnel was depicted, in rather distorted form, in the 1989
movie "Ghostbusters II"; the modern form of the New York subway
has been depicted in many movies, notably the 1974 one "The Taking
of Pelham One Two Three"; but I don't believe the atmospheric or
pneumatic systems have ever been depicted at work in any movie.
Clearly this needs to be rectified! :-)</p>
<p>References.</p>
<p>Almost all the information in this posting about the pneumatic
and atmospheric systems comes from one book... "Atmospheric
Railways: A Victorian Venture in Silent Speed" by Charles Hadfield,
1967, reprinted 1985 by Alan Sutton Publishing, Gloucester; ISBN
0-86299-204-4.</p>
<p>For other topics, I principally consulted "The Pictorial
Encyclopedia of Railways", 1976 edition, by (C.) Hamilton Ellis,
Hamlyn Publishing; ISBN 0-600-37585-4; some details came from other
books or my memory.</p>
<p>The information about the Djakarta line comes from two postings in
rec.railroad, one last November by Andrew Waugh quoting the November 24
issue of "New Scientist" magazine, and the recent one by Russell Day
citing "Towards 2000".</p>
<p>--
Mark Brader"Great things are not done by those
SoftQuad Inc., Toronto who sit down and count the cost
utzoo!sq!msb, msb@sq.com of every thought and act." -- Daniel Gooch</p>
<p>This article is in the public domain.
</p></xml>

664
regexConsp/alt3.xml Normal file
View File

@ -0,0 +1,664 @@
<xml><p> -Here's the lowdown on "ALTERNATIVE 3" from a TV-movie compendium.
"ALTERNATIVE 3" (GB 1977; 52m, colour)
Amusing spoof do commentary about the disappearance of various high-IQ
citizens, allegedly to form nucleus of a standby civilization on Mars against
the coming End of the World. Sly parodies of fashionable breathless TV
journalism sweetened the joke, ex- newscaster Tim Brinton held it all
together with po-faced gravity and needless to say some supernature fanatics
refuse to this day to accept that it was anything but gospel truth, although
it was orignally scheduled for April 1st (1977). Written by David Ambrose;
directed by Chris Miles; for Anglia. Apparently the TV-movie was spawned by a
book (or assuming the date is accurate, vice versa) of the same name. Written
by Leslie Watkins, it was published by Sphere Books Ltd. in 1978.</p>
<p>======================================================================</p>
<p>ALTERNATIVE 003
by
Leslie Watkins</p>
<p>with
David Ambrose &amp; Christopher Miles</p>
<p>Section 1</p>
<p>NO NEWSPAPER has yet secured the truth behind the operation known
as ALTERNATIVE 3. Investigations by journalists have been blocked by
governments on both sides of the Iron Curtain. American and Russia are
ruthlessly obsessed with guarding their shared secret and this obsession, as
we can now prove, has made them partners in murder.</p>
<p>However, despite this intensive security, fragments of information have
been made public. Often they are released inadvertently by experts who do
not appreciate their sinister significance and these fragments, in isolation,
mean little. But when jigsawed together they form a definite pattern, a
pattern which appears to emphasize the enormity of this conspiracy of
silence.</p>
<p>On May 3, 1977, the Daily Mirror published this story:</p>
<p>President Jimmy Carter has joined the ranks of UFO spotters. He sent
in two written reports stating he had seen a flying saucer when he was the
Governor of Georgia.</p>
<p>The President has shrugged off the incident since then, perhaps fearing
that electors might be wary of a flying saucer freak.</p>
<p>But he was reported as saying after the "sighting"; "I don't laugh at
people any more when they say they've seen UFOs because I've seen one
myself."</p>
<p>Carter described his UFO like this: "Luminous, not solid, at first bluish,
then reddish. It seemed to move towards us from a distance, stopped, then
moved partially away."</p>
<p>Carter filed two reports on the sighting in 1973, one to the
International UFO Bureau and the other to the National Investigations
Committee on Aerial Phenomena.</p>
<p>Heydon Hewes, who directs the International UFO Bureau from his
home in Oklahoma City, is making speeches praising the President's
"open-mindedness."</p>
<p>But during his presidential campaign last year Carter was cautious. He
admitted he had seen a light in the sky but declined to call it a UFO.</p>
<p>He joked: "I think it was a light beckoning me to run in the California
primary election."</p>
<p>Why this change in Carter's attitude? Because, by then, he had been
briefed on Alternative 3?</p>
<p>A 1966 Gallup Poll showed that five million Americans including several
highly experienced airline pilots claimed to have seen Flying Saucers.
Fighter pilot Thomas Mantell has already died while chasing one over
Kentucky his F.51 aircraft having disintegrated in the violent wash of his
quarry's engines.</p>
<p>The U.S. Air Force, reluctantly bowing to mounting pressure, asked Dr.
Edward Uhler Condon, a professor of astrophysics, to head an investigation
team at Colorado University.</p>
<p>Condon's budget was $500,000. Shortly before his report appeared in
1968, this story appeared in the London Evening Standard:</p>
<p>The Condon study is making headlines, but for all the wrong reasons. It
is losing some of its outstanding members, under circumstances which are
mysterious to say the least. Sinister rumors are circulating. At least four key
people have vanished from the Condon team without offering a satisfactory
reason for their departure.</p>
<p>The complete story behind the strange events in Colorado is hard to
decipher. But a clue, at last may be found in the recent statements of Dr.
James McDonald, the senior physicist at the Institute of Atmospheric
Physics at the University of Arizona and widely respected in his field. In a
wary, but ominous, telephone conversation this week, Dr. McDonald told me
that he is "most distressed." Condon's 1,485-page report denied the
existence of Flying Saucers and a panel of the American National Academy of
Sciences endorsed the conclusion that "further extensive study probably
cannot be justified."</p>
<p>But, curiously, Condon's joint principal investigator, Dr. David Saunders,
had not contributed a word to that report. And on January 11, 1969, the
Daily Telegraph quoted Dr. Saunders as saying of the report:</p>
<p>"It is inconceivable that it can be anything but a cold stew. No matter
how long it is, what it includes, how it is said, or what it recommends, it will
lack the essential element of credibility."</p>
<p>Already there were wide-spread suspicions that the Condon
investigation had been part of an official coverup, that the government knew
the truth but was determined to keep it from the public. We now know that
those suspicions were accurate. And that the secrecy was all because of
Alternative 3.</p>
<p>Only a few months after Dr. Saunders made his "cold stew" statement a
journalist with the Columbus (Ohio) Dispatch embarrassed the National
Aeronautics and Space Agency by photographing a strange craft looking
exactly like a Flying Saucer at the White Sands missile range in New Mexico.</p>
<p>At first no one at NASA would talk about this mysterious circular craft,
15 feet in diameter, which had been left in the "missile graveyard" a section
of the range where most experimental vehicles were eventually dumped.</p>
<p>But the Martin Marietta company of Denver, where it was built,
acknowledged designing several models, some with ten and twelve engines.
And a NASA official, faced with this information, said, "Actually the engineers
used to call it 'The Flying Saucer."</p>
<p>That confirmed a statement made by Dr. Garry Henderson, a leading
space research scientist: "All our astronauts have seen these objects but have
been ordered not to discuss their findings with anyone."</p>
<p>Otto Binder was a member of the NASA space team. He has stated that
NASA "killed" significant segments of conversation between Mission Control
and Apollo 11, the spacecraft which took Buzz Aldrin and Neil Armstrong to
the Moon and that those segments were deleted from the official record:</p>
<p>"Certain sources with their own VHF receiving facilities that by passed
NASA broadcast outlets claim there was a portion of Earth-Moon dialogue
that was quickly cut off by the NASA monitoring staff."</p>
<p>Binder added:</p>
<p>"It was presumably when the two moon walkers, Aldrin and Armstrong,
were making the round some distance from the LEM that Armstrong
clutched Aldrin's arm excitedly and exclaimed 'What was it? What the hell
was it? That's all I want to know.' "</p>
<p>Then, according to Binder, there was this exchange:</p>
<p>MISSION CONTROL: What's there? malfunction(garble).Mission
Control calling Apollo 11.</p>
<p>APOLLO 11: These babies were huge, sir. enormous, Oh, God you
wouldn't believe it!
I'm telling you there are other space-craft out there
lined up on the far side of the crater edge.
They're on the Moon watching us.</p>
<p>NASA, understandably, has never confirmed Binder's story but Buzz
Aldrin was soon complaining bitterly about the Agency having used him as a
"traveling salesman."</p>
<p>And two years after his Moon mission, following reported bouts of heavy
drinking, he was admitted to hospital with "emotional depression."</p>
<p>"Traveling salesman", that's an odd choice of words, isn't it? What, in
Aldrin's view, were the NASA authorities trying to sell? And to whom?
Could it be that they were using him, and others like him, to sell their
official version of the truth to ordinary people right across the world?</p>
<p>Was Aldrin's Moon walk one of those great spectaculars, presented with
maximum publicity, to justify the billions being poured into space research?</p>
<p>Was it part of the American-Russian cover for Alternative 3?</p>
<p>All men who have travelled to the Moon have given indications of
knowing about Alternative 3 and of the reasons which precipitated it.</p>
<p>In May, 1972, James Irwin, officially the sixth man to walk on the
Moon, resigned to become a Baptist missionary. And he said then, "The
flight made me a deeper religious person and more keenly aware of the
fragile nature of our planet."</p>
<p>Edgar Mitchell, who landed on the Moon with the Apollo 14 mission in
February, 1971, also resigned in May, 1972 to devote himself to
parapsychology. Later, at the headquarters of his Institute for noetic
Sciences near San Francisco, he described looking at this world from the
Moon: "I went into a very deep pathos, a kind of anguish. That incredibly
beautiful planet that was Earth, a place no bigger than my thumb was my
home.. a blue and white jewel against a velvet black sky...was being killed
off."</p>
<p>And on March 23, 1974, he was quoted in the Daily Express as saying
that society had only three ways in which to go and that the third was "the
most viable but most difficult alternative."</p>
<p>Another of the Apollo Moon walkers, Bob Grodin, was equally specific
when interviewed by a Sceptre Television reporter on June 20, 1977;</p>
<p>"You think they need all that crap down in Florida just to put two guys
up there on a bicycle? The hell they do! You know why they need us?
So they've got a P.R. story for all that hardware they've been firing into
space.
We're nothing, man! Nothing!"</p>
<p>On July 11, 1977, the Los Angeles Times came near to the heart of
the matter, nearer than any other newspaper, when it published a
remarkable interview with Dr. Gerard O'Neill.</p>
<p>Dr. O'Neill is a Princeton professor who served, during a 1976
sabbatical, as Professor of Aerospace at the Massachusetts Institute of
Technology and who gets nearly $500,000 each year in research grants from
NASA. Here is a section from that article:</p>
<p>The United Nations, he says, has conservatively estimated that the
world's population, now more than 4 billion people, will grow to about 6.5
billion by the year 2000. Today, he adds, about 30% of the world's
population is in developed nations. But, because most of the projected
population growth will occur in underdeveloped countries, that will drop to
22% by the end of the century. The world of 2000 will be poorer and
hungrier than the world today, he says.</p>
<p>Dr. O'Neill also explained the problems caused by the earth's 4,000 mile
atmospheric layer, but presumably because the article was comparatively
short one, he was not quoted on the additional threat posed by the notorious
"greenhouse" syndrome.</p>
<p>His solution? He called it Island 3. And he added: "There's no debate
about the technology involved in doing it. That's been confirmed by NASA's
top people."</p>
<p>But Dr. O'Neill, a family man with three children who like to fly
sailplanes in his spare time, did not realize that he was slightly off target.
He was right, of course, about the technology.</p>
<p>But he knew nothing of the political ramifications and he would have
been astounded to learn that NASA was feeding his research to the Russians.</p>
<p>Even eminent political specialists, as respected in their sphere as Dr.
O'Neill is in his own, have been puzzled by an undercurrent they have
detected in East-West relationships.</p>
<p>Professor G. Gordon Broadbent, director of the independently financed
Institute of Political Studies in London and author of a major study of
U.S.-Soviet diplomacy since the 1950s, emphasized that fact on June 20,
1977, when he was interviewed on Sceptre Television:</p>
<p>"On the broader issue of Soviet-U.S. relations, I must admit there is an
element of mystery which troubles many people in my field."</p>
<p>He added: "What we're suggesting is that, at the very highest levels of
East-West diplomacy, there has been operating a factor of which we know
nothing. Now it could just be and I stress the word 'could' that this
unknown factor is some kind of massive but covert operation in space. But
as for the reasons behind it we are not in the business of speculation."</p>
<p>Washington's acute discomfort over O'Neill's revelations through the Los
Angeles Times can be assessed by the urgency with which a "suppression"
Bill was rushed to the Statute Book.</p>
<p>On July 27, 1977, only sixteen days after publication of the O'Neill
interview columnist Jeremy Campbell reported in the London Evening
Standard that the Bill would become law that September. He wrote:</p>
<p>It prohibits the publishing of an official report without permission,
arguing that this obstructs the Government's control of its own information.
That was precisely the charge brought against Daniel Ellsberg for giving the
Pentagon papers to the New York Times.</p>
<p>Most ominous of all, the Bill would make it a crime for any present or
former civil servant to tell the Press of Government wrong doing or pass on
any news based on information "submitted to the Government in private."</p>
<p>Campbell pointed out that this final clause "has given serious pain to
guardians of American Press freedom because it creates a brand new crime."
Particularly as there was provision in the Bill for offending journalists to be
sent to prison for up to six years.</p>
<p>We subsequently discovered that a man called Harman Leonard Harman
read that item in the newspaper and that later, in a certain television
executives' dining room, he expressed regret that a similar Law had not been
passed years earlier by the British government.</p>
<p>He was eating treacle tart with custard at the time and he reflected
wistfully that he could then have insisted on such a Law being obeyed. That,
when it came to Alternative 3, would have saved him from a great deal of
trouble.</p>
<p>He had chosen treacle tart, not because he particularly liked it, but
because it was 2p(ence) cheaper than the chocolate sponge. That was
typical of Harman.</p>
<p>He was one of the people, as you may have learned already through the
Press, who tried to interfere with the publication of this book. We will later
be presenting some of the letters received by us from him and his lawyers
together with the replies from our legal advisers.</p>
<p>We decided to print these letters in order to give you a thorough insight
into our investigation for it is important to stress that we, like Professor
Broadbent, are not in the "business of speculation." We are interested only in
the facts.</p>
<p>And it is intriguing to note the pattern of facts relating to astronauts
who have been on Moon missions and who have therefore been exposed to
some of the surprises presented by Alternative 3.</p>
<p>A number, undermined by the strain of being party to such a
horrendous secret, suffered nervous or mental collapses. A high percentage
sought sanctuary in excessive drinking or in extramarital affairs which
destroyed what had been secure and successful marriages.</p>
<p>Yet these were men originally picked from many thousands precisely
because of their stability. Their training and experience, intelligence and
physical fitness all these, of course, were prime considerations in their
selection. But the supremely important quality was their balanced
temperament.</p>
<p>It would need something stupendous, something almost unimaginable
to most people, to flip such men into dramatic personality changes. That
something, we have now established, was Alternative 3 and, perhaps more
particularly, the night marish obscenities involved in the development and
perfection of Alternative 3.</p>
<p>We are not suggesting that the President of the United States has had
personal knowledge of the terror and clinical cruelties which have been an
integral part of the Operation, for that would make him directly responsible
for murders and barbarous mutilations.</p>
<p>We are convinced, in fact, that this is not the case. The President and
the Russian leader, together with their immediate subordinates, have been
concerned only with broad sweep of policy.</p>
<p>They have acted in unison to ensure what they consider to be the best
possible future for mankind. And the day to day details have been delegated
to high level professionals.</p>
<p>These professionals, we have now established, have been classifying
people selected for the Alternative 3 operation into two categories: those
who are picked as individuals and those who merely form part of a "batch
consignment."</p>
<p>There have been several "batch consignments" and it is the treatment
meted out to most of these men and women which provides the greatest
cause for outrage.</p>
<p>No matter how desperate the circumstances may be$and we reluctantly
recognize that they are extremely desperate$no humane society could
tolerate what has been done to the innocent and the gullible.</p>
<p>That view, fortunately, was taken by one man who was recruited into
the Alternative 3 team three years ago. He was, at first, highly enthusiastic
and completely dedicated to the Operation. However, he became revolted by
some of the atrocities involved. He did not consider that, even in the
prevailing circumstances, they could be justified.</p>
<p>Three days after the transmission of that sensational television
documentary, his conscience finally goaded him into action. He knew the
appalling risk he was taking, for he was aware of what had happened to
others who had betrayed the secrets of Alternative 3, but he made telephone
contact with television reporter Colin Benson and offered to provide Benson
with evidence of the most astounding nature.</p>
<p>He was calling, he said, from abroad but he was prepared to travel to
London. They met two days later. And he then explained to Benson that
copies of most orders and memoranda, together with transcripts prepared
from tapes of Policy Committee meetings, were filed in triplicate in
Washington, Moscow and Geneva where Alternative 3 had its operational
headquarters.</p>
<p>The system had been instituted to ensure there was no
misunderstanding between the principal partners. He occasionally had
access to some of that material although it was often weeks or even months
old before he saw it and he was willing to supply what he could to Benson.
He wanted no money. He merely wanted to alert the public, to help stop the
mass atrocities.</p>
<p>Benson's immediate reaction, after he had assessed the value of this
offer, was that Sceptre should mount a follow up programme, one which
would expose the horrors of Alternative 3 in far greater depth.</p>
<p>He argued bitterly with his superiors at Sceptre but they were adamant.
The company was already in serious trouble with the government and there
was some doubt about whether its licence would be renewed. They refused
to consider the possibility of doing another programme. They had officially
disclaimed the Alternative 3 documentary as a hoax and that was where the
matter had to rest.</p>
<p>Anyway, they pointed out, this character who'd come forward was
probably a nut$ If you saw the documentary, you will probably realize that
Benson is a stubborn man. His friends say he is pig obstinate. They also say
he is a first class investigative journalist.</p>
<p>He was angry about this attempt to suppress the truth and that is why
he agreed to co-operate in the preparation of this book. That co-operation
has been invaluable.</p>
<p>Through Benson we met the telephone caller who we now refer to as
Trojan. And that meeting resulted in our acquiring documents, which we
will be presenting, including transcripts of tapes made at the most secret
rendezvous in the world, thirty five fathoms beneath the ice cap of the
Arctic.</p>
<p>For obvious reasons, we cannot reveal the identity of Trojan. Nor can
we give any hint about his function or status in the Operation.</p>
<p>We are completely satisfied, however, that his credentials are authentic
and that, in breaking his oath of silence, he is prompted by the most
honourable of motives.</p>
<p>He stands in relation to the Alternative 3 conspiracy in much the same
position as the anonymous informant "Deep Throat" occupied in the
Watergate affair. Most of the "batch consignments" have been taken from the
area known as the Bermuda Triangle but numerous other locations have also
been used.</p>
<p>On October 6, 1975, the Daily Telegraph gave prominence to this
story: </p>
<p>The disappearance in bizarre circumstances in the past two weeks of
20 people from small coastal communities in Oregon was being intensively
investigated at the weekend amid reports of an imaginative fraud scheme
involving a "flying saucer" and hints of mass murder.</p>
<p>Sheriff's officers at Newport, Oregon, said that the 20 individuals had
vanished without trace after being told to give away all their possessions,
including their children, so that they could be transported in a flying saucer
"by UFO to a better life."</p>
<p>"Deputies under Mr. Ron Sutton, chief criminal investigator in
surrounding Lincoln County, have traced the story back to a meeting on
September 14 in a resort hotel, the Bayshore Inn at Waldport, Oregon$
Local police have received conflicting reports as to what occurred (at the
meeting).</p>
<p>But while it is clear that the speaker did not pretend to be from outer
space, he told the audience how their souls could be "saved through a UFO.</p>
<p>"The hall had been reserved for a fee of $50 by a man and a woman who
gave false names. Mr. Sutton said witnesses had described them as "fortyish,
well groomed, straight types."</p>
<p>The Telegraph said that "selected people would be prepared at a special
camp in Colorado for life on another planet" and quoted Investigator Sutton
as adding:</p>
<p>"They were told they would have to give away everything, even their
children. I'm checking a report of one family who supposedly gave away
150-acre farm and three children."</p>
<p>"We don't know if it's fraud or whether these people might be killed.
There are all sorts of rumours, including some about human sacrifice and
that this is sponsored by the (Charles) Manson family."</p>
<p>"Most of the missing 20 were described as being "hippie types"
although there were some older people among them."</p>
<p>People of this calibre, we have now discovered, have been what is
known as "scientifically adjusted" to fit them for a new role as a slave
species.</p>
<p>There have been equally strange reports of animals, particularly farm
animals, disappearing in large numbers. And occasionally it appears that
aspects of the Alternative 3 operation have been bungled, that attempts to
lift "batch consignments" of humans or of animals have failed.</p>
<p>On July 15, 1977, the Daily Mail under a "Flying Saucer" headline
carried this story:</p>
<p>Men in face masks, using metal detectors and a geiger counter,
yesterday scoured a remote Dartmoor valley in a bid to solve a macabre
mystery. Their search centred on marshy grassland where 15 wild ponies
were found dead, their bodies mangled and torn.</p>
<p>All appeared to have died at about the same time, and many of the bones
have been inexplicably shattered. To add to the riddle, their bodies
decomposed to virtual skeletons within only 48 hours.</p>
<p>Animal experts confess they are baffled by the deaths at Cherry Brook
Valley near Postbridge.</p>
<p>Yesterday's search was carried out by members of the Devon
Unidentified Flying Objects centre at Torquay who are trying to prove a link
with outer space.</p>
<p>They believe that flying saucers may have flown low over the area and
created a vortex which hurled the ponies to their death. Mr. John Wyse,
head of the four-man team, said:</p>
<p>"If a spacecraft has been in the vicinity, there may still be detectable
evidence. We wanted to see if there was any sign that the ponies had been
shot but we have found nothing. This incident bears an uncanny
resemblance to similar events reported in America."</p>
<p>The Mail report concluded with a statement from an official
representing The Dartmoor Livestock Protection Society and the Animal
Defence Society:</p>
<p>"Whatever happened was violent. We are keeping an open mind. I am
fascinated by the UFO theory. There is no reason to reject that possibility
since there is no other rational explanation."</p>
<p>These, then, were typical of the threads, which inspired the original
television investigation. It needed one person, however, to show how they
could be embroidered into a clear picture.</p>
<p>Without the specialist guidance of that person the Sceptre television
documentary could never have been produced, and Trojan would never have
contacted Colin Benson.</p>
<p>And it would have been years, possibly seven years or even longer,
before ordinary people started to suspect the devastating truth about this
planet on which we live. That person, of course, is the old man$</p>
<p> </p>
<p>Section 2</p>
<p>THEY Realize now that they should have killed the old man.</p>
<p>That would have been the logical course to protect the secrecy of
Alternative 3. It is curious, really, that they did not agree to his death on
that Thursday in February for, as we have stated, they do use murder.</p>
<p>Of course, it is not called murder, not when it is done jointly by the
governments of America and Russia. It is an Act of Expediency.</p>
<p>Many Acts of Expediency are believed to have been ordered by the
sixteen men, official representatives of the pentagon and the Kremlin, who
comprise the Policy Committee.</p>
<p>Grotesque and apparently inexplicable slayings in various parts of the
world in Germany and Japan, Britain and Australia are alleged to have been
sanctioned by them.</p>
<p>We have not been able to substantiate these suspicions and allegations
so we merely record that an unknown number of people, including
distinguished radio astronomer Sir William Ballantine, have been executed
because of this astonishing agreement between the super-powers.</p>
<p>Prominent politicians, including two in Britain, were among those who
tried to prevent the publication of this book. They insisted that it is not
necessary for you, and others like you, to be told the unpalatable facts.</p>
<p>They argue that the events of the future are now inevitable, that there is
nothing to be gained by prematurely unleashing fear.</p>
<p>We concede that they are sincere in their views but we maintain that
you ought to know. You have a right to know.</p>
<p>Attemps were also made to neuter the television programme which first
focused public attention on Alternative 3. Those attemps were partially
successful. And, of course, after the programme was transmitted, when
there was that spontaneous explosion of anxiety, Septre Television was
forced to issue a formal denial.</p>
<p>It had all been a hoax. That's what they were told to say. That's what
they did say.</p>
<p>Most people were then only too glad to be reassured. They wanted to
be convinced that the programme had been devised as a joke, that it was
merely an elaborate piece of escapist entertainment. It was more
comfortable that way.</p>
<p>In fact, the television researchers did uncover far more disturbing
material than they were allowed to transmit. The censored information is
now in our possession. And, as we have indicated, there was a great deal
that Benson and the rest of the television team did not discover, not until
after their programme had been screened. </p>
<p>------------------------------------------------------------------------ </p>
<p>Copies of Alternative 3 are rare. There is a source in ENGLAND which
we do not currently know, however, you may purchase an imported copy for
about $11.00 from Metaphysical Book Store, 9511 E. Colfax, Aurora, CO
80010 (303) 341-7562. Please mention that you got the address from VANGARD
SCIENCES or the KeelyNet Bulletin Board System. Thanks.</p>
<p>Placed in the public domain from the</p>
<p>VANGARD SCIENCES archives on October 28 1989.
Our mailing address is PO BOX 1031, Mesquite, TX 75150.
Voice phone (Jerry 214-324-8741...Ron 214-484-3189
KeelyNet (214) 324-3501</p>
<p>======================================================================</p>
<p>The Truth about Alternative 3
from its author, Leslie Watkins</p>
<p>(This article is taken from the $Windwords$ newsletter)
address not available</p>
<p>In our June issue, we told you about the controversial book Alternative
3, by British author Leslie Watkins. In out attempt to find out if the
shocking theories in the book were true, we called Avon Books, the
American publisher; they said the book was out of print in the states. We
called Penguin Books in London and found that it was listed on their
NON-FICTION list. A senior editor there told us that it was officially
classified as FICTION BASED ON FACT. The author's agent told us it was
most definitely fiction. We wrote to the author himself to try to get the
real story, and here is the letter he sent us.</p>
<p>Dear Ms. Dittrich:</p>
<p>Thank you for your letter, which reached me today. Naturally, I am
delighted by your interest in Alternative 3 and by the fact that you plan to
sell it in the Windwords bookstore. I will certainly cooperate in any way I
can.</p>
<p>The correct description of Alternative 3 was given to you by the
representative from Penguin Books. The book is based on fact, but uses that
fact as a launchpad for a HIGH DIVE INTO FICTION. In answer to your
specific questions:</p>
<p>1) There is no astronaut named Grodin.
2) There is no Sceptre Television and the reported Benson is also
fictional.
3) There is no Dr. Gerstein.
4) Yes, a "documentary" was televised in June 1977 on Anglia
Television, which went out to the entire national network in Britain.
It was called Alternative 3 and was written by David Ambrose and
produced by Christopher Miles (whose names were on the book for
contractual reasons). This original TV version, which I EXPANDED
IMMENSELY for the book, was ACTUALLY A HOAX which had been
scheduled for transmission on April Fools' Day. Because of certain
problems in finding the right network slot, the transmission was
delayed.</p>
<p>The TV program did cause a tremendous uproar because viewers
refused to believe it was fiction. I initially took the view that the
basic premise was so way-out, particularly the way I aimed to
present it in the book, that no one would regard it as non-fiction.
Immediately after publication, I realized I was totally wrong. In fact,
the amazing mountains of letters from virtually all parts of the world
including vast numbers from highly intelligent people in positions of
responsibility-convinced me that I had ACCIDENTALLY trespassed
into a range of top-secret truths. </p>
<p>Documentary evidence provided by many of these
correspondents decided me to write a serious and COMPLETELY
NON-FICTION sequel. Unfortunately, a chest containing the bulk of
the letters was among the items which were mysteriously LOST IN
TRANSIT some four years when I moved from London, England, to
Sydney, Australia, before I moved on to settle in New Zealand. For
some time after Alternative 3 was originally published, I have
reason to suppose that my home telephone was being tapped and my
contacts who were experienced in such matters were convinced
that certain intelligence agencies considered that I probably knew
too much.</p>
<p>So, summing up, the book is FICTION BASED ON FACT. But I now feel
that I inadvertently got VERY CLOSE TO A SECRET TRUTH. I hope this is of
some help to you and I look forward to hearing from you again.</p>
<p>With best wishes,
Leslie Watkins</p>
<p>Unfortunately, Alternative 3 is no longer available. We (Windwords)
bought all the remaining copies from the British publisher and those quickly
sold out. If the book is reprinted, you can be sure we'll let you know and
we'll carry it in the Windwords bookstore.</p>
<p></p></xml>

360
regexConsp/anti-jew.xml Normal file
View File

@ -0,0 +1,360 @@
<xml><p>
Anti-American Jewish League
---------------------------</p>
<p>From: San Francisco Chronicle, Wed. Dec. 12, 1990 (Briefing Section)
----</p>
<p>The British Zionists were led by Chaim Weizmann, a brilliant chemist who
contributed to the war effort by discovering a new process for manufacturing
acetone, a substance vital for TNT that was until then only produced in
Germany. Weizmann saw a historic opening for Zionism and began to lobby
influential British politicians.</p>
<p>Early in their talks with British politicians, it became clear to them that
only a British Palestine would be a reliable buffer for the Suez Canal.
Weizmann therefore assured Britain that in exchange for its support,
Zionists would work for the establishment of a British protectorate there.
This suited Britain better than the agreement it had already made with
France for an international administration for Palestine.</p>
<p>So on November 2, 1917, Foreign Secretary Arthur Balfour made his famous
and deeply ambiguous declaration that Britain would "view with favor the
establishment in Palestine of a national home for the Jewish people..."
How did the pledge to the Zionists square with what had already been
promised to the Arabs in return for their support in the war against the
Turks? The Arabs realized that they had been outmaneuvered.</p>
<p>Note - As you can see, the main reason our troops are in the Persian Gulf
is because of the Zionist hunger for a national home in Palestine.
Palestine was an independent land before 1917. But after the
totally unfair Balfour Declaration, written by British Zionists,
Zionists (Jews) were given permission by Great Britain to take
over Palestine and keep lands which do not belong to them. And
the US has not done anything about it. Why? Because of the
better known media, which are all Zionists. (ie. Ted Koppell,
Larry King, etc etc etc) Many large corporations are also run
by Jews, including many of the large corporations which make
stuff for our military. </p>
<p>Note - The American Anti-Jewish League in no way supports the naked
aggression committed by Saddam Hussein against Kuwait. He
must leave Kuwait, even though Kuwait, contrary to popular
opinion, once WAS a PROVINCE of Iraq. There is no doubt about
this: just go to your public library and get a good book on
Iraq, Kuwait, or British Foreign Policy in the Middle East.
Once again, it was the British (and French) who set up the
current boundaries which exist today. However, what Saddam
has done must be overruled, exactly as what the Jews have
done to Palestine must be stopped. Do you know how much of
our TAXES go to Israel every year? Do you know how much
trouble we've gone through to protect Israel? Do you know
that there are more Jews in the USA than in any other country
in the world? Do you know most Jews (especially the conser-
vative and highly orthodox ones) are strong anti-Americans?
Why then, are we supporting them? Because many of our
highest government positions are run by Jews. They are
practically running the US. And what about the British?
It is not Japan that owns more of the US than other countries.
It is Great Britain. They own more US land, corporations,
stocks, interests, etc. in the US than the Japanese and 5
other countries put together. If you don't believe any of
this, just print it out, and go to your local public library
or ask an unbiased History professor. This is all true.
Please spread the word around, and upload this and other
files to as many BBS's as you can. We must begin to stop
this low-profile takeover of our country, or else it will
be too late to control it. Thank you for your time.</p>
<p> American Anti-Jewish League
---------------------------</p>
<p>Have you ever wondered why so many people hate or dislike Jews? From their
very first existence, they have been hated by people around them and people
who knew them. Why? All through these ages, anti-semitism is still strong.
Why? It is true that some of this hatred is not founded for truly, such as
in the case of the Germans. Hitler was looking for a people to accuse of
Germany's downfall, so he picked the Jews. Although this is not the main
reason for Germany's weakness at that time, there is still something to it.
Jews were contributing, but very minutely, and in low-profile, to Germany's
problems. Anyway, back to the main point. Now it is the Arabs who are after
the Jews, even though if you go back to Germany today, the majority of
Germans (although they will not admit it right away) are still anti-semitic.
Wouldn't you still be? Just look at ALL these movies made and shown on
TV and at cinemas in which the world is pitted against the Germans, and
the Germans always lose. These movies are still shown every day on TV and
cable. Just turn on TBS, TNT, etc. Anyway, now it is the Arabs. And
now we have and soon will have more movies which bring down the Arabs.
(ie. the new Sally Field movie, which is grossly exaggerated) Don't
forget who runs most of the TV networks and movie studios. So why do
so many people hate Jews (also known as Zionists, semitic people (not very
correctly though), Israelites, Israelis) The answer to this question
is very simple. Jews believe that they are God's chosen people (they
honestly believe this, even though they will not admit it anymore di-
rectly) and that because they are so, then they are superior to all
other people. All others must work for Jews, because no one else is
as gifted as they are. It is true that most Jews have above-average
intelligence, and that they are very handy and dexterous, and work hard
(but only for themselves) We are not denying this. What we detest is
their attitude that they are superior to us, and therefore we must
be their slaves. And they can do almost anything they want, because
they are the "chosen" ones. Because of this belief of theirs, Jews
along with their other attributes have been slowly and quietly taking
over the most important world systems. They cheat a lot; this is one
of their most distinguished characteristics. What we mean by cheat
is not just cheating, but taking advantage of the right opportunities
to gain their objectives. They are extremely well-known for their
"money habits". They take advantage of less qualified peoples, using
them knowingly. They help mostly only themselves, and have very close
ties with each other. (they even have their owns BBs's, just look in-
side Computer Currents) Because of this connections, they can get
things done easily. If a Jew needs job, no problem. There are other
Jews in all the top job areas, who will right away hire him/her first
over others. They have extremely high-level propaganda machinery;
many TV and radio commentators are Jews, many reporters, book writers,
and magazines are Jewish. AND very importantly, the many publications
companies are run by Jews. If you have any doubts, just do some
research. It might take you a while, but you will find out that, yes,
it is true. And these people are ALL over the world: Israel, USA,
England, Canada, spread over in S. American, all over Europe, USSR,
etc etc. They are practically in the highest-level positions all over
the world. And they use their clear advantage to continually gain
more and more power. The Middle East is the last bastion of true
anti-Zionism. God only knows what would happen if they were to take
over the Middle East and its oil too. They already have the biggest
banks, corporations, communications systems, etc in the world. All
they need now is oil. And all throughout the ages, they have been
doing the same thing, and when successful, suppressing all opposing
views. Now they have finally succeeded in turning the whole world
against Iraq, the 2nd biggest anti-Zionist country in the world. This
of course, has been done in an indirect manner, and has taken them a
lot of time. But it has worked. Once Saddam is ousted, thanks to
our soldiers and money, they will then begin to slowly get control of
the region. There is still Iran, Syria, and other countries, but they
can be taken care of too. It will not be easy for them, because the
Arabs are tremendous anti-semites, and they are willing to do anything
to stop the Jews. But, with the US, Britain, and other countries
helping them, the Jewish will have all the support they need to accom-
plish their goals. And all because these countries are practically
run by Jews. So please, become more informed on this subject. Read
more books, newspapers, etc. about these people, making DEAD sure
that they are not written by Jewish authors, or published by Jewish
publication companies, or third-party Jewish-influenced writers.
We must stop these people from controlling the world. We don't want
to kill them or hurt them, we want to let them know that they are
not superior to us, they are not God's chosen people, and that they
cannot do whatever they want. Please, help us out. Spread these
files around, call your senators and representatives, read more
about this stuff, etc. JEWS MUST BE STOPPED... NOW!</p>
<p> American Anti-Jewish League
--------------------------- </p>
<p>How would you like it if another peoples, with greater military capability
and more money came to the United States and started to control it. If
they began to put strict restrictions on everything you did, and started
to take away your rights. If they set curfews, so that you couldn't
come outside at times, and refused to let you go wherever you wanted.
If they refused to allow you to celebrate certain holidays. If they put
down all opposition brutally, killing anyone who disobeyed their rules.
And to top if off, they were supported by the biggest military in the
world. You could do nothing about it. Nothing. All tries have been
put down by force. Anything you have done has ended in your people
being killed or injured. How would you feel? Be honest now. Well,
this is exactly what is happening in Palestine now. It's even worse
than this. There is no way to describe it. The only way to do so is
to sit down for a few minutes and imagine people coming into your
town and suddenly taking control of it. You have to do everything
they tell you to. If you go out and protest, they will injure you. If
you get violent, they will kill you, saying that you have been wanted
for other offenses as well, and that you had done such and such.
And there is absolutely nothing that you can do. Many people outside
are talking about this, but no one is really doing anything about it.
It feels terrible, doesn't it? You are beginning to get really angry
now, that no one is listening to your cries. You try more violent
methods - nothing. So you decide the only way to make it known to
others is to use terrorist methods. You hijack a plane. Now the
whole world is against you. More Jewish propaganda. You are called
a barbarian, uncivilized. Just throw a nuke on you, many say. So
what do you do? This is exactly what is happening to the Palestinian
people. Please, do something about it. Or at least, next time you
hear Jews, Jewish propaganda, or some other Jewish views, question
them, embarass them. Don't believe everything they say. Become
more informed. STOP THEM BEFORE IT'S TOO LATE!</p>
<p> American Anti-Jewish League
---------------------------</p>
<p> Disclaimer - Any use of this info for illegal purposes is forbidden
and against the law. All of the info in this file is
only for your personal knowledge. If you use any of
this info in the process, the consequences are yours
and yours alone.</p>
<p> </p>
<p> Useful Addresses and Phone Numbers
----------------------------------</p>
<p>1. Consulate General of Israel
220 Bush
San Francisco, CA.</p>
<p> (415) 398-8885</p>
<p> Open M-F 10am to 1pm</p>
<p>2. Adath Israel
Rabbi Jacob Traub
1851 Noriega</p>
<p> (415) 564-5665</p>
<p>3. Ahavat Shalom
150 Eureka</p>
<p> (415) 621-1020</p>
<p>4. Congregation Anshey Sfard
1500 Clement
(415) 752-4979</p>
<p>5. Congregation Beth Israel-Judea
Rabbi Herbert Morris
625 Brotherhood Way</p>
<p> (415) 586-8833</p>
<p>6. Congregation Beth Sholom
Rabbi Alexander Graubart
14th Ave &amp; Clement</p>
<p> (415) 221-8736</p>
<p>7. Congregation B'Nai B'Rit Ha Mashiach
(415) 992-2079</p>
<p>8. Congregation B'Nai Emunah (Conservative Jews - Give 'em HELL!)
Rabbi Theodore R. Alexander
3595 Taraval</p>
<p> (415) 664-7373</p>
<p>9. Congregation B'Nai Israel (also conservative)
Rabbi Malcolm Cohen
1575 Annie</p>
<p> (415) 756-5430</p>
<p>10. Congregation Chevra Thilim
751 25th Ave
(415) 386-9570 </p>
<p>11. Congregation Emanu-El
199 Arguello Bl.
(415) 751-2535</p>
<p>12. Congregation Keneseth Israel
1255 Post Suite 427
(415) 771-3420</p>
<p>13. Congregation Magain David Sephardim
351 4th Ave
(415) 752-9095</p>
<p>14. Congregation Ner Tamid
1250 Quintara</p>
<p> (415) 661-3383</p>
<p>15. Congregation Sherith Israel
2266 California</p>
<p> (415) 346-1720</p>
<p>16. Hillel Foundation
33 Banbury Dr.</p>
<p> (415) 333-4922</p>
<p>17. Jewish Educational Center of SF
538 29th Ave</p>
<p> (415) 221-7045</p>
<p>18. United Synagogue of America
425 Divisadero
(415) 864-1051</p>
<p>Note - Some 42% of the problems of the US are a direct result of Jews. This
is not some hypothetical figure, it is thouroughly researched fact.
One of the main reasons our troops are in the gulf is Israel. Why?
They run practically all the biggest TV networks, newspapers, radio
stations, higher posts, etc. in the USA. </p>
<p> American Anti-Jewish League
---------------------------</p>
<p> UPDATE</p>
<p>So, now that Saddam Hussein has fired Scud missiles into Israel, and the
Jews have shown restraint, they immediately expect something from us. Today
they asked for 13 billion more dollars (billion, not million). In addition
to this, they have asked for another $10 billion from other countries.
Why the hell do we have to send our tax dollars to them? Why? They have
everything they already need. They have a huge air force, many nuclear
weapons, an army, navy, and money. Why should we send them anything? If
we are going to send money to someone, there are many other needier nations
on this planet who have none of the above. Instead, we send this money to
a country which from its very beginning has caused trouble. Possibly, no
other country has ever caused so many problems for humankind in history.
These Jewish pigs are now taking advantage of the circumstances to get many
of their ideas across, and thanks to Saddam, they are being very success-
ful. All the TV networks (most of which are run by Jews (many of the news
directors are Jewish, plus anchormen as well, such as Ted Coppel, Larry
King, etc etc)) are interviewing Jewish state figures, and asking them
favorable questions. CNN itself constantly interviews many Jewish heads
of state. But very few Arab leaders/figures are interviews, and if done
so, not very rational figures are chosen so that people get the wrong
impression. (ie. those two Jordanian engineers on Nightline who do not
reflect the majority opinion of Arabs) All the Jewish pigs interviewed
have been saying: "Now the world knows what we have had to put up with
all these years", when in fact, it is exactly the opposite! It is what
the Arab people have had to put up with, especially the Palestinians,
who unfortunately supported Saddam's aggression. This is truly sad,
because it has given the Palestinians a very bad image, especially in
the USA. Many of you are probably saying, "Oh, those poor Israelis,
look what they have to put up with. If San Francisco was bombed, I
would do the same too." And this is somewhat true; Saddam is a brutal
dictator, and the only thing he has done is help the Zionist pigs.
So here we go again; we've given them Patriot missile systems (each
Patriot missile costs $1 million - this is your TAX money!) Now we're
about to give those pigs, who don't really need this money, another
$13 billion. Of course the Arab countries will see us with an evil
eye. Not only have we ignored them, but now we are putting the icing
on the Jewish cake. This is enfuriating them. The Jews are (they say
this, and it is true, but they also take advantage of inferior peoples.
Just trace Jewish history) smart people, they are literate, have schools,
money, etc. Why can't they just get their own money? They practically
run a third of our country. Now, for restraining against immediate
attack (they will attack later though), they ask us for $13 billion.
This is an outrage! An absolute outrage! Our economy is going down,
we are cutting from health care, and from education, there are many
programs here that need money, and what do we do? We give those Jewish
pigs, who need the money less than we do, millions of dollars every
year. So that they can in return take advantage of our resources.
I plead with you that you do something about this. We have to stop
this. Many of the people who run the USA our Jews. Get them out
of their posts. Please, we must do something about this NOW, before
it's too late to even start something. Write letters. Ask people.
Inform yourselves. Read books (that are not biased - many of the
biggest publications companies are run by Jews) Spread this file
around as many bulletin boards as possible. Thank you for your
time.
</p></xml>

769
regexConsp/aosc_fbi.xml Normal file
View File

@ -0,0 +1,769 @@
<xml><p>FROM THE ALL OHIO SCANNER CLUB:</p>
<p>SYSTEM PROFILE - The FEDERAL BUREAU OF INVESTIGATION</p>
<p>History</p>
<p>The FBI traces its roots back to the year 1908 when then U.S. Attorney General
Charles Bonaparte directed that Department of Justice investigations be handled
by a small group of special investigators. The group was formed as the Bureau
of Investigation and, in 1935, the present day name was designated by Congress.</p>
<p>Duties</p>
<p>The primary functions of the FBI and its agents are the investigations of
violations of certain Federal statutes and the collection of evidence in cases
in which the United States is or may be an interested party. The FBI performs
other duties specifically imposed by law or Presidential directive and conducts
a number of service activities for other law enforcement agencies. The FBI can
investigate a matter only when it has authority to do so under a law passed by
Congress or on instructions of the President or the Attorney General.</p>
<p>The FBI is not a Federal police force, it is a fact-finding organization
investigating violations of Federal laws and its authority is strictly limited
to matters within its jurisdiction. FBI agents may make arrests without a
warrant for any Federal offense committed in their presence, or when they have
reasonable grounds to believe that the person to be arrested has committed or
is attempting to commit a felony violation of United States laws. Agents may
also make arrests by warrant.</p>
<p>Agents do not make arrests for "investigation" or "on suspicion". Before
arrests are made, if at all possible, the facts of each case are presented tom
the U.S. Attorney who decides whether or not a Federal violation has occurred
and, if so, the U.S. Attorney may authorize agents to file a complaint which
serves as the basis of the arrest warrant.</p>
<p>The FBI has no authority to investigate local crimes which are not within its
jurisdiction. The FBI will, however, render all possible assistance to the
local police through the FBI Laboratory and Identification Division. The FBI
LID maintains fingerprint files on approximately 70 million (yes, million)
people. The FBI also maintains the National Crime Information Center (NCIC)
which keeps records of missing persons, serialized stolen property, wanted
persons for whom an arrest warrant is outstanding, and criminal histories on
individuals arrested and fingerprinted for serious or significant offenses.</p>
<p>The NCIC is a computerized information system established by the FBI as a
service to all criminal justice agencies- local, state and Federal. The
information can be instantly retrieved over a vast communications network
through the use of telecommunications equipment in criminal justice centers in
various locations in the United States, Canada and Puerto Rico. Many times when
monitoring the local or county police/sheriff departments a reference to a NCIC
check is heard.</p>
<p>The FBI is involved in criminal investigations and foreign counterintelligence
efforts. Most notably criminal investigations are those of bank robberies and
kidnapping cases. The FBI can also investigate criminal activity associated
with interstate transportation of stolen property, and the FBI can investigate
graft and corruption cases of local government under certain circumstances.
Department of Justice offices mat be found on some military installations as
the FBI has jurisdiction when a crime involves Government property, or funds,
or when only civilians are involved.</p>
<p>The FBI's responsibility with respect to foreign counterintelligence, within
the United States, is to detect, lawfully counteract, and/or prevent espionage
and other clandestine intelligence activities, sabotage, international
terrorist activities, or assassinations conducted for or on behalf of foreign
powers, organizations, or persons. The FBI also investigates murders,
kidnappings, and assaults against foreign diplomatic officials while in the
United States, as well as damage to property of foreign governments in the
United States.</p>
<p>Organization</p>
<p>The FBI is an agency within the U.S. Department of Justice, which is lead by
the U.S. Attorney General. The head of the FBI is the Director who is appointed
by the President with the advice and consent of the Senate. Assistant directors
are the next level of command within the FBI. The FBI has ten assistant
directors who are accountable to the Director for all matters within their
sphere of operations.</p>
<p>The FBI has 59 field offices located in major cities throughout the United
States and in San Juan, Puerto Rico. Each, with the exception of the New York
Office which is headed by an Assistant Director, is under the direct
supervision of a Special Agent In Charge (SAIC). The SAIC is supervised and
receives directions from the FBI headquarters in Washington, D.C.</p>
<p>Each FBI Field Office has Resident Agencies which are local offices in some of
the larger cities within the field offices jurisdiction. Refer to the FBI field
office map for the sectioning of the field offices across the United States.
The following list of the field offices and associated data was generated by
data contributed from several readers who wish to remain anonymous and from
this editor.</p>
<p>Location F.O. Telephone No. Call Letters RA's</p>
<p>Albany, NY 12201 1 518 465 7551 KEC 250 - 262 8</p>
<p>Albuquerque, NM 87102 2 505 247 1555 6</p>
<p>Alexandria, VA 3 KFQ 240 - 244 3</p>
<p>Anchorage, AK 99513 4 907 276 4441 2</p>
<p>Atlanta, GA 30303 5 404 521 3900 KIE 300 - 311 8</p>
<p>Baltimore, MD 21207 6 301 265 8080 KGB 747 - 756 9</p>
<p>Birmingham, AL 35203 7 205 252 7705 5</p>
<p>Boston, MA 02203 8 617 742 5533 KCB 800 - 814 12</p>
<p>Buffalo, NY 14202 9 716 856 7800 KEX 590 - 595 3</p>
<p>Butte, MT 59702 10 406 782 2304 13</p>
<p>Charlotte, NC 28217 11 704 529 1030 KEV 220 - 228 8</p>
<p>Chicago, IL 60604 12 312 431 1333 KSC 210 - 217 4</p>
<p>Cincinnati, OH 45202 13 513 421 4310 KQC 390 - 399 8</p>
<p>Cleveland, OH 44199 14 216 522 1400 KEX 740 - 750 9</p>
<p>Columbia, SC 29201 15 803 254 3011 KEX 820 - 830 8</p>
<p>Dallas, TX 75202 16 214 720 2200 8</p>
<p>Denver, CO 80202 17 303 629 7171 7</p>
<p>Detroit, MI 48226 18 313 965 2323 KEX 760 - 772 12</p>
<p>El Paso, TX 79901 19 915 533 7451 1</p>
<p>Honolulu, HI 96850 20 808 521 1411 0</p>
<p>Houston, TX 77008 21 713 868 2266 3</p>
<p>Indianapolis, IN 46204 22 317 639 3301 KEX 780 - 790 9</p>
<p>Jackson, MS 39269 23 601 948 5000 9</p>
<p>Jacksonville, FL 32211 24 904 721 1211 7</p>
<p>Kansas City, MO 64106 25 816 221 6100 KEX 570 - 582 9</p>
<p>Knoxville, TN 37902 26 615 544 0751 KEV 240 - 246 6</p>
<p>Las Vegas, NV 89104 27 702 385 1281 2</p>
<p>Little Rock, AR 72211 28 501 221 9100 KFQ 200 - 208 7</p>
<p>Los Angeles, CA 90024 29 213 477 6565 KMC 250 - 275 25</p>
<p>Louisville, KY 40202 30 502 583 3941 KIA 320 - 332 12</p>
<p>Memphis, TN 38103 31 901 525 7373 6</p>
<p>Miami, FL 33169 32 305 944 9101 KEV 300 - 305 4</p>
<p>Milwaukee, WI 53202 33 414 276 4684 KSC 220 - 228 6</p>
<p>Minneapolis, MN 55401 34 612 339 7861 14</p>
<p>Mobile, AL 36602 35 205 438 3674 5</p>
<p>Newark, NJ 07102 36 201 622 5613 KEX 620 - 628 6</p>
<p>New Haven, CT 06510 37 203 777 6311 KEX 600 - 606 4</p>
<p>New Orleans, LA 70113 38 504 522 4671 6</p>
<p>New York, NY 10278 39 212 553 2700 KEC 270 - 283 ?</p>
<p>Norfolk, VA 23510 40 804 623 3111 KEX 340 - 341 1</p>
<p>Oklahoma City, OK 73118 41 405 842 7471 11</p>
<p>Omaha, NE 68102 42 402 348 1210 9</p>
<p>Philadelphia, PA 19106 43 215 629 0800 KEX 640 - 651 7</p>
<p>Phoenix, AZ 85012 44 602 279 5511 6</p>
<p>Pittsburgh, PA 15222 45 412 471 2000 KEX 660 - 679 12</p>
<p>Portland, OR 97201 46 503 224 4181 KEX 720 - 728 6</p>
<p>Richmond, VA 23220 47 804 644 2631 KEX 360 - 369 6</p>
<p>Sacramento, CA 95825 48 916 481 9110 KFP 900 - 910 6</p>
<p>St Louis, MO 63103 49 314 241 5357 5</p>
<p>Salt Lake City, UT 84138 50 801 355 7521 3</p>
<p>San Antonio, TX 78205 51 512 225 6741 KEX 840 - 847 5</p>
<p>San Diego, CA 92188 52 619 231 1122 KEX 680 - ? 4?</p>
<p>San Francisco, CA 94102 53 415 553 7400 KFP 970 - 990 19</p>
<p>San Juan, PR 00918 54 809 754 6000 0</p>
<p>Savannah, GA 31405 55 912 354 9911 KEV 380 - 389 4</p>
<p>Seattle, WA 98174 56 206 622 0460 KOD 220 - 232 9</p>
<p>Springfield, IL 62704 57 217 522 9675 KEX 800 - 812 10</p>
<p>Tampa, FL 33602 58 813 228 7661 KEV 320 - 327 5</p>
<p>Washington, D.C. 20535 59 202 324 3000 KGB 770 0</p>
<p>The list of Field Offices and RA's is not 100% accurate, updates please. The
number of RA's may differ from the call letter assignment block for a given
F.O. because many RA's were closed and consolidated during the Carter and early
Regan administrations. The call letters were assigned prior to their
administrations.</p>
<p>The F.O. call letters will be the first is an assigned block for a given F.O.
Example Cincinnati F.O. call is KQC 390 (or simply 390 as often will be heard)
or Cleveland F.O. call is KEX 740 (740).</p>
<p>The following is a list of Resident Agencies for the primary coverage states of
the AOSC. The list is as of 1 October 1987. I will send a copy of the FBI Field
Office and Resident Agency map for a SASE to those who desire a copy. A list of
RA's may be obtained from the map for your local area. The map will be a copy
of a copy, however it will be fairly legible. Note the two Ohio Field Office
lists are presented later in this column with the detailed Ohio data.</p>
<p>Chicago "CG" Field Office - RA's</p>
<p> Lisle (Chicago West)
Mount Prospect (Chicago North)
Oakland Park (Chicago South)
Rockford</p>
<p>Frequency Plan:</p>
<p> A-1 167.3375 B-1 167.600
A-2 167.4875 B-2 167.675
A-3 167.425 B-3 167.7375
A-4 167.5625 B-4 167.5625
A-5 163.9875/167.3375 B-5 162.8625/167.600
A-6 Unconfirmed B-6 Unconfirmed
A-7 163.8625/167.5375 B-7 163.8625/167.5375
A-8 163.8375/167.2875 B-8 163.8375/167.2875</p>
<p>Chicago F.O. utilizes 8 banks, A through H. Channel banks C through H are not
confirmed to exact frequencies and usage. There are one way links in the upper
162, lower 164 and upper 165 MHz ranges. The one way links are often a control
station to a repeater site utilizing a directional antenna. The one way links
may also be a point-to-point relay of communications from an outer fringe RA to
the F.O.</p>
<p>Chicago appears to configured similarly as several other F.O.'s in that up to
five other VHF frequencies can be active with 163.9875 simultaneously with the
same radio traffic. Chicago F.O. also still uses some remote VHF receive/UHF
re-transmit link sites, but most are believed to be converted to microwave
links.</p>
<p>Also 167.7625 which Randy Strayer and this editor received via skip between KSC
210 and KSC 216. Channel identified as Bravo 1.</p>
<p>Detroit "DE" Field Office - RA's</p>
<p> Ann Arbor
Benton Harbor
Flint KEX 762
Grand Rapids
Jackson
Kalamazoo
Lansing
Marquette KEX 767
Mount Clemens
Oakland County
Saginaw
Traverse City KEX 772</p>
<p>Frequencies per MFFD (1986) and others: 163.925/267.2625 R.A. repeater;
163.8875/167.750 F.O. repeater; 163.8625/167.5375R; 167.3125; 167.3625;
167.400; 167.450; 167.500; 167.650; 414.500 is a state-wide UHF link to Detroit
F.O. and 419.250 is believed to a FBI UHF link, continuous tone.</p>
<p>Indianapolis "IP" Field Office - RA's</p>
<p> Bloomington
Evansville
Fort Wayne
Gary
Lafayette
Muncie
New Albany KEX 786
South Bend
Terre Haute</p>
<p>Frequencies from the MFFD: 163.9625/167.2125 R.A. repeater and 167.600.</p>
<p>Louisville "LS" Field Office - RA's</p>
<p> Ashland
Bowling Green
Covington
Elizabethtown
Frankfort
Hopkinsville
Lexington KIA 321
London
Paducah
Pikeville</p>
<p>Frequencies from the MFFD: 163.9375/167.675 R.A. repeater and 167.600.</p>
<p>Philadelphia Field Office - RA's</p>
<p> Allentown KEX 645
Harrisburg KEX 641
Landsdale KEX 648
Newtown Square KEX 650
Scranton KEX 643
State College KEX 652
Williamsport KEX 651</p>
<p>Frequencies: 163.9875/167.325R CH 1; 167.7125 CH 2; 167.500 CH 3; 167.5625 CH
4; 167.525 CH 5; 163.9625 ECC-1; 163.8375/167.3875R; 163.9375R; 167.2625;
167.300; 167.325; 167.3375; and 419.325 data/tone.</p>
<p>Pittsburgh "PG" Field Office - RA's</p>
<p> Beckley (WV)
Charleston (WV)
Clarksburg (WV)
Erie
Greensburg
Huntington (WV)
Johnstown
Martinsburg (WV)
New Castle
Parkersburg (WV)
Washington
Wheeling (WV)</p>
<p>Frequencies per MFFD (1986, no updates since then): 163.925/167.475R R.A.
repeater; 163.950/167.2125 F.O. repeater; 167.6375 and UHF links on 414.025,
414.125, 414.425 and 419.425.</p>
<p>Springfield (IL) Field Office - RA's</p>
<p> Alton
Belleville
Bloomington
Carbondale
Champaign
Danville
Decatur
Effingham
Peoria
Rock Island</p>
<p>Frequencies per the MFFD: 163.9125/167.725 R.A. repeater; 167.3625 and 167.625.</p>
<p>Now some miscellaneous data from the files on frequencies and call letters. The
following list of call signs are for NY and NJ state and are from a list dated
in 1981, so be fore told.</p>
<p>Albany F.O.: KEC 250; KEC 254 Watertown; KEC 256 Syracuse; KEC 257 Utica; KEC
258 Burlington (VT); KEC 259 Plattsburgh; and KEC 261 Glens Falls.</p>
<p>Buffalo F.O.: KEX 590; KEX 591 Rochester; KEX 592 Geneva; KEX 593 Jamestown;
and KEX 595 Niagara Falls.</p>
<p>Newark F.O.: KEX 620; Camden KEX 624</p>
<p>NYC F.O.: KEC 270/271; KEC 272 Suffolk; KEC 273 Garden City (NJ); KEC 277 JFK
Airport; KEC 278 Poughkeepsie, NY; KEC 280 Staten Island; KEC 281 Richmond
Hills; and KEC 283 New Rochelle. From a 1988 list I have a KEC 900 for NYC as
well as KEC 270.</p>
<p>Now some frequencies from the input basket contributed by AOSC or NESN (North
East Scanner News - more data at the end of this column) members during 1989 or
1990.</p>
<p>Boston F.O.: Romeo Units (R.A.'s) - 162.7625, 162.7875, 167.2625, 167.3625,
167.5625, 167.600, 167.6625 and 167.7625. Delta Units - 167.2625, 167.3625,
167.4625, 167.600, 167.6625 and 167.7625. Rhode Island - 167.2375, 167.2625,
167.4625, 167.7125 and 167.7625. New Hampshire - 163.9875/167.3625R, also
167.2375 and 167.6125.</p>
<p>Still with Boston from NESN: 163.8375, 163.8875, 163.900 and 163.925/164.125,
163.975/167.275 repeaters. Also 164.150, 167.250, 167.325, 167.425, 167.450,
167.500, 167.6375, and 167.750.</p>
<p>CT/NY FBI - 163.750 NY; 163.8625 CH 6 CT; 163.8875 CT; 164.125 Long Island;
164.150 NY; 167.2375 CT; 167.2625 NY; 167.2875 NY?; 167.3375 Long Island;
167.3875 NY; 167.425 CT primary; 167.4375 CT; 167.4625 NY; 167.5375 CT (note
input to 163.8625 CH 6); 167.5625; 167.600 NY; 167.6875 NY; 167.775 Long
Island; 167.7875 CT; 413.625 NY; 414.075 CT; 414.350 NY "Bronco Base" and
419.350 CT tone. Also note from the previous American Scannergram
169.975/168.850 as a new NYC repeater.</p>
<p>Also several with "?" as follows: 165.925 NY; 167.175 NY; 169.575 NY, possible
FBI/DEA; and 419.250 NY. One other interesting frequency - 170.825 as a U.S.
Marshal/INS/FBI NY "tie-in" frequency.</p>
<p>Charlotte F.O.: 163.9125/? A-1 Greensboro (R.A. repeater)
163.9625/?R, 167.750 and 167.7125.</p>
<p>Knoxville F.O.: A-1 163.9875R Knoxville F.O., also A-5 (probably different
input frequency and/or tone).
A-4 163.8375/167.2375 Chattanooga R.A.
B-5 163.8375/167.400 R.A. repeater, also C-1
C-5 163.8375R R.A. repeater
Johnson City base call is KEV-243
Knoxville Unit Numbers: 99 - Aircraft; mobile units 1 - 69.</p>
<p>Los Angeles F.O.: An excellent complete and detailed listing is available from
Mobile Radio Resources (2661 Carol Drive, San Jose, CA 95125). The FBI in LA
utilizes repeater channels in the 162, 163, 164, and 165 MHZ frequency range.
Inputs can be found in the 167 MHz frequencies. The 165 repeater frequencies
are 167.5875 and 165.7125.</p>
<p>Memphis F.O.: R.A. repeater - 163.9375; F.O. repeater 163.8625</p>
<p>Norfolk F.O.: 163.8375/167.600 F1; 167.2375 F2; 167.4875 F3; and 167.5625 F4.</p>
<p>Richmond F.O.: 163.8875/167.625 Operations Repeater; 167.5625 (note -
nationwide FBI simplex common); 163.8625/167.5375 (note - this is the only
repeater frequency pair that is common nationwide, usually used for SWAT or
special operations - ed.); 414.250 and 419.525 as UHF links.</p>
<p>San Diego F.O. sampling via Mobile Radio Resources Government Radio Systems
directory: Repeaters in the 162, 163, 164 and 165 MHz ranges with the input in
the 167 MHz range. The 165 repeater is on 167.5625 MHz.</p>
<p>San Francisco F.O. sampling via MRS GRS directory: Repeaters in the 163 and 167
MHz frequency ranges with inputs in the 167 and 162 MHz ranges respectively.</p>
<p>Tampa-St. Petersburg from Blaine Brooks: A-2: 167.725; A-3 167.325; A-5
167.3875; A-6 167.275; repeater on 163.9875 and 419.250 UHF satellite receiver
link.</p>
<p>CINCINNATI FIELD OFFICE OPERATIONS</p>
<p>The Cincinnati Field Office originally had nine Resident Agencies which were
located in Athens, Chillicothe, Columbus, Dayton, Hamilton, Portsmouth,
Springfield, Steubenville and Zanesville. The Springfield office is closed and
I am not sure about the Zanesville R.A.</p>
<p>The CI F.O. and R.A.'s radio communication systems are DES (Digital Encryption
Standard) capable and are utilized on a regular basis. CI appears to have a 32
channel DES system in place as testing was monitored during 1988 and 1989. Most
of their frequencies remained the same from the previous DES days. Note that
the CI radios are VHF/UHF mobiles. Refer to the B channel series in the
frequency list.</p>
<p>The signal numbers do not appear to be squad base (logically grouping by
general agent function such as bank robbery squad or drug enforcement, or by
R.A.'s), but rather a numeric numbering scheme starting with 1 and into the low
100's.</p>
<p>The CI F.O./R.A. operations still need some work from our southern Ohio members
as allot of holes and gaps remain. The following profile on CI was mainly made
possible by the efforts of Bill Gillie, Tony Cono, Rick Poorman, another member
who desires to named Mr. Anonymous, and this editor.</p>
<p>NOTE: ALL OHIO data is confirmed unless noted otherwise.</p>
<p>CI Call Letter Assignments</p>
<p> KQC 390 Cincinnati
KQC 391 Dayton
KQC 392 Columbus
KQC 393 Chillicothe
KQC 394 Springfield (closed)
KQC 395 Athens
KQC 396 Hamilton
KQC 397 Portsmouth
KQC 398 Stubenville
KQC 399 Zanesville</p>
<p>CI Frequency Assignments</p>
<p> 167.650 A-1 Operations simplex R.A.'s
167.2375 A-2 " " F.O.
167.4375 A-3 " " division wide
167.5625 A-4 Nationwide common simplex
163.9875/167.650 A-5 Operations Repeater R.A.'s
163.8625/167.5375 A-6 SWAT Repeater
163.8375/167.2375 A-7 Operations Repeater F.O.</p>
<p>The B channels are local option assigned meaning that each office will have a
different set of frequencies. The CI F.O. has Cincinnati PD CH 5, 460.275R,
(B-1); Hamilton County Sheriff, 460.500R, (B-2); and several DEA frequencies.</p>
<p> ??? D-6 and D-8 channel designators heard, but not confirmed.</p>
<p> 163.9875/167.650 ECC-1 (Extended Car-to-Car) repeater R.A.'s
163.8375/167.2375 ECC-2 repeater F.O.
163.8625/167.5375 ECC-3 SWAT/Special Operations nationwide repeater
164.100/? ? Repeater heard with CI units</p>
<p> 167.325, 167.600, 167.625, 167.6625, 167.6875 and 167.725: Simplex
operations.</p>
<p> 412.575 - Xenia, Greene County UHF Repeater link
419.300 - New Vienna, Highland County UHF Repeater link
419.500 - Macon, Brown County UHF Repeater link</p>
<p> 168.000 - possibly a VHF one-way link.</p>
<p>CI Signal Numbering</p>
<p> 390 Signals: 1, 2, 3, 20, 22, 24, 53, 71, 72, 77, 90, 106, 133, 141 and
148.
391 Signals: 11 (SAIC), 18, 26, 29, 33, 43, 45, 49, 51, 52, 61, 64, 72,
75, 78, 91, 112, 137, 158 and 159.
392 Signals: 5 (SAIC), 6, 23, 34, 38, 40, 41, 42, 50, 54, 56, 65, 69, 73,
75, 82, 88, 93, 98, 100, 103, 104, 105, 108, 112, 113, 114,
116, 117, 122, 125, 147, 157, 166 and 225?
393 Signals: 71
397 Signals: 27 (SAIC)
398 Signals: 95 and 96.</p>
<p> Sometimes units may only use their last two digits, such as 14 or 17
instead of 114 or 117. Unit 90 usually in a helicopter or may be a helicopter.
Unit The MFFD has units in the 200's as surveillance vans/vehicles and units
in the 400's as surveillance air vehicles. Also we have report that unit 500 is
a surveillance aircraft.</p>
<p>CLEVELAND FIELD OFFICE OPERATIONS</p>
<p>The Cleveland Field Office originally had 10 Resident Agencies located in
Akron, Canton, Elyria, Lima, Mansfield, Mentor, Painesville, Sandusky, Toledo
and Youngstown. The Mentor R.A. currently is the only R.A. out of service in
the CV division.</p>
<p>The CV F.O. And R.A.'s radio communication system is DES capable and utilized
quite often in the DES mode. The CV F.O. has been in DES since the mid-eighties
on a limited basis and a full system since early 1989. The CV system appears to
be a 64 channel system which was implemented during the latter part of 1989.</p>
<p>The CV division utilizes a squad numbering scheme for assignment of signal
numbers. There are still a few holes in the numbering, but for the most part it
is complete.</p>
<p>CV Call Letter Assignment</p>
<p> KEX 740 Cleveland
KEX 741 Akron
KEX 742 Toledo
KEX 743 Youngstown
KEX 744 Painesville
KEX 745 Elyria
KEX 746 Mentor (closed)
KEX 747 Lima
KEX 748 Mansfield
KEX 749 Canton
KEX 750 Sandusky</p>
<p>CV Frequency Assignments</p>
<p> 167.675 A-1 Operations Simplex F.O.
167.4125/167.7375 A-2 S.O.G. Repeater (Special Operations Group)
167.7875 A-3 S.O.G. Simplex; Operations Simplex
167.5625 A-4 Nationwide Common
164.100/167.2875 A-5 S.O.G. repeater
163.9125/167.675 A-6 Operations Repeater
163.8625/167.5375 A-7 (?) SWAT Repeater
154.935 A-8 Ohio LEERN</p>
<p> 167.425 B-1 R.A. Simplex
167.5625 B-4 Simplex
163.875/167.425 B-5 R.A. Operations Repeater
155.370 B-6 Ohio Intercity</p>
<p> 167.3375/162.7375 C-2 Canton Operations Repeater
167.3375/? C-3 " " "
167.3875/? C-4 Mansfield " "
167.7875/167.7375 C-7 CV Repeater</p>
<p> 167.425 D-1 R.A. Simplex
163.875/167.425 D-4 R.A. Repeater
??? D-7 Akron simplex, not confirmed</p>
<p> 167.7625 G-1 Akron Operations Simplex
167.7625/162.7625 G-2 Akron R.A. Operations Repeater
167.3625 G-3 Painesville Simplex (?)</p>
<p> The F bank is believed to be local option. No E or H bank references.</p>
<p>Confirmed frequency list:</p>
<p> 162.7375 Canton B/M input to 167.3375 repeater
162.7625 Akron " " to 167.7625 "
163.8625/167.5375 CV SWAT Repeater
163.875/167.425 R.A. Repeater
163.9125/167.675 CV F.O. Repeater
164.100/167.2875 S.O.G. Repeater
167.100 Simplex
167.2125 CV simplex
167.2375 Akron simplex
167.2625 " "
167.2875 CV simplex; input to 164.100
167.3375/162.7375 Canton R.A. Repeater
167.3375/? Lima, Sandusky, Toledo R.A. Repeater
167.3625/162.7625 Akron, Painesville R.A. Repeater
167.3625 Akron, Painesville Simplex
167.3875/? Mansfield Operations Repeater
167.4125/167.7375 CV S.O.G. Repeater
167.425 R.A. Simplex; input to 163.875
167.4625 Mansfield Simplex
167.5125 CV Simplex
167.5375 Input to 163.8625
167.5625 Common simplex
167.675 CV Simplex; input to 163.9125
167.7375 CV Simplex AND CV Repeater
167.7625/162.7625 Akron R.A. repeater
167.7875 CV Simplex and CV Repeater</p>
<p>That is 22 unique confirmed frequencies and there are probably more out there
in CV. Also try 168.000 as it may be a VHF fixed one-way link.</p>
<p>Several frequencies come active with the same traffic at times, namely
167.4125, 167.7375 and 167.7875, and at times 164.100 also!</p>
<p>CV Signal Numbering</p>
<p> 1-99 Administration
100 - 199 Exact function(s) not confirmed
200 - 299 Gambling Squad
300 - 399 Bank Robbery Squad; Kidnapping Squad; Extortion Cases
400 - 499 Drug Enforcement Squad
500 - 599 Organized Crime Task Force; S.O.G. personnel
600 - 699 Exact function(s) not confirmed
assists w/kidnapping cases, surveillances
700 - 739 Assistant U.S. Attorney's; others?
740 - 750 Base Station Calls
800 - 899 SWAT; Foreign Counterintelligence; O.C.T.F.
900 - 999 Akron, Painesville R.A.'s
Akron - 900, 901, 902, 904, 906, 921 - 929
Painesville - 903, 920, 930
1000 - 1099 Canton and Mansfield R.A.'s
Canton - 1000 to 1010; 1030 to 1040
Mansfield - 1005, 1032 and 1033
1100 - 1199 Sandusky and Toledo R.A.'s
Sandusky - 1121 - 1129
Toledo - 1100 - 1119, 1130
1200 - 1299 Youngstown R.A. - 1200 to 1209 and 1220 to 1232.
1300 - 1399 Radio Technicians and Vehicle Maintenance
Radio Techs - 1302, 1303, 1304, 1307 and 1319
Vehicle Maintenance - 1300, 1301, 1305, 1306 and 1318.</p>
<p>FBI COMMON FREQUENCY RANGES</p>
<p>I suggest searching the following frequency ranges for FBI radio activity. Note
that in many areas across the U.S. the FBI have picked up many traditional
non-FBI frequencies. Originally the Department of Justice had only 82 VHf
frequencies assigned for ALL of its members, let alone just the FBI. The FBI
originally had less than 40 of the 82 frequencies for their exclusive use.</p>
<p>During the change over to DES nationwide, the FBI has received additional
frequencies from other branches and departments who did not utilize or need
them. In the NE region the FBI received 110 VHF frequencies - almost 300%
increase in the number of frequencies available. The early days saw the FBI in
the 163 MHz range for repeaters and the 167 MHz range for simplex operations.</p>
<p>Limit your search to 500 KHz at a time, certainly no more than a 1 MHz. The
following are common ranges reported nationwide:</p>
<p> 162.6125 - 162.7875 Repeater Inputs; Outputs; 12.5KHz steps
163.825 - 163.9875 Repeater Outputs; 12.5KHz steps
164.000 - 164.500 Repeater Outputs; 25KHz steps
165.5125 - 165.900 Repeater Outputs; 12.5KHz steps
167.100 - 167.7875 Repeater Inputs; Outputs; Simplex; 12.5KHz steps
168.825 - 169.000 Repeater Inputs; 25KHz steps
169.825 - 169.975 Repeater Outputs; 25KHz steps</p>
<p>FBI COMMON TEN CODES</p>
<p> 10-0 Negative 10-29 O.L. Check
10-4 Affirmative 10-42 Residence
10-7 Out-of-Service 10-58 Mileage
10-8 In-Service 10-66 Alarm (?)
10-9 Repeat 10-76 Enroute
10-16 Message Check 10-77 Bank Alarm
10-20 Location 10-85 Meet w/agent ...
10-21 Telephone Call 10-90 Bank Robbery
10-22 Report to Office 10-91 BR In Progress
10-23 Stand-By 10-99 Assist Agent
10-26 N.C.I.C. Check
10-28 Registration check</p>
<p>FBI COMMON CODE WORDS</p>
<p>ASAIC - Assistant Special Agent In Charge
AUSA - Assistant U.S. Attorney
Big K - K-Mart
Bird Dog - Surveillance Aircraft
C.I. - Confidential Informant
Diaper Change - Changing of battery (bug or trailing transmitter)
ECC - Extended Car-to-Car
FCI - Foreign Counter Intelligence
Half Signal - An Agent's spouse
H.T. - Handi-Talkies
In-the-Pocket - Subject in surveillance net
Intel - Intelligence
KEL - Manufacturer of Surveillance equipment
Main Man - Primary subject under surveillance/investigation
Mickey D's - McDonald's
Nest - Off-site office from F.O./R.A. for S.O.G. and Undercover Agents
No Joy - Negative Communications
O, The - The Office
OCTF - Organized Crime Task Force
Other Side - DES mode
Out-of-Pocket - Subject not currently under surveillance
Outside Agency - News Media
Package - Suspect or item under surveillance
Plank - Bridge
Private - DES Mode
Private Side - DES Mode
Port - Motel
Quarter Signal - An Agent's child
RA - Resident Agency
Rabbit - Subject under surveillance
Rabbit Tracks - subject on the move
R.D.O.- Regular Day Off
Red Balled - Stopped at traffic light w/subject
Red Boarded - " " " " ; subject not stopped
Road Runner - Surveillance Aircraft
SAIC - Special Agent In Charge
Signal - A field agent
S.O.G. - Special Operations Group
S.W. - Search Warrant
SWAT - Special Weapons and Tactics
Ten Check - Message Check
Unit - A vehicle
USA - U.S. Attorney
Wagon - Surveillance Van
Wire - Body Transmitter</p>
<p>FEDERAL NEWS - FBI</p>
<p>The FCC has established a nationwide radio frequency for stolen vehicle
tracking systems operating on the frequency of 173.025. The frequency was
reported as a FBI assignment (wouldn't we like to see the exact frequency
assignment chart?) Nationwide. Perhaps this frequency was used for wireless
microphones or bugs, and if so perhaps others operate on nearby similar
frequencies. Give it a listen and let us know.</p>
<p>The FBI Academy, located 40 miles south of Washington, is the host to the most
crime ridden town in the United States - Hogan's Alley. Hogan's Alley is a
"Hollywood" town with a motel, bank, post office, drug store, laundry and even
a theater. It is used as a training ground for FBI agent trainees. Various
scenarios are enacted under the careful eyes of supervisors. The trainees
performance are evaluated with each exercise.</p>
<p>One thing about Hogan's Alley - it has a 100% success rate in solving of cases,
pretty impressive. Something that is not pretty impressive about the FBI is the
starting pay agents earn. According to a 8 January 1990 U.S. News and World
Report quirk the starting pay of a FBI agent is $26,261. Consider that an agent
does not choice his assignment location, the agent could be placed in a very
high cost of living area. Placement in certain cities such as NYC offer
slightly more pay, however it is not enough for the work that they perform for
all of us. Yet even worse is the pay for DEA agents $19,493 to $23,846.</p>
<p>The Congress is aware of these low salaries (after all they, the Congressmen
and Senators literally took care of themselves) and will hopefully rectify the
problem this year.
</p></xml>

213
regexConsp/art-04.xml Normal file
View File

@ -0,0 +1,213 @@
<xml><p>Volume : SIRS 1991 History, Article 56
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Do Assassinations Alter the Course of History?
Author : Simon Freeman and Ronald Payne
Source : European
Publication Date : May 24-26, 1991
Page Number(s) : 9
EUROPEAN
(London, England)
May 24-26, 1991, p. 9
"Reprinted courtesy of THE EUROPEAN."
DO ASSASSINATIONS ALTER THE COURSE OF HISTORY?
by Simon Freeman and Ronald Payne
India faces collapse with the violent death of Rajiv Gandhi--or
does it? Simon Freeman and Ronald Payne analyse the importance of
individuals in the march of events
They have paid their tributes, expressed their horror and
pledged, as they always do when one of their number is murdered,
that democracy will triumph in the face of terrorism. Now, in
their weekend retreats, with their foreign affairs advisers and
their top secret intelligence reports, world leaders will have to
judge the true impact on India of the assassination of Rajiv
Gandhi.
They will conclude, perhaps a little unhappily for them but
fortunately for the rest of us, that Gandhi's death is unlikely
to be more than a footnote, if a substantial one, in the history
of his country. India will not disintegrate. There will be no
civil war. The Indian military will not stage a coup. Pakistan
will not launch the oft-predicted strike which would set the
region ablaze.
Some Indians, perhaps many, may die over the next month in
the kind of primitive ethnic and religious feuding which has
always threatened to destroy the country. But, unless history is
truly mischievous, India will muddle through and get on with the
business of trying to survive.
It is rarely the personal stature of a statesman which
decides how pivotal his contribution to history will be. History
usually depends less on the drama of an assassination or the
status of the victim than on more profound political, economic or
demographic forces. In retrospect, it often appears that assassin
and victim were inexorably drawn together to become the catalyst
for inevitable change.
The most spectacular assassination in modern European
history--the shooting of Archduke Francis Ferdinand and his wife
at Sarajevo in 1914 by a Serbian student, Gavrilo Princip--was
undoubtedly the immediate cause of the First World War. But few
serious historians today subscribe to the theory that, had
Princip not pressed the trigger that late June day in the cause
of Serbian nationalism, the 19th-century order would have
survived.
Dr Christopher Andrew, of Cambridge University, believes
that the assassination merely set the timetable for war. He said:
"Even if the Archduke had not been killed then there might have
been a great war anyway." Other experts now talk not of Princip
but of an explosive cocktail of nationalism straining within
decrepit empires and of fatally dangerous alliances built by
leaders from an earlier world.
It is possible to see Sarajevo as the climax to a period in
which political murders became almost routine. The reference
books on late 19th-century Europe are peppered with the names of
hapless, long-forgotten politicians who were shot, bombed or
stabbed because, so it was thought by the many bands of
extremists, that was the only way to force change.
While there are no precise ways to assess the real
importance of an assassination, historians like Andrew reckon
that there are some general guidelines. In the stable, advanced
democracies of today the murder of a top politician is unlikely
to cause more than outrage and pain.
When the Irish Republican Army blew up the Grand Hotel in
Brighton in 1984 in an attempt to kill Prime Minister Margaret
Thatcher and most of her Cabinet, they hoped that there would be
such disgust at the murders that the British public would force
their leaders to pull out of Northern Ireland. But, even if
Thatcher had died this would not have happened. Her death would
probably have strengthened her successor's resolve not to bow to
terrorism.
The IRA should have known this from the reaction to the
killing five years earlier of Lord Louis Mountbatten,
distinguished soldier, public servant and pillar of the British
Establishment. The murder changed nothing in the province and
only demonstrated, as if it was necessary, that determined
terrorists often find ways to murder their chosen targets.
Similarly, The Red Brigade anarchists who cold-bloodedly killed
Aldo Moro, the Italian prime minister, in May, 1978, achieved
nothing except to ensure that the Italian authorities would hunt
them with even more determination. Nor did the killers of Swedish
Prime Minister Olof Palme accomplish anything. The murder--still
unsolved--drew the usual, but clearly genuine, shocked response
from world leaders. But even at the time they were hardpressed to
pretend that Palme's murder would fundamentally matter to Sweden.
The Third World, on the other hand, is more volatile.
Sometimes, as in India, countries are an uneasy blend of
feudalism and capitalism, dynastic authoritarianism and
democracy. The demise of dictators often leaves a bloody vacuum.
Yet even here, the assassination of a tyrant does not necessarily
signal major upheaval. General Zia ul-Haque, who had ruled
Pakistan since 1977, was blown up in his plane in the summer of
1988. But, though he had long seemed crucial to the continuing
stability of the country, his death seemed to be the fated climax
to the era of military rule.
The murder of Egypt's President Sadat in October 1981 seemed
then to herald some new dark age of internal repression and
aggression towards Israel. But his successor, Hosni Mubarak,
merely edged closer to the Arab world without returning to the
pre-Sadat hostility towards Israel.
The killers of kings and dictators in other Arab countries
have also discovered that they have murdered in vain. Iraq has
endured a succession of brutal military dictators who have died
as violently as they lived. The fact that Iraq has never
experienced democracy is the result of economic and historical
realities, not assassins' bullets. Saudi Arabia has also seen its
share of high level killings yet, today, the House of Saud
remains immovably in power.
But in the United States, where the idea of righteous
violence is deeply embedded in the national consciousness, the
grand assassination has been part of the political process for
more than a century. Beginning with the murder of President
Abraham Lincoln in 1865, the list of victims is a long and
distinguished one. It includes most recently, President John F.
Kennedy in 1963; his brother, Robert, heir apparent, shot in
1968; Martin Luther King, civil rights campaigner and Nobel Peace
Prize winner, gunned down the same year. Ronald Reagan could
easily have followed in 1981 when he was shot and badly wounded.
John Kennedy's death now appears important for different
reasons from those one might have expected at the time. It did
not derail any of his vaunted civil rights or welfare programmes;
rather his death guaranteed that his successor, Lyndon Johnson,
would be able to push the Kennedy blueprint for a New America
through Congress. Nor did it end the creeping US involvement in
Vietnam.
But Kennedy has been immortalised by his assassin and the
mythology of his unfulfilled promise will endure long after his
real accomplishments are forgotten.
In a curious, perverse, sense he and his fellow-martyrs
might live on as far more potent symbols of change than if they
had survived into gentle retirement with their fudges revealed
and their frailties exposed.
Why good leaders die and bad ones survive
Few names of hated tyrants appear on the roll-call of world
leaders who fall to the assassin's bomb, knife or bullet, writes
Ronald Payne. One of the curiosities of the trade in political
murder is that those the world generally recognises as bad guys
often live to a ripe old age or die quietly in their beds. Few
who mourn the passing of Rajiv Gandhi would have shed so many
tears had President Saddam Hussein been blown to pieces in Iraq.
There was a time only a few years ago when Americans and
Europeans would have celebrated the violent demise of President
Muammar Gaddafi. Both the Libyan leader and Hussein live on, as
do Idi Amin of Uganda, or Fidel Castro, whom the American Central
Intelligence Agency plotted so imaginatively and ineffectually to
remove.
When academics play the game of what might have been, the
consequences of assassinating such monstres sacres as Stalin and
Hitler arise.
When the Russian dictator died suddenly of natural causes,
the whole Soviet Union was paralysed because no leader dared
claim the right to succeed him. That in itself suggests what
might have happened had Stalin been shot unexpectedly at a more
critical moment.
The timing of a political murder is crucial. Had Adolf
Hitler been assassinated before he achieved full power or before
his invasion of the Soviet Union, the history of Germany, and
indeed of Europe, would have been very different.
Fascinating though such intellectual exercises are, it seems
that as a rule it is the decent, the innocent and the relatively
harmless who perish as assassins' victims.
The reason may not be far to seek. Tyrants watch their backs
pretty carefully. The secret police are ever active. It is easier
to kill statesmen in democracies where the rule of law prevails
and the sad truth is that leaders in those countries which
exercise authority through voting rather than shooting are more
at risk than Middle East tyrants.
A further reason for the survival of the hated monster
figure might be that Western intelligence services have been
forbidden to go in for execution. The CIA and the British secret
intelligence service are now out of the killing business. Even
the KGB's assassination specialists seem to have been stood down.
In any case the Kremlin was hardly keen on the murder of
ruling statesmen even in the bad old days. Soviet leaders
understood the realities of power well enough to know that such
acts were unlikely to further their cause.
</p></xml>

308
regexConsp/art-05.xml Normal file
View File

@ -0,0 +1,308 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Conspiracy Theories: Doubts Refuse to Die
Author : Bob Dudney
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 11
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Commemorative Section, pp. 11
Reprinted with permission from the author.
CONSPIRACY THEORIES: DOUBTS REFUSE TO DIE
by Bob Dudney
Special to the Times Herald
Editor's Note: Bob Dudney, a former reporter for the Dallas Times
Herald, has written hundreds of articles about the investigation
of President Kennedy's assassination. He has covered
congressional inquiries on the subject, has interviewed dozens of
people connected with it, and has examined thousands of
government documents.
The shots fired in Dealey Plaza on a sunny Dallas day 20
years ago still reverberate in a bizarre way: the belief that
President John F. Kennedy's assassination resulted from a
conspiracy.
There is a deep, almost theological assumption by some
Americans that the President was the victim of conspirators who
still roam at large. The conclusion is strange because there is
no solid evidence to support it--and significant reasons to
believe it is false.
There is no denying the difficulty of accepting the Warren
Commission's verdict on the events of Nov. 22, 1963--that a
down-and-out, 24-year-old ex-Marine named Lee Harvey Oswald, with
no outside assistance, murdered the most glamorous, powerful man
in the world at the time.
But no matter how strong the unwillingness to believe, the
evidence in the case demonstrates beyond a reasonable doubt that
there was no plot. Undermining the scores of conspiracy theories
that have cropped up over the years are three crucial factors:
- The scientific, eyewitness and medical data establishing
that Oswald shot Kennedy.
- The absence of uncontroverted evidence linking Oswald to
other conspirators.
- The lack of evidence to suggest that Oswald was
unwittingly manipulated by others.
So long as these elements remain unshaken, claims that a
sinister plot was afoot that November day will amount to nothing
more than speculation.
Nevertheless, theories about the active involvement of
others in the assassination thrive and multiply. Their
proponents--some skilled and some not, some sincere and some not
--have produced dozens of books, films and articles that purport
to reveal the "full" treachery of events in Dallas two decades
ago.
In fact, from the volume and variety of conspiracy theories,
one might conclude that the possibility of a conspiracy had never
been officially probed. The theories discount thousands of
documents and millions of investigative man-hours devoted to that
question by the Warren panel, the FBI and the CIA in 1963 and
1964; the Rockefeller Commission in 1975; the Senate Select
Committee on Intelligence in 1975 and the House Committee on
Assassinations in 1977-1978.
The list of "suspects" the theories implicate is extensive.
Among them: The Soviet KGB; anti-Soviet exiles; Fidel Castro;
pro-Castro Cubans in the United States; anti-Castro Cubans;
loyalists of slain South Vietnamese leader Ngo Dinh Diem; right
wing fanatics; left wing Marxists; the Mafia; rogue Texas oilmen;
labor unions; Southern white racists; the Dallas Police
Department; the CIA; the FBI; the Secret Service; the Chinese
communists; reactionary Army officers; and Jewish extremists.
But it is not enough to demonstrate that some group stood to
benefit from the murder. Theorists must establish participation
of two or more people in the murder. This they have not done.
Each theory alters the nature of Oswald's role in the death,
but the possible changes are necessarily limited. The principle
theories are:
Oswald is innocent: Adherents of this contention maintain
that law enforcement officials--cynically or through honest
error--settled on Oswald as the assassin even though there was no
reliable evidence against him. They say Oswald could have
exonerated himself at a trial had he not been killed by Dallas
nightclub owner Jack Ruby.
Challenging this theory is an abundance of evidence.
Scientific testing and physical evidence found at the scene show
that shots were fired at Kennedy's limousine from a sixth-floor
window of the Texas School Book Depository building.
Oswald worked in the building at Elm and Houston. He was
seen leaving it shortly after the shooting. Crates were found
stacked by the sixth-floor window as an apparent gun brace.
Oswald's fingerprints were on the crates. The morning of the
assassination, Oswald was seen carrying a long, paper-wrapped
object into the building. Wrapping paper found near the window
bore Oswald's fingerprints.
A rifle was found hidden between boxes in the building. A
bullet and the bullet fragments removed from Kennedy, Connally
and the limousine ballistically matched the rifle. Oswald's palm
print was found on the rifle. The rifle, purchased from a Chicago
mail order house, had been shipped to a Dallas post office box
rented by Oswald. A photograph showed Oswald holding a rifle
identical to the one found.
Proponents of this theory retort that all of the evidence
was fabricated and put credence in Oswald's post-arrest
declaration that he hadn't killed anyone.
But claims that the incriminating rifle photo was doctored--
with Oswald's head superimposed over another man's body--were
dispelled by Marina Oswald's confirmation that she took the
picture. And claims that Oswald's rifle was planted in the room
after the assassination were refuted by ballistic tests that
showed it fired the deadly shots.
Given the problems with claims of planted evidence, some
theorists have argued that there must have been a "planted
Oswald," or Oswald impersonator on the scene. This contention,
however, has been difficult to reconcile with the Oswald
fingerprints and palmprints found on the evidence.
Two years ago, conspiracy theorists, successfully pressed
for the opening of Oswald's grave to show it contained an
imposter--probably a Soviet agent. Subsequent examination,
however, determined the body was the "real" Lee Harvey Oswald.
Oswald had accomplices: Faced with the weight of evidence
indicating Oswald's guilt, quite a few conspiracy theories have
contended he was only one of those involved.
Some theories assert that a person or persons helped put
Oswald in position to shoot the President. They leave unexplained
why Oswald would need such help. As an employee of the book
depository, he had easy access to the building. After the
shooting, according to witnesses' testimony, he sought no help in
fleeing and left downtown Dallas by city bus and then a taxi.
Moreover, it would seem unlikely that accomplices could have
helped get Oswald a job that put him on the motorcycle route.
Oswald got his job at the depository on Oct. 15. White House
planning for the President's motorcade route did not begin until
Nov. 4, and the map of the route was not published until Nov. 19.
Somewhat more credible is the contention others provided
secret financing, planning, direction or encouragement for the
murder that Oswald carried out.
In this scenario, the chief suspect over the years has been
the Soviet Union. After all, Oswald defected to Russia in 1959.
He married a Russian woman, Marina Prusakova, in 1961. He was a
vociferous Marxist. Even after he returned to the United States
in June 1962, Oswald had several fleeting contacts with Soviet
diplomats.
However, no evidence of Soviet complicity has been found.
Investigators who combed Oswald's effects discovered no
unexplained funds, no code books, no messages--nothing to suggest
a Soviet hand in Oswald's actions. Also, had Oswald been
recruited as a Soviet agent, the Russians would not have been
likely to allow him to defect, as he did--thereby exposing his
relationship with them.
The other top suspect has been Cuba. Oswald admired Fidel
Castro; he was a member of the Fair Play for Cuba Committee in
the United States; he visited the Cuban embassy in Mexico City a
few weeks before the assassination, seeking a travel visa to that
country. Because the CIA was backing assassination plots against
Castro at the time, some speculate that Castro may have
retaliated through Oswald.
But, as with the theory of Soviet involvement, there is no
evidence. At one point, there did appear to be some. A young
Central American informant told U.S. authorities he saw Oswald in
the Cuban embassy, talking to two other men, one of whom was
conversing in Spanish. Later, he said, Oswald supposedly received
$6,500 to kill an important person. Under questioning, however,
the informant admitted he had never seen Oswald and had
fabricated the transaction, wishing to stir up American hatred
for Castro's Cuba. Subsequently, he retracted his retraction.
Finally, he failed a lie-detector test. Anyway, Oswald did not
speak Spanish.
Another account suggesting possible Cuban involvement was
provided by a Cuban exile who testified before the Warren
commission. She said two Hispanic men and an Anglo man they
identified as "Leon Oswald" came to her Dallas apartment 28 days
before the assassination. She said they spoke vaguely of Cuban
revolutionary plans before she turned them away. She identified
Oswald in television film as the man she had seen, but federal
investigators said they do not believe it was him. They said they
believe that at that time, Oswald was traveling from his New
Orleans home to Mexico in his quest for a Cuban entry visa.
The most publicized theories involving Oswald accomplices
are those that have featured other gunmen.
These various versions have assassins firing from other
windows in the depository building; from the Dal-Tex building;
from sewer drains, a grassy knoll near Dealey Plaza, the railroad
bridge over Elm, Main and Commerce streets and the Dallas County
Courthouse roof; and firing with silencers or automatic weapons.
The arguments surrounding these claims:
- One-man, one-bullet: The first shot that wounded Kennedy
in the neck did not also hit John Connally, as the Warren
Commission concluded. Rather they were struck by individual
bullets simultaneously, requiring that there be two shooters. A
team of experts, including a National Aeronautics and Space
Administration engineer, conducted an exhaustive study of this
question in 1978. The panel's conclusion: It is not only
possible, but almost certain that Kennedy and Connally were hit
by the same bullet.
- Filmed accomplices: Photographs of Dealey Plaza taken at
the time of the assassination show a dim form behind a wall on a
grassy knoll to the right and in front of the presidential
limousine. However, investigators found no spent cartridges,
weapons or footprints in this area. A panel of photography
experts concluded in 1978 that the images on the film were
shadows.
Films and photos also show a man in Dealey Plaza opening and
closing a black umbrella. Conspiracy theories suggest he was
signaling gunmen or that some weapon was hidden in the umbrella.
But at a hearing of the House Assassinations Committee in 1978, a
mild-mannered Dallas insurance worker identified himself as the
mysterious "umbrella man" and said he was only trying to harass
Kennedy.
- Head movement: The famous Zapruder film of the
assassination clearly shows President Kennedy's head lurching
backward when it was struck by the fatal gunshot. If the shot had
come from behind, conspiracy theorists reason, the impact would
have driven the President's head forward. Nonetheless, a panel of
medical experts concluded in 1978 that Kennedy's head wounds were
caused by a shot from the rear. Moreover, a panel of
wound-ballistics scientists concluded that the backward motion
was caused by the sudden tightening of the President's neck
muscles.
- Tape-recorded sounds: Sound transmitted through the
microphone of a motorcycle patrolman in the motorcade, and
recorded at Dallas police headquarters, shows four noise
"spikes." At the behest of the House Assassinations Committee in
1978, three acoustical experts conducted three test gunshot
firings in Dealey Plaza, compared the sounds and concluded it was
95 percent certain that four shots had been fired. The Warren
Commission had concluded that no more than three shots had been
fired from the window. The source of the previously unknown one,
the acoustical experts said, was the grassy knoll area.
The finding was the first scientific evidence supporting a
conspiracy theory and stirred an uproar. But it, too, was later
discounted. Twelve experts assembled by the National Research
Council reviewed the tapes and concluded the "spikes" were
actually recorded about a minute after the assassination.
The Assassinations Committee also grappled futily with the
prospect of a likely colleague for Oswald. "The question is with
who," said one member of the now-defunct committee. "If there's a
conspirator, then who could it have been? We asked ourselves over
and over: What associates did Oswald have, where was there
evidence of conspiracy? We found none."
Oswald was manipulated: These theories suggest that Oswald,
and perhaps other operatives, were unknowingly influenced in
their actions.
There can be only one reasonable candidate to mastermind
such a project--the KGB. It would have been the only organization
with the scientific means and the extended access to Oswald. Even
some Warren Commission lawyers and CIA members briefly toyed with
the possibility. Because Oswald spent some time in a Soviet
hospital while residing in Russia, there was the suspicion he
might have been brainwashed.
Once again, the problem is that there is no evidence to
suggest Oswald was brainwashed. Moreover, the CIA believes KGB
"mind conditioning" techniques at the time were primitive.
Surely, it is impossible to rule out the prospect of a
conspiracy in the assassination. The Warren Commission itself did
not do so. "Because of the difficulty of providing negatives to a
certainty," the panel said, proving there was no conspiracy
"cannot be established categorically." However, the panel said,
"if there is any such evidence it has been beyond the reach of
all the investigative agencies and resources of the United
States."
Twenty years later, that is still the case.
</p></xml>

426
regexConsp/art-06.xml Normal file
View File

@ -0,0 +1,426 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : The Day John Kennedy Died
Author : Bryan Woolley
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Sec. Sec. 2-3
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Special Section, pp. 2-3
Reprinted with permission from the author.
THE DAY JOHN KENNEDY DIED
Sun cleared dawn's drizzle, but gloom clouded Dallas
by Bryan Woolley
Staff Writer
The valet walked past the Secret Service guard and entered
Suite 850 of Fort Worth's Texas Hotel. He knocked on the door of
the master bedroom. It was 7:30 a.m. "Mr. President," he said,
"it's raining out."
President John F. Kennedy, coming out of sleep, replied,
"That's too bad."
While he was dressing, he heard the murmur of the crowd
outside and went to the window. Below him, 5,000 people were
standing patiently in the soft drizzle, some wearing raincoats,
some holding umbrellas, most simply ignoring the weather. They
were office and factory workers. They had begun gathering before
dawn to hear the speech the President would make in the parking
lot where they stood. Mounted police officers wearing yellow
slickers moved among them. "Gosh, look at the crowd!" the
President said to his wife. "Just look! Isn't that terrific."
In the lobby, he was joined by Vice President Lyndon
Johnson, Gov. John Connally, Sen. Ralph Yarborough, several
members of Congress and the president of the Fort Worth Chamber
of Commerce. They crossed Eighth Street and plunged into the
crowd, shaking hands, smiling. They mounted the truck that was to
serve as the speaker's platform. Kennedy grabbed the microphone
and shouted: "There are no faint hearts in Fort Worth!"
The crowd cheered. Somebody yelled, "Where's Jackie?"
Kennedy pointed toward his eighth-floor window. "Mrs.
Kennedy is organizing herself," he replied. "It takes her a
little longer, but, of course, she looks better than we do when
she does it."
Fort Worth was the third stop on the President's five-city
Texas tour. He had ridden through Houston and San Antonio like a
triumphant emperor, and Fort Worth had stayed up past midnight to
welcome the handsome 46-year-old President and his beautiful
34-year-old wife, lining their route from Carswell Air Force base
to the hotel.
After an informal speech in the parking lot, he would go to
the hotel, deliver a breakfast speech, fly from Carswell to Love
Field, ride in a motorcade through Dallas, deliver a speech at a
$100-a-plate luncheon at the Dallas Trade Mart, fly to Austin for
a banquet and a reception at the Governor's Mansion, and then go
to the LBJ ranch for a weekend of rest.
Back inside the Texas Hotel, Kennedy accepted the ceremonial
cowboy hat from his hosts, but refused to wear it for
photographers and TV cameramen. He would model it later, he said,
at the White House. His breakfast speech was the standard
fence-mending one-- about the greatness of Texas and Fort Worth
and the Democratic Party--and it drew a thunderous ovation.
The President and the first lady retired to Suite 850 to
prepare for the flight to Dallas. Kennedy placed a call to former
Vice President John Nance "Cactus Jack" Garner in Uvalde, Texas,
to wish him a happy 95th birthday, and an aide showed him a
black-bordered full-page ad with a sardonic headline in The
Dallas Morning News. "Welcome Mr. Kennedy to Dallas," it read. In
13 rhetorical questions, something called the "American
Fact-Finding Committee" accused the administration of selling out
the world to communism.
"Oh, you know, we're heading into nut country today," the
President said. Mrs. Kennedy later told author William Manchester
that he paced the floor and then stopped in front of her. "You
know, last night would have been a hell of a night to assassinate
a president," he said. "There was the rain and the night, and we
were all getting jostled. Suppose a man had a pistol in a
briefcase." He pointed a finger at the wall and pretended to fire
two shots.
Not many in the presidential party were looking forward to
Dallas. Several Texans--some from Dallas--had warned the
President not to include Dallas on his Texas tour, that an ugly
incident was likely to occur there. But Kennedy insisted that the
state's second-largest city be placed on the itinerary.
So the preparations had been made. Dallas civic leaders had
launched a public relations campaign to try to ensure a friendly
turnout for the President.
Seven hundred law officers--city police officers and
firefighters, sheriff's deputies, Texas Rangers and state highway
patrol officers--had been assembled to keep order. About the time
that John Kennedy was waking up, Dallas Police Chief Jesse Curry
had gone on TV to warn that his officers would take "immediate
action to block any improper conduct." If the police were
inadequate, he said, even citizen's arrests were authorized.
Others were preparing, too, in the early morning. Waiters
were setting the places for the Trade Mart luncheon. A warehouse
worker named Lee Harvey Oswald sneaked a rifle and a telescopic
sight into the Texas School Book Depository. Because of forecasts
showing that the rain probably would be past Dallas by the time
the presidential party arrived, a Kennedy aide told the Secret
Service not to put the bubble-top on the big blue limousine in
which the President and Mrs. Kennedy would ride.
Air Force One had barely left the runway at Carswell before
it began its descent toward Love Field. The flight took only 13
minutes. The big plane touched down at 11:38 a.m. Police armed
with rifles stood along the roof of the terminal building. A
large crowd waited beyond a chain-link fence. Many in the crowd
were jumping, screaming, waving placards: "We Love Jack," "Hooray
for JFK." Others were less friendly. They held placards, too:
"Help Kennedy Stamp Out Democracy," "In 1964 Goldwater and
Freedom," "Yankees Go Home And Take Your Equals With You." They
booed and hissed when the President and first lady emerged from
the plane, smiled, waved and descended the stairs of Air Force
One.
For the fourth time in 24 hours, Lyndon and Lady Bird
Johnson were waiting to welcome the Kennedys to a Texas city. The
presidential couple was introduced to the 12-man official
welcoming committee. Mrs. Earle Cabell, wife of the Dallas mayor,
presented Mrs. Kennedy with a bouquet of red roses. Then Kennedy
broke from the official cluster and moved along the chain-link
fence, smiling, shaking hands; letting people touch him.
At 11:55, two motorcycle police officers led the motorcade
out of Love Field and turned left on Mockingbird Lane. Police
Chief Curry drove the lead car. With him rode Dallas County
Sheriff Bill Decker and two Secret Service agents. Then came
three more motorcycles. Then the blue limousine with two Secret
Service agents in the front, John and Nellie Connally in the jump
seats and the Kennedys in the back seat. Two motorcycles flanked
the car on each side. Next was another convertible, full of
Kennedy aides and Secret Service agents, and four more agents
standing on its running boards.
Then came the vice presidential convertible, carrying two
Secret Service agents, the Johnsons and Yarborough. A Texas
highway patrol officer and four Secret Service agents rode in the
next car. A press pool car, a press bus, convertibles bearing
photographers, and cars carrying lesser dignitaries completed the
procession.
The motorcade would move through a sizable portion of
Dallas--along Mockingbird to Lemmon Avenue, right on Lemmon to
Turtle Creek Boulevard, along Turtle Creek and Cedar Springs Road
to Harwood Street, down Harwood to Main Street, where, at City
Hall, it would turn right and move westward along Main through
the downtown business district.
At the west end of downtown, it would turn right onto
Houston Street and then immediately left onto Elm Street and move
through the Triple Underpass. A few yards beyond the underpass,
it would turn right again onto Stemmons Expressway and move to
the Trade Mart at the intersection of Stemmons and Harry Hines
Boulevard. After the President's speech, it would proceed out
Harry Hines to Mockingbird, turn right, and return to Love Field.
The sidewalk crowds were sparse at first. A few people in
the factories and offices along Mockingbird came out to have a
look. The sun was bright now, and Mrs. Kennedy was regretting
that she was wearing the pink wool suit. She had expected woolen
weather. It was, after all, late November. She put on sunglasses,
but her husband told her to take them off. The people wanted to
see her, he said.
At the corner of Lemmon and Lomo Alto, a group of children
held a long banner reading, "Please Stop and Shake Our Hands."
Kennedy ordered his driver to stop. He got out and shook their
hands. Farther along, he ordered another stop and got out to
greet a group of nuns. At Lee Park on Turtle Creek, the crowd
began to thicken. And at Harwood and Live Oak, still two blocks
from the turn onto Main, the people in the motorcade heard the
downtown crowd murmuring like a distant tide.
When the caravan made the turn, it faced pandemonium. People
were standing 10 and 12 deep on the sidewalks. Red, white and
blue bunting fluttered from the buildings. People leaned out
windows, waving and screaming. There were no picket signs, no
sour faces. The feared Dallas crowd was friendly--even adoring.
The nuts had stayed home. It was 12:21 p.m.
At the Trade Mart, the luncheon guests were showing their
tickets to the door guards and filing to their seats. The huge
building was surrounded by Dallas and Texas police, standing at
parade rest, holding riot sticks, glaring at a handful of
protesters. Inside the atrium hall, parakeets flew freely from
tree to tree. A fountain splashed. An organist was practicing
"Hail to the Chief." Dozens of yellow roses adorned the head
table. The presidential seal had been mounted on the rostrum.
As the motorcade neared Houston Street, the size of the
crowd diminished, but the cheers and applause were still hearty.
Nellie Connally turned in her seat and said, "You can't say
Dallas doesn't love you, Mr. President."
Kennedy replied, "No, you can't."
Workers from the Texas School Book Depository, the Dal-Tex
Building and the Dallas County buildings lined the sidewalks at
Houston and Elm as the head of the motorcade turned toward the
Triple Underpass. Others stood on the grass of Dealey Plaza. Many
had brought their children to see the President. Several
spectators noticed a man standing very still in a sixth-floor
corner window of the depository. One man saw the rifle he was
holding and assumed he was a Secret Service agent.
As the blue limousine made the sharp left turn from Houston
onto Elm, the Hertz rental car time-and-temperature sign on the
roof of the depository red 12:30. A Secret Service man in the
motorcade radioed the Trade Mart: "Halfback to Base. Five minutes
to destination." He wrote in his shift log: "12:35 p.m. President
Kennedy arrived at Trade Mart."
Some thought the noises were firecrackers. Others thought a
motorcycle was backfiring. Some recognized them as rifle shots.
Pigeons flew from the roof of the depository. Kennedy lurched
forward and grabbed his neck.
Sen. Yarborough, in the vice president's car, cried, "My
God! They've shot the President!" Secret Service agent Rufus
Youngblood climbed from the front seat to the back, threw Johnson
to the floorboard and covered him with his own body.
In the blue limousine, Gov. Connally had been hit, too. He
pitched forward and fell toward his wife. "No, no, no, no, no!"
he screamed.
Then another shot. The President's head exploded. Blood
spattered the occupants of the blue car. The first lady, in
shock, tried to climb out over the trunk. A Secret Service agent
pushed her back. The car slowed and then lurched out of the
motorcade line and sped past the Triple Underpass, with Chief
Curry's car and the Secret Service car in pursuit.
UPI White House correspondent Merriman Smith was sitting in
the middle of the front seat of the press pool car. He grabbed
the mobile phone. He called the wire service's Dallas bureau and
dictated the first bulletin: "Three shots were fired at President
Kennedy's motorcade in downtown Dallas."
The cheers of greeting in Dealey Plaza rose to screams of
horror and fear. "They killed him! They killed him! They killed
him!" Parents grabbed children and ran. Men and women lay
prostrate on the grass and sidewalks, as if dead. The motorcade
was disintegrating, the cars veering hither and yon, trying to
get through the crowd and follow the limousine. Helmeted police
officers leaped from motorcycles, pulled guns, looked wildly
about. The Hertz clock still read 12:30.
The staff at Parkland Memorial Hospital had only five
minutes notice of the massive emergency rushing upon them, and
many thought the message was a joke. When the blue car arrived,
they weren't ready. No one was waiting at the emergency entrance.
A Secret Service agent dashed inside to order stretchers.
Connally--whose wounds were serious but not fatal--was
wheeled to Trauma Room No. 2, Kennedy to Trauma Room No. 1. Teams
of surgeons and nurses went to work. The Secret Service regrouped
around the Johnsons and hustled them to seclusion in another part
of the hospital. Reporters dashed around the halls and offices,
searching for phones. Parkland patients heard the news and rushed
to have a look.
"Gentlemen," a weeping Yarborough told reporters, "this has
been a deed of horror. Excalibur has sunk beneath the waves."
Mrs. Kennedy insisted on being in the trauma room with her
husband. A nurse protested, but she was admitted.
Outside, more of the motorcade vehicles were arriving. Their
passengers tumbled out and stared in horror at the blood-soaked
convertible.
At 1 p.m., Dr. Kemp Clark, the senior physician working on
the President, pronounced him dead. A priest administered last
rites. At 1:13, the news was carried to the vice president. At
1:26, the Secret Service, fearing the assassination was part of a
massive plot against the government, spirited the Johnsons away
to unmarked cars and sped to Love Field. They boarded Air Force
One at 1:33, while Kennedy press aide Malcolm Kilduff was
announcing the President's death to the press.
Police were still combing the Dealey Plaza area for
Kennedy's murderer. Indeed, only a minute after the fatal shot
was fired, Marrion Baker, a Dallas motorcycle officer, had
pointed his pistol at Lee Harvey Oswald. Baker had been riding by
the Texas School Book Depository when the killing occurred, and
he jumped off his motorcycle and dashed inside with Roy Truly,
the building's superintendent. They encountered Oswald in the
second-floor lunchroom. Baker drew his gun. "Do you know this
man?" he asked Truly. "Does he work here?" Truly said he did, and
Baker let him go. A minute later, Oswald walked out the front
door of the depository, where he encountered NBC reporter Robert
MacNeil, who was looking for a phone. Oswald told him he could
find one inside. Five minutes later, police sealed off the door.
At 12:44, Oswald boarded a bus at Elm and Murphy streets,
seven blocks from the depository, but got off a few minutes later
when the bus was caught in a traffic snarl. By 12:45, Dallas
police had questioned the witness who had seen the man standing
in the depository window with the rifle and had broadcast his
description from a radio car in front of the depository. Two
minutes later, Oswald caught a taxicab at the Greyhound bus
station and rode to Beckley and Neely, a corner near his Oak
Cliff rooming house. He went to his room, got a pistol and left
again.
Meanwhile, Roy Truly had drawn up a list of depository
employees and told police that Oswald was missing. At 1:12,
sheriff's deputies found three empty cartridge cases near the
sixth floor corner window. Ten minutes later, they would find the
rifle, hidden between boxes of textbooks in the room.
At 1:15, Dallas officer J.D. Tippett was cruising by a drug
store at 10th and Patton, less than a mile from the Oak Cliff
rooming house, and spotted Oswald walking along the sidewalk.
Tippett, for reasons never determined, pulled over and stopped
him. Oswald jerked his pistol from under his jacket, shot four
times and ran away. Nine people saw the shooting. A pickup truck
driver took the dead officer's radio mike and said, "Hello,
police operator. We've had a shooting out here."
On Air Force One, stewards were removing some of the seats
in the tail compartment to make room for President Kennedy's
coffin. In the plane's stateroom, Lyndon Johnson was watching
Walter Cronkite on television and was asking aides and
congressmen whether he should be sworn in immediately or wait
until they had returned to Washington. Some thought he should
wait. Others thought it might be dangerous for the country to be
without a President while he was en route. Johnson decided he
would assume the office in Dallas. "Now," he said, "What about
the oath?"
The aides and congressmen were embarrassed. They could
remember neither the words nor where to find them. They couldn't
remember who, besides Supreme Court justices, was authorized to
administer the oath. Everyone was in such shock and confusion
that phone calls were made to several Justice Department
officials in Washington and Dallas before someone remembered that
a President may be sworn in by any judge and that the oath is in
the Constitution. Deputy Attorney General Nicholas Katzenbach
dictated it by phone from Washington, and U.S. District Judge
Sarah Hughes, an old friend of Johnson who had been appointed to
the North Texas federal bench by Kennedy, was dispatched to Love
Field.
At 1:40, Lee Oswald ran into the Texas Theater on West
Jefferson--eight blocks from officer Tippit's body--without
buying a ticket. The box office attendant called the police.
Cruisers began converging on the theater. At 1:50, the house
lights went up, and officers moved up and down the aisles, looked
into the faces of the few patrons. Officer M.N. McDonald stopped
at the 10th row and said to a man sitting alone: "Get up."
"Well, it's all over now," Oswald said, according to
witnesses and he stood up. But when McDonald moved closer, Oswald
struck him in the face and went for his pistol. McDonald struck
back and grabbed for the gun. Oswald pulled the trigger, but the
web of skin between McDonald's thumb and forefinger was caught
under the hammer. The gun didn't fire. Other officers joined the
fight. They subdued Oswald and hustled him out of the theater. "I
protest this police brutality!" Oswald shouted.
Twenty-five minutes later, Capt. Will Fritz, chief of
homicide, returned to the Police Department and ordered that the
missing Texas School Book Depository worker named Lee Harvey
Oswald be arrested as a suspect in the presidential killing. An
officer pointed to a small young man with a bruised eye who was
sitting in a chair. "There he sits," he said.
At Parkland, a Secret Service agent called Oneal's Funeral
Home in Oak Lawn to order a casket. The funeral director, Vernon
Oneal, arrived with it at 1:30. After the President's body had
been placed in the casket, Mrs. Kennedy entered Trauma Room No.
1, took off her wedding ring and placed it on her husband's
finger. The casket was closed and placed on a funeral home cart
to be moved to the hearse.
Dr. Earl Rose, the Dallas County medical examiner,
protested. Kennedy was a homicide victim, he said, and the body
couldn't be released legally until after an autopsy had been
performed. A quarrel developed between him and the Secret
Service. Kennedy aides and the Secret Service agents forced the
casket through the crowd that had gathered at the hospital door
and loaded it into the hearse. Mrs. Kennedy rode in the back with
it. At 2:20, the dead President was carried up the stairs into
Air Force One. Mrs. Kennedy retired to the bedroom.
Judge Hughes boarded the plane at 2:35 and was handed a
small white card with the oath scrawled on it. Capt. Cecil
Stoughton, an Army Signal Corps photographer, tried to arrange
the crowd in the cramped stateroom so that he could take a
picture of the ceremony. "We'll wait for Mrs. Kennedy," Johnson
said. "I want her here."
Mrs. Kennedy came out of the bedroom still wearing the
blood-soaked pink suit. Johnson pressed her hand and said, "This
is the saddest moment of my life." The photographer placed her on
Johnson's left, Lady Bird on his right. Judge Hughes, the first
woman to administer the presidential oath, was shaking.
"What about a Bible?" asked one of the witnesses. Someone
remembered that President Kennedy had kept a Bible in the bedroom
and went to get it.
"I do solemnly swear..."
The oath lasted 28 seconds. At 2:38 p.m., Lyndon B. Johnson
became the 36th President of the United States. The big jet's
engines already were screaming. "Now, let's get airborne," he
said.
</p></xml>

154
regexConsp/art-07.xml Normal file
View File

@ -0,0 +1,154 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : A Remembrance of Kennedy
Author : Jim Henderson
Source : Dallas Times Herald (Dallas, Texas)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 1+
. . . Reprinted with permission from
DALLAS TIMES HERALD
(Dallas, Texas)
Nov. 20, 1983, Special Section, pp. 1+
A REMEMBRANCE OF KENNEDY
by Jim Henderson
Staff Writer
`Let the word go forth from this time and place...that the torch
has been passed to a new generation of Americans--born in this
century, tempered by war, disciplined by a hard and bitter peace,
proud of our ancient heritage.'
After 20 years, the events seem as compressed as a leanly
edited videotape.
A sunny day, a dark convertible, a steady din rebounding
from the canyon walls above a crowded street, three cracks from a
rifle in a sniper's nest, a scramble below, engines racing, a
sobbing black woman outside Parkland Memorial Hospital, a
policeman shot across town, a pronouncement of death, a scrawny,
handcuffed suspect in a corridor with Jack Ruby's .38 exploding
in his belly.
The nation was stunned by the images that were transmitted
from Dallas--hard images formed in terse, teletype prose and more
vivid ones fashioned from bits and pieces of celluloid.
America paused to watch the newsreel.
A new President quickly sworn in and airlifted into command,
a bloodstained widow never far from the coffin, a change to
black, a bewildered daughter kneeling before a flag-draped box in
the Capitol rotunda, the wintry streets of the capital, a dark
riderless horse with empty boots facing backward in the stirrups,
a slow-moving caisson, a young boy saluting the honor guard
carrying his father to Arlington National Cemetery, the lighting
of the eternal flame.
On the day John F. Kennedy was buried, Alistair Cooke wrote:
"He was snuffed out. In that moment, all the decent grief of a
nation was taunted and outraged. So along with the sorrow, there
is a desperate and howling note from over the land. We may pray
on our knees, but when we get up from them, we cry with the poet:
Do not go gentle into that good night. Rage, rage against the
dying of the light."
It is only in memory that the howling note from those four
days flits past. Behind the newsreel, the hours were agonizing
and interminable. For many, particularly in Dallas, time moved as
slowly as a motorcade or a horse-drawn caisson.
Erik Jonsson, then-president of the Dallas Citizens Council,
would recall the anxiety he felt when the President did not show
up on schedule for a luncheon at the Trade Mart. What's going on?
he asked himself over and over as the wait, only a few moments in
duration, seemed endless.
After 12:33 p.m. Nov. 22, 1963, the time the first news
bulletin notified the republic that its President had been shot
in Dallas, the city stood motionless and helpless, waiting for
the firestorm of scorn. It came in searing, overlapping bursts.
"Are these human beings or are these animals?" Adlai Stevenson
had asked moments after he escaped from a violent crowd in Dallas
a month earlier.
The world looked again at Dallas with the same question. It
would seem, in the slow-motion drift of events, that the answer
would never come. Dallas mourned the assassination as the rest of
the nation mourned it, as a deeply personal tragedy.
Schoolteachers wept as they broke the news to their classes. Men
cried in public. Rage and shame and guilt and dread melted into
one great immobilizing glob of emotional turmoil.
An eternity, two hours and 20 minutes, passed before the
truth would be known. Kennedy's assassin was not of Dallas, was
far removed from the nation's perception of the city and the
city's own worst fears of itself.
In time, the world, as well as Dallas, would believe the
city was merely caught in one of history's inscrutable warps,
that it was only by chance that the light passing through the
long prism of that era intersected in Dealey Plaza.
The howl that was heard through the dark night of those
times had the tone of a primal scream, a victim raging against a
felon. In truth, it was a cry of national doubt, of the sense
that America would not be the same. More than mere innocence was
lost that day in Dallas. With it went the cable that anchored the
nation to its sense of order.
To the historians who define eras in terms of events rather
than years, the decade of the '60s was born in Dallas.
In a great, shuddering spasm, the fragile floodgates that
had held back the reservoir of a restless social movement was
punctured by the bullets that rained down from the Texas School
Book Depository.
Within months, America would experience the first of her
long hot summers, just the beginning of another newsreel: the
dogs and fire hoses of Birmingham, the first smiling Marines
marching into Vietnam and returning in body bags, campus radicals
occupying the administration building at Columbia University,
rioting outside the Democratic National Convention in Chicago,
the fires of Watts and Newark and Detroit, Dr. Strangelove,
Apollo 11, Woodstock, Charles Manson, the cultural revolution,
the counterculture revolution, the sexual revolution, the
yippies, the hippies, the peaceniks and the crazies.
In 1968, Stuart Udall, secretary of interior for both
Kennedy and Johnson, was asked his opinion of the times, which
seemed to be reeling out of control. He offered a sober, but
startling, observation.
"This may be remembered," he said, "as the most creative
time in our history."
It did not seem such an outrageous judgment when the
hurricane had passed. A sorting out had occurred in the storm.
Not many years would pass before a black preacher from Chicago
would run for the presidency. Women would flood the work place
and supervise staffs of men. Men with an eye on the White House
could talk of a female running mate without risking ridicule.
Wars would be harder to make, nuclear waste harder to conceal,
books harder to burn, air harder to pollute, justice harder to
deny.
America was starkly different. Kennedy's presidency and his
assassination may have been essential to unlocking the passions
of the time, but what the land became was neither his legacy, nor
Oswald's nor Dallas.'
After the trauma and shame and guilt were gone, the judgment
of history would be that Kennedy and Oswald, Edwin Walker and
Martin Luther King, George Wallace and Stokely Carmichael, Angela
Davis and George Lincoln Rockwell, Dallas and Los Angeles,
Memphis and Birmingham, Detroit and Da Nang were fragments of the
American character, slivers of the dream and the nightmare.
The legacy of that sunlit moment in Dallas was a nation's
fretful and all-consuming search for itself, a long and howling
rage against the dying of the light.
</p></xml>

177
regexConsp/bankcris.xml Normal file
View File

@ -0,0 +1,177 @@
<xml><p></p>
<p> The Next Banking Crisis:
=========================================
The Issue Whose Name They Dare Not Speak.
========================================= </p>
<p> Late in June, [the Bush] Administration unleashed a bill that
would gut the Community Reinvestment Act (which requires banks to
make loans in their own neighborhoods, including low-income
areas), ease restrictions on loans to a bank's own officers and
directors and postpone the effective date of some tighter
regulations contained in last year's banking law.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This proposal is only the latest in a series of deregulatory
gestures by the Administration and the Fed. [whose] gifts to the
financial industry -- [recently] forty-five actions, taken rather
quietly since December [..] mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective
effect is to make the banking industry look healthier than it
really is and to permit riskier behavior in the future. These
moves defer tomorrow's disasters
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The CBO estimates that the repeated delays in shutting down
insolvent institutions from 1980 to 1991 added $66 billion to the
cost of the S&amp;L bailout -- enough to fund the Aid to Families with
Dependent Children program for three years, or AIDS research for 50 </p>
<p> The Next Banking Crisis:
=========================================
The Issue Whose Name They Dare Not Speak.
=========================================
By Doug Henwood, _The Nation_, July 20/27, 1992
(See below for more about _The Nation_) </p>
<p>Transcribed by Joseph Woodard </p>
<p>Whatever happened to the financial crisis? Only a year ago, it seemed
the credit system was imploding, and ever-more-extravagant bailouts
appeared inevitable. Now, the Resolution Trust Corporation (R.T.C.),
liquidator of failed savings and loans, is winding down operations;
banks and surviving thrifts seem generally profitable; and the seizure
of failing institutions has all but ceased. Surely the weak, possibly
failing, economic recovery we've seen since late last year can't be
solely responsible for this apparent reversal of fortune. </p>
<p>No, finance owes its recovery mainly to an indulgent government, whose
normal generosity has been deepened by election year concerns. The
Bush Administration wants to bury the problem, Congress is happy to go
along and the media aren't asking any unpleasant questions. Clinton
raises the issue with his typical technocratic dullness, and Perot
with his usual empty fury -- but neither has made that big a deal of
the timely disappearance of the financial crisis. That's odd,
considering that, as Bush campaign officials told Lynda Edwards of
_The Village Voice_, people in their focus groups are obsessed with
the savings and loan bailout and wonder why the press isn't covering
it. </p>
<p>One reason the banking mess has receded from view is that the Federal
Reserve -- which no doubt prefers that the financial system never be
an electoral issue at all -- has been easing policy gradually but
steadily since March 1989. The federal funds rate (the interest rate
banks charge one another for overnight loans), the most sensitive
indicator of the central bank's policy, has fallen in thirty-two of
the past forty months, pushing short-term interest rates to their
lowest levels since 1963. </p>
<p>Although the economy has barely responded to this treatment -- no
modern slump has proved so resistant to lowered rates -- it has helped
refloat the banking system in at least two ways. First, banks haven't
really shared the Fed's generosity with their customers. Rates charged
for loans haven't declined anywhere near as much as those paid on
deposits, boosting bank profits. And second, long-term rates haven't
declined nearly as much as short-term rates. Leaving aside two brief
spikes in the 1950s, the gap between long- and short-term rates is the
widest it's been since the dislocations of the 1930s and 1940s. This
also fattens the banks, which have been buying government bonds
(rather than making loans) and pocketing the large spread between what
they pay their depositors and what they can get from Uncle Sam. Should
the relation between long-term and short-term rates return to normal,
the banks would take a quick turn for the worse. </p>
<p>Fed chairman Alan Greenspan isn't the banks' only friend. The other is
the man who has said he will do anything to get re-elected, George
Bush. Late in June, his Administration unleashed a bill that would gut
the Community Reinvestment Act (which requires banks to make loans in
their own neighborhoods, including low-income areas), ease
restrictions on loans to a bank's own officers and directors and
postpone the effective date of some tighter regulations contained in
last year's banking law. </p>
<p>This proposal is only the latest in a series of deregulatory gestures
by the Administration and the Fed. The Durham, North Carolina-based
Financial Democracy Campaign recently issued a five-page list of such
gifts to the financial industry -- forty-five actions, taken rather
quietly since December, that mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective effect
is to make the banking industry look healthier than it really is and
to permit riskier behavior in the future. </p>
<p>These moves defer tomorrow's disasters, shoring up shaky banks (more
than 1,000 are on the F.D.l.C.'s problem list); yesterday's disasters
are being dealt with separately. The government has virtually stopped
seizing failed banks and thrifts; the liquidators can only move in
when ordered to by Administration agencies (the Office of Thrift
Supervision and the Comptroller of the Currency, both fiefdoms within
Nicholas Brady's Treasury Department), and such orders aren't being
given. This is good news for the liquidators, since their insurance
funds are broke, and Congress is reluctant to vote them more money --
at least not in an election year. </p>
<p>If you listen to the R.T.C., its work is nearly done. Even though it
has run through only half its budget, the corporation is shutting
offices and reducing staff. Among the staff being reduced, as Susan
Schmidt has been reporting in _The Washington Post_, are lawyers with
the professional liability section, who are supposed to be going after
the executives and board members who ran the thrift industry into the
ground. With a three-year statute of limitations (running from the
moment institutions are seized), the division needs more staff, not
less -- but the R.T.C. is dismissing experienced lawyers and replacing
them with novices. No one can prove anything yet, of course, but the
likely targets of such liability investigations, aside from bankers,
would be realtors, accountants, lawyers, doctors and others who are
likely to be generous campaign contributors to both parties. </p>
<p>Insofar as there's a strategy behind this delay in dealing with the
banking problem (aside from political expediency), it's one of
"forbearance" -- the hope that the problem will just go away with time
and economic growth. But the economy is hardly growing, and insolvency
isn't one of the diseases that time can cure. The Congressional Budget
Office estimates that the repeated delays in shutting down insolvent
institutions from 1980 to 1991 added $66 billion to the cost of the
S&amp;L bailout -- enough to fund the Aid to Families with Dependent
Children program for three years, or AIDS research for fifty. </p>
<p>Students of the S&amp;L disaster are reminded of 1988, when the same trio
of co-conspirators -- the executive and legislative branches, assisted
by a lazy or complicit media -- ignored the disaster until after the
election. In early 1989, the thrift crisis was suddenly "discovered,"
only to disappear again in accordance with the quadrennial cycle. </p>
<p>But the problems won't just go away. Bank and thrift balance sheets
are contaminated with billions of dollars of loans that went to build
pointless shopping centers and see-through office buildings. Salomon
Brothers estimates that it will take a national average of twelve
years to fill up existing empty commercial real estate -- ten years in
Los Angeles, twenty-six years in Boston, forty-six years in New York
City and fifty-six years in San Antonio, the national champ. </p>
<p>Aside from increasing the ultimate cost of the financial rescue, the
conspiracy of silence has largely prevented any serious discussion of
why the financial meltdown happened or how we might make the best of
the situation. The government is spending hundreds of billions of
public dollars to restore business as usual. Instead, failed
institutions could be transformed to publicly or cooperatively owned
local development banks, and the government's vast inventory of
near-worthless real estate could be turned over to community groups,
local governments or nonprofit associations for creative use. But some
things are too important to be discussed openly, especially during
election season. </p>
<p>**************************************************************
Doug Henwood is Editor of _Left Business Observer_ (see below)
************************************************************** </p>
<p>
##################################################################
Reprinted with permission - granted by The Nation magazine/The Nation
Company, Inc. Copyright 1992
##################################################################
Subscriptions to _The Nation_ -- published since 1865 and the oldest
weekly magazine in America -- are $32 per year (47 issues):
The Nation // Dept MAP // 72 Fifth Ave. // New York, NY 10011
Or a half-year subscription (24 issues) is $22.
</p></xml>

1223
regexConsp/bcci-1.xml Normal file

File diff suppressed because it is too large Load Diff

495
regexConsp/bendini.xml Normal file
View File

@ -0,0 +1,495 @@
<xml><p>&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#
%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;
#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%
&amp;%# &amp;%#
%#&amp; Axon Industries Present %#&amp;
#&amp;% #&amp;%
&amp;%# The Kromery Converter/Free Electricity &amp;%#
%#&amp; %#&amp;
#&amp;% Original articles by John Bedini, Eike Mueller, and Tom Bearden. #&amp;%
&amp;%# Retyped Without Permission 07/04/86 by (_&gt;Shadow Hawk 1&lt;_) &amp;%#
%#&amp; %#&amp;
#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%
&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#
%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;</p>
<p>Tom Bearden</p>
<p> John Bedini has a prototype free energy motor.</p>
<p> Imagine having a small D.C. electrical motor sitting on your laboratory bench powered
by a common 12 volt battery. Imagine starting with a fully charged battery and
connecting it to the motor with no other power input. Obviously, the motor is go
ing to run off the battery, but by conventional thinking it will stop when the battery
runs down.</p>
<p> It isn't running by the conventional wisdom of electrical physics. It isn't running
by the conventional rules of electric motors and generators, but it is running.</p>
<p> And it isn't something complex. It's pretty simple, once one gets the hang of the
basic idea.</p>
<p> Impossible, you say. Not at all. That's precisely what John Bedini has done, and the
motor is running now in his workshop.</p>
<p> It's running off the principles of electromagnetics that Nikola Tesla
discovered shortly before 1900 in his Colorado Springs experiments. It's running
off the fact that pure empty vacuum - pure "emptiness", so to speak, is filled with riv
ers and oceans of seething energy, just as Nikola Tesla pointed out.</p>
<p> It's running off the fact that vacuum space-time itself is nothing but pure masless
charge. That is, vacuum has a very high electrostatic scalar potential - it is greatly
stressed. To usefully tap the enormous locked-in energy of that stress, all one
has to do is crack it sharply and tap the vacuum oscillations that result. The best
way to do that is to hit something resonant that is imbedded in the vacuum, then
tap the resonant stress of the ringing of the vacuum itself.</p>
<p> In other words, we can ring something at its resonant frequency and, if that
something is imbedded in the vacuum, we can tap off the resonance in vacuum stress,
without tapping energy directly from the embedded system we rang into oscillation.
So
what we really need is something that is deeply imbedded in the vacuum, that is,
something that can translate the "vacuum" movement into "mass" movement.</p>
<p> Well, all charged particles and ions are already imbedded in the vacuum by their
charged fluxes, so stressed oscillations - that is, vacuum oscillations - can be
converted into normal energy of mass movement by charged particles or ions, if the
sy
stem of charged particles or ions is made to resonate in phase with our tapping
"potential". For our purpose, let's use a system of ions.</p>
<p> First we will need a big accumulator to hold a lot of the charged ions in the system
that we wish to shock into oscillation. We need something that has a big capacitance
and also contains a lot of ions.</p>
<p> An ordinary battery filled with electrolyte fits the bill nicely. While it's not
commonly known, ordinary lead-acid storage batterys have a resonant ionic frequency,
usually in the range of from 1 - 6 Mhz. All we have to do is shock -oscillate the
ions in the electrolyte at their resonant frequency and time our "trigger" potential
and "siphon" circuit correctly. Then if we keep adding potential to trigger the
system we can get all that "potential" to translate into "free electrical energy".</p>
<p> Look at it this way. Conventionally "electrostatic scalar potential" is composed
of work or energy per columb of charged particle mass. So if we add potential alone,
without the mass flow, to a system of oscillating charged particles, we add "physica
l energy" in the entire charged particle system. In other words, the "potential" we
add is converted directly into "ordinary energy " by the imbedded ions in the system.
And if we are clever we don't have to furnish any pushing energy to move pure po
tential around. (For proof that this is possible, see Bearden's Toward a New
Electromagnetics; Part IV; Vectors and Mechanisms Clarified, Tesla Book Co., 1983,
Slide 19, Page 43, and the accompanying write-up, pages 10, and 11. Also see Y.
Aharonov an
d V. Bohm, "Significance of Electromagnetic Potentials in the Quantum Theory",
Physical Review, Second Series, Vol. 115, No. 3, Aug. 1, 1959, pages 485-491. On page
490 you will find that it's possible to have a field-free reigon of space, and
still have the potential determine the physical properties of the system.)</p>
<p> Now this "free energy resonant coupling" can be done in a simple, cheap system.
You don't need big cyclotrons and huge laboratories to do it; you can do it with
ordinary D.C. motors, batteries, controllers and trigger circuits.</p>
<p> And that's exactly what John Bedini has done. It's real. It works. It's running
now on John's laboratory bench in prototype form.</p>
<p> But that's not all. John is also a humanitarian. He's as concerned as I am for that
little old widow lady at the end of the lane, stretching her meager Social Security
check as far as she can, shivering in the cold winter and not daring to turn
up her furnace because she can't afford the frightful utility bills.</p>
<p> That's simply got to change and John Bedini may well be the fellow who changes it.
By openly releasing his work in this paper, he is providing enough information
for all the tinkerers and independent inventors around the world to have at it. If
he can get a thousand of them to duplicate his device, it simply can't be supressed as
so many others have been.</p>
<p> So here it is. John has deliberately written his paper for the tinkerer and
experimenter, not for the scientist. You must be careful, for the device is a little
tricky to adjust in and synchronize all the resonances. You'll have to fiddle with
it,
but it will work. Keep at it.</p>
<p> Also, we warn you not to play with this unless you know what you are doing. The
resonating battery electrolyte produces hydrogen, and if you hit it to hard with a
"voltage spike" you can get an electrical spark inside the battery. If that happens, </p>
<p>THE BATTERY WILL EXPLODE, so don't mess with it unless you are qualified and use the
utmost caution.</p>
<p> But it DOES work. So all you experimenters and pioneers, now's your chance. Have
at it. Build it. Tinker with it. Fiddle it into resonant operation. Then lets build
this thing in quantity, sell it widely, and get those home utilities down to where w
e can all afford them - including the shivering little old lady at the end of the lane.</p>
<p> And when we do, lets give John Bedini, and men like him the credit and appreciation
they so richly deserve.</p>
<p> Tom Bearden</p>
<p> April 13,1984</p>
<p>John Bedini</p>
<p>[Note: John Bedini developed Two kinds of controller devices. One, being very simple,
is the one I will present here. The other is quite a bit more complex, and would be
impossible for me to reproduce here... Anyway if you want to see the all electro
nic controller, get the book "Bedini's Free Energy Generator" by John C. Bedini,
Published by the Tesla Book Co. 1580 Magnolia Ave., Millbrae, CA 94030.]</p>
<p> For some time man has been looking for different ways to generate electricity. He has
used water power, steam power, nuclear power, and solar power. Recent papers written
by Tom Bearden make a free energy generator possible. Tom Bearden, rather
than patent his devices, chose to share them with people who had open ears. I
myself have had many conversations with Tom Bearden. He found Tom to be one of
the most reasonable men he had ever dealt with in this energy field. Most others woul
d tell you stories of great machines they had, but would never present the truth
with circuit diagrams or a look at the machine in question. Tom, on the other hand,
clearly presents his ideas and clearly presents his ideas and discloses the
concepts by means of which they work.</p>
<p>The facts I am about to present to you about free energy were never put into textbooks,
only portions were. The textbooks have grounded people in conventional theory and made
things very complicated. What I am about to explain is very simple; anyone
can understand this theory and anyone who understands what he is doing can build
this device.</p>
<p> I have been grounded in conventional theory for some eleven years. I have always
tried to study the simplicity of electrical circuits, but my mind wouldn't allow
this because of my orthodox training. In any event, I had to change the way
i was looking at things. I started to wonder, why do we need to have things so
complicated? The truth of the matter is, we have been taught to consume or waste energy
at every turn in our lives, so we jump into our cars, turn on lights, etc. In other
words, we have been conditioned to waste energy and fuels lavishly, not realizing
that someday someone will sky-rocket our energy bills to a point where we will
not be able to pay for these fuels. Everything will come to a stand-still. But la
ugh as you will, at that time Rube Goldberg machines will power your future. It
probably will not be uncommon to see machines from the size of garbage cans to the
size of two story apartment houses powering everything in sight. These machines will </p>
<p>be using a force in nature never conceived by the conventionally trained mind of today.</p>
<p> The theory I am about to explain to you will bring you one step closer to gaining
free energy.</p>
<p> To begin my story I must state I had a vision - looking for this energy. Many times
I hammered my head into the ground, but I refused to give up in my search. Any person
with a dream should never let it be wasted by fools, who will always say "you
can't do that". All that statement really means is that they do not know how to do it.</p>
<p> There are many different ways to explain this theory. I will discuss the first
one now.</p>
<p> The device is very simple and uses a motor, a generator, a controller switch, and a
battery. Basically, we drive a direct current motor with pulsed current from a battery,
then utilize a special means to cause the battery to recharge itself.</p>
<p> First, the battery, controller, and generator are interconnected as shown in figure
3. (See also Figure 1)</p>
<p>
/-----\ /-----\
o-12v | |===| || | 14v.o
[Motor==| |==||===Gen. ]
o+ | |===| || | .o
\-----/ Mass \-----/
Controller
Figure 1: The Kromery Converter
</p>
<p> __________
= Brush 1
_-_ * =shaft
/xxx\ xxx=copper
/x/x\x\ = =brush
| x*x=|_________ _o--o1
\ \x/ /Brush 2 /|
\_ _/ 2o--/
-
= Brush 3 o--o3
__________ Equivelant
Circuit
Figure 2: Controller Construction
</p>
<p> 3O To controller 1O To controller
| brush #3 | brush #1
| |
| Mass | 2O To controller
| Gen. Motor| | brush #2
| ____ = ____ | |
\----O+ |-=-| +O-/ \-To batt +
/--O- |-=-| -O--+---To batt -
| ---- = ---- |
\---------------/
Figure 3: Schematic of the device
</p>
<p>Let's begin by stating certain facts. The ions move backwards under charging
conditions and in reverse under discharging conditions. So here we start our new
concept. Suppose we have constructed a machine that has tricked this battery into a
different space and time relationship. Simply put, suppose the battery never did any
work
and it should have its full charge left in it. Suppose this becomes possible because
we have stressed the terminals in such a way that the ions in the battery electrolyte
actually move themselves backwards. The machine, or unit, that makes this possible h
as many different names. Some people call these units generators, energizers,
alternators, etc. Conventionally such devices have one thing in common; they stress the
battery backwards by pushing electricity into the battery and forcibly pushing the ions
i
n the electrolyte backwards. In our theory, we are not going to push anything - the ions
are going to move themselves, recharging the battery.</p>
<p>If we go a little deeper into this theory, you are probably asking yourself, "what is
this madman talking about?" Simply put, we are going to put a stress on the battery
terminals for a moment in time and the battery will do the rest. Now comes the heavy
part of this theory. What they didn't teach you in textbooks is that, in order for the
battery to charge, two oscillatory actions must occur, one at the positive terminal and
one at the negative terminal. Under different stress levels this then forces the
ions backwards. The same would occur for an electron. Our machine will slingshot ions
in the battery electrolyte backwards beyond the normal recoil action.</p>
<p> I must give a very stern warning at this time that if the voltage developed is too
high the battery will explode. Use the utmost care. Test setups in my lab have proven
that this can be dangerous. Do not build the device and experiment with it unless yo
u know what you are doing, and use the utmost caution.</p>
<p> When struck by a sharp voltage spike, the electrolyte in the battery will resonate
at a certain frequency and this can also force the ions backwards. Simply put, the
battery, the motor, and the energizer will become resonant at some point, "ring" like
a
bell when we "strike" it, and in its ringing the most energy will be developed.</p>
<p>[Note: sorry I can't produce waveforms here so get the book! I will present the
explanation here, however]</p>
<p> The battery is really charging itself. The ions in the electrolyte are being stressed
in a curved space and time relationship, the battery is actually forced into believing
that no work ever occured. The oscillatory action that has taken place by the en
ergizer has just pulsed our "slingshot" and immediately let go. Once this has happened,
the electrolyte in the battery goes wild and the ions race backwards, giving off
hydrogen and oxygen gas. I must make a stern warning here! The time of the stimulaing
pulse is very important. If the time is to long the battery will burn itself out. If
the pulse time is too short or if the circuit fails to operate correctly, the battery
will never recover its charge. Taking this into consideration, the only failures tha
t could occur would be the controller failure due to a points faiulre (on the electronic
controller), or the multivibrator latched in the "on" position (again, only on the
electronic controller). Anyone studying this can see that we have used very little
energy to get to this point, and gained a lot of resonant energy in return.</p>
<p> We must remember that, if the battery is applied to the energizer longer than normal,
we must burn up the excess energy to keep the battery cool. The problem now becomes one
of embarrassing excess of energy, not a shortage.</p>
<p> The energizer is also a simple machine, but if yu want to, you can make it very
complex. The simple way is to study the alternator principles. The waves we want to
generate are like those that came from old D.C. generators with the exception of
armature
drag, bearing drag, and no excited fields. Also, we would want to cut the magnetic
fields at 90 degress to the armature. The simpler the better.</p>
<p> I am going to throw a few ideas your way. I have run some tests in my lab and
discovered that certain types of energizers, generators, and alternators do what we
need. Also, we want to be able to tune the output of our energizer. The old D.C.
generator
puts out something very close towhat we need, except for The drag.</p>
<p> In an A.C. generator output we are going to see just what we manufacture. It would
appear that this leaves this generator out. Not really, because we can make this
generator's output change by rectifying it.</p>
<p> In looking at the A.C. generator with rectified output, we see that it could become
very useful to us as an energizer, simply because it is the easiest to construct and
its principles are simple. I have done experiments with an A.C. generator using ALL
N. alligned magnets, and rectified. Most people can see that that type o alternator
might have some problems. However, remember that I am looking for a certain type of wave
form that I want to tune to a certain frequency at a certain speed. The winding of
this alternatr is a problem and it is a bit tricky, but I chose to stay with this unit.
You may choose a different method if you retain the principle. The type of energizer
that was used for the prototype was a standard office type 2-speed A.C. fan housi
ng. The coils were replaced with 6 coils of approx. 200 turns of #20 wire - all in
phase. Six permanent magnets are bonded to an aluminum disc. This arrangement is
basically a magneto, but will produce more amperage than ordinarily expected of a
magneto.</p>
<p>Controller Construction: Figure 2 shows the controller. It should be made of two
coencentric circles, one with approx. 140 degrees of copper, the other, spaced far
enough from the first for a brush to be inserted between them, a full 360 degrees of
copper
. Provisions should be made to rotate the brushes in relationship to each other in order
to secure the required timing.</p>
<p>Eike Mueller</p>
<p>John Bedini found that the material generally available concerning Kromery's
Converter had been altered. Rebuilding the Kromery Converter from the patent papers
ended up in a non-functioning device. Bedini found the necessary modifications </p>
<p>which made this machine perform.</p>
<p>Our first goal was to determine the converters efficiency. We found this to be
quite difficult as the efficiency changes with the load applied.</p>
<p>Figure K-1 shows the first setup we used. We drove the Kromery Converter from
a 12v motorcycle battery. We connected at the output of the converter a condenser
and a rectifier bridge in parallel. The rectified current was then put b
ack into the motorcycle battery. To detect any current flow, we connect into the
positive line a 12 V light bulb.</p>
<p>The result of this test was the light bulb was lit up. However after 15 minutes the
batrery voltage had dropped from 11.05 V to 9.10 V. The speed of the converter
was stabale at 1020 rpm.</p>
<p> /----------\ /----\
/--O Kromery +O----+--O+12v|
|/-OConverter-O---+---O- | FIGURE K - 1 || \--
--------/ || \----/ ||
|| || /------------/|
KROMERY CONVERTER |\-------. |
| | / \ |
| | /FW \ |
TEST SETUP #1 | \-Bridg+--(X)-/
| \ / Bulb
| \ /
\--------.
</p>
<p>In the next test we introduced a seperate battery (battery #2) for charging from
the converter.</p>
<p>We recharged the battery #2 from 12.30 V to 12.40 V within 4 minutes, and we measured
a current flow into the battery #2 of 0.8 amperes.</p>
<p> /----------\ /----\
/--O Kromery +O-------O+12v|
|/-OConverter-O-------O-#1 | FIGURE K - 2 || \--
--------/ \----/ ||
|| /-------------\
/----\ KROMERY CONVERTER |\-------. \--O-
12*| | | / \ /--O+#2 |
| | /FW \ | \----/
TEST SETUP #2 | \-Bridg+--(/)-/
| \ / Ampere *Note difference
| \ / Meter in polarity from
\--------. battery #1.
Figure K-2 shows the second test setup. Because the kromery converter ran
too slow on one 12 V battery, we decided to drive the converter using 24 V via tw
o 12 V batteries, connected in series.</p>
<p> Next we wanted to find a correlation between the normal charging of battery #2 using
a commercial battery charger, and charging this same battery with the Kromery converter.
We drained the battery #2 to 8 V, connected it to the Kromery Converter, and af
ter reaching 11.51 V, we measured the time it took to charge the battery from this
voltage level of 11.51 V to 12.45 V. We reached this voltage (12.45 V) after 11
minutes. The indicated current into the battery was 0.94 A.</p>
<p>We then repeated these steps using the commercial battery charger. Because we ran out
of time after nearly 2 hours, we disconnected the battery from the charger. The
battery voltage had reached 12.41 V. The measurement is depicted in Figure K-3.</p>
<p> THE BATTERY CHARGER NEEDED 119 MINUTES</p>
<p> TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.41 V
FIGURE K - 3</p>
<p> THE KROMERY CONVERTER NEEDED 11 MINUTES</p>
<p> TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.45 V</p>
<p> NOTE: The charger could not fill up the batteries
to 12.45 volts within two hours.</p>
<p>We wanted to find a correction factor for the Kromery Converter by comparing the
same effect, i.e. the charging of the same battery from one specific voltage to
another specific voltage. The calculation of this factor is avilable in the book "E
xperiments with a Kromery and a Brandt-Tesla converter built by John Bedini" By Eike
Mueller, with Comments by Tom Bearden. Table K-1 shows the combined test results.
Because we detected an increase in the speed of the Kromery Converter as well as
a
decrease in the input energy when we increased the output load, we decided to
measure the input energy and speed when the output was shorted. Again, the input energy
dropped and the speed increased.</p>
<p> Measurement No Load Loaded With Shorted Corrected
Battery Fact. 5.535
============================================================</p>
<p> Input Voltage 25.30 25.00 24.90 </p>
<p> Input Current 3.90 3.00 2.20 </p>
<p> ------------------------------------------------------------</p>
<p> Watts In 98.67 75.00 54.78 </p>
<p> Watts Out N/A 10.26 N/A 56.78 </p>
<p> ------------------------------------------------------------</p>
<p> Speed In Rev/Sec 40.00 65.00 73.00 </p>
<p> Output Voltage DC 48.00 10.80 N/A
Output Current N/A 0.95 1.05
------------------------------------------------------------</p>
<p> Watts In/Out N/A 7.31 N/A 1.32 </p>
<p> ============================================================</p>
<p> Table K - 1</p>
<p>Using the earlier determined correction factor of 5.535 we calculated the energy
they put into the battery to 56.78 watts (from 10.26 * 5.535). Looking at Table K-1
we see that it takes only 54.78 watts to run the Kromery Converter when the outpu
t is shorted. This result led us to continue with theese tests and load the converter
output even more. The results of these tests can be seen in Table K-2.</p>
<p>Here again, we detected that we would get a higher efficiency of the total device,
the more we load down the output side. This effect is totally contradictory
to the conventional laws of physics.</p>
<p> Measurement No Load Loaded With Loaded w/ Loaded w/
Lamp &amp; Batt 13.5 Ohms 0.63 Ohms
============================================================</p>
<p> Input Voltage 25.40 25.30 20.00 21.90 </p>
<p> Input Current 3.90 3.90 3.39 2.30 </p>
<p> ------------------------------------------------------------</p>
<p> Watts In 99.06 98.67 67.80 50.37 </p>
<p> Watts Out N/A 21.00 185.19 634.92 </p>
<p> Watts Out (Corrected) 116.24
------------------------------------------------------------</p>
<p> Resistance (Ohms) N/A N/A 13.50 0.63 </p>
<p> Output Voltage DC 48.00 28.00 50.00 20.00 </p>
<p> Output Current N/A 0.75 N/A N/A </p>
<p> ------------------------------------------------------------</p>
<p> Watts In/Out N/A 0.85 0.37 0.08 </p>
<p> ============================================================</p>
<p> Table K - 2</p>
<p>We used the Kromery correction factor for the First case, when we had connected the
battery to the converter output. We did not use this factor in both other cases when
we used resistors in the output circuit.</p>
<p>The above test results show that the efficiency of the Kromery Converter is well
above 100%.</p>
<p>The end. Typed by (_&gt;Shadow Hawk 1&lt;_). May be distributed anywhere as long as you keep
the credits. I dont give a shit what you do with it either.</p>
<p>DOWNLOADED FROM P-80 SYSTEMS</p></xml>

43
regexConsp/bermutri.xml Normal file
View File

@ -0,0 +1,43 @@
<xml><p>"The Bermuda Triangle and Parapsychology" By Dave Beall</p>
<p>. Although not embraced by the parapsychological community, the Bermuda
Triangle phenomena is an intriguing topic to the public. Jane Roberts' Seth
claims the mysterious disappearances of ships and planes is the result of a
"coordination point", which is a place where time and space meet. Supposed
energy "crystals" from the ancient culture of Atlantis, which Edgar Cayce
predicted would be discovered in the Atlantic Ocean, are suspected by some to
be responsible for the peculiar events in this region. Some individuals
consider UFOs as the source of the phenomena.</p>
<p>. A provacative theory has been proposed by geologists as a result of the
recent discover and subsequent laboratory analysis of an ice like substance
called hydrate. A hydrate layer, formed by mixing cold sea water and natural
gas at immense pressures of the deep ocean, has been found on the ocean floor
in the triangle area, and this seal prevents natural venting of natural gas
from the large hydrocarbon desposits located there.</p>
<p>. When a large natural gas pocket is suddenly released as a result of a
buildup in pressure or sea floor movement (i.e. faulting), ships can be
suddenly swallowed by the foamy mixture of gas and water and temporary
"islands" as much as one mile across can be visible on neighboring ship's radar
screens, as the gas enters the atmosphere. Negative ions generated by agitated
sea water rise into the atmosphere along with the lighter-than-air-gas, causing
magnetic disturbances which could disrupt compass readings in the area.
Aircraft, passing over the gas blowout, could experience engine failure due to
oxygen starvation in the gas rich air and crash without a trace.</p>
<p>. Any sinking wreckage from a plane or ship could be carried miles from the
accident site by the strong currents in the region, before being consumed by
thick bottom muds or hydrate accumulations, leaving no evidence. The release
of trapped gas desposits ruptured by faulting in shallow ocean areas could
display similar characteristics, whithout hydrate, and the chance of a gas
blowout of this nature exists anywhere in the world's oceans where large
natural gas deposits are present. In the case of the Bermuda Triangle
phenomena, it would appear that a reasonable explanation has been proposed.
. Many aspects of parapsychology or related areas may not have solutions
which readily conform to known physical principles. On the other hand, many
esoteric or metaphysical ideas may someday be explainable in purely physical
terms. In an attempt to understand paranormal occurences, an individual should
remain open and objective until all of the evidence is in so that the
temptation towards premature and unfounded conclusions can be overcome. </p></xml>

355
regexConsp/bkgroun1.xml Normal file
View File

@ -0,0 +1,355 @@
<xml><p>Foresight Background
No. 4, Rev. 0
Copyright 1989 The Foresight Institute.
All rights reserved by the author.
Box 61058, Palo Alto, CA 94306 USA</p>
<p>by Arthur Kantrowitz</p>
<p>Dartmouth College</p>
<p>"The best weapon of a dictatorship is secrecy, but the best weapon of
a democracy should be the weapon of openness."</p>
<p>--Niels Bohr</p>
<p>Introduction</p>
<p>What is the "weapon of openness" and why is it the best weapon of a
democracy? Openness here means public access to the information needed
for the making of public decisions. Increased public access (i.e. less
secrecy) also gives information to adversaries, thereby increasing
their strength. The "weapon of openness" is the net contribution that
increased openness (i.e. less secrecy) makes to the survival of a
society. Bohr believed that the gain in strength from openness in a
democracy exceeded the gains of its adversaries, and thus openness was
a weapon.</p>
<p>This is made plausible by a Darwinian argument. Open societies evolved
as fittest to survive and to reproduce themselves in an international
jungle. Thus the strength of the weapon of openness has been tested
and proven in battle and in imitation. Technology developed most
vigorously in precisely those times, i.e. the industrial revolution,
and precisely those places, western Europe and America, where the
greatest openness existed. Gorbachev's glasnost is recognition that
this correlation is alive and well today.</p>
<p>Let us note immediately that secrecy and surprise are clearly
essential weapons of war and that even countries like the U.S., which
justifiably prided itself on its openness, have made great and
frequently successful efforts to use secrecy as a wartime weapon.
Bohr's phrase was coined following WWII when his primary concern was
with living with nuclear weapons. This paper is concerned with the
impact of secrecy vs. openness policy on the development of military
technology in a long duration peacetime rivalry.</p>
<p>Let us also immediately note that publication is the route to all
rewards in academic science and technology. When publication is
denied, the culture changes toward the standard hierarchical culture
where rewards are dependent on finding favor with superiors. Reward
through publication has been remarkably successful in stimulating
independent thinking. However, in assessing openness vs. secrecy
policy it must be borne in mind that research workers (including the
present author) start with strong biases favoring openness.</p>
<p>In contrast, secrecy insiders come from a culture where access to
deeper secrets conveys higher status. Those who "get ahead" in the
culture of secrecy understand its uses for personal advancement.
Knowledge is power, and for many insiders access to classified
information is the chief source of their power. It is not surprising
that secrecy insiders see the publication of technological information
as endangering national security. On the other hand, to what degree
can we accept insiders' assurances that operations not subject to
public scrutiny or to free marketplace control will strengthen our
democracy?</p>
<p>My own experience relates only to secrecy in technology. Therefore I
will not discuss such secrets as submarine positions (which seem
perfectly justifiable to me in the sense that they clearly add to our
strength) or activities which are kept secret to avoid the
difficulties of explaining policy choices to the public (which seem
disastrously divisive to me).</p>
<p>First, we offer some clues to understanding the historical military
strength of openness in long duration competition with secrecy.</p>
<p>Second, we suggest a procedure for the utilization of more openness to
increase our strength.</p>
<p>The Strength of Openness</p>
<p> An important source of support for secrecy in technology is the
ancient confusion between magic and science. In many communications
addressed to laymen the terms are used almost interchangeably. Magic
depends on secrecy to create its illusions while science depends on
openness for its progress. A major part of the educated public and the
media have not adequately understood this profound difference between
magic and science. This important failure in our educational system is
one source of the lack of general appreciation of the power of
openness as a source of military strength. A more general
understanding of the power of openness would bolster our faith that
open societies would continue to be fittest to survive.</p>
<p>Openness is necessary for the processes of trial and the elimination
of error, Sir Karl Popper's beautiful description of the mechanism of
progress in science. Let's try to understand what happens to each of
these processes in a secret project and perhaps we can shed some light
on how the peacetime military was able to justly acquire its
reputation for resistance to novelty.</p>
<p>Trial in Popper's language means receptivity to the unexpected
conjecture. There is the tradition of the young outsider challenging
the conventional wisdom. However in real life it is always difficult
for really new ideas to be heard. Such a victory is almost impossible
in a hierarchical structure. The usual way a new idea can be heard is
for it to be sold first outside the hierarchy. When the project is
secret this is much more difficult, whether the inventor is inside or
outside the project.</p>
<p>Impediments to the elimination of errors will determine the pace of
progress in science as they do in many other matters. It is important
here to distinguish between two types of error which I will call
ordinary and cherished errors. Ordinary errors can be corrected
without embarrassment to powerful people. The elimination of errors
which are cherished by powerful people for prestige, political, or
financial reasons is an adversary process. In open science this
adversary process is conducted in open meetings or in scientific
journals. In a secret project it almost inevitably becomes a political
battle and the outcome depends on political strength, although the
rhetoric will usually employ much scientific jargon.</p>
<p>Advances in technology incorporate a planning process in addition to
the trial and elimination of error which is basic to all life. When
the planned advance is small the planning can be dominant, in the
sense that little new knowledge is required and no significant errors
must be anticipated. When the planned advance is large it will usually
involve research and invention, and the processes of trial and the
elimination of error discussed above will determine the rate of
progress. In these cases the advantages of openness will be especially
important. The familiar disappointments in meeting schedules and
budgets are frequently related to the fact that, in selling new
programs, the importance of these unpredictable processes is not
sufficiently emphasized. More openness would reduce these
disappointments.</p>
<p>Trial and the elimination of error is essential to significant
progress in military technology, and thus both aspects of the process
by which significant progress is made in military technology are
sharply decelerated when secrecy is widespread in peacetime. Openness
accelerates progress. In peacetime military technology, openness is a
weapon. It is one clue to the survival of open societies in an
international jungle.</p>
<p>Secrecy as an Instrument of Corruption</p>
<p>The other side of the coin is the weakness which secrecy fosters as an
instrument of corruption. This is well illustrated in Reagan's 1982
Executive Order #12356 on National Security (alarmingly tightening
secrecy) which states {Sec. 1.6(a)};</p>
<p>In no case shall information be classified in order to conceal
violations of law, inefficiency, or administrative error; to prevent
embarrassment to a person, organization or agency; to restrain
competition; or to prevent or delay the release of information that
does not require protection in the interest of national security.</p>
<p>This section orders criminals not to conceal their crimes and the
inefficient not to conceal their inefficiency. But beyond that it
provides an abbreviated guide to the crucial roles of secrecy in the
processes whereby power corrupts and absolute power corrupts
absolutely. Corruption by secrecy is an important clue to the strength
of openness.</p>
<p>One of the most important impacts of corruption from secrecy is on the
making of major technical decisions. Any federally sponsored project
and especially a project so hotly contested as the Strategic Defense
Initiative must always keep all its constituencies in mind when making
such decisions. Thus the leadership must ask itself whether its
continual search for allies will be served by making a purely
technical decision one way or the other. (A purely technical decision
might determine whether money flows to Ohio or to Texas. Worse yet,
revealing technical weaknesses could impact the project budget.)</p>
<p>When this search for allies occurs in an unclassified project,
technical criticisms, which will come from the scientific community
outside the project, must be considered. Consideration of these
criticisms can improve the decision making process dramatically by
bringing a measure of the power of the scientific method to the making
of major technical decisions.</p>
<p>In a classified project, the vested interests which grow around a
decision can frequently prevent the questioning of authority necessary
for the elimination of error. Peacetime classified projects have a
very bad record of rejecting imaginative suggestions which frequently
are very threatening to the existing political power structure.</p>
<p>When technical information is classified, public technical criticism
will inevitably degrade to a media contest between competing
authorities and, in the competition for attention, it will never be
clear whether politics or science is speaking. We then lose both the
power of science and the credibility of democratic process.</p>
<p>Corruption is a progressive disease. It diffuses from person to person
across society by direct observations of its efficacy and its safety.
The efficacy of the abuse of secrecy for interagency rivalry and for
personal advancement is well illustrated by the array of abuses listed
in Sec. 1.6(a). The safety of the abuse of secrecy for the abuser is
dependent upon the enforcement of the Section. As abuses spread and
become the norm, enforcibility declines and corruption diffuses more
rapidly.</p>
<p>However, diffusive processes take time to spread through an
organization, and this makes it possible for secrecy to make a
significant contribution to national strength during a crisis. When a
new organization is created to respond to an emergency, as for example
the scientific organizations created at the start of WWII, the
behavior norms of the group recruited may not tolerate the abuse of
secrecy for personal advancement or interagency rivalry. In such
cases, and for a short time, secrecy may be an effective tactic. The
general belief that there is strength in secrecy rests partially on
its short-term successes. If we had entered WWII with a well-developed
secrecy system and the corruption which would have developed with
time, I am convinced that the results would have been quite different.</p>
<p>Secrecy Exacerbates Divisiveness: the SDI Example</p>
<p>Reagan's Executive Order, previously referred to, provides another
clue to the power of openness. The preamble states;</p>
<p>It [this order] recognizes that it is essential that the public be
informed concerning the activities of its Government, but that the
interests of the United States and its citizens require that certain
information concerning the national defense and foreign relations be
protected against unauthorized disclosure.</p>
<p>The tension in this statement is not resolved in the order. It may be
informative to attempt a resolution by considering a concrete example,
namely the Strategic Defense Initiative. SDI symbolizes one of the
conflicts, clearly exacerbated by secrecy, which currently divide us.</p>
<p>I would assert that there are unilateral steps toward openness which
we could take, and which would leave us more unified and stronger,
even if no reciprocal steps were taken by the Soviets. I propose that
we start unclassified research programs designed to provide scientific
information needed for making public policy. If these programs are
uncoupled from classified programs, their emphases would not
compromise classified information. Their purpose would be to provide a
knowledge base for public policy discussions. These programs would not
reveal the decisions taken secretly, but a public knowledge base would
reduce the debilitating divisiveness fostered by secrecy.</p>
<p>The Strategic Defense Initiative provides a classic example of
debilitating divisiveness. Countermeasures to SDI are deeply
classified. The deadly game of countermeasures and
countercountermeasures will probably determine whether SDI is
successful or a large-scale Maginot Line. At the present time,
classification of the countermeasure area trivializes the public
debate to a media battle between opposed authorities offering
conflicting interpretations of secret information.</p>
<p>An example of this game is decoying vs. discrimination. If the offense
can proliferate a multitude of decoys which cannot be discriminated
from warheads by the defense, SDI will not succeed. Knowing a decoy
design would of course make it easier for an adversary to discriminate
it from a warhead. It is therefore very important that such designs be
carefully guarded. On the other hand, maintaining secrecy over the
scientific and engineering research basic to the
decoying-discrimination technology would, for the reasons discussed
earlier, make it much more difficult to provide assurance to the
public that all avenues had been explored. Indeed, a substantial part
of the criticism of the feasibility of SDI turns on the possibility
that an adversary would invent a countermeasure for which we would be
unprepared.</p>
<p>The Cryptography Case: Uncoupled Open Programs</p>
<p>We can learn something about the efficiency of secret vs. open
programs in peacetime from the objections raised by Adm. Bobby R.
Inman, former director of the National Security Agency, to open
programs in cryptography. NSA, which is a very large and very secret
agency, claimed that open programs conducted by a handful of
matheticians around the world, who had no access to NSA secrets, would
reveal to other countries that their codes were insecure and that such
research might lead to codes that even NSA could not break. These
objections exhibit NSA's assessment that the best secret efforts, that
other countries could mount, would miss techniques which would be
revealed by even a small open uncoupled program. If this is true for
other countries is it not possible that it also applies to us?</p>
<p>Inman (1985) asserted that "There is an overlap between technical
information and national security which inevitably produces tension.
This tension results from the scientists' desire for unrestrained
research and publication on the one hand, and the Federal Government's
need to protect certain information from potential foreign adversaries
who might use that information against this nation.</p>
<p>I would assert that uncoupled open programs (UOP) in cryptography make
America stronger. They provide early warning of the capabilities an
adversary might have in breaking our codes. There are many instances
where secret bureaucracies have disastrously overestimated the
invulnerability of their codes. In this case I see no tension between
the national interest and openness. The cryptographers have provided a
fine case study in strengthening the weapon of openness.</p>
<p>Consider then the value of starting unclassified, relatively cheap,
academic research programs uncoupled from the classified programs.
These UOP could provide the more solid information on countermeasures
needed for an informed political decision on SDI, just as the open
cryptography research has taught us something about the security of
our codes. If indeed SDI's critics are right about the opportunities
for the invention of countermeasures, then the UOP would provide an
opportunity to make a conclusive case. On the other hand if the open
programs exhibited that SDI could deal with all the countermeasures
suggested and retain its effectiveness, its case would be
strengthened.</p>
<p>These open programs would indeed be shared with the world. They would
strengthen the U.S. even if there were no response from the USSR by
reducing corruption by secrecy, by improving our decision making, and
by reducing our divisiveness. Undertaking such programs would exhibit
our commitment to strengthening the weapon of openness. Making that
commitment would enable democratic control of military technology.
More openness, reducing suspicions in areas where Americans are
divided, will do more to increase our military strength by unifying
the country and its allies than it could possibly do to increase the
military strength of its enemies.</p>
<p>The Weapon of Openness and the Future</p>
<p>Bohr's phrase which was the keynote of this article was invented in an
effort to adapt to the demands for social change required to live with
advancing military technology. Unfortunately Bohr's effort, to
persuade FDR and Churchhill of the desirability of more openness in
living with nuclear weapons, was a complete failure. There can be no
doubt that the future will bring even more rapid rates of progress in
science-based technology. Let's just mention three possibilities,
noting that these are only foreseeable developments and that there
will be surprises which, if the past is any guide, will be still more
important.</p>
<p>Artificial Intelligence is advancing, driven by its enormous economic
potential and its challenge in understanding brain function.</p>
<p>Molecular biology and genetic engineering are creating powers beyond
our ability to forecast limits.</p>
<p>Feynman some years ago wrote a paper entitled "There's Plenty of Room
at the Bottom" pointing out that miniaturization could aspire to the
huge advances possible with the controlled assembly of individual
atoms. When the possibility of the construction of assemblers which
could reproduce themselves was added by Eric Drexler in his book
Engines of Creation, a very large expansion of the opportunities in
atomic scale assembly were opened up. This pursuit, today known as
nanotechnology, will also be driven by the enormous advantages it
affords for health and for human welfare.</p>
<p>But each of these has possible military uses comparable in impact to
that of nuclear weapons. With the aid of the openness provided by
satellites and arms control treaties, we have been able to live with
nuclear weapons. We will need much more openness to live with the
science-based technologies that lie ahead.</p>
<p>Dr. Kantrowitz is a professor at the Thayer School of Engineering at
Dartmouth, and former Chairman of Avco-Everett Research Lab. He
serves as an Advisor to the Foresight Institute.
</p></xml>

186
regexConsp/bnlgate.xml Normal file
View File

@ -0,0 +1,186 @@
<xml><p>
The War and Peace Digest is a bimonthly international newsletter on issues
of disarmament, government secrecy, media accountability, the nuclear
threat (from both civilian power plants and the military weapons complex),
ecological destruction, and peaceful conflict resolution through the
structures of the United Nations. If you would like to be placed on our
mailing list or receive a copy of our new information packet on nuclear
power, contact Matthew Freedman at 32 Union Square East, New York, NY
10003-3295 (Tel: 212-777-6626).
Contributions are always welcome. All materials may be reproduced without
permission.
--------------------
BNL - IRAQGATE SCANDAL
The Chicago Connection - Bush &amp; Saddam Inc.
Key documents - sought by Gonzalez - withheld
With George Bush ready to take America into another war with Iraq to
destroy the nuclear, chemical, biological and missiles weapons that Bush
himself helped Saddam Hussein to build, Congressmen Henry Gonzalez, the
courageous Texas Democrat who heads the House Banking Committee, continues,
single-handedly, to peel back layer after layer of cover-up to reveal the
monumental proportions of the Iraqgate-BNL (Banca Nazionale Del Lavoro)
scandal that now threatens to bring down the Bush regime. But the most
explosive documents have been withheld.
Over the past several months Gonzalez has shown the Iraqgate-
BNL scandal to be bigger than anyone had imagined. He has uncovered and
reported incontestable evidence that Bush and his associates secretly sold
nuclear, biological, chemical and missile-related weapons materials to
Saddam Hussein; blocked investigations into the use of such materials by
Hussein; suppressed memos warning of the dangers of such sales;
deliberately falsified documents on such sales submitted to Congress and
interfered illegally to halt investigations into the criminal activities of
the BNL bank in secretly diverting American agricultural loans to buy the
weapons for Hussein.
BNL-BCCI Chicago Branches
Gonzalez has revealed a Bush policy disaster that lead to the first
Gulf War and a blunder that is now costing the Americans $2 billion to pay
off the loans Bush guaranteed with U.S. taxpayersU money . Bush repeatedly
ignored warnings that Iraq would default on the loans. Now, certain key
documents - perhaps the most revealing yet - are being withheld from the
Gonzalez investigation. They are said to be the records of the Chicago
branches of BNL and BCCI (Bank of Credit and Commerce International),
through which, some investigators say , George Bush and Saddam Hussein may
have been involved in a joint, private enterprise to skim oil profits
arising from Reagan-Bush policies toward Iraq. The documents have been
impounded by a Chicago court and Congressman Gonzalez Banking Committee
has been denied access.
Bush's Pennzoil Profits
Between 1980 and 1990 the Gulf region exported a trillion dollars
worth of oil to the West. Hundreds of billions of dollars in kickbacks were
involved. Some of the kickbacks were said to be handled by the BNL/BCCI
banks for Pennzoil, an oil company founded by George Bush The Pennzoil
case was (is?) the target of Ross PerotUs much-denied investigation of the
Bush family and friends. Investigators believe the Chicago bank records
could help explain BushUs massive, covert military support for Iraq in the
years between 1981-1990.
The Chicago BNL /BCCI records could also provide clues to why the
Bush Administration secretly - and possibly illegally - exempted eleven
members of the Bush cabinet from conflict of interest restrictions in their
handling of the Gulf war policy. Bush simply declared that the law
regarding conflict of interest would cease to apply to his advisors on the
Gulf war policy. He then ordered that his declaration would be not be made
public. Congressman Gonzalez is now asking Bush to explain the deal. Bush
has not responded.
According to some investigators, the BNL-BCCI bank documents
now impounded by a Chicago judge could shed light not only on the
Iraqgate case, but on other illegal transactions including Iran-Contra,
October Surprise and the Inslaw case. In all instances monies passed
through the BNL/BCCI banking network.
BNL is an Italian bank now under investigation by Congress for
fraud in using loans from the U.S. Department of Agriculture to finance
IraqUs pre-war military buildup. Over the past thirty years, BNL is
suspected of involvement in a wide range of international criminal
activities. (French Intelligence investigators have even linked the bank to
large payments to certain individuals in Europe in late 1963, thought to be
associated with the John Kennedy assassination.)
On December 28th 1990, when Gonzalez sought the records of the
Chicago branch of BNL (Case number 90 C 6863 of the U.S. District Court in
Chicago: People of the State of Illinois ex re; William C. Harris v. the
Board of Governors of the Federal Reserve System), Gonzalez was told by
Federal Judge, Brian Duff that he could not have them. Duff, a friend of
both Bush and Reagan, works closely with the Federal Reserve Bank. Duff
impounded the documents and abused GonzalezU attorney for Rbehaving like an
800 -pound gorilla.S That is when Duff impounded the records.
Questions abound. Suspicions arise from the fact that among
officials involved in the BNL bank is Brent Scowcroft, BushUs National
Security advisor who, Gonzalez has now revealed, maintained a million-
dollar financial interest in 40 of the biggest U.S. weapons companies that
profited from U.S. policies toward Iraq, including General Electric,
General Motors, ITT, and Lockheed. Gonzalez has also revealed that
Assistant Secretary of State Laurence Eagleberger worked closely with BNL
when he and Scowcroft were part of Henry KissingerUs consulting firm.
Kissinger was a member of the board of BNL and his firm represents BNL in
the USA.
BNL, P2 and the Vatican Bank
The BNL bank was also used for secret arms trade by the outlawed P2
Masonic Lodge of Rome, whose Grandmaster, Licio Gelli is thought to have
been the mastermind behind BNLUs illegal, world-wide banking strategies,
until his arrest in 1981, for embezzling $1.5 billion from the Vatican
Bank. The Vatican Bank had close ties with BNL. Gelli was recently
sentenced to 18 years in jail for his role in the case.
Gelli was involved with the PopeUs banker and bodyguard, Bishop
Marcinkus (formerly of Chicago) in the Vatican Bank embezzlement. When the
Italian government issued a warrant for the BishopUs arrest they were
blocked by the Vatican, which claims separate city-state authority. (The
Pope is still closely involved with Marcinkus and the Vatican Bank is still
closely associated with BNL.)
Bush and Gelli are friends. Gelli was guest of honor at the 1981
Reagan-Bush inaugural ball. (N.Y. Times, June 4, 1981, page 7.) Kissinger
also knew Gelli. When Gelli was arrested in March, 1981, Kissinger
immediately sent an agent to Rome with $18,000 to try to buy some of the
documents in the P2 case to keep them from becoming public ( In These
Times, Sept. 1982). It may be of interest that P2 had a lodge in Chicago.
Chicago, it is now emerging, has been the central point for vast,
international, illegal transactions involving the BNL and BCCI banks and
secret deals with American oil companies, military manufacturers, the CIA,
and possibly U.S. politicians. (According to a London source, unreleased
BCCI documents in the possession of the Bank of London list the names of
at least 105 members of U.S. Congress - of both Houses and both parties -
who have received money through the Chicago branch of BCCI. The U.S.
Federal Reserve is said to have a copy of the same secret BCCI list).
The Octopus
Just as the P2 scandal in Italy brought down the government and
destroyed hundred of careers in politics, industry and banking, so too the
BNL/BCCI - Penzzoil case could bring down the Bush administration and send
dozens of top administration officials to jail. Indeed the P2 and BNL cases
overlap in the October Surprise case, and U.S. investigators would do well
to examine the Italian government documents in the P2 case as part of their
inquiry into the October Surprise/BNL/BCCI/Penzzoil/Bush/Hussein links. It
is beginning to look as though the late journalist, Danny Casselaro was on
the right track at the time of his highly suspicious RsuicideS last year,
when he was investigating what he called RThe OctopusS, a vast,
interlocking, international criminal conspiracy.
Bush's Watergate
Congress is now calling for the appointment of a Special Prosecutor
to investigate the ballooning BNL-Iraqgate case. In his insightful and
relentless reporting on the case in The New York Times, William Safire says
flatly that BNL will be BushUs Watergate. Saffire is now investigating the
Chicago link to the case. (Updates on the case now appear regularly on the recorded telephone hotlines of controversial Chicago investigator, Sherman
Scholnick of the RCommittee to Clean Up the CourtsS, who has spearheaded
his own investigation. Call: 312 - 731 1100 &amp; 312- 731 1505 for five-
minute recorded updates.)
When appointed, the Special Prosecutor in the BNL/Iraqgate case
should have immediate access to all the records, including the crucial
documents now confiscated and impounded by the Chicago court.
When the truth of the BNL case is finally revealed, the War &amp;
Peace foundation believes we will see the extent to which politics around
the world
have been corrupted by the arms trade. Iraqgate will serve as further
evidence of the need for international monitoring by the United Nations of
all weapons traffic as a first, essential step toward complete world
disarmament.
Ironically, as we go to press, joint efforts by both houses of
Congress in the wake of the Iraqgate revelations to tighten restrictions on
the sale of nuclear weapons-related materials to nations like Iraq, Iran
and Syria, have provoked a threat of veto by George Bush, who argues that
such non- proliferation legislation would mean a loss of business for
American nuclear exporters!
** End of text from cdp:gen.newsletter **
</p></xml>

54
regexConsp/bohemian.xml Normal file
View File

@ -0,0 +1,54 @@
<xml><p>THE BOHEMIAN CLUB</p>
<p> For two and a half weeks every July, two thousand of the top
movers and shakers in business and government attend the Bohemian
Club's summer encampment. Although highly selective, the club has
a national membership and is among the most prestigious of
affiliations in neoconservative circles. Its membership is known
to include Ronald Reagan, George Bush, Gerald Ford, William F.
Buckley, Jr., Frank Borman, Justin Dart, William Randolph Hearst,
Jr., Caspar Weinberger, Charles Percy, George Schultz, Edward
Teller, Merv Griffin, and a large proportion of the directors and
chief executive officers of the Fortune 1000. Daniel Ludwig, the
richest private citizen on earth, is a Bohemian. Conspiracy nuts
think the Bohemian Club meets each summer to plot to take over the
world. These guys ALREADY run the world.
The club's name harkens back to its founding in 1872 by
artists and journalists in the Bay Area; the club proper is at 624
Taylor Street in San Francisco. The annual summer camp is held at
"Bohemian Grove," an isolated site in Sonoma County, California,
near the town of Monte Rio. To get there, you cross the bridge
over the Russian River and take the second left.
Signs warn off trespassers, and the Grove is guarded during
the encampment. Visitors must have invitations and sign in and
out; cooks and other workers have to wear ID badges. The club (and
hired staff) is all male. There are no black Bohemians and just
one Asian; the former Philippine president Carlos Romulo.
The club does a good job of avoiding publicity, although in
1980 Rick Clogher, a writer for MOTHER JONES magazine, managed to
slip in to the encampment for four days with the help of an
unidentified insider. Brooding over the Grove is a giant rock that
looks like an owl. Clogher discovered that the rock is concrete,
covered with moss to look natural. The Cremation of Care ritual
takes place in front of the owl when, on the first night of camp,
robed members burn a doll representing Dull Care.
Bohemian Grove includes 122 distinct camps in its 2,700
acres. The camps have whimsical names such as Whiskey Flat,
Toyland, Owl's Nest, Hill Billies, and Cave Man's, and each one
has its own kitchen-bar building -- there is a lot of drinking --
and sleeping quarters. The members of some camps sleep in tents;
other camps have redwood cabins. Daily "Lakeside Talks" on
geopolitical topics are given by prominent speakers, both members
and non-members. It is claimed that Richard Nixon and Ronald
Reagan conferred during the 1967 encampment, Reagan agreeing not
to challenge Nixon for the presidential nomination.
The highlight of camp is the Grove play, which is written
exclusively for the club. All the female roles are played by men
in drag. The 1980 play was an adaptation of the Greek myth of
Cronus and Zeus supplemented with fireworks, smoke bombs, and a
light show. (One can only wonder if Reagan ever starred in a Grove
play. He certainly has more acting experience than most club
members.) The polished productions cost the Bohemians as much as
$25,000 -- for one performance.</p>
<p> xperience than most </p></xml>

545
regexConsp/bookfile.xml Normal file
View File

@ -0,0 +1,545 @@
<xml><p>Path: uuwest!spies!apple!usc!samsung!uunet!isis!jsanders
From: jsanders@isis.cs.du.edu (Jim Sanders)
Newsgroups: alt.conspiracy
Subject: BOOK FILE! PROVES CIA-MOB-OIL-DRUG-MURDER WORLD CONSPIRACY!!!!
<info type="Message-ID"> 1991Jan21.054207.6954@isis.cs.du.edu</info>
Date: 21 Jan 91 05:42:07 GMT
Reply-To: jsanders@isis.UUCP (Jim Sanders)
Organization: Math/CS, University of Denver
Lines: 534</p>
<p>HERE IT IS -&gt; ********** THE BOOK FILE ***************</p>
<p>THE SUPER RADICAL FILE THAT USES REAL SOURCES TO DOCUMENT THE
CIA/BUXH/MOB/ILLUMINATI/OIL CO LINKS TO RAPE AND STEAL FROM WE THE PEOPLE!!!</p>
<p>A KILLER COMPANION FILE TO THIS ONE IS THE OPAL FILE - WHICH WAS POSTED TO
ALT.CONSPIRACY ON 1/10/91 AND AGAIN ON APPX 1/21/91.
PLEASE CROSS POST THESE FILES ON YOUR LOCAL SSYSTEM NEWS FOR ALL TO SEE THE
TRUTH BEHIND WHY WE MUST NOW DIE FOR THE SEVEN SISTERS(THE OIL COMPANIES).</p>
<p>TABLE OR CONTENTS:
PARTI=LAWYERS/KILLER BOOKS,PARTII=MOB BOOK,PARTIII=DEA BOOK,PARTIV=ILLUMINATI.</p>
<p>PART I:</p>
<p>LAWYERS/CIA/MOB/BUSH -----&gt; RAPE/MURDER/DRUG SMUGGLE/STEAL </p>
<p>Part A:</p>
<p>Lawyers have amassed into a worldwide coalition to dominate the world in the
tradition of the Bavarian Illuminati. Back in the 1800's they managed to gain
control of Amerika by planting their seeds in the Executive, Legislative, and
Judicial branch of U.S. Now separation of powers of the 3 branches exists only
on the hemp paper the Constitution was written on. Oh, and they managed to make
hemp illegal because their buddies own chemical and logging industries that
hemp paper was and can put out of business because it grows 20 times faster,
makes better paper, and needs fewer chemicals to process into paper! They
turned U.S. politics into a morbid game for money. In 1700's our founders
warned us of political parties and hired farmers for presidents who did not use
CIA hitmen to topple foreign regimes for private business concerns. (Bush's
international construction company builds oil refineries in Saudi Arabia!*!*!)
Big brother is nothing more than a four eyed wimp called George with a
lust for megabucks. Death to all who oppose the villain - ex-head of the CIA -
turned US Pres! But he made a terrible mistake. He called a war on drugs,but
his CIA has imported Heroin from Asia for half a century and brought Coke into
the US on Air Amerika planes coming back from Contra Arms deliveries in Central
Amerika!</p>
<p>IMPEACH BUSH NOW - HE'S A DOPE DEALER BETTER YET HANG HIM HIGH FOR TREASON for
working in the Cia when they killed Kennedy so they could escalate the Viet
Nam War and sell heroin to soldiers and JP4 fuel and military jets/helicopters
to U.S. TAXPAYERS! </p>
<p>**** SEND THIS TO YOUR FRIENDS AND CONGRESSMAN/WOMAN AND TELL HER/HIM YOU WANT
BUSH IMPEACHED TODAY AND NO EXCUSES !!!
BESIDES, QUALE WOULD HAVE TROUBLE ESCALATING A BAR FIGHT BY DIALING 911
- HE COULDN'T START A WAR!!!
(MANY UNCONFIRMED THEORIES FORMULATE THAT IF BUSH WERE TO LOSE HIS LIFE OR GET
ROUND FILED, THE CIA WOULD HAVE TO ASSASINATE QUALE)
______________________________________________
| |
| WHAT FOLLOWS ARE EXPLANATIONS AND SOURCES: |
|______________________________________________|</p>
<p>Part B:(Some facts and logical conclusions about lawyers)</p>
<p> "AN AMERICAN TYRANNY,"
by David C. Morrow:</p>
<p>LAWYERS MAKE THE LAWS, JUDGE THE LAWS, BREAK THE LAWS, FUDGE THE LAWS
----------------&gt; SHOULDN'T THIS CHANGE?
Slave owners often helped themselves to their female property and medieval
lords showed their ability to dominate and degrade by having serfs' brides
spend their wedding nights with them and not the grooms.
The California State Bar's Standing Committee on Professional Responsibility
and Conduct has recently decided that "a lawyer-client sexual relationship"
does not impair the lawyer's ability "to competently perform the legal services
required."
"A ban on any sexual relationship with a client," the gentlemen of the Bar
concluded, "appears overly broad and unnecessary." Like the Alaska Bar
Association and, a few years ago, its Oregon counterpart, they ruled it
perfectly fine for lawyers to have sex with women (or men) they represent.
Much criticism of lawyers has come from men trying to reform divorce laws
that give wives at least half a man's property, most of his future income, and
child support without enforced visitation. The accusation is that attorneys,
in legislative offices deliberately make laws that bribe women to divorce in
order to generate cases and that judges, themselves lawyers, assign custody to
women because of evidence showing that maternal more than paternal custody
results in juvenile delinquency. That divorcees may not enjoy as high a living
standard as they anticipate is of no concern to the lawyers.
While these observations can be supported by findings of such established
researchers as the Kettering Foundation and the FBI Crime report, there are
broader implications.
Minnesotan R. F. Doyle, while researching the law's abuse of marriage, came
across a telling article in the September 17, 1975 "Philadelphia Inquirer".
Participants in a Philadelphia Bar Association meeting voted against marijuana
decriminalization. No health reasons were cited; instead the prominent attorney
A. Charles Peruto said that lawyers needed marijuana cases for personal profit.
One need but recall how prostitution, pornography, and other vices are usually
tolerated except during election year when incumbents need to demonstrate their
"effectiveness" and raise extra revenues while scratching one another's backs.
More recently, victims of violent crimes by repeat offenders have begun to
speak out against lenient judges and parole boards who do not keep dangerous
offenders locked up. Each retrial means money for lawyers, judges and a host of
court employees, and who better to guarantee retrials than habitual criminals?</p>
<p>"SINCE LAWYERS OCCUPY ALL BRANCHES OF GOVERNMENT,
THE SEPARATION OF POWER EXISTS ONLY ON PAPER!!!"</p>
<p> To test the lawyer conspiracy theory a few years ago, I sent to various
state legislatures for copies of their statistics. While Idaho listed only
eight of 105 legislators as lawyers in 1983, I discovered that in Wisconsin,
for example, eleven of thirty-one senators and twelve of ninety-nine
representatives were attorneys. During that time, seventeen of Alabama's
thirty-five senators and eleven of sixty-five representatives were lawyers.
The New York State legislature was twenty percent lawyers. Governors, as in
Wisconsin, frequently proved to be lawyers.
It would seem that since members of the legal fraternity occupy all branches
of government, the separation of powers exists only on paper. This enables them
to generate cases for profit and the public detriment by making unenforceable
laws, encouraging repeat offenders as long as possible, and appealing to greed
to keep families - and thereby society in general - in disorder. Perhaps,
indeed, most of America's problems are due less to mysterious sociological
factors than to sly legal machinations.
In their zeal to publicly approve their own sexual misbehavior, what lawyers
are really doing is, like slave owners or medieval lords, sneering down at the
rest of us from their pinnacle and flaunting their privileges in the most
degrading and insulting manner. They are also engaging in behavior that causes
social change, especially change of ruling classes. It is the signal to take
actions to eliminate their tyranny.
We should exclude attorneys from all legislative and executive positions.
Office holders can hire or appoint legal advisers. Judges should be elected,
since appointment, especially by professional peers, would be perverted to
favor persons who work to advance their profession and not to secure justice
and social stability. Rather than campaigning, judges should have to publish
their decisions and sentences with complete explanations in ordinary language,
and this information alone should be the basis of the voters' decision to
re-elect or turn them out of office. Since they enjoy immunity from prosecution
for wrongful decisions, judges' punishments for crimes committed while in
office should be extremely severe.
With these and other measures that may be found useful, we can enter the next
century with few social problems, a very high standard of public morality, and
with crimes violent and victimless under a functional measure of control.</p>
<p>&lt;--REPRINT FROM NOMOS, Vol. 7, #'s 2 &amp; 3, Nomos Press, Inc. 9857 S. Damen Ave.,
Chicago, IL 60643, 1 year subscription of 4 issues costs $15 (Never mail cash)</p>
<p>Part C:(Some more facts about lawyers and Mr. CIA dude(G.BUSH!))</p>
<p>In the early 1800's, the professional politicians took over this country and
public office went from "A duty and a privilege" to a profession. A
professional politician must be a master of words. A lawyer's rhetoric is as
effective as a 357 magnum. Who better to pull off the bloodless coup. Or has it
been blood-less? The civil war devastated the north, the south, and the blacks
had to go to work in polluted northern factories for pennies a day afterwards
(quite handy however for the northern industrial imperialists.) Then the
bluecoats killed off the Indians and the buffalo to boot! Then came Korea, Nam,
Graneda, Nicaragua, Panama, El Salvador, Kuwait.
Around 1903 a New York oil baron had Nikolai Tesla thrown out of N.Y.
(Tesla was a super inventer of such things as AC current and the Westinghouse
electric motor!) It seems Tesla had discovered a way to transmit electricity
without wires around NY city! The oilmen knew it would be an end to their
gross profiteering from energy manipulation and tossed Nik outta there!
A book called "The Emperor Wears No Clothes" documents how hemp was
needed to win world wars, but soon after became illegal after oil, logging and
chemical companies realized hemp made better paper with less petro-chemicals
and converted to alcohol easily with extremely high energy per kilo of biomass!
(Cars can run on alcohol just as easily as gas-I know-I raced cars &amp; planes!)
"The Origin of Consciousness In the Breakdown of the Bicameral Mind" by
Dr. Julian Jaynes of Princeton U., shows in his book how leaders of the world
have confused us for thousands of years with rhetoric, mysticism, music, &amp;
theology, so as to better manipulate and tax the poor masses.
Then there was the carburetor invented in the 70's that got 100 MPG. All
of a sudden a major U.S. company bought the patent rights to the carb and
locked it away. Think of the pollution we now have that we could have avoided
if a handful of greedy politicians and oilmen didn't want all of the excess
wealth their oil businesses have afforded them at the cost of our health!
And Bush is an Oil Refinery Contractor from Texas! Remember, the place
where LBJ, Carlos Marcello, and the CIA had Kennedy shot. Oh, but Bush was in
the CIA! Oh and Bush became the head of the CIA - the same folks that killed
JFK to escalate war and drug profits in NAM. A book "The politics of Heroin in
South East Asia" documents the CIA's selling of narcotics to fund operations.
So does the Book "The American Heroin Empire". HOT NEW BOOK ON DRUGWAR SCAM &amp;
COUNTERINSUGENCY IS CALLED "DEEP COVER" BY MICHAEL LEVINE - GET IT NOW!!!!!!!!!
Garrison's book, "On the trail of Assassins" shows how Oswall was indeed also a
CIA agent. Lucky for the CIA &amp; FBI that Oswald died soon after, along with over
a dozen very important witnessess and suspects who perished for unexplainably
weird reasons within a year of JFK's murder. (And David Scheim's book "Contract
On America" provides the evidence showing how Mafia chiefs like Marcello worked
together with the CIA to murder JFK, Robert Kennedy(he prosecuted MOB Bosses
as JFK's Attorney General), Martin Luther King and Malcom X(these two were
begining to expose the facts that the CIA/MOB drug dealers were taking all the
money from the poor people they sold narcotics to!))
But Bush wants a drug war? But his CIA sells drugs(hard narcotics). Let
us impeach Bush for accessory to a felony to import narcotics(He knew about it)
Or impeach him for accessory to JFK's treasonous murder.(It is supreme high
treason to withhold knowledge of a conspiracy to kill a U.S. President - and
treason carries the death penalty!)
Hoover ran the FBI at the time the killing and helped the coverup. Such
twisted justice can be found described in Turner's book, "Hoover's FBI."
Ex-CIA agents have written books like "The CIA File" and "Deadly Deceits" which
further documents the ruthless activities of drug smuggling and crime by
the CIA abroad and at home. (U.S. law strictly forbids CIA operation in U.S.)
"The Cocaine Wars" explains that the CIA now imports South American Cocaine
into U.S. The Mafias do too, but then they also work for the CIA in many areas
like drug smuggling, assassinations, and other clandistine, cloak and dagger
dirty work no longer needed in the global world of the nineties!
According to the book "Poisoning for Profit," by Block and Scarpitti, the
Mafias basically own the nations waste disposal companies and have dumped toxic
waste illegally into U.S. water supplies for decades. If the CIA and the Mafia
work together, then who is committing crimes against the U.S. now?
I would say that the Bush/Oil/CIA/Mafia connection poses the most threat
to U.S. national security for choking US with oil pollution in Air and Water,
killing our presidents, poisoning our water with toxic waste, and getting our
kids hooked on Smack, Coke and Crack - and all for their love of $.
Hell, these guys make the KGB look about as dangerous as a Cub Scout Pack
loaded with water balloons!
But these same guys control the news services too! No one ever hears any
of this. But then no one reads non-fiction books any more either! These books
are all available at a good college or city library to read for free! Just when
Iraq grabbed the headlines months ago, the Gannett news agency reported in a
small article that mostly Texans including G.Bush received over 500,000 bucks
from failing S&amp;L's. Great smokescreen(sandscreen) George! </p>
<p> Oh, and Bush is a life member of the "Skull and Crossbones Club" which is
the American equivalent of the Bavarian Illuminati - the motto of which falls
along the lines of "secrecy or death!" These secret sects were formed by
Lawyers as far back as 1776 to dominate, manipulate and tax the masses!</p>
<p>Part D(Conclusion:)
We the people could all have 2 day work weeks if $.60 out of every $1.00 we
spend did not pay for energy costs they have assessed us soley for their own
gains-this alone is multiple felony counts of interstate fraud/mail fraud by
Bush &amp; Company. (CIA, &amp; Logging, Oil, Chemical &amp; Financial Industries!)
I propose a new order, not of imperfect, selfish, egotistical humans, but of
and through microprocessors. These machines would not rule the world as most
would expect, but would just aid in applying logic to the production of
solutions to the race's survival.
Data on natural resources, human resources, pollution, et cetera, would be
inputed into a program written in Basic language, open to anyone's inspection,
that would give a committee of non-lawyers/oilmen logical options to take in
handling the affairs of the people. Data input into the Basic interpreter by
the committee would be available to all citizens to duplicate and certify the
committees results.
If the program can be run on anyone's PC, then everyone with a PC could
verify the results the committee obtained so as to make sure that the committee
was not exceeding its own authority. The committee would have to post input
data in newspapers for each problem entered, to allow citizens to duplicate the
committee's findings. If the committee obtained results that differed with the
people's results, the committee would be subject to an audit of their hardware
and software systems until the reason was determined that they obtained
different solutions. This would eliminate the possibility for a virus to be
injected into their system and would eliminate the criminal elements from
tampering with our government for their own personal gains!
With such a system, we no longer would have the personal conflicts of
interest that we presently have with our leaders who are so economically tied
to world events and whose "solutions" are now tainted by such events.</p>
<p>---</p>
<p>PART II:</p>
<p>HOW POLITICIANS/ILLUNINATI USE MAFIAS TO DO THERE DIRTY WORK:</p>
<p>"CONTRACT ON AMERICA" =superexpose on mob/cia/illuminati JFK,King,Malcm X hits!</p>
<p>Well go to a good bookstore and aquire the book "Contract On America" by
David E Scheim. Paperback versions have 624 pages and cost 4.95 US bux.
This is probably the best single source on "the conspiracy" by our governent
to work with the Mob to take over the U.S.A. and run it for their personal
profit.</p>
<p>Chapter 21 "More Assassinations"
Documents how the Mob killed Martin Luther/Malcom X because the two had
begun to expose how much the Mob profitted off of ghetto Blacks by
selling drugs to the poor People!</p>
<p>Chapter 22 "Richard Nixon and the Mob."
This chapter documents a multitude of conections between Nixon and
the Mob/Hoffa/Teamsters/and relatives of such.
(in my opinion, Nixon was one of the fuckin greasyest, slimyest, scum
buckets who pretended to work for the People as a "politician" -
- next to Rea-gun and Bush-wacker of course!)</p>
<p>Chapter 23 "The Reagan Administration"</p>
<p>Obviously deals with CIA/Mob connections that Reagan and his cronies like
G.Bush had in those 8 years of blood sucking!</p>
<p>And now for a quote from page 257 of "Contract On America" (read it and weep)</p>
<p> "Organized crime involves itself in the life of every single human being.
It causes prices to be raised; it affects your pocketbook when you go to a
laundry or dry cleaner; the price you pay for food in the market. I have
been involved in and know of bad meat being purchased, unfit for human
consumption, that has been converted into salami in delicatessens and
forced to be sold through grocery stores...
When I testified about Mr DeCarlo, I, too, had the native feel of what
organized crime was.
I saw photographs of graves dug in New Jersey, with over 35 bodies over
a period of years, melted with lye. I sat and heard the voices at dinner
talking over murdering a 12-year-old child and burying bodies in New Jersey...
Narcotics, manipulation of businesses that cause prices to spiral, we can
go on for a long, long time. . . .It goes on and on.</p>
<p> Mob defector Gerald Zelmanowitz, testifying
in 1973 before a U.S. Senate committee"</p>
<p>BUSH &amp; THE MOB:</p>
<p>page 594 states "Gelli is also "very well aquainted with Vice-President-Bush."
(in Mobese this translates to "the two fuckin worked together")</p>
<p>page367 states "On August 2, 1980, as resort-bound Italian and foreign tourists
crowded Italy's Bologna R.R. station, a massive bomb ripped through a waiting
room. The explosion left 85 dead and 200 others injured. It was the worst
terrorist strike in postwar Europe....
....Another defendent in the pending trial(on the bombing) is P2
grandmaster Licio Gelli, now a fugitive believed to be hiding in S Amerika.
In 1981, shortly before fleeing multiple criminal indictments, Gelli had
been an honored guest at Reagan's inaugural ball...
...when police raided Gelli's villa in 1981...they found an exchange of
letters between Gelli and Guarino discussing ways to help "our brother
Michele," refering to Sindona, another P2 member. Sindona, who had curried the
Italian-American vote for Nixon as Guarino did for Reagan, was then on trial
in New York. Gelli also wrote a letter of support to Reagan offering to ensure
favorable coverage for him in the Italian press. The powerful Italian used his
infuence in a major publishing empire to do exactly that....
....the president(Reagan-Bush) has countenanced the use of unsavory
partnerships and methods to further a political agenda. Moreover, two policy
developments of his presidency find disturbing counterparts in Mob ideology and
perhaps reflect traces of the Mob's insidious, post-assassination influence on:
1) A classic mob scam is to assume control of a thriving business and drain
its wealth through massive loans based on its previoously good finacial
standing. During Reagan's 2 terms, Amerikans have been steered along in an orgy
of consumption that has tripled the national debt from $645 billion to
$2 trillion and turned the world's largest creditor nation into the world's
largest debtor.
2) Organized crime's "ultimate solution to everything is to kill somebody,"
as one defector observed. During the early years of Reagan's presidency,
military force became the prime instrument of U.S. foreign policy. Patterned
after a percieved Soviet menace and financed by the ballooning deficit, the
biggest peacetime weapons buildup in U.S. history was conducted. This obsessive
reliance on weaponry was no better exhibited than in the 1985 covert U.S. arms
sale to Iran - obstensibly a good-will gesture - while that nation was known
to be sponsoring terrorism against Amerikan citizens."</p>
<p>Borrow or buy this book and learn even more! It has pictures, and it seems as
though every other sentence is documented with footnotes referencing hard core
sources!</p>
<p>_____</p>
<p>PART III:</p>
<p>*** NEW DRUGWAR COUNTERINSURGENCY MANUAL - "DEEP COVER": ***</p>
<p>"Deep Cover", by Michael Levine (an expose of the
phony drug war by a former undercover operative)
is out in paperback for $6.00. Seems pretty good
reading, and should provide lots of ammunition for
those of us trying to end this "drug war" madness.</p>
<p>(Standard plug: legalized drugs could bring in on
the order of $100 *BILLION* a year in tax revenues,
the best chance to reduce the deficit and pull us
out of the recession. Currently that money is going
overseas to 3rd world drug producers.)</p>
<p>Quote from the book: " ... the secret agencies that
really pull the strings of foreign policy believe that
our two-hundred-BILLION-dollar-a-year drug habit is a
necessary subsidy to keep the millions of poor in Third
World countries from turning to communism ..."</p>
<p>"Once lead the American people into war, and they'll forget there
ever was such a thing as tolerance. To fight you must be brutal
and ruthless, and the spirit of ruthless brutality will enter into
every fiber of our national life ..." --- President Woodrow Wilson</p>
<p>----</p>
<p>PART IV:</p>
<p>ILLUMINATI DIRECTLY LINKED TO CURRENT WORLD EVENTS BY VICTORY CHART:</p>
<p>Hell, I'm Jewish, but it sure as hell to me looks like international
banking is a Religious plot to rule the world. After all, the
major International Banks are owned by three Jewish families, the
Rosenthauls, the Rockefellers, and the Rothschilds! New York City was
owned by 'em until the Japs bought them out! Read a book by a former
Moussad operative(Israeli SS) called "Moussad" to become more enlightened about
this matter! And order the best single source on the Illuminati for *FREE*
by asking for the "Rise and Power of the International Bankers" chart from:</p>
<p> VICTORY BAPTIST CHURCH
900 46TH AVENUE
EAST MOLINE, IL 61244 </p>
<p>(Summary of just one-hundredth of the chart is found at end of this document.)</p>
<p>Jayne's book and I&amp;O Publishing out of Boulder City Nevada will illustrate that
whenever a bunch of religious fanatics do something, they ruin things for all
others. Take the Pope's overpopulation of the earth for example, or the
crusades, or the Koran's evil followers in Arabia. Every time We the People
are left holding the bag naked. I say lets drop the bag in the dumpster. Ditch
religion forever and think for yourself damn-it! I only include this church
literature cause they are involved with the Freedom Movement who, yes, are a
little fanatical, but they are the only ones around who will stand up to
the B.S. that has suppressed so many others, and are the only ones who dare
expose the Illuminati and live to talk about it!</p>
<p>NOW FOR THE SUM OF A MAN'S KNOWLEDGE ABOUT THE ILLUMINATI:</p>
<p>These folks are more secret than Moussad(the Israeli SS) who is the
undisputed ultimate "secret agent men/women" experts of the world.
Therefore, you will find no reliable sources of information on them.
They like to frequent Swiss chalets and spend their loot on good
spirits and women. Oh, they do not have women for members.
Their associates are in international banking and are world leaders of
organized crime. But they are not ever necessarily top world leaders or
top CEO's, but they completely influence the major decisions of most
multinational companies and world leaders.
They are always there but you never see them:
Once, at a coffee shop in an affluent Denver 'burb in the foothills, I ran
across a man of this general authority. With a German accent, he had told
me that if I were to sit at a table, I was to buy coffee, but he did not
work there. He wore a $2,000 Swiss pilot's chronometer on one wrist. His
clothes cost at least half of the watch and he wasn't wearing a suit!
We were just waiting for the rain to stop and I could not believe my ears
when he tried to shoo me away from my dry spot under the curbside table's
canvas awning. I thought carefully and then replied something to the likes
of "The Illuminati would always like for me to be recirculating my money
back into their economic system of manipulation."
As soon as I said this, never mind the weather, he took off. He was a
strong 50 year old Aryan, about 6'1", 200lbs, to my 5'11", 150lbs
but he looked extremely agitated before he left. I could tell he was not
physically scared of me. In fact, he knew all too well what I was saying about
the global economic policies of his "associates" in the Illuminati. You see,
they have so effectively cut off information about even their existence, that
it will damn near give one of them vapor lock if you call their hand!
(Notice that Europe houses the ultimate banks next to Bavaria on Swiss soil,
and note how the Swiss are given International Neutrality to boot so that
the Secret accounts will be safe and stable! I would wager a month of Sundays
that money in a Swiss account is backed by real gold too!)
Bush belongs to the "Skull and Crossbones Club" which is the American
Equivalent of the Illuninati. You have to study at Yale and be in a family that
is part of the old boy system and then you might get in. It is highly secret,
but really is much more well known than the Illuminati. It exists to perpetuate
the existence of the old boys in Amerika, much as the Illuminati does the same
in Europe.
Amazingly, the only reference to the Illuminati that I have ever seen other
than in a few paper back books on mysticism called the Trilogy which actually
are probably right 50% of the time, was in the Unabridged Webster's Dictionary,
where all it dares say is that they were "the members of an anticlerical,
deistic, republican society founded in 1776 by Adam Weishaupt, professor of
law at Ingolstadt in Bavaria. It was suppressed by the Bavarian government in
1785: called also the Order of the Illuminati."
I suppose they had to go deep undercover, much more so than even the Mafia.
This might explain the agitation I evoked in the fellow!
It might be fun to know more about these fellow, but you now know all you
need to know, except their names. Search and destroy! </p>
<p>The Illuminati was formed by the creme de la creme of Europe's most powerful
aristocrats to perpetuate its iron grip on the peasants, to maintain the status
quo, to keep the rich rich, and the poor masses poor.</p>
<p>J.Jaynes book, "The Origin of Consciousness in the Breakdown Of the Bicameral
Mind," explains how for thousands of years, the masses have been hypnotized
into not thinking for themselves by Illuminati like leaders who use mysticism,
religion, music and propaganda to accomplish this. A person can still do very
hard organized work for these manipulators and actually still not ever think in
a non-bicameral or enlightened state of mind. This has allowed the world's
sadistic, oppressive leaders to screw us for 1000's of years.</p>
<p>It appears that the illuminati had penetrated U.S. government from the
beginning. The Illuminati was formed in 1776 by a lawyer in Bavaria.
These esquires snaked their way into the womb of Amerika from the getgo!
I find it revolting and an infinite slap in the face to see lawyers' own symbol
of economic repression on the very money we get shafted for by these leach
lawyers daily. </p>
<p>(In 1776 The European Economic Community (the aristocracy) worried quite
a bit when WE told England to get the Hell outta here, so naturally they
regrouped and formed the Illuminati to deal with US and prevent future colonies
from being so eager to toss the king's tea taxes overboard!)</p>
<p>ACCORDING TO THE RISE AND POWER OF THE INTERNATIONAL BANKERS CHART:</p>
<p>Beginning in 1795, five of the Rothschild's sons were sent to five different
European countries, were the Illuminati/World Banker scam started to spread
in Germany, Vienna, England, Italy, and France. This put them in the top five
countries, where they soon rose to positions of immense power and influence.
Thus the manipulation of global affairs began!</p>
<p>The 10 commandments of the Illuminati are:
1 - Abolish land ownership.
2 - Taxation of the people.
3 - Abolish all rights of inheritance.
4 - Confiscate lands and properties of all rebels.
5 - Centralize credit - Create National banks.
6 - Control transportation and communication.
7 - State owned factories.
8 - Equal liability of all to labor.
9 - Distribution of the population.
10 - Free education to all in "public" schools.
(Sounds like bigbro ta me, Booboo!)</p>
<p>The chart shows that in 1798 the following 3 things occurred:
1 - Washington warned of the danger of the Illuminati.
2 - Jefferson wrote to John Adams stating that he agreed with
him that the international bankers were more powerful and
dangerous than standing armies.
3 - Professor John Robinson exposed it in his book, " PROOFS OF
A CONSPIRACY."</p>
<p>And then in 1836, Andrew Jackson abolished the central bank. If this
measure had not been taken, America would have fallen to the
International bankers at this time.</p>
<p>NOTE: the last 40 lines were 1% of the data on the chart showing the
Illuminati's links and activities as "Control," which appears
to be their new name. Get the damn chart - I don't care what
you think of Baptists, these folks are just helping us now!
?
* * * * * * * * * * * * * * *
* PLEASE COPY AND DISTRIBUTE THIS TO AS MANY PEOPLE AS POSSIBLE !!! *
* SEND A COPY TO YOUR POLICE, GOVERNORS, LEGISLATORS, RELATIVES !!! *
* * * * * * * * * * * * * * *
____________________
| __ .__ |
| |__| |__| " |
| |
| DON'T TREAD ON ME! |
|____________________|
</p></xml>

576
regexConsp/bor-stat.xml Normal file
View File

@ -0,0 +1,576 @@
<xml><p> Feel free to copy this article far and wide, but please
keep my name and this sentence on it.</p>
<p> The Bill of Rights, a Status Report
by Eric Postpischil</p>
<p> 4 September 1990</p>
<p> 6 Hamlett Drive, Apt. 17
Nashua, NH 03062</p>
<p> edp@jareth.enet.dec.com</p>
<p> How many rights do you have? You should check, because it
might not be as many today as it was a few years ago, or
even a few months ago. Some people I talk to are not
concerned that police will execute a search warrant without
knocking or that they set up roadblocks and stop and
interrogate innocent citizens. They do not regard these as
great infringements on their rights. But when you put
current events together, there is information that may be
surprising to people who have not yet been concerned: The
amount of the Bill of Rights that is under attack is
alarming.</p>
<p> Let's take a look at the Bill of Rights and see which
aspects are being pushed on or threatened. The point here
is not the degree of each attack or its rightness or
wrongness, but the sheer number of rights that are under
attack.</p>
<p> Amendment I</p>
<p> Congress shall make no law respecting an
establishment of religion, or prohibiting the
free exercise thereof; or abridging the freedom
of speech, or of the press; or the right of the
people peaceably to assemble, and to petition the
Government for a redress of grievances.</p>
<p> ESTABLISHING RELIGION: While campaigning for his first
term, George Bush said "I don't know that atheists should
be considered as citizens, nor should they be considered
patriots." Bush has not retracted, commented on, or
clarified this statement, in spite of requests to do so.
According to Bush, this is one nation under God. And
apparently if you are not within Bush's religious beliefs,
you are not a citizen. Federal, state, and local
governments also promote a particular religion (or,
occasionally, religions) by spending public money on
religious displays.</p>
<p> FREE EXERCISE OF RELIGION: Robert Newmeyer and Glenn
Braunstein were jailed in 1988 for refusing to stand in
respect for a judge. Braunstein says the tradition of
rising in court started decades ago when judges entered
carrying Bibles. Since judges no longer carry Bibles,
Braunstein says there is no reason to stand -- and his
Bible tells him to honor no other God. For this religious
practice, Newmeyer and Braunstein were jailed and are now
suing.</p>
<p> FREE SPEECH: We find that technology has given the
government an excuse to interfere with free speech.
Claiming that radio frequencies are a limited resource, the
government tells broadcasters what to say (such as news and
public and local service programming) and what not to say
(obscenity, as defined by the Federal Communications
Commission [FCC]). The FCC is investigating Boston PBS
station WGBH-TV for broadcasting photographs from the
Mapplethorpe exhibit.</p>
<p> FREE SPEECH: There are also laws to limit political
statements and contributions to political activities. In
1985, the Michigan Chamber of Commerce wanted to take out
an advertisement supporting a candidate in the state house
of representatives. But a 1976 Michigan law prohibits a
corporation from using its general treasury funds to make
independent expenditures in a political campaign. In
March, the Supreme Court upheld that law. According to
dissenting Justice Kennedy, it is now a felony in Michigan
for the Sierra Club, the American Civil Liberties Union, or
the Chamber of Commerce to advise the public how a
candidate voted on issues of urgent concern to their
members.</p>
<p> FREE PRESS: As in speech, technology has provided another
excuse for government intrusion in the press. If you
distribute a magazine electronically and do not print
copies, the government doesn't consider you a press and
does not give you the same protections courts have extended
to printed news. The equipment used to publish Phrack, a
worldwide electronic magazine about phones and hacking, was
confiscated after publishing a document copied from a Bell
South computer entitled "A Bell South Standard Practice
(BSP) 660-225-104SV Control Office Administration of
Enhanced 911 Services for Special Services and Major
Account Centers, March, 1988." All of the information in
this document was publicly available from Bell South in
other documents. The government has not alleged that the
publisher of Phrack, Craig Neidorf, was involved with or
participated in the copying of the document. Also, the
person who copied this document from telephone company
computers placed a copy on a bulletin board run by Rich
Andrews. Andrews forwarded a copy to AT&amp;T officials and
cooperated with authorities fully. In return, the Secret
Service (SS) confiscated Andrews' computer along with all
the mail and data that were on it. Andrews was not charged
with any crime.</p>
<p> FREE PRESS: In another incident that would be comical if
it were not true, on March 1 the SS ransacked the offices
of Steve Jackson Games (SJG); irreparably damaged property;
and confiscated three computers, two laser printers,
several hard disks, and many boxes of paper and floppy
disks. The target of the SS operation was to seize all
copies of a game of fiction called GURPS Cyberpunk. The
Cyberpunk game contains fictitious break-ins in a
futuristic world, with no technical information of actual
use with real computers, nor is it played on computers.
The SS never filed any charges against SJG but still
refused to return confiscated property.</p>
<p> PEACEABLE ASSEMBLY: The right to assemble peaceably is no
longer free -- you have to get a permit. Even that is not
enough; some officials have to be sued before they realize
their reasons for denying a permit are not Constitutional.</p>
<p> PEACEABLE ASSEMBLY: In Alexandria, Virginia, there is a
law that prohibits people from loitering for more than
seven minutes and exchanging small objects. Punishment is
two years in jail. Consider the scene in jail: "What'd
you do?" "I was waiting at a bus stop and gave a guy a
cigarette." This is not an impossible occurrence: In
Pittsburgh, Eugene Tyler, 15, has been ordered away from
bus stops by police officers. Sherman Jones, also 15, was
accosted with a police officer's hands around his neck
after putting the last bit of pizza crust into his mouth.
The police suspected him of hiding drugs.</p>
<p> PETITION FOR REDRESS OF GRIEVANCES: Rounding out the
attacks on the first amendment, there is a sword hanging
over the right to petition for redress of grievances.
House Resolution 4079, the National Drug and Crime
Emergency Act, tries to "modify" the right to habeas
corpus. It sets time limits on the right of people in
custody to petition for redress and also limits the courts
in which such an appeal may be heard.</p>
<p> Amendment II</p>
<p> A well regulated Militia, being necessary to the
security of a free State, the right of the people
to keep and bear Arms, shall not be infringed.</p>
<p> RIGHT TO BEAR ARMS: This amendment is so commonly
challenged that the movement has its own name: gun
control. Legislation banning various types of weapons is
supported with the claim that the weapons are not for
"legitimate" sporting purposes. This is a perversion of
the right to bear arms for two reasons. First, the basis
of freedom is not that permission to do legitimate things
is granted to the people, but rather that the government is
empowered to do a limited number of legitimate things --
everything else people are free to do; they do not need to
justify their choices. Second, should the need for defense
arise, it will not be hordes of deer that the security of a
free state needs to be defended from. Defense would be
needed against humans, whether external invaders or
internal oppressors. It is an unfortunate fact of life
that the guns that would be needed to defend the security
of a state are guns to attack people, not guns for sporting
purposes.</p>
<p> Firearms regulations also empower local officials, such as
police chiefs, to grant or deny permits. This results in
towns where only friends of people in the right places are
granted permits, or towns where women are generally denied
the right to carry a weapon for self-defense.</p>
<p> Amendment III</p>
<p> No Soldier shall, in time of peace be quartered
in any house, without the consent of the Owner,
nor in time of war, but in a manner to be
prescribed by law.</p>
<p> QUARTERING SOLDIERS: This amendment is fairly clean so
far, but it is not entirely safe. Recently, 200 troops in
camouflage dress with M-16s and helicopters swept through
Kings Ridge National Forest in Humboldt County, California.
In the process of searching for marijuana plants for four
days, soldiers assaulted people on private land with M-16s
and barred them from their own property. This might not be
a direct hit on the third amendment, but the disregard for
private property is uncomfortably close.</p>
<p> Amendment IV</p>
<p> The right of the people to be secure in their
persons, houses, papers and effects, against
unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be seized.</p>
<p> RIGHT TO BE SECURE IN PERSONS, HOUSES, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: The RICO law
is making a mockery of the right to be secure from seizure.
Entire stores of books or videotapes have been confiscated
based upon the presence of some sexually explicit items.
Bars, restaurants, or houses are taken from the owners
because employees or tenants sold drugs. In Volusia
County, Florida, Sheriff Robert Vogel and his officers stop
automobiles for contrived violations. If large amounts of
cash are found, the police confiscate it on the PRESUMPTION
that it is drug money -- even if there is no other evidence
and no charges are filed against the car's occupants. The
victims can get their money back only if they prove the
money was obtained legally. One couple got their money
back by proving it was an insurance settlement. Two other
men who tried to get their two thousand dollars back were
denied by the Florida courts.
RIGHT TO BE SECURE IN PERSONS, HOUSES, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: A new law goes
into effect in Oklahoma on January 1, 1991. All property,
real and personal, is taxable, and citizens are required to
list all their personal property for tax assessors,
including household furniture, gold and silver plate,
musical instruments, watches, jewelry, and personal,
private, or professional libraries. If a citizen refuses
to list their property or is suspected of not listing
something, the law directs the assessor to visit and enter
the premises, getting a search warrant if necessary. Being
required to tell the state everything you own is not being
secure in one's home and effects.
NO WARRANTS SHALL ISSUE, BUT UPON PROBABLE CAUSE, SUPPORTED
BY OATH OR AFFIRMATION: As a supporting oath or
affirmation, reports of anonymous informants are accepted.
This practice has been condoned by the Supreme Court.</p>
<p> PARTICULARLY DESCRIBING THE PLACE TO BE SEARCHED AND
PERSONS OR THINGS TO BE SEIZED: Today's warrants do not
particularly describe the things to be seized -- they list
things that might be present. For example, if police are
making a drug raid, they will list weapons as things to be
searched for and seized. This is done not because the
police know of any weapons and can particularly describe
them, but because they allege people with drugs often have
weapons.</p>
<p> Both of the above apply to the warrant the Hudson, New
Hampshire, police used when they broke down Bruce Lavoie's
door at 5 a.m. with guns drawn and shot and killed him.
The warrant claimed information from an anonymous
informant, and it said, among other things, that guns were
to be seized. The mention of guns in the warrant was used
as reason to enter with guns drawn. Bruce Lavoie had no
guns. Bruce Lavoie was not secure from unreasonable search
and seizure -- nor is anybody else.</p>
<p> Other infringements on the fourth amendment include
roadblocks and the Boston Police detention of people based
on colors they are wearing (supposedly indicating gang
membership). And in Pittsburgh again, Eugene Tyler was
once searched because he was wearing sweat pants and a
plaid shirt -- police told him they heard many drug dealers
at that time were wearing sweat pants and plaid shirts.
</p>
<p> Amendment V</p>
<p> No person shall be held to answer for a capital,
or otherwise infamous crime, unless on a
presentment or indictment of a Grand Jury, except
in cases arising in the land or naval forces, or
in the Militia, when in actual service in time of
War or public danger; nor shall any person be
subject to the same offence to be twice put in
jeopardy of life or limb; nor shall be compelled
in any criminal case to be a witness against
himself, nor be deprived of life, liberty, or
property, without due process of law; nor shall
private property be taken for public use without
just compensation.</p>
<p> INDICTMENT OF A GRAND JURY: Kevin Bjornson has been
proprietor of Hydro-Tech for nearly a decade and is a
leading authority on hydroponic technology and cultivation.
On October 26, 1989, both locations of Hydro-Tech were
raided by the Drug Enforcement Administration. National
Drug Control Policy Director William Bennett has declared
that some indoor lighting and hydroponic equipment is
purchased by marijuana growers, so retailers and
wholesalers of such equipment are drug profiteers and
co-conspirators. Bjornson was not charged with any crime,
nor subpoenaed, issued a warrant, or arrested. No illegal
substances were found on his premises. Federal officials
were unable to convince grand juries to indict Bjornson.
By February, they had called scores of witnesses and
recalled many two or three times, but none of the grand
juries they convened decided there was reason to criminally
prosecute Bjornson. In spite of that, as of March, his
bank accounts were still frozen and none of the inventories
or records had been returned. Grand juries refused to
indict Bjornson, but the government is still penalizing
him.</p>
<p> TWICE PUT IN JEOPARDY OF LIFE OR LIMB: Members of the
McMartin family in California have been tried two or three
times for child abuse. Anthony Barnaby was tried for
murder (without evidence linking him to the crime) three
times before New Hampshire let him go.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: Oliver North
was forced to testify against himself. Congress granted
him immunity from having anything he said to them being
used as evidence against him, and then they required him to
talk. After he did so, what he said was used to find other
evidence which was used against him. The courts also play
games where you can be required to testify against yourself
if you testify at all.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: In the New York
Central Park assault case, three people were found guilty
of assault. But there was no physical evidence linking
them to the crime; semen did not match any of the
defendants. The only evidence the state had was
confessions. To obtain these confessions, the police
questioned a 15-year old without a parent present -- which
is illegal under New York state law. Police also refused
to let the subject's Big Brother, an attorney for the
Federal government, see him during questioning. Police
screamed "You better tell us what we want to hear and
cooperate or you are going to jail," at 14-year-old Antron
McCray, according to Bobby McCray, his father. Antron
McCray "confessed" after his father told him to, so that
police would release him. These people were coerced into
bearing witness against themselves, and those confessions
were used to convict them.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: Your answers to
Census questions are required by law, with a $100 penalty
for each question not answered. But people have been
evicted for giving honest Census answers. According to the
General Accounting Office, one of the most frequent ways
city governments use census information is to detect
illegal two-family dwellings. This has happened in
Montgomery County, Maryland; Pullman, Washington; and Long
Island, New York. The August 8, 1989, Wall Street Journal
reports this and other ways Census answers have been used
against the answerers.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: Drug tests are
being required from more and more people, even when there
is no probable cause, no accident, and no suspicion of drug
use. Requiring people to take drug tests compels them to
provide evidence against themselves.
DEPRIVED OF LIFE, LIBERTY, OR PROPERTY WITHOUT DUE PROCESS
OF LAW: This clause is violated on each of the items life,
liberty, and property. Incidents including such violations
are described elsewhere in this article. Here are two
more: On March 26, 1987, in Jeffersontown, Kentucky,
Jeffrey Miles was killed by police officer John Rucker, who
was looking for a suspected drug dealer. Rucker had been
sent to the wrong house; Miles was not wanted by police.
He received no due process. In Detroit, $4,834 was seized
from a grocery store after dogs detected traces of cocaine
on three one-dollar bills in a cash register.
PRIVATE PROPERTY TAKEN FOR PUBLIC USE WITHOUT JUST
COMPENSATION: RICO is shredding this aspect of the Bill of
Rights. The money confiscated by Sheriff Vogel goes
directly into Vogel's budget; it is not regulated by the
legislature. Federal and local governments seize and
auction boats, buildings, and other property. Under RICO,
the government is seizing property without due process.
The victims are required to prove not only that they are
not guilty of a crime, but that they are entitled to their
property. Otherwise, the government auctions off the
property and keeps the proceeds.</p>
<p> Amendment VI</p>
<p> In all criminal prosecutions, the accused shall
enjoy the right to a speedy and public trial, by
an impartial jury of the State and district
wherein the crime shall have been committed,
which district shall have been previously
ascertained by law, and to be informed of the
nature and cause of the accusation; to be
confronted with the witnesses against him; to
have compulsory process for obtaining Witnesses
in his favor, and to have the assistance of
counsel for his defence.
THE RIGHT TO A SPEEDY AND PUBLIC TRIAL: Surprisingly, the
right to a public trial is under attack. When Marion Barry
was being tried, the prosecution attempted to bar Louis
Farrakhan and George Stallings from the gallery. This
request was based on an allegation that they would send
silent and "impermissible messages" to the jurors. The
judge initially granted this request. One might argue that
the whole point of a public trial is to send a message to
all the participants: The message is that the public is
watching; the trial had better be fair.
BY AN IMPARTIAL JURY: The government does not even honor
the right to trial by an impartial jury. US District Judge
Edward Rafeedie is investigating improper influence on
jurors by US marshals in the Enrique Camarena case. US
marshals apparently illegally communicated with jurors
during deliberations.
OF THE STATE AND DISTRICT WHEREIN THE CRIME SHALL HAVE BEEN
COMMITTED: This is incredible, but Manuel Noriega is being
tried so far away from the place where he is alleged to
have committed crimes that the United States had to invade
another country and overturn a government to get him. Nor
is this a unique occurrence; in a matter separate from the
Camarena case, Judge Rafeedie was asked to dismiss charges
against Mexican gynecologist Dr. Humberto Alvarez Machain
on the grounds that the doctor was illegally abducted from
his Guadalajara office in April and turned over to US
authorities.</p>
<p> TO BE INFORMED OF THE NATURE AND CAUSE OF THE ACCUSATION:
Steve Jackson Games, nearly put out of business by the raid
described previously, has been stonewalled by the SS. "For
the past month or so these guys have been insisting the
book wasn't the target of the raid, but they don't say what
the target was, or why they were critical of the book, or
why they won't give it back," Steve Jackson says. "They
have repeatedly denied we're targets but don't explain why
we've been made victims." Attorneys for SJG tried to find
out the basis for the search warrant that led to the raid
on SJG. But the application for that warrant was sealed by
order of the court and remained sealed at last report, in
July. Not only has the SS taken property and nearly
destroyed a publisher, it will not even explain the nature
and cause of the accusations that led to the raid.</p>
<p> TO BE CONFRONTED WITH THE WITNESSES AGAINST HIM: The courts
are beginning to play fast and loose with the right to
confront witnesses. Watch out for anonymous witnesses and
videotaped testimony.</p>
<p> TO HAVE COMPULSORY PROCESS FOR OBTAINING WITNESSES: Ronald
Reagan resisted submitting to subpoena and answering
questions about Irangate, claiming matters of national
security and executive privilege. A judge had to dismiss
some charges against Irangate participants because the
government refused to provide information subpoenaed by the
defendants. And one wonders if the government would go
to the same lengths to obtain witnesses for Manuel Noriega
as it did to capture him.</p>
<p> TO HAVE THE ASSISTANCE OF COUNSEL: The right to assistance
of counsel took a hit recently. Connecticut Judge Joseph
Sylvester is refusing to assign public defenders to people
ACCUSED of drug-related crimes, including drunk driving.</p>
<p> TO HAVE THE ASSISTANCE OF COUNSEL: RICO is also affecting
the right to have the assistance of counsel. The
government confiscates the money of an accused person,
which leaves them unable to hire attorneys. The IRS has
served summonses nationwide to defense attorneys, demanding
the names of clients who paid cash for fees exceeding
$10,000.</p>
<p> Amendment VII</p>
<p> In Suits at common law, where the value in
controversy shall exceed twenty dollars, the
right of trial by jury shall be preserved, and no
fact tried by a jury, shall be otherwise
reexamined in any Court of the United States,
than according to the rules of common law.</p>
<p> RIGHT OF TRIAL BY JURY IN SUITS AT COMMON LAW: This is a
simple right; so far the government has not felt threatened
by it and has not made attacks on it that I am aware of.
This is our only remaining safe haven in the Bill of Rights.</p>
<p> Amendment VIII</p>
<p> Excessive bail shall not be required, nor
excessive fines imposed, nor cruel and unusual
punishments inflicted.</p>
<p> EXCESSIVE BAIL AND FINES: Tallahatchie County in
Mississippi charges ten dollars a day to each person who
spends time in the jail, regardless of the length of stay
or the outcome of their trial. This means innocent people
are forced to pay. Marvin Willis was stuck in jail for 90
days trying to raise $2,500 bail on an assault charge. But
after he made that bail, he was kept imprisoned because he
could not pay the $900 rent Tallahatchie demanded. Nine
former inmates are suing the county for this practice.</p>
<p> CRUEL AND UNUSUAL PUNISHMENTS: House Resolution 4079
sticks its nose in here too: "... a Federal court shall
not hold prison or jail crowding unconstitutional under the
eighth amendment except to the extent that an individual
plaintiff inmate proves that the crowding causes the
infliction of cruel and unusual punishment of that
inmate."</p>
<p> CRUEL AND UNUSUAL PUNISHMENTS: A life sentence for selling
a quarter of a gram of cocaine for $20 -- that is what
Ricky Isom was sentenced to in February in Cobb County,
Georgia. It was Isom's second conviction in two years, and
state law imposes a mandatory sentence. Even the judge
pronouncing the sentence thinks it is cruel; Judge Tom
Cauthorn expressed grave reservations before sentencing
Isom and Douglas Rucks (convicted of selling 3.5 grams of
cocaine in a separate but similar case). Judge Cauthorn
called the sentences "Draconian."</p>
<p> Amendment IX</p>
<p> The enumeration in the Constitution, of certain
rights, shall not be construed to deny or
disparage others retained by the people.</p>
<p> OTHER RIGHTS RETAINED BY THE PEOPLE: This amendment is so
weak today that I will ask not what infringements there are
on it but rather what exercise of it exists at all? What
law can you appeal to a court to find you not guilty of
violating because the law denies a right retained by you?</p>
<p> Amendment X</p>
<p> The powers not delegated to the United States by
the Constitution, nor prohibited by it to the
States, are reserved to the States respectively,
or to the people.</p>
<p> POWERS RESERVED TO THE STATES OR THE PEOPLE: This
amendment is also weak, although it is not so nonexistent
as the ninth amendment. But few states set their own speed
limits or drinking age limits. Today, we mostly think of
this country as the -- singular -- United States, rather
than a collection of states. This concentration of power
detaches laws from the desires of people -- and even of
states. House Resolution 4079 crops up again here -- it
uses financial incentives to get states to set specific
penalties for certain crimes. Making their own laws
certainly must be considered a right of the states, and
this right is being infringed upon.</p>
<p> Out of ten amendments, nine are under attack, most of them
under multiple attacks of different natures, and some of
them under a barrage. If this much of the Bill of Rights
is threatened, how can you be sure your rights are safe? A
right has to be there when you need it. Like insurance,
you cannot afford to wait until you need it and then set
about procuring it or ensuring it is available. Assurance
must be made in advance.</p>
<p> The bottom line here is that your rights are not safe. You
do not know when one of your rights will be violated. A
number of rights protect accused persons, and you may think
it is not important to protect the rights of criminals.
But if a right is not there for people accused of crimes,
it will not be there when you need it. With the Bill of
Rights in the sad condition described above, nobody can be
confident they will be able to exercise the rights to which
they are justly entitled. To preserve our rights for
ourselves in the future, we must defend them for everybody
today.
</p></xml>

727
regexConsp/brainwsh.xml Normal file
View File

@ -0,0 +1,727 @@
<xml><p></p>
<p>NOTE: This is a report on Government and military techniques, notterrorist!</p>
<p> B R A I N W A S H I N G
By Lorenzo Saint Dubois</p>
<p>The report that follows is a condensation of a study by training experts of
the important information available on this subject.</p>
<p> BACKGROUND</p>
<p>Brainwashing, as a technique, has been used for centuries and is no mystery
to psychologists. In this sense, brainwashing means involuntary re-education
of basic beliefs and values. All people are being re-educated continually.
New information changes one's beliefs.</p>
<p>Everyone has experienced to some degree the conflict that ensues when new
information is not consistent with prior belief.</p>
<p>The experience of the brainwashed individual differs in that the inconsistent
information is forced upon the individual under controlled conditions after
the possibility of critical judgment has been removed by a variety of
methods.</p>
<p>There is no question that an individual can be broken psychologically by
captors with knowledge and willingness to persist in techniques aimed at
deliberately destroying the integration of a personality. Although it is
probable that everyone reduced to such a confused, disoriented state will
respond to the introduction of new beliefs, this cannot be stated
dogmatically.</p>
<p> HUMAN CONTROL AND REACTION TO CONTROL</p>
<p>There are progressive steps in exercising control over an individual and
changing his behaviour and personality integration.</p>
<p>The following five steps are typical of behaviour changes in any controlled
individual:</p>
<p>1. Making the individual aware of control is the first stage in changing his
behaviour. A small child is made aware of the physical and psychological
control of his parents and quickly recognizes that an overwhelming force
must be reckoned with.</p>
<p> So a controlled adult comes to recognize the overwhelming powers of the
state and the impersonal, incarcerative machinery in which he is enmeshed.
The individual recognizes that definite limits have been put upon the ways
he can respond.</p>
<p>2. Realization of his complete dependence upon the controlling system is a
major factor in the controlling of his behaviour.</p>
<p> The controlled adult is forced to accept the fact that food, tobacco,
praise and the only social contact that he will get come from the very
interrogator who exercises control over him.</p>
<p>3. The awareness of control and recognition of dependence result in causing
internal conflict and breakdown of previous patterns of behaviour.</p>
<p> Although this transition can be relatively mild in the case of a child,
it is almost invariably severe for the adult undergoing brainwashing.
Only an individual who holds his values lightly can change them easily.</p>
<p> Since the brainwasher/interrogators aim to have the individuals undergo
profound emotional change, they force their victims to seek out painfully
what is desired by the controlling individual. During this period the
victim is likely to have a mental breakdown characterized by delusions
and hallucinations.</p>
<p>4. Discovery that there is an acceptable solution to his problem is the
first stage of reducing the individuals conflict.</p>
<p> It is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror of
internal conflict would cease and that perhaps they would not be driven
insane.</p>
<p> It is at this point that they are prepared to make major changes in their
value system. This is an automatic rather than voluntary choice. They have
lost their ability to be critical.</p>
<p>5. Reintegration of values and identification with the controlling system is
the final stage in changing the behaviour of the controlled individual.</p>
<p> A child who has learned a new, socially desirable behaviour demonstrates
its importance by attempting to as apt the new behaviour to a variety of
other situations. Similar states in the brainwashed adult are pitiful.</p>
<p> His new value-system, his manner of perceiving, organizing, and giving
meaning to events, is virtually independent of his former value system.
He is no longer capable of thinking or speaking in concepts other than
those he has adopted. He tends to identify by expressing thanks to his
captors for helping him see the light.</p>
<p> Anyone willing to use known principles of control and reactions to
control and capable of demonstrating the patience needed in raising a
child can probably achieve successful brainwashing.</p>
<p> CONTROL TECHNIQUES AND THEIR EFFECTS</p>
<p>A description of usual communist control techniques follows.</p>
<p>INTERROGATION</p>
<p>There are at least two ways in which interrogation is used:</p>
<p>A. Elicitation, which is designed to get the individual to surrender
protected information, is a form of interrogation. One major difference
between elicitation and interrogation used to achieve brainwashing is that
the mind of the individual must be kept clear to permit coherent,
undistorted disclosure of protected information.</p>
<p>B. Elicitation for the purpose of brainwashing consists of questioning,
argument, indoctrination, threats, cajolery, praise, hostility and a
variety of other pressures. The aim of this interrogation is to hasten the
breakdown of the individual's value system and to encourage the substitution
of a different valuesystem.</p>
<p>The procurement of protected information is secondary and is used as a
device to increase pressure upon the individual. The term interrogation in
this article will refer in general, to this type. The interrogator is the
individual who conducts this type of interrogation and who controls the
administration of the other pressures. He is the protagonist against whom
the victim develops his conflict and upon whom the victim develops a state
of dependency as he seeks some solution to his conflict.</p>
<p>PHYSICAL TORTURE &amp; THREATS OF TORTURE</p>
<p>Two types of physical torture are distinguishable more by their psychological
effect in inducing conflict than by the degree of painfulness:</p>
<p>A. The first type is one in which the victim has a passive role in the pain
inflicted on him (e.g., beatings). His conflict involves the decision of
whether or not to give in to demands in order to avoid further pain.
Generally, brutality of this type was not found to achieve the desired
results. Threats of torture were found more effective, as fear of pain
causes greater conflict within the individual than does pain itself.</p>
<p>B. The second type of torture is represented by requiring the individual to
stand in one spot for several hours or assume some other pain-inducing
position. Such a requirement often engenders in the individual a
determination to stick it out. This internal act of resistance provide a
feeling of moral superiority at first. As time passes and his pain mounts,
the individual becomes aware that it is his own original determination to
resist that is causing the continuance of pain.</p>
<p>A conflict develops within the individual between his moral determination and
his desire to collapse and discontinue the pain. It is this extra internal
conflict, in addition to the conflict over whether or not to give in to the
demands made of him, that tends to make this method of torture more
effective in the breakdown of the individual personality.</p>
<p>
ISOLATION</p>
<p>Individual differences in reaction to isolation are probably greater than to
any other method. Some individuals appear to be able to withstand prolonged
periods of isolation without deleterious effects, while a relatively short
period of isolation reduces others to the verge of psychosis. Reaction
varies with the conditions of the isolation cell.</p>
<p>Some sources have indicated a strong reaction to filth and vermin, although
they had negligible reactions to the isolation. Others reacted violently to
isolation in relatively clean cells. The predominant cause of breakdown in
such situations is a lack of sensory stimulation (i.e., grayness of walls,
lack of sound, absence of social contact, etc.). Experimental subjects
exposed to this condition have reported vivid hallucinations and
overwhelming fears of losing their sanity.</p>
<p>CONTROL OF COMMUNICATION</p>
<p>This is one of the most effective methods for creating a sense of
helplessness and despair. This measure might well be considered the
cornerstone of the system of control. It consists of strict regulation of
the mail, reading materials, broadcast materials and social contact
available to the individual. The need to communicate is so great that when
the usual channels are blocked, the individual will resort to any open
channel, almost regardless of the implications of using that particular
channel.</p>
<p>Many POWs in Korea, whose only act of collaboration was to sign petitions
and peace appeals, defended their actions on the ground that this was the
only method of letting the outside world know they were still alive.</p>
<p>Many stated that their morale and fortitude would have been increased
immeasurably had leaflets of encouragement been dropped to them. When the
only contact with the outside world is via the interrogator, the prisoner
comes to develop extreme dependency on his interrogator and hence loses
another prop to his morale.</p>
<p>Another wrinkle in communication control is the informer system. The
recruitment of informers in POW camps discouraged communication between
inmates. POWs who feared that every act or thought of resistance would be
communicated to camp administrators, lost faith in their fellow man and
were forced to untrusting individualism. Informers are also under several
stages of brainwashing and elicitation to develop and maintain control over
the victims.</p>
<p>INDUCTION OF FATIGUE</p>
<p>This is a well-known device for breaking will power and critical powers of
judgment. Deprivation of sleep results in more intense psychological
debilitation than does any other method of engendering fatigue. They vary
their methods.</p>
<p>Conveyor belt interrogation that last 50-60 hours will make almost any
individual compromise, but there is danger that this will kill the victim.
It is safer to conduct interrogations of 8-10 hours at night while forcing
the prisoner to remain awake during the day. Additional interruptions in the
remaining 2-3 hours of allotted sleep quickly reduce the most resilient
individual.</p>
<p>Alternate administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression. Fatigue, in addition to reducing the will to resist, also
produces irritation and fear that arise from increased slips of the
tongue forgetfulness and decreased ability to maintain orderly thought
processes.</p>
<p>CONTROL OF FOOD, WATER AND TOBACCO</p>
<p>The controlled individual is made intensely aware of his dependence upon his
interrogator for the quality and quantity of his food and tobacco. The
exercise of this control usually follows a pattern.</p>
<p>No food and little or no water is permitted the individual for several
days prior to interrogation. When the prisoner first complains of this to
the interrogator, the latter expresses surprise at such inhumane treatment.</p>
<p>He makes a demand of the prisoner, if the latter complies, he receives a
good meal. If he does not, he gets a diet of unappetizing food containing
limited vitamins, minerals and calories.</p>
<p>This diet is supplemented occasionally by the interrogator if the prisoner
cooperates. Studies of controlled starvation indicate that the whole value-
system of the subjects underwent a change. Their irritation increased
as their ability to think clearly decreased. The control of tobacco presented
an even greater source of conflict for heavy smokers. Because tobacco is not
necessary to life, being manipulated by his craving for it can in the
individual a strong sense of guilt.</p>
<p>CRITICISM AND SELF-CRITICISM</p>
<p>There are mechanisms of thought control. Self-criticism gains its
effectiveness from the fact that although it is not a crime for a man to be
wrong, it is a major crime to be stubborn and to refuse to learn. Many
individuals feel intensely relieved in being able to share their sense of
guilt.</p>
<p>Those individuals however, who have adjusted to handling their guilt
internally have difficulty adapting to criticism and self-criticism. In
brainwashing, after a sufficient sense of guilt has been created in the
individual, sharing and self-criticism permit relief. The price paid for
this relief, however, is loss of individuality and increased dependency.</p>
<p>HYPNOSIS AND DRUGS AS CONTROLS</p>
<p>There is no reliable evidence of making widespread use of drugs or hypnosis
in brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and mood swings.</p>
<p>Other methods of control, which when used in conjunction with the basic
processes, hasten the deterioration of prisoners' sense of values and
resistance are:</p>
<p>A. Requiring a case history or autobiography of the prisoner provides a mine
of information for the interrogator in establishing and documenting
accusations.</p>
<p>B. Friendliness of the interrogator, when least expected, upsets the
prisoner's ability to maintain a critical attitude.</p>
<p>C. Petty demands, such as severely limiting the allotted time for use of
toilet facilities or requiring the POW to kill hundreds of flies, are
harassment methods.</p>
<p>D. Prisoners are often humiliated by refusing them the use of toilet
facilities during interrogation, until they soil themselves. Often
prisoners were not permitted to bathe for weeks until they felt
contemptible.</p>
<p>E. Conviction as a war criminal appears to be a potent factor in creating
despair in the individual. One official analysis of the pressures exerted
by the ChiComs on confessors and non-confessors to participation in
bacteriological warfare in Korea showed that actual trial and conviction
of war crimes was overwhelmingly associated with breakdown and confession.</p>
<p>F. Attempted elicitation of protected information at various times during
the brainwashing process diverted the individual from awareness of the
deterioration of his value-system.</p>
<p>The fact that, in most cases, the ChiComs did not want or need such
intelligence was not known to the prisoner. His attempts to protect
such information was made at the expense of hastening his own breakdown.</p>
<p> EXERCISE OF CONTROL
A SCHEDULE FOR BRAINWASHING</p>
<p>From the many fragmentary accounts reviewed, the following appears to be the
most likely description of what occurs during brainwashing. In the period
immediately following capture, the captors are faced with the problem of
deciding on best ways of exploitation of the prisoners.</p>
<p>Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. Concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological softening-up which
includes: limited unpalatable food rations, withholding of tobacco, possible
work details, severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness, limitation of sleep such as requiring a
subject to sleep with a bright light in his eyes.</p>
<p>The interrogation and autobiographical material, the reports of the
prisoner's behaviour in confinement and tentative personality typing by the
interrogators, provide the basis upon which exploitation plans are made.</p>
<p>There is a major difference between preparation for elicitation and for
brainwashing. Prisoners exploited through elicitation must retain sufficient
clarity of thought to be able to give coherent, factual accounts.</p>
<p>In brainwashing, on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defence, the controlled individual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes. The
most important aspect of the brainwashing process is the interrogation. The
other pressures are designed primarily to help the interrogator achieve his
goals. The following states are created systematically within the
individual. These may vary in order, but all are necessary to the
brainwashing process:</p>
<p>1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.
2. An initial reaction of surprise.
3. A feeling of uncertainty about what is required of him.
4. A developing feeling of dependence upon the interrogator.
5. A sense of doubt and loss of objectivity.
6. Feelings of guilt.
7. A questioning attitude toward his own value-system.
8. A feeling of potential breakdown i.e., that he might go crazy.
9. A need to defend his acquired principles.
10. A final sense of belonging (identification).</p>
<p>A feeling of helplessness in the face of the impersonal machinery of control
is carefully engendered within the prisoner. The individual who receives the
preliminary treatment described above not only begins to feel like an animal
but also feels that nothing can be done about it. No one pays any personal
attention to him. His complaints fall on deaf ears. His loss of
communication, if he has been isolated, creates a feeling that he has been
forgotten. Everything that happens to him occurs according to an impersonal
time schedule that has nothing to do with his needs. The voices and
footsteps of the guards are muted. He notes many contrasts, e.g., his
greasy, unpalatable food may be served on battered tin dishes by guards
immaculately dressed in white.</p>
<p>The first steps in depersonalization of the prisoner have begun. He has no
idea what to expect. Ample opportunity is allotted for him to ruminate upon
all the unpleasant or painful things that could happen to him. He approaches
the main interrogator with mixed feelings of relief and fright.</p>
<p>Surprise is commonly used in the brainwashing process. The prisoner is rarely
prepared for the fact that the interrogators are usually friendly and
considerate at first. They make every effort to demonstrate that they are
reasonable human beings.</p>
<p>Often they apologize for bad treatment received by the prisoner and promise
to improve his lot if he, too, is reasonable. This behaviour is not what he
has steeled himself for. He lets down some of his defences and tries to take
a reasonable attitude. The first occasion he balks at satisfying a request
of the interrogator, however, he is in for another surprise. The formerly
reasonable interrogator unexpectedly turns into a furious maniac. The
interrogator is likely to slap the prisoner or draw his pistol and threaten
to shoot him. Usually this storm of emotion ceases as suddenly as it began
and the interrogator stalks from the room. These surprising changes create
doubt in the prisoner as to his very ability to perceive another person's
motivations correctly. His next interrogation probably will be marked by
impassivity in the interrogator's mien.</p>
<p>A feeling of uncertainty about what is required of him is likewise carefully
engendered within the individual. Pleas of the prisoner to learn specifically
of what he is accused and by whom are side-stepped by the interrogator.</p>
<p>Instead, the prisoner is asked to tell why he thinks he is held and what he
feels he is guilty of. If the prisoner fails to come up with anything, he is
accused in terms of broad generalities (e.g, espionage, sabotage, acts of
treason against the people etc.)</p>
<p>This usually provokes the prisoner to make some statement about his
activities. If this take the form of a denial, he is usually sent to
isolation on further decreased food rations to think over his crimes.</p>
<p>This process can be repeated again and again, as soon as the prisoner thinks
of something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it. Meanwhile a strong sense of
dependence upon the interrogator is developed. It does not take long for the
prisoner to realize that the interrogator is the source of all punishment,
all gratification, and all communication. The interrogator, meanwhile,
demonstrates his unpredictbility. He is perceived by the prisoner as a
creature of whim.</p>
<p>At times, the interrogator can be pleased very easily and at other times no
effort on the part of the prisoner will placate him. The prisoner may begin
to channel so much energy into trying to predict the behaviour of the
unpredictable interrogator that he loses track of what is happening
inside himself. After the prisoner has developed the above psychological
and emotional reactions to a sufficient degree, the brainwashing begins in
earnest.</p>
<p>First, the prisoner's remaining critical faculties must be destroyed. He
undergoes long, fatiguing interrogations while looking at a bright light.
He is called back again and again for interrogations after minimal sleep.</p>
<p>He may undergo torture that tends to create internal conflict. Drugs may
be used to accentuate his mood swings. He develops depression when the
interrogator is being kind and becomes euphoric when the interrogator is
threatening the direst penalties. Then the cycle is reversed, the
prisoner finds himself in a constant state of anxiety which prevents him
from relaxing even when he is permitted to sleep. Short periods of
isolation now bring on visual and auditory hallucinations.</p>
<p>The prisoner feels himself losing his objectivity. It is in this state that
the prisoner must keep up an endless argument with the interrogator. He
may be faced with the confessions of other individuals who collaborated with
him in his crimes.</p>
<p>The prisoner seriously begins to doubts his own memory. This feeling is
heightened by his inability to recall little things like the names of the
people he knows very well or the date of his birth. The interrogator
patiently sharpens this feeling of doubt by more questioning. This tends to
create a serious state of uncertainty when the individual has lost most of
his critical faculties.</p>
<p>The prisoner must undergo additional internal conflict when strong feelings
of guilt are aroused within him. As any clinical psychologist is aware, it
is not at all difficult to create such feelings. Military servicemen are
particularly vulnerable.</p>
<p>No one can morally justify killing even in wartime. The usual justification
is on the grounds of necessity or self-defence. The interrogator is careful
to circumvent such justification. He keeps the interrogation directed toward
the prisoner's moral code. Every moral vulnerability is exploited by
incessant questioning along this line until the prisoner begins to question
the very fundamentals of his own value-system.</p>
<p>The prisoner must constantly fight a potential breakdown. He finds that
his mind is going blank for longer and longer periods of time. He can
not think constructively. If he is to maintain any semblance of psychological
integrity, he must bring to an end this state of interminable internal
conflict. He signifies a willingness to write a confession.</p>
<p>If this were truly the end, no brainwashing would have occurred. The
individual would simply have given in to intolerable pressure. The final
stage of the brainwashing process has just begun. No matter what the prisoner
writes in his confession the interrogator is not satisfied. The interrogator
questions every sentence of the confession. He begins to edit it with the
prisoner. The prisoner is forced to argue against every change. This is the
essence of brainwashing.</p>
<p>Every time that he gives in on a point to the interrogator, he must rewrite
his whole confession. Still the interrogator is not satisfied, in a desperate
attempt to maintain some semblance of integrity and to avoid further
brainwashing, the prisoner must begin to argue that what he has already
confessed to is true. He begins to accept as his own the statements he has
written. He uses many of the interrogator's earlier arguments to buttress
his position. By this process, identification with the interrogator's
value-system becomes complete.</p>
<p>It is extremely important to recognize that a qualitative change has taken
place within the prisoner. The brainwashed victim does not consciously
change his value-system; rather the change occurs despite his efforts. He is
no more responsible for this change than is an individual who snaps and
becomes psychotic. Like the psychotic, the prisoner is not even aware of the
transition.
</p>
<p>DEFENSIVE MEASURES</p>
<p>1. Training of Individuals potentially subject to communist control.
Training should provide for the trainee a realistic appraisal of what
control pressures the interrogators are likely to exert and what the
usual human reactions are to such pressures. The trainee must learn the
most effective ways of combating his own reactions to such pressures and
he must learn reasonable expectations as to what his behaviour should be.</p>
<p> Training has two decidedly positive effects; first, it provides the
trainee with ways of combating control; second, it provides the basis for
developing an immeasurable boost in morale. Any positive action that the
individual can take, even if it is only slightly effective, gives him a
sense of control over a situation that is otherwise controlling him.</p>
<p>2. Training must provide the individual with the means of recognizing
realistic goals for himself.</p>
<p> A. Delay in yielding may be the only achievement that can be hoped for.
In any particular operation, the agent needs the support of knowing
specifically how long he must hold out to save an operation, protect
his cohorts, or gain some other goal.</p>
<p> B. The individual should be taught how to achieve the most favourable
treatment and how to behave and make necessary concessions to obtain
minimum penalties.</p>
<p> C. Individual behavioural responses to the various control pressures
differ markedly. Therefore, each trainee should know his own particular
assets and limitations in resisting specific pressures. He can learn
these only under laboratory conditions simulating the actual pressures
he may have to face.</p>
<p> D. Training must provide knowledge of the goals and the restrictions
placed upon his interrogator. The trainee should know what controls
are on his interrogator and to what extent he can manipulate the
interrogator.</p>
<p> For example, the interrogator is not permitted to fail to gain
something from the controlled individual. The knowledge that, after
the victim has proved that he is a tough nut to crack he can
sometimes indicate that he might compromise on some little point to
help the interrogator in return for more favourable treatment, may be
useful indeed. Above all, the potential victim of interrogator control
can gain a great deal of psychological support from the knowledge that
the interrogator is not a completely free agent who can do whatever he
wills with his victim.</p>
<p> E. The trainee must learn what practical cues might aid him in recognizing
the specific goals of his interrogator. The strategy of defence against
elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the individual may hasten his
own state of mental confusion; whereas, to prevent brainwashing,
maintaining clarity of thought processes is imperative.</p>
<p> F. The trainee should obtain knowledge about carrots as well as sticks.
They keep certain of their promises and always renege on others, for
example, demonstrable the fact that informers receive no better
treatment than other prisoners should do much to prevent this particular
evil. On the other hand, certain meaningless concessions will often get
a prisoner a good meal.</p>
<p> G. In particular, it should be emphasized to the trainee that, although
little can be done to control the pressures exerted upon him, he can
learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about
internal conflict and conflict-producing mechanisms. He should learn
to recognize when someone is trying to arouse guilt feelings and what
behavioural reactions can occur as a response to guilt.</p>
<p> H. The training must teach some methods that can be utilized in thwarting
particular control techniques:</p>
<p>ELICITATION</p>
<p>In general, individuals who are the hardest to interrogate for information
are those who have experienced previous interrogations. Practice in being
the victim of interrogation is a sound training device.</p>
<p>TORTURE
The trainee should learn something about the principles of pain and shock.
There is a maximum to the amount of pain that can actually be felt. Any
amount of pain can be tolerated for a limited period of time. In addition,
the trainee can be fortified by the knowledge that there are legal
limitations upon the amount of torture that can be inflicted by jailors.</p>
<p>ISOLATION</p>
<p>The psychological effects of isolation can probably be thwarted best by
mental gymnastics and systematic efforts on the part of the isolate to
obtain stimulation for his neural end
organs. Controls on Food and Tobacco. Food given will always be enough to
maintain survival, sometimes the victim gets unexpected opportunities
to supplement his diet with special minerals, vitamins and other nutrients
(e.g., iron from the rust of prison bars).</p>
<p>In some instances, experience has shown that individuals could exploit
refusal to eat. Such refusal usually resulted in the transfer of the
individual to a hospital where he received vitamin injections and
nutritious food. Evidently attempts of this kind to commit suicide arouse
the greatest concern in officials.</p>
<p>If deprivation of tobacco is the control being exerted. The victim can gain
moral satisfaction from giving up tobacco. He can't lose since he is not
likely to get any anyway.</p>
<p>FATIGUE</p>
<p>The trainee should learn reactions to fatigue and how to overcome them
insofar as possible. For example, mild physical exercise clears the head in
a fatigue state.</p>
<p>WRITING PERSONAL ACCOUNTS AND SELF-CRITICISM</p>
<p>Experience has indicated that one of the most effective ways of combating
these pressures is to enter into the spirit with an overabundance of
enthusiasm.</p>
<p>Endless written accounts of inconsequential material have virtually
smothered some eager interrogators. In the same spirit, sober, detailed
self-criticisms of the most minute sins has sometimes brought good results.</p>
<p>Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an individual's
duties may become mutually incompatible in this situation.</p>
<p>Take the example of a senior grade military officer, he has the knowledge
of sensitive strategic intelligence which it is his duty to protect. He
has the responsibility of maintaining the physical fitness of his men and
serving as a model example for their behaviour. The officer may go to the
camp commandant to protest the treatment of the POW`s and the commandant
assures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another.</p>
<p>The officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for any
other behaviour if he does his utmost to carry out his highest priority
responsibility.</p>
<p>There is considerable evidence that many individuals tried to evaluate the
priority of their responsibilities on their own, but were in conflict over
whether others would subsequently accept their evaluations. More than one
individual was probably brainwashed while he was trying to protect himself
against elicitation.</p>
<p>CONCLUSIONS</p>
<p>The application of known psychological principles can lead to an
understanding of brainwashing.</p>
<p>1. There is nothing mysterious about personality changes resulting from the
brainwashing process.</p>
<p>2. Brainwashing is a complex process. Principles of motivation, perception,
learning, and physiological deprivation are needed to account for the
results achieved in brainwashing.</p>
<p>3. Brainwashing is an involuntary re-education of the fundamental beliefs of
the individual. To attack the problem successfully, the brainwashing
process must be differentiated clearly from general education methods for
thought-control or mass indoctrination, and elicitation.</p>
<p>4. It appears possible for the individual, through training, to develop
limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting
individual emotional reactions to brainwashing techniques rather than to
ward thwarting the techniques themselves.</p>
<p>DEVELOPMENT IN THE FIELD OF CONTROL OF HUMAN BEHAVIOUR</p>
<p>1. There are two major methods of altering or controlling human behaviour
and the Soviets where interested in both.</p>
<p> The first is psychological; the second, pharmacological. The two may be
used as individual methods or for mutual reinforcement.</p>
<p> For long-term control of large numbers of people, the former method is
more promising than the latter. In dealing with individuals, the U.S.
experience suggests the pharmacological approach (plus psychological
techniques) would be the only effective method. Neither method would be
very effective for individuals on a long term basis.</p>
<p>2. Soviet research on the pharmacological agents producing behavioural
effects has consistently lagged about five years behind Western research.</p>
<p> They have been interested in such research and are now pursuing research
on such chemicals as LSD-25, amphetamines, tranquillizers, hypnotics and
similar materials. There is no present evidence that anyone has any
singular, new, potent drugs to force a course of action on an individual.</p>
<p> They are aware of the tremendous drive produced by drug addiction and
perhaps could couple this with psychological direction to achieve
control of an individual.</p>
<p>3. The psychological aspects of behaviour control would include not only
conditioning by repetition and training, but such things as hypnosis,
deprivation, isolation, manipulation of guilt feelings, subtle or covert
threats, social pressure and so on.</p>
<p>Some of the newer trends in the USSR where as follows:</p>
<p>A. The adoption of a multi-disciplinary approach integrating biological,
social and physicalmathematical research in attempts better to
understand, and eventually, to control human behaviour in a manner
consonant with national plans.</p>
<p>B. The outstanding feature, in addition to the inter-disciplinary approach,
is a new concern for mathematical approaches to an understanding of
behaviour.</p>
<p> Particularly notable are attempts to use modern information theory,
automata theory and feedback concepts in interpreting the mechanisms by
which the second signal system, i.e., speech and associated phenomena,
affect human behaviour.</p>
<p> Implied by this second signal system, using information inputs as
causative agents rather than chemical agents, electrodes or other more
exotic techniques applicable, perhaps, to individuals rather than groups.</p>
<p>C. This new trend, observed in the early Soviet post-Stalin period,
continues. By 1960 the word cybernetics was used by the Soviets to
designate this new trend.</p>
<p> This science is considered by some as the key to understanding the human
brain and the product of its functioning - Psychic activity and
personality - To the development of means for controlling it and to ways
for moulding the character of the New Communist Man.</p>
<p> As one Soviet author put it: Cybernetics can be used in moulding of a
child's character, the inculcation of knowledge and techniques, the
amassing of experience, the establishment of social behaviour patterns,
all functions which can be summarized as 'control' of the growth process
of the individual. Students of particular disciplines in the USSR, such
as psychologist and social scientists, also support the general
cybernetic trend.
Research indicates that the Soviets had attempted to develop a technology
for controlling the development of behavioural patterns among the
citizens of the USSR in accordance with politically determined
requirements of the system. Furthermore, the same technology can be
applied to more sophisticated approaches to the coding of information for
transmittal to population targets in the battle for the minds of men.</p>
<p> Some of the more esoteric techniques such as ESP or, as the Soviets call
it, biological radio-communication, and psychogenic agents such as LSD,
are receiving some overt attention with, possibly, applications in mind
for individual behaviour control under clandestine conditions.</p>
<p></p></xml>

3655
regexConsp/bushbio.xml Normal file

File diff suppressed because it is too large Load Diff

107
regexConsp/bushbomb.xml Normal file
View File

@ -0,0 +1,107 @@
<xml><p> Wrong Number BBS FILE NAME: BUSHBOMB.TXT
[Reproduced with permission from _The Spotlight_, June 22, 1992
The Spotlight
300 Independence Avenue, SE
Washington, DC 20003
Free use of this material is permitted provided that _The Spotlight_
is credited, including publisher's address]
BUSH LINKED TO TERROR BOMBING;
WILL U.N. ASK FOR EXTRADITION?:
Shocking Evidence Revealed
The evidence pointing to President Bush's role in the terrorist bombing of
a Cuban airliner grows stronger with new revelations. Will the UN Security
Council demand his extradition to Cuba or the World Court, as Bush and the
UN have done in the case of Libyan suspects in a similar crime?
By Warren Hough
Exclusive to The Spotlight
Washington, DC, 6/12/92 -- Long-suppressed records have turned up
"shattering" new evidence of the role played by President George Bush in
the midair bombing of a Cuban airliner and in its subsequent cover-up,
Latin American officials conducting a "preliminary review" of the tragic
incident have told the UN Security Council.
The secret files reportedly confirm that in mid-1976, while serving as
CIA chief, Bush was in "overall command" of a botched sabotage operation
that ended in the crash of a Cuban passenger jet, killing all 73 aboard,
The SPOTLIGHT has learned from diplomatic sources close to the
investigation.
A CIA agent identified as Luis Posada was arrested by Venezuelan
authorities shortly after the Cuban plane exploded in midair during its
takeoff from a Caribbean stopover, these sources say. Posada, a member of
a sizable CIA contingent conducting covert operations from Venezuelan bases
at the time, was charged with having smuggled an explosive device aboard
the flight, and held for trial.
Bush, anxious to disclaim all responsibility for such an atrocious
terrorist outrage, ordered a "no-holds-barred" cover-up of the crime, the
record suggests.
"In order to take the heat off Posada, the CIA targeted another
suspect, Dr. Orlando Bosch, a militant Cuban exile activist who advocated
`armed action' against the Castro dictatorship," recounted Felipe Rivero,
the popular Miami broadcaster who is The SPOTLIGHT's correspondent in the
region." Venezuela's secret police, known after its Spanish initials as DISIP,
maintained close relations with the CIA and followed its lead. Bosch was
imprisoned and charged with complicity in the bombing in Venezuela.
BUSH ORCHESTRATION
The next move in the cover-up reportedly orchestrated by Bush was to
"recover" Posada, these sources day. In a well-organized and lavishly
financed jailbreak, the alleged aerial bomber was spirited from Venezuela
to Panama, where the CIA issued him a new set of identity documents under
the name of Ramon Medina, a Guatemalan businessman.
In the concluding move of the cover-up, Posada, now known as "Medina,"
was handed over to Felix Rodriguez, a senior CIA field agent with whom Bush
had a personal working relationship, the record shows. Rodriguez gave
Posada a series of covert jobs with CIA teams stationed in Central America,
largely in order to protect him and "keep him happy," these sources
related.
"I, for my part, spent 11 years in various maximum security Venezuelan
prisons," Bosch told a SPOTLIGHT reporter during a recent telephone
interview. "During those years, I was put on trial four times for that
airplane bombing. My case was heard by military, civilian and appellate
courts. I was found innocent each time. But after each acquittal, the CIA
came up with new `suggestions' about my guilt."
PALE AND FRAIL
Finally the Venezuelan government told Washington it could no longer
hold Bosch. Pale and in frail health, the falsely accused "terrorist" was
flown back to Miami. "Here I could hope for no acquittal," recounted
Bosch. "At the airport, immigration officials threw me into chains. I was
held in solitary confinement for 29 months."
Finally granted a provisional release after leading Cuban-American
Republicans pressed his cause without letup, Bosch now lives in seclusion
near Miami. "My status is that of a `deportable' alien," he told The
SPOTLIGHT. "If I engage in any political activity, or even if I talk too
much, I can be tossed back into jail. I am in no position to comment on
controversial questions -- not even in my own cause."
Living under the assumed name and a small CIA paycheck in Central
America also proved difficult for Posada, SPOTLIGHT correspondent Rivero
reports. "A couple of years ago, two men walked up to Posada in a
Guatemalan restaurant and shot him five times," Rivero related. "He
survived the shooting by a sheer miracle. Badly injured -- he lives
largely on liquefied food and walks with a crutch, I hear -- he has
vanished into the `protective custody' of the CIA."
The reason for Posada's attempted assassination is known, however. He
"drank a bit and began to talk too much," U.N. sources said. "The CIA
needed an airtight cover-up of that airline bombing. When Posada turned
talkative, his usefulness to Bush was at an end -- and, but for an iron
physique and that miraculous survival, he would have been, too."
Now the U.N. Security Council, having assumed jurisdiction over such
international terrorist crimes when it clamped harsh sanctions on Libya
last April, faces a tougher challenge: How to deal with a case of aerial
mass murder in which the principal suspect happens to be THE INCUMBENT
PRESIDENT OF THE UNITED STATES. </p></xml>

246
regexConsp/camps.xml Normal file
View File

@ -0,0 +1,246 @@
<xml><p>
*** The "Liberation of the Camps": FACTS vs. LIES ***</p>
<p> By Theodore J. O'Keefe
_______________________________________________________________________________</p>
<p> Nothing has been more effective in establishing the authenticity of the Holocaust in the minds of Americans than the terrible scenes U.S. GI's discovered when they entered the German concentration camps at the close of World War II.</p>
<p> At Dachau, Buchenwald, Dora, Mauthausen, and other work and detention camps, horrified American infantrymen encountered heaps of dead and dying inmates, emaciated and diseased. Survivors told them hair-raising stories of torture and slaughter, a
d backed up their claims by showing the GI's crematory ovens, alleged gas chambers, supposed implements of torture, even shrunken heads and lampshades, gloves, and handbags purportedly made from skin flayed from dead inmates.</p>
<p> U.S. government authorities, mindful that most Americans, who remembered the atrocity stories fed them during World War I, still doubted the Allied propaganda directed against the Hitler regime, resolved to "document" what the GI's had found in
he camps. Prominent newsmen and politicians were flown in to see the harrowing evidence, while the U.S. Army Signal Corps filmed and photographed the scenes for posterity. The famous journalist Edward R. Murrow reported, in tones of horror, but no lo
ger of disbelief, what he had been told and shown, and Dachau and Buchenwald were branded on the hearts and minds of the American populace as names of infamy unmatched in the sad and bloody history of this planet.</p>
<p> For Americans, what was "discovered" at the camps - the dead and the diseased, the terrible stories of the inmates, all the props of torture and terror - became the basis not simply of a transitory propaganda campaign but of the conviction that
es, it was true: the Germans DID exterminate six million Jews, most of them in lethal gas chambers. What the GI's found was used, by way of films which were mandatory viewing for the vanquished populace of Germany, to "re-educate" the German people b
destroying their national pride and their will to a united, independant national state, imposing in their place overwhelming feelings of collective guilt and political impotence. And when the testimony, and the verdict, at Nuremberg incorporated mos
, if not all, of the horror stories Americans were told about Dachau, Buchenwald, and other places captured by the U.S. Army, the Holocaust could pass for one of the most documented, one of the most authenticated, one of the most proven historical ep
sodes in the human record.</p>
<p> A Different Reality</p>
<p>* But it is known today that, very soon after the liberation of the *
* camps, American authorities were aware that the real story of the camps *
* was quite different from the one in which they were coaching military *
* public information officers, government spokesmen, politicians, *
* journalists, and other mouthpieces. *</p>
<p> When American and British forces overran western and central Germany in the spring of 1945, they were followed by troops charged with discovering and securing any evidence of German war crimes. Among them was Dr. Charles Larson, one of America's
leading forensic pathologists, who was assigned to the Judge Advocate General's Department. Dr. Larson performed autopsies at Dachau and some twenty other German camps, examining on some days more than 100 corpses. After his grim work at Dachau, he w
s questioned for three days by U.S. Army prosecutors.^1</p>
<p> Dr. Larson's findings? According to an interview he gave to an American journalist in 1980, "What we've heard is that six million Jews were exterminated. Part of that is a hoax."^2 And what part was the hoax? Dr. Larson, who told his biographer
hat to his knowledge he "was the only forensic pathologist on duty in the entire European Theater,"^3 informed "Wichita Eagle" reporter Jan Floerchinger that "never was a case of poison gas uncovered."^4 Neither Dr. Larson nor any other forensic spec
alist has ever been cited by any Holocaust historian to substantiate a single case of death by poison gas, whether Zyklon-B or any other variety.</p>
<p> Typhus, Not Poison Gas</p>
<p> If not by gassing, how did the unfortunate victims at Dachau, Buchenwald, and Bergen-Belsen perish? Were they tortured to death? Deliberately starved? The answers to these questions are known as well. As Dr. Larson and other Allied medical men d
scovered, the chief cause of death at Dachau, Belsen, and the other camps was disease, above all typhus, an old and terrible scourge of mankind which until recently flourished in places where populations were crowded together in circumstances where p
blic health measures were unknown or had broken down. Such was the case in the overcrowded internment camps in Germany at war's end, where, despite such measures as systematic delousing, quarantine of the sick, and cremation of the dead, the virtual
ollapse of Germany's food, transport, and public health systems led to catastrophe.</p>
<p> Perhaps the most authoritative statement of the facts as to typhus and mortality in the camps has been made by Dr. John E. Gordon, M.D., Ph.D., a professor of preventive medicine and epidemiology at the Harvard University School of Public Health
who was with U.S. forces in Germany in 1945. Dr. Gordon reported in 1948 that "The outbreaks in concentration camps and prisons made up the great bulk of typhus infection encountered in Germany." Dr. Gordon summarized the causes for the outbreaks as
follows:</p>
<p> * * *</p>
<p> Germany was in chaos. The destruction of whole cities and the path left by advancing armies produced a disruption of living conditions contributing to the spread of the disease. Sanitation was low grade, public utilities were seriously disrupted
food supply and food distribution was poor, housing was inadequate and order and discipline were everywhere lacking. Still more important, a shifting of populations was occurring such as few countries and few times have experienced.^5</p>
<p> * * *</p>
<p> Dr. Gordon's findings are corroborated by Dr. Russel Barton, today a psychiatrist of international repute, who entered Bergen-Belsen with British forces as a young medical student in 1945. Barton, who volunteered to care for the diseased survivo
s, testified under sworn oath in a Toronto courtroom in 1985 that "Thousands of prisoners who died at the Bergen-Belsen concentration camp during World War II weren't deliberately starved to death but died from a rash of diseases."^6 Dr. Barton furth
r testified that on entering the camp he had credited stories of deliberate starvations but had decided such stories were untrue after inspecting the well-equipped kitchens and the meticulously maintained ledgers, dating back to 1942, of food cooked
nd dispensed each day. Despite noisily publicized claims and widespread popular notions to the contrary, no researcher has been able to document a German policy of extermination through starvation in the German camps.</p>
<p> No Lampshades, No Handbags, Etc.</p>
<p> What of the ghoulish stories of concentration camp inmates skinned for their tattoos, flayed to make lampshades and handbags, or other artifacts? What of the innumerable "torture racks," "meathooks," whipping posts, gallows, and other tools of t
rment and death that are reported to have abounded at every German camp? These allegations, and even more grotesque ones profferred by Soviet prosecutors, found their way into the record at Nuremberg.</p>
<p> The lampshade and tattooed-skin charges were made against Ilse Koch, dubbed by journalists the "Bitch of Buchenwald," who was reported to have furnished her house with objects manufactured from the tanned hides of luckless inmates. But General L
cius Clay, military governor of the U.S. zone of occupied Germany, who reviewed her case in 1948, told his superiors in Washington: "There is no convincing evidence that she [Ilse Koch] selected inmates for extermination in order to secure tattooed s
ins or that she possessed any articles made of human skin."^7 In an interview General Clay gave years later, he stated about the material for the infamous lampshades: "Well, it turned out actually that it was goat flesh. But at the trial it was still
human flesh. It was almost impossible for her to have gotten a fair trial."^8 Ilse Koch hanged herself in a West German jail in 1967.</p>
<p> It would be tedius to itemize and refute the thousands of bizarre claims as to Nazi atrocities. That there were instances of German cruelty, however, is clear from the testimony of Dr. Konrad Morgen, a legal investigator attached to the Reich Cr
minal Police, whose statements on the witness stand at Nuremberg have never been challenged by believers in the Jewish Holocaust. Dr. Morgen informed the court that he had been given full authority by Heinrich Himmler, commander of Hitler's SS and th
dread Gestapo, to enter any German concentration camp and investigate instances of cruelty and corruption on the part of the camp staffs. According to Dr. Morgen's sworn testimony at Nuremberg, he investigated 800 such cases, in which over 200 convi
tions resulted.^9 Punishments included the death penalty for the worst offenders, including Hermann Karl Koch, Ilse's husband, commandant of Buchenwald.</p>
<p> In reality, while camp commandants in certain cases did inflict physical punishment, such acts had to be approved by authorities in Berlin, and it was required that a camp physician first certify the good health of the prisoner to be disciplined
and then be on hand at the actual beating.^10 After all, the camps were throughout most of the war important centers of industrial activity. The good health and morale of the prisoners was critical to the German war effort, as is evidenced by a 1942
order issued by SS-Brigadefuhrer Richard Glucks, chief of the office which controlled the concentration camps, which held camp commanders "personally responsible for exhausting every possibility to preserve the physical strength of the detainees."^11</p>
<p> Concentration Camp Survivors - Merely Victims?</p>
<p> U.S. Army investigators, working at Buchenwald and other camps, quickly ascertained what was common knowledge among veteran inmates: that the worst offenders, the cruelest denizens of the camps were not the guards but the prisoners themselves. C
mmon criminals of the same stripe as those who populate U.S. prisons today committed many villainies, particularly when they held positions of authority, and fanatical Communists, highly organized to combat their many political enemies among the inma
es, eliminated their foes with Stalinist ruthlessness.</p>
<p> Two U.S. Army investigators at Buchenwald, Egon W. Fleck and Edward A. Tenenbaum, carefully investigated circumstances in the camp before its liberation. In a detailed report submitted to their superiors, they revealed, in the words of Alfred To
mbs, their commander, who wrote a preface to the report, "how the prisoners themselves organized a deadly terror within the Nazi terror."^12</p>
<p> Fleck and Tenenbaum described the power exercised by criminals and Communists as follows:
* * *</p>
<p>. . . The trusties, who in time became almost exclusively Communist Germans, had the power of life and death over all other inmates. They could sentence a man or a group to almost certain death . . . The Communist trusties were directly responsible f
r a large part of the brutalities at Buchenwald.</p>
<p> * * *</p>
<p> Colonel Donald B. Robinson, chief historian of the American military government in Germany, summarized the Fleck-Tenenbaum report in an article which appeared in "The American Mercury" shortly after the war. Colonel Robinson wrote succinctly of
he American investigators' findings: "It appeared that the prisoners who agreed with the Communists ate; those who didn't starved to death."^13</p>
<p> Additional corroboration of inmate brutality has been provided by Ellis E. Spackman, who, as Chief of Counter-Intelligence Arrests and Detentions for the Seventh U.S. Army, was involved in the liberation of Dachau. Spackman, later a professor of
history at San Bernardino Valley College in California, wrote in 1966 that at Dachau "the prisoners were the actual instruments that inflicted the barbarities on their fellow prisoners."^14</p>
<p> "Gas Chambers"</p>
<p> On December 9, 1944 Col. Paul Kirk and Lt. Col. Edward J. Gully inspected the German concentration camp at Natzweiler in Alsace. They reported their findings to their superiors at the headquarters of the U.S. 6th Army Group, which subsequently f
rwarded Kirk and Gully's report to the War Crimes Division. While, significantly, the full text of their report has never been published, it has been revealed, by an author supportive of Holocaust claims, that the two investigators were careful to ch
racterize equipment exhibited to them by French informants as a "SO-CALLED lethal gas chamber," and claim it was "ALLEGEDLY used as a lethal gas chamber"^15 [emphasis added].</p>
<p> Both the careful phraseology of the Natzweiler report, and its effective suppression, stand in stark contrast to the credulity, the confusion, and the blaring publicity which accompanied official reports of alleged gas chambers at Dachau. At fir
t, a U.S. Army photo depicting a GI gazing mournfully at a steel door marked with a skull and crossbones and the German words for: "Caution! Gas! Mortal danger! Don't open!" was identified as showing the murder weapon. Later, however, it was evidentl
decided that the apparatus in question was merely a standard delousing chamber for clothing, and another alleged gas chamber, this one cunningly disguised as a shower room, was exhibited to American congressmen and journalists as the site where thou
ands breathed their last. While there exist numerous reports in the press as to the operation of this second "gas chamber," no official report by trained Army investigators has yet surfaced to reconcile such problems as the function of the shower hea
s: Were they "dummies," or did lethal cyanide gas stream through them? (Each theory has appreciable support in journalistic and historiographical literature.)</p>
<p> As with Dachau, so with Buchenwald, Bergen-Belsen, and the other camps captured by the Allies. There was no end of propaganda about "gas chambers," "gas ovens," and the like, but so far not a single detailed description of the murder weapon and
ts function, not a single report of the kind that is mandatory for the successful prosecution of any assault or murder case in America at the time and today, has come to light.</p>
<p> Furthermore, a number of Holocaust authorities have now publicly decreed that there were no gassings, no extermination camps in Germany after all! All these things, we are told, were located in what is now Poland, in areas captured by the Soviet
Red Army and off-limits to Western investigators. In 1960 Dr. Martin Broszat, who is now director of the Munich-based Institute for Contemporary History, which is funded by the West German government to SUPPORT the Holocaust story, wrote a letter to
he German weekly "Die Zeit" in which he stated categorically: "Neither in Dachau nor in Bergen-Belsen nor in Buchenwald were Jews or other prisoners gassed."^16 Professional Nazi-hunter Simon Wiesenthal wrote in 1975 that "there were no extermination
camps on German soil."^17 And Dachau "gas chamber" No. 2, which was once presented to a stunned and grieving world as a weapon which claimed hundreds of thousands of lives, is now described in the brochure issued to tourists at the modern Dachau "mem
rial site" in these words: "This gas chamber, camouflaged as a shower room, was not used."^18</p>
<p> The Propaganda Intensifies</p>
<p> More than forty years after American troops entered Dachau, Buchenwald, and the other German camps, and trained American investigators established the facts as to what had gone on in them, the government in Washington, the entertainment media in
Hollywood, and the print media in New York continue to churn out millions of words and images annually on the horrors of the camps and the infamy of the Holocaust. Despite the fact that, with the exception of the defeated Confederacy, no enemy of Ame
ica has ever so suffered so complete and devestating defeat as did Germany in 1945, the mass media and the politicians and bureaucrats behave as if Hitler, his troops, and his concentration camps continue to exist in an eternal present, and our opini
n makers continue to distort, through ignorance or malice, the facts about the camps.</p>
<p> Time for the Truth</p>
<p> It is time that the government and the professional historians revealed the facts about Dachau, Buchenwald, and the other camps. It is time that they let the American public know how the inmates died, and how they didn't die. It is time that the
claims as to mass murder by gassing were clarified and investigated in the same manner as any other claims of murder are dealt with. It is time that the free ride certain groups have enjoyed as the result of unchallenged Holocaust claims be terminate
, just as it is time that other groups, including Germans, eastern Europeans, the Roman Catholic hierarchy, and the wartime leadership of America and Britain stop being scapegoated, either for their alleged role in the Holocaust or their supposed fai
ure to stop it.</p>
<p> Above all, it is time that the citizens of this great democratic Republic have the facts about the camps, facts which they possess a right to know, a right that is fundamental to the exercise of their authority and their will in the governance o
their country. As citizens and as taxpayers, Americans of all ethnic backgrounds, of all faiths, have a basic right and an overriding interest in determining the facts of incidents which are deemed by those in positions of power to be determinative
n America's foreign policy, in its educational policy, in its selection of past events to be memorialized in our civic life. The alleged facts of the Holocaust are today at issue all over the civilized world: in Germany, in France, in Italy, in Brita
n, in the Low Countries and Scandinavia, in Japan, across our border in Canada and in the United States of America itself. The truth will be decided only by recourse to the facts, in the public forum: not by concealing the facts, denying the truth, s
onewalling reality. The truth will out, and it is time the government of this country, and governments and international bodies throughout the world, made public and patent the evidence of what actually transpired in the German concentration camps in
the years 1933-1945, so that we may put paid to the lies, without fear or favor, and carry out the work of reconciliation and renewal that is and must be the granite foundation of mutual tolerance between peoples and of a peace based on justice, rath
r than on guns, barbed wire, prisons, and lies.</p>
<p> NOTES</p>
<p> 1. _Crime Doctor_, a biography of Larson by John D. McCallum, Mercer,
Washington &amp; Vancouver, British Columbia, Canada, 1979, p. 69.</p>
<p> 2. _Wichita Eagle_, April 1, 1980, p. 4C.</p>
<p> 3. _Crime Doctor_, p. 46.</p>
<p> 4. _Wichita Eagle_, April 1, 1980, p. 4C.</p>
<p> 5. John E. Gordon, "Louse-Borne Typhus Fever in the European Theater of
Operations, U.S. Army, 1945," in Forest Ray Moulton, Ed., _Rickettsial
Diseases of Man_, Am. Acad. for the Advancement of Science, Washington D.C.
1948.</p>
<p> 6. _Toronto Star_, February 8, 1985, p. A2.</p>
<p> 7. _New York Times_, 24 September 1948, p. 3.</p>
<p> 8. Interview with Lucius Clay, _Official Proceeding of the George C. Marshall
Research Foundation,_ cited in "Buchenwald: Legend and Reality," Mark
Weber, _The Journal of Historical Review_, Vol. 7, no. 4.</p>
<p> 9. International Military Tribunal, Vol. XVII, p. 556; IMT, Vol. XX, pp. 489,
438.</p>
<p>10. Cited in _The Theory and Practice of Hell_, Eugen Kogon, Berkley Books, New
York, pp. 108-109.</p>
<p>11. Nuremberg document NO-1523.</p>
<p>12. _Buchenwald: A Preliminary Report_, Egon W. Fleck and Edward A. Tenenbaum,
U.S. Army, 12th Army Group, 24 April 1945. National Archives, Record Group
331, SHAEF, G-5, 17.11, Jacket 10, Box 151 (8929/163-8929/180).</p>
<p>13. "Communist Atrocities at Buchenwald," Donald B. Robinson, in _American
Mercury_, October 1946.</p>
<p>14. _San Bernardino Sun-Telegram_, March 13, 1966 (cited in _The Man Who
Invented "Genocide"_, James J. Martin, Institute for Historical Review,
IHR, 1984, pp. 110-111.</p>
<p>15. _Concentration Camp at Natzwiller [sic]_, RG 331, Records of Allied
Operations and Occupation, Army Headquarters WW2, SHAEF/G-5/2717, Modern
Military, National Archives, Washington, D.C., cited in Robert H. Abzug,
_Inside the Vicious Heart_, Oxford University Press, New York, 1985, p. 10,
p. 181.</p>
<p>16. _Die Zeit_, Hamburg, Germany, August 26, 1960.</p>
<p>17. _Books &amp; Bookmen_, April 1975, Vol. 7, p. 5.</p>
<p>18. Leaflet, _Memorial Site Concentration Camp Dachau_, The International
Dachau-Committee, Dachau, Germany, n.d.
_______________________________________________________________________________</p>
<p> Theodore J. O'Keefe is the editor of "The Journal of Historical Review." Educated at Harvard, he has studied history and literature on three continents, and has published many articles on historical and political subjects.
_____________________________________________________________________________
| |
| The conclusions of the early U.S. Army investigations as to the |
| truth about the wartime German concentration camps have since been |
| corroborated by all subsequent investigators and can be summarized: |
| |
| 1. The harrowing scenes of dead and dying inmates were not the result of |
| a German policy of "extermination," but rather the result of epidemics of |
| typhus and other disease brought about largely by the effects of Allied |
| aerial attacks. |
| |
| 2. Stories of Nazi supercriminals and sadists who turned Jews and others |
| into handbags and lampshades for their private profit or amusement were |
| sick lies or diseased fantasies; indeed, the German authorities |
| consistently punished corruption AND cruelty on the part of camp |
| commanders and guards. |
| |
| 3. On the other hand, the representations of the newly liberated inmates |
| to have been saints and martyrs of Hitlerism were quite often very far |
| from the truth; indeed, most of the brutalities inflicted on camp |
| detainees were the work of their fellow prisoners, in contravention of |
| German policy and German orders. |
| |
| 4. The alleged homicidal showers and gas chambers had been used either |
| for bathing camp inmates or delousing their clothes; the claim that they |
| had been used to murder Jews or other human beings is a contemptible |
| fabrication. Orthodox, Establishment historians and professional "Nazi- |
| hunters" have quietly dropped claims that inmates were gassed at Dachau, |
| Buchenwald, and other camps in Germany. They continue, however, to keep |
| silent regarding the lies about Dachau and Buchenwald, as well as to |
| evade an open discussion of the evidence for homicidal gassing at |
| Auschwitz and the other camps captured by the Soviets. |
|_____________________________________________________________________________|</p>
<p> Send $2 for a packet of literature and a full listing of books, audio cassettes and videotapes. Or, order more copies of this leaflet, postpaid, at the following prices:
10 copies: $2
50 copies: $5
100 copies or more: 8 cents each
THE INSTITUTE FOR HISTORICAL REVIEW
1822 1/2 Newport Blvd., Suite 191
Costa Mesa, California 92627
</p></xml>

113
regexConsp/carter.xml Normal file
View File

@ -0,0 +1,113 @@
<xml><p>
-------------------------------------------------------------------------------
CARTER'S TRUE LEGACY SHOCKING</p>
<p> By Mike Blair
Exclusive to The SPOTLIGHT</p>
<p>Washington, DC -- While many frown when they think of the high interest
rates, U.S. hostages held abroad and foreign policy giveaways associated
with the Carter administration, former President Jimmy Carter's true legacy
may be even more shocking than imagined.</p>
<p> Carter seemingly ran an end run around a law passed in the wake of
Watergate and signed before Carter took office, which limited White House
powers, when he formed the Federal Emergency Management Agency (FEMA).</p>
<p> FEMA was based on Richard Nixon's Executive Order (EO) 11490.</p>
<p> The legislation contained nearly 200,000 words on 32 pages. It
pertained to every executive order ever issued unless specifically revoked.</p>
<p> When Carter took office, EO 11490 was incorporated into a new order
allowing a president to assume dictatorial powers during any self-
proclaimed "emergency" situation; these powers will remain with a president
until specifically revoked by Congress.</p>
<p> Some senators thought they had successfully squashed the chief
executive's "national emergency" powers more than 10 years ago, after a
bipartisan congressional committee pushed the National Emergencies Act into
law.</p>
<p> Until September 14, 1976, the nation's chief executive officer was
empowered by more than 470 special statues to "seize property, organize and
control the means of production, seize commodities, institute martial law,
seize and control all transportation and communication, regulate the
operation of private enterprise, restrict travel and, in a host of other
ways, control the lives of Americans," then-Sen. Frank Church (D-Idaho)
said in the _Congressional Record_.</p>
<p> The National Emergencies Act, which took effect in 1978, was supposed
to prevent the nation from turning into a potential dictatorship.
Presidents had used their "emergency" powers at least four times in the
previous 45 years.</p>
<p> The president held this little-known sway over citizens through
executive orders, which he could write into law in a moment's notice. No
group, neither elected officials, business leaders, nor private citizens,
had the power to void these laws.</p>
<p> Franklin Roosevelt invoked a national emergency in 1933 to deal with
the banking crisis, and Harry Truman responded to the Korean War with an
emergency act in 1950.</p>
<p> Richard Nixon declared a pair of crises. In March 1970 he declared a
national emergency to deal with the post office strike. The Nixon White
House was at it again 16 months later when it implemented currency
restriction in August of 1971 in order to control foreign trade.</p>
<p> Then, in 1976, after two years of public hearings and committee
meetings, a bipartisan special congressional Committee on Emergency Powers
pushed legislation to wrestle power from the White House.</p>
<p> The National Emergencies Act became law on September 14, 1978,.
Senators used the second anniversary of their law to pat each other on the
back -- through the _Congressional Record_ -- and to attempt to establish
Congress's role in national security.</p>
<p> "The Congress must never again trade away its responsibilities in the
name of national emergency," Church said. "Let that be one of the lessons
learned from the investigation completed, the passage of the National
Emergencies Act and the termination today of emergency powers."</p>
<p> Church's warning fell on deaf ears. Less than one year later,
President Jimmy Carter ordered into being an entire apparatus --
unprecedented in American history -- designed to seize and exercise all
political, economic and military power in the United States.</p>
<p> Carter, Ronald Reagan, George Bush or any future president could
establish himself as total dictator.</p>
<p> Carter did this with an executive order -- EO 12148.</p>
<p> An executive order has never been defined by Congress. The validity
of such directives has been questioned many times, but there has never been
a decision made by the courts or Congress on how far-reaching executive
orders may be.</p>
<p> Through existing executive orders it is possible for one person to
ignore the Constitution, Congress and the will of the American people. A
complete dictatorship can be imposed under the veil of law.</p>
<p> A declaration by the president of the existence of a "national
emergency" has always stopped short of martial law, although the president
has that prerogative. Undoubtedly it would be exercised in the event of an
attack on the United States.</p>
<p> An attempt was made to incorporate all the "national emergency" powers
into one law under Nixon. However, in the wake of the Watergate scandal,
he was unable to pull off the presidential coup.</p>
<p> Carter, a Trilateralist, did.</p>
<p>-----------------</p>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003
</p></xml>

693
regexConsp/castro.xml Normal file
View File

@ -0,0 +1,693 @@
<xml>
<p>CUBA, CASTRO, and the UNITED STATES
or How One Man With A Cigar Dominated American Foreign Policy</p>
<p> In 1959, a rebel, Fidel Castro, overthrew the reign of
Fulgencia Batista in Cuba; a small island 90 miles off the
Florida coast. There have been many coups and changes of
government in the world since then. Few if any have had the
effect on Americans and American foreign policy as this one.</p>
<p>In 1952, Sergeant Fulgencia Batista staged a successful
bloodless coup in Cuba . </p>
<p>Batista never really had any cooperation and rarely
garnered much support. His reign was marked by continual
dissension.
</p>
<p> After waiting to see if Batista would be seriously opposed,
Washington recognized his government. Batista had already
broken ties with the Soviet Union and became an ally to the
U.S. throughout the cold war. He was continually friendly and
helpful to American business interest. But he failed to bring
democracy to Cuba or secure the broad popular support that
might have legitimized his rape of the 1940 Constitution.</p>
<p>As the people of Cuba grew increasingly dissatisfied with
his gangster style politics, the tiny rebellions that had
sprouted began to grow. Meanwhile the U.S. government was
aware of and shared the distaste for a regime increasingly
nauseating to most public opinion. It became clear that Batista
regime was an odious type of government. It killed its own
citizens, it stifled dissent. (1)</p>
<p> At this time Fidel Castro appeared as leader of the growing
rebellion. Educated in America he was a proponent of the
Marxist-Leninist philosophy. He conducted a brilliant guerilla
campaign from the hills of Cuba against Batista. On January
1959, he prevailed and overthrew the Batista government.</p>
<p>Castro promised to restore democracy in Cuba, a feat
Batista had failed to accomplish. This promise was looked
upon benevolently but watchfully by Washington. Castro was
believed to be too much in the hands of the people to stretch
the rules of politics very far. The U.S. government supported
Castro's coup. It professed to not know about Castro's
Communist leanings. Perhaps this was due to the ramifications
of Senator Joe McCarty's discredited anti-Communist diatribes.</p>
<p>It seemed as if the reciprocal economic interests of the
U.S. and Cuba would exert a stabilizing effect on Cuban
politics. Cuba had been economically bound to find a market for
its #1 crop, sugar. The U.S. had been buying it at prices much
higher than market price. For this it received a guaranteed
flow of sugar. (2)</p>
<p>Early on however developments clouded the hope for peaceful
relations. According to American Ambassador to Cuba, Phillip
Bonsal, "From the very beginning of his rule Castro and his
sycophants bitterly and sweepingly attacked the relations of
the United States government with Batista and his regime".(3)
He accused us of supplying arms to Batista to help overthrow
Castro's revolution and of harboring war criminals for a
resurgence effort against him. For the most part these were
not true: the U.S. put a trade embargo on Batista in 1957
stopping the U.S. shipment of arms to Cuba. (4) However, his
last accusation seems to have been prescient.</p>
<p>With the advent of Castro the history of U.S.- Cuban
relations was subjected to a revision of an intensity and
cynicism which left earlier efforts in the shade. This
downfall took two roads in the eyes of Washington: Castro's
incessant campaign of slander against the U.S. and Castro's
wholesale nationalization of American properties.</p>
<p>These actions and the U.S. reaction to them set the stage
for what was to become the Bay of Pigs fiasco and the end of
U.S.- Cuban relations.</p>
<p>Castro promised the Cuban people that he would bring land
reform to Cuba. When he took power, the bulk of the nations
wealth and land was in the hands of a small minority. The huge
plots of land were to be taken from the monopolistic owners and
distributed evenly among the people. Compensation was to be
paid to the former owners. According to Phillip Bonsal, "
Nothing Castro said, nothing stated in the agrarian reform
statute Castro signed in 1958, and nothing in the law that was
promulgated in the Official Gazzette of June 3, 1959, warranted
the belief that in two years a wholesale conversion of Cuban
agricultural land to state ownership would take place".(5) Such
a notion then would have been inconsistent with many of the
Castro pronouncements, including the theory of a peasant
revolution and the pledges to the landless throughout the
nation. Today most of the people who expected to become
independent farmers or members of cooperatives in the operation
of which they would have had a voice are now laborers on the
state payroll. (6) </p>
<p>After secretly drawing up his Land Reform Law, Castro used
it to form the National Institute of Agrarian Reform (INRA)
with broad and ill defined powers. Through the INRA Castro
methodically seized all American holdings in Cuba. He promised
compensation but frequently never gave it. He conducted
investigations into company affairs, holding control over them
in the meantime, and then never divulging the results or giving
back the control. (7)</p>
<p>These seizures were protested. On January 11 Ambassador
Bonsal delivered a note to Havana protesting the Cuban
government seizure of U.S. citizens property. The note was
rejected the same night as a U.S. attempt to keep economic
control over Cuba. (8)</p>
<p>As this continued Castro was engineering a brilliant
propaganda campaign aimed at accusing the U.S. of "conspiring
with the counter revolutionaries against the Castro regime"(9).
Castro's ability to whip the masses into a frenzy with wispy
fallacies about American "imperialist" actions against Cuba was
his main asset. He constantly found events which he could work
the "ol Castro magic " on, as Nixon said , to turn it into
another of the long list of grievances, real or imagined, that
Cuba had suffered.</p>
<p>Throughout Castro's rule there had been numerous minor
attacks and disturbances in Cuba. Always without any
investigation whatsoever, Castro would blatantly and publicly
blame the U.S.. </p>
<p>Castro continually called for hearings at the Organization
of American States and the United Nations to hear charges
against the U.S. of "overt aggression". These charges were
always denied by the councils. (10)</p>
<p>Two events that provided fuel for the Castro propaganda
furnace stand out. These are the "bombing" of Havana on
October 21 and the explosion of the French munitions ship La
Coubre on March 4, 1960.(11)</p>
<p>On the evening of October 21 the former captain of the
rebel air force, Captain Dian-Lanz, flew over Havana and
dropped a quantity of virulently anti-Castro leaflets. This was
an American failure to prevent international flights in
violation of American law. Untroubled by any considerations of
truth or good faith, the Cuban authorities distorted the
facts of the matter and accused the U.S. of a responsibility
going way beyond negligence. Castro, not two days later,
elaborated a bombing thesis, complete with "witnesses", and
launched a propaganda campaign against the U.S. Ambassador
Bonsal said, "This incident was so welcome to Castro for his
purposes that I was not surprised when, at a later date, a
somewhat similar flight was actually engineered by Cuban secret
agents in Florida."(12)</p>
<p> This outburst constituted "the beginning of the end " in
U.S.- Cuban relations. President Eisenhower stated ,"Castro's
performance on October 26 on the "bombing" of Havana spelled
the end of my hope for rational relations between Cuba and the
U.S."(13)</p>
<p>Up until 1960 the U.S. had followed a policy of non
intervention in Cuba. It had endured the slander and seizure
of lands, still hoping to maintain relations. This ended,
when, on March 4, the French munitions ship La Coubre arrived
at Havana laden with arms and munitions for the Cuban
government. It promptly blew up with serious loss of life. (14)</p>
<p>Castro and his authorities wasted no time venomously
denouncing the U.S. for an overt act of sabotage. Some
observers concluded that the disaster was due to the careless
way the Cubans unloaded the cargo. (15) Sabotage was possible
but it was preposterous to blame the U.S. without even a
pretense of an investigation. </p>
<p>Castro's reaction to the La Coubre explosion may have been
what tipped the scales in favor of Washington's abandonment of
the non intervention policy. This, the continued slander, and
the fact that the Embassy had had no reply from the Cuban
government to its representations regarding the cases of
Americans victimized by the continuing abuses of the INRA.</p>
<p>The American posture of moderation was beginning to become,
in the face of Castro's insulting and aggressive behavior, a
political liability. (16)</p>
<p>The new American policy, not announced as such, but
implicit in the the actions of the United States government was
one of overthrowing Castro by all means available to the U.S.
short of open employment of American armed forces in Cuba.</p>
<p>It was at this time that the controversial decision was
taken to allow the CIA to begin recruiting and training of
ex-Cuban exiles for anti-Castro military service. (17)</p>
<p>Shortly after this decision, following in quick steps,
aggressive policies both on the side of Cuba and the U.S. led
to the eventual finale in the actual invasion of Cuba by the
U.S!</p>
<p>In June 1960 the U.S. started a series of economic
aggressions toward Cuba aimed at accelerating their downfall.</p>
<p>The first of these measures was the advice of the U.S. to
the oil refineries in Cuba to refuse to handle the crude
petroleum that the Cubans were receiving from the Soviet Union.
The companies such as Shell and Standard Oil had been buying
crude from their own plants in Venezuela at a high cost. The
Cuban government demanded that the refineries process the crude
they were receiving from Russia at a much cheaper price. These
refineries refused at the U.S. advice stating that there were
no provisions in the law saying that they must accept the
Soviet product and that the low grade Russian crude would
damage the machinery. The claim about the law may have been
true but the charge that the cheaper Soviet
crude damaging the
machines seems to be an excuse to cover up the attempted
economic strangulation of Cuba. (The crude worked just fine as
is soon to be shown)</p>
<p>Upon receiving the refusal Che Gueverra, the newly
appointed head of the National Bank,and known anti-American,
seized all three major oil company refineries and began
producing all the Soviet crude,not just the 50% they had
earlier bargained for. This was a big victory and a stepping
stone towards increasing the soon to be controversial alliance
with Russia.</p>
<p>On July 6, a week after the intervention of the refineries,
President Eisenhower announced that the balance of Cuba's 1960
sugar quota for the supply of sugar to the U.S. was to be
suspended. (18). This action was regarded as a reprisal to
the intervention of the refineries. It seems obvious that it
was a major element in the calculated overthrow of Castro.</p>
<p>In addition to being an act of destroying the U.S. record
for statesmanship in Latin America, this forced Cuba into
Russia's arms and vice-versa.</p>
<p>The immediate loss to Cuba was 900,000 tons of sugar
unsold. This was valued at about $100,000,000.(19) Had the
Russians not come to the rescue it would have been a serious
blow to Cuba. But come to the rescue they did, cementing the
Soviet-Cuban bond and granting Castro a present he could have
never given himself. As Ernest Hemingway put it,"I just hope to
Christ that the United States doesn't cut the sugar quota. That
will really tear it. It will make Cuba a gift to the
Russians." (20) And now the gift had been made.</p>
<p>Castro had announced earlier in a speech that action
against the sugar quota would cost Americans in Cuba "down to
the nails in their shoes" (21) Castro did his best to carry
that out. In a decree made as the Law of Nationalization, he
authorized expropriation of American property at Che Gueverra's
discretion. The compensation scheme was such that under
current U.S. - Cuban trade relations it was worthless and
therefore confiscation without compensation.</p>
<p>The Soviet Unions assumption of responsibility of Cuba's
economic welfare gave the Russians a politico-military stake in
Cuba. Increased arms shipments from the U.S.S.R and
Czechoslovakia enabled Castro to rapidly strengthen and expand
his forces. On top of this Cuba now had Russian military
support. On July 9, three days after President Eisenhowers
sugar proclamation, Soviet Premier Nikita Kruschev announced,
"The U.S.S.R is raising its voice and extending a helpful hand
to the people of Cuba.....Speaking figuratively in case of
necessity Soviet artillerymen can support the Cuban people with
rocket fire. (22) Castro took this to mean direct commitment
made by Russia to protect the Cuban revolution in case of U.S.
attack. The final act of the U.S. in the field of economic
aggression against Cuba came on October 19, 1960, in the form
of a trade embargo on all goods except medicine and medical
supplies. Even these were to be banned within a few months.
Other than causing the revolutionaries some inconvenience, all
the embargo accomplished was to give Castro a godsend. For the
past 25 years Castro has blamed the shortages, rationings,
breakdowns and even some of the unfavorable weather conditions
on the U.S. blockade.</p>
<p>On January 6, 1961, Castro formally broke relations with
the United States and ordered the staff of the U.S. embassy to
leave. Immediately after the break in relations he ordered
full scale mobilization of his armed forces to repel an
invasion from the United States, which he correctly asserted
was imminent. For at this time the Washington administration,
under new President-elect Kennedy was gearing up for the Cuban
exile invasion of Cuba. The fact that this secret was ill kept
led to increased arms being shipped to Cuba by Russia in late
1960.</p>
<p>President Kennedy inherited from the Eisenhower-Nixon
administration the operation that became the Bay of Pigs
expedition. The plan was ill conceived and a fiasco.</p>
<p>Both Theodore Sorensen and Arthur Schlesinger describe the
President as the victim of a process set in motion before his
inauguration and which he, in the first few weeks of his
administration, was unable to arrest in spite of his
misgivings. Mr. Schlesinger writes -"Kennedy saw the project
in the patios of the bureaucracy as a contingency plan. He did
not yet realize how contingency planning could generate its own
reality." (23)</p>
<p>The fact is that Kennedy had promised to pursue a more
successful policy towards Cuba. I fail to see how the proposed
invasion could be looked upon as successful. The plan he
inherited called for 1500 patriots to seize control over their
seven million fellow citizens from over 100,000 well trained,
well armed Castroite militia!</p>
<p>As if the plan wasn't doomed from the start, the
information the CIA had gathered about the strength of the
uprising in Cuba was outrageously misleading. If we had won,
it still would have taken prolonged U.S. intervention to make
it work. This along with Kennedys decision to rule out
American forces or even American officers or experts, whose
participation was planned, doomed the whole affair.</p>
<p>Additionally these impromptu ground rules were not relayed
to the exiles by the CIA, who were expecting massive U.S.
military backing!</p>
<p>The exiles had their own problems; guns didn't work, ships
sank, codes for communication were wrong, the ammunition was
the wrong kind - everything that could go wrong, did. As could
be imagined the anti-Castro opposition achieved not one of its
permanent goals. Upon landing at the Bay of Pigs on April 17,
1961, the mission marked a landmark failure in U.S. foreign
politics. By April 20, only three days later, Castro's forces
had completely destroyed any semblance of the mission: they
killed 300 and captured the remaining 1,200!</p>
<p>Many people since then have chastised Kennedy for his
decision to pull U.S. military forces. I feel that his only
mistake was in going ahead in the first place, although, as
stated earlier, it seems as if he may not have had much choice.</p>
<p>I feel Kennedy showed surer instincts in this matter than
his advisors who pleaded with him not to pull U.S. forces. For
if the expedition had succeeded due to American armed forces
rather than the strength of the exile forces and the anti-
Castro movement within Cuba, the post Castro government would
have been totally unviable: it would have taken constant
American help to shore it up. In this matter I share the
opinion of `ambassador Ellis O. Briggs, who has written "The
Bay of Pigs operation was a tragic experience for the Cubans
who took part, but its failure was a fortunate (if mortifying)
experience for the U.S., which otherwise might have been
saddled with indefinite occupation of the island.</p>
<p>Beyond its immediately damaging effects, the Bay of Pigs
fiasco has shown itself to have far reaching consequences.</p>
<p>Washington's failure to achieve its goal in Cuba provided
the catalyst for Russia to seek an advantage and install
nuclear missiles in Cuba. The resulting "missile crisis" in
1962 was the closest we have been to thermonuclear war.</p>
<p>America's gain may have been America's loss. A successful
Bay of Pigs may have brought the United States one advantage.
The strain on American political and military assets resulting
from the need to keep the lid on in Cuba might have lid on Cuba
might have led the President of the United States to resist,
rather than to enthusiastically embrace, the advice he received
in 1964 and 1965 to make a massive commitment of American air
power, ground forces, and prestige in Vietnam.</p>
<p>Cuban troops have been a major presence as Soviet
surrogates all over the world, notably in Angola.</p>
<p>The threat of exportation of Castro's revolution permeates
U.S.-Central and South American policy. (Witness the invasion
of Grenada.)</p>
<p>This fear still dominates todays headlines. For years the
U.S. has urged support for government of El Salvador and the
right wing Contras in Nicaragua. The major concern underlying
American policy in the area is Castro's influence. The fear of
a Castro influenced regime in South and Central America had
such control of American foreign policy as to almost topple the
Presidency in the recent Iran - Contra affair. As a result the
U.S. government has once again faced a crisis which threatens
to destroy its credibility in foreign affairs. All because of
one man with a cigar.</p>
<p>In concluding I would like to state my own feelings on the
whole affair as they formed in researching the topic. To
start, all the information I could gather was one-sided. All
the sources were American written, and encompassed an American
point of view. In light of this knowledge, and with the
advantage of hindsight, I have formulated my own opinion of
this affair and how it might have been more productively
handled. American intervention should have been held to a
minimum. In an atmosphere of concentration on purely Cuban
issues, opposition to Castro's personal dictatorship could be
expected to grow. Admittedly, even justified American
retaliation would have led to Cuban counterretaliation and so
on with the prospect that step by step the same end result
would have been attained as was in fact achieved. But the
process would have lasted far longer; measured American
responses might have appeared well deserved to an increasing
number of Cubans, thus strengthening Cuban opposition to the
regime instead of, as was the case, greatly stimulating
revolutionary fervor, leaving the Russians no choice but to
give massive support to the Revolution and fortifying the
belief among anti-Castro Cubans that the United States was
rapidly moving to liberate them. The economic pressures
available to the United States were not apt to bring Castro to
his knees, since the Soviets were capable of meeting Cuban
requirements in such matters as oil and sugar. I believe the
Cuban government would have been doomed by its own
disorganization and incompetence and by the growing
disaffection of an increasing number of the Cuban people. Left
to its own devices, the Castro regime would have withered on
the vine.
ammunition was
the wrong kind - everything that could go wrong, di
Downloaded from Just Say Yes. 2 lines, More than 1500 files online!
Do you write? Give us a call! 415-922-2008 CASFA </p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron 415-935-5845
Just Say Yes 415-922-1613
Rat Head 415-524-3649
Cheez Whiz 408-363-9766
Reality Check 415-474-2602
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p>Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
</xml>

514
regexConsp/celine.xml Normal file
View File

@ -0,0 +1,514 @@
<xml><p> CELINE'S LAWS
by Hagbard Celine</p>
<p> As every thinking person has noticed, our national life has
become increasingly weird and surrealistic. The waiting lines at
banks and post offices are growing longer all the time, even
though demographers tell us US population is no longer rising.
The street signs more often than not say WALK on the red and
DON"T WALK on the green. You can't get a plumber on the
weekends. Nobody has been able to explain the cattle mutilations
yet. Every survey shows that the price of consumer goods, the
number of violent crimes, and the eerie popularity of THE GONG
SHOW are ominously accelerating.
I believe I have found the explanation these distressing
trends. Needless to say, I cannot present, in a short article,
all the evidence which I have accumulated in three decades of
careful metasociological research; that will have to await the
publication of my three-volume study, "Why Everybody Is Going
Bonkers." Here I can only mention the thousands of depth
interviewws, the innumerable flowcharts and helix-matrix
equations, the vast files of computer readouts, the I CHING
divinations, and other rigorous scientific techniques used in
developing what I modestly call Celine's Laws of Chaos, Discord
and Confusion.
Celine's First Law is that National Security is the chief
cause of national insecurity!
That may sound like a paradox, but I will explain it at one.
Every secret police agency must be monitored by an elite corps
of secret-police-of-the-second-order. There are numerous reasons
for this, but three are especially noteworthy.
********************************************************************************************
NATIONAL SECURITY IS THE CHIEF CAUSE OF NATIONAL INSECURITY!!!
*******************************************************************************</p>
<p>1). Infiltration of the secret police, for the purpose of
subversion, will always be a prime goal of internal
revolutionaries. This is an ordinary part of the spy-counterspy
game. There is nothing Weather Underground would like better
than having a few agents in the FBI or CIA, for the same reasons
that the FBI or CIA would like to have a few agents in Weather
Underground.</p>
<p>2). Such infiltration will also be a prime goal of hostile
foreign powers, for the same reasons.</p>
<p> Please note that these are simple facts of the secret-police
game, well-known even to the general public, the subject of many
ingenious plots in popular spy films, and not particularly
alarming...yet. Nonetheless, the seeds of Chaos, Discord,
Confusion, and Paranoia are already here, for the simple reason
that once a human being develops the habits of worry and
suspicion, he or she finds increasing justifications for more
worry and more suspicion. For instance, Richard Q. (not his real
initial), one of my interview subjects, became concerned, after
ten years in the CIA, with the possibility of infiltration by
"extraterrestrial" agents. He was eventually retired when he
began to claim that demons in the form of dogs wanted him to
assassinate Laverne and Shirley. </p>
<p>3). Secret-police officials acquire fantastic capacities to
blackmail and intimidate others in goverment.</p>
<p> Stalin executed three chiefs of his secret police in a row,
because of this danger. One of my informants claims that every
president since the National Security Act was passed in 1947 has
learned how to have sexual intercourse without making a single
audible sound, because of the possible electronic eavesdroppers.
As Nixion says so wistfully on the Watergate transcripts, "Well,
Hoover performed. He would have fought. That was the point. He
would have defied a few people. He would have scared them to
death. HE HAS A FILE ON EVERYBODY!" <special>Caps added</special>. Thus, those
who employ secret-police organizations MUST monitor them th be
sure they are not acquiring too much power.
In the United States today, the superelite that monitors the
CIA is the National Security Agency. ( And a group called "The
Store" monitors the NSA).
Here is where a sinister infinite regress enters the game.
Any such elite, second or third order secret-police agency must
be, according to the above pragmatic and necessary rules, subject
to infiltration by native subversives or hostile foreign powers,
or to acquiring "too much power" in the opinion of its masters.
(It may even be subject, if Richard Q. was correct in his
anxieties, to extraterrestrial manipulation). And so, it, too,
must be monitored by a secret police of the third order.</p>
<p> But this third-order secret-police (such as Nixon's notorious
"plumbers", or more currently, "The Store"). is also subject to
infiltration or to acquiring too much power...and thus, with
relentless logic, the infinite regress builds. Once a goverment
has n orders of secret police spying on each other, all are
potentially suspect, and to be safe a secret police of order n+1
must be created. And so on, forever.</p>
<p>******************************************
* THUS WHO EMPLOY SECRET *
* POLICE MUST MONITOR THEM TO *
* BE SURE THEY ARE NOT ACQUIRING *
* TOO MUCH POWER. *
****************************************** </p>
<p> In practice, of course, this cannot really regress to
infinity, but only to the point where every other citizen, or
until the funding runs out, whichever comes first.</p>
<p> National Security in practice, then, must always fall short of
the logically ideal infinite regress which we have shown is
necessary to the achievement of its goal. In that gap between
the ideal of "One nation under survillance, with wiretaps and
mail covers for all" andthe strictly limited real situation of
finite funding, there is ample encouragement for paranoias of all
sorts to flourish. In short, every government that employs
secret-police agencies must grow more insecure, not more secure,
as the strength, versatility, and power of the secret-police
agencies grow.
For instance, a certain left-wing nation which has employed
secret-police agencies for 61 years has now reached the point
where the leaders are terrified of painters and poets. In
another, right-wing nation infested with secret-police agencies,
several purges have been caused by three practical jokers who
regularly call middle-rank officials on the phone and talk in
what appears to be a code. The secret police, of course, are no
fools, and are aware that this might be what it in fact is, a
form of anarchist humor; but they can't be sure.</p>
<p> What usually happens in such cases is this: an official
receives one of these mystery calls, saying perhaps "Pawn to
queen rook five. No wife, no horse, no mustache. A boy has never
wept nor dashed a thousand kim." He knows immediately that
surveillance upon him will be increased tenfold. In the next few
days, while memories of all his mistakes, small bribes,
incautious remarks, and other incriminating events haunt his
imagination, he observes the increased surveillance, and begins
to suspect even the most loyal of his subordinates of watching
him with eyes that miss nothing and to give a sinister
interpertation to everything. Within ten days, he usually
attempts to contact a foreign goverment to seek political
sanctuary, and the secret-police net closes on him.</p>
<p> By the same process of worry leading to more worry and
suspicion leading to more suspicion, the very act of joining a
ecret-police organization will eventually turn a man or woman
into a clinical paranoi; in layman's terms, "bananas" or "wigged
out." THE AGENT KNOWS WHOM HE IS SPYING ON; BUT HE NEVER KNOWS
WHO IS SPYING ON HIM! Could it be his wife, his girl friend, his
secretary, the newsboy, the Good Humor man?
For these reasons, secret-police agents develop elaborate and
complex theories to account for what is actually going on.
According to one of my tables of data, there isn't a single
theory held by professional conspiracy buffs which isn't also
believed by many members of our various secret-police agencies.
In fact, the exact percentages of believes in these extravagant
scenarios are quite similar among a group of 1,000 CIA agents and
a control group of 1,000 readers of the underground press, as
shown in table 1.</p>
<p>Table 1. True Believes in various Conspiracy Theories Among CIA
Agents and Underground-Press Readers.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: :: :: UNDERGROUND PRESS ::
::CONSPIRACY THEORY :: CIA :: READERS ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::The Yankees (Eastern :: :: ::
::millionaires) run :: 25% :: 30% ::
::everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: The Cowboys(Western :: :: ::
:: millionaires) run :: 25% :: 15% ::
:: everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the result of :: :: ::
:: civil war between :: 23% :: 17% ::
::Yankees and Cowboys :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the 33 degree :: :: ::
:: Masons :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the Jesuits :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Elders of Zion :: 2% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Military :: :: ::
::Industrial Complex :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Bilderbergers :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Gnomes of :: :: ::
:: Zurich :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Lesbian :: :: ::
:: Vegetarians :: 10% :: 28% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Rock n Roll :: :: ::
:: Empire :: 2% :: 2% ::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: </p>
<p>a). Source: Gallup, Roper, and Hogtied, "WHO'S WATCHING WHOM"
(Washington, DC: US Goverment Printing Office, 1979), p. 432.</p>
<p>b). All figures are percentages. Figures do not add to 100, for
a variety of reasons. For a list of them, please send 25 cents
and a list of suspicious persons in your neighborhood to the US
Dept. of Bedding, Washington DC 20001.</p>
<p>c). Includes those who blame it all on the Bavarian Illuminati;
those who hold a multiconspiracy theory (e.g., the Lesbian
Vegetarians are allied with the Yankees and Bilderbergers against
the Cowboys, the TV Networks, and the Cattle Mutilators); those
who believe it is all part of the UFO Cover-Up; and those who
claim that demons in the form of dogs told them it's connected
somehow with the alligators in New York's sewers.
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p>************************************
* IN RUSSIA, THE GOVERMENT IS *
* TERRIFIED OF PAINTERS AND POETS! *
************************************</p>
<p> Now, Table 1 clearly gives a picture of a rather schizzed-out
nation. This is the result of the impossible infinite regress
and its resultant of worry leading to more worry.
Furthermore, if there is a secret police at all, in any nation
you care to imagine, every branch and department of that
country's government becomes suspect, in the eyes of cautious and
intelligent people, as a possible front or funnel to the secret
police. (That is, the more shrewd citizens will recognize that
something titled a branch of the HEW or even PTA might actually
be run by the CIA). Inevitably, the government as a whole, and
many nongovernmental agencies, will be regarded by reasonable
persons with fear and trepidation. Proverbs like "One can't be
too careful these days" and "Better safe than sorry" become a
kind of sinister folk wisdom.</p>
<p> But further yet: any government which already has a secret
police (and a secret police monitoring the secret police, etc).
will become alarmed on observing that its more hip and
intelligent citizens now regard it with loathing and misgivings.
The government will therefore increase the size and powers of the
secret police. This is the only rational move, within the
context of the secret-police game.</p>
<p>******************************
* SOMETHING PASSING AS A *
* BRANCH OF HEW MIGHT BE A *
* FRONT FOR THE CIA! *
****************************** </p>
<p> (The only alternative was once suggested sarcastically by
playwright Bert Brecht, who said, "If the government doesn't
trust the people, why does'nt it dissovle them and elect new
people?" No way has yet been invented to elect a new people; so
the police state will instead spy on the existing people even
more vigorously).
This, of course, creates additional paranoia in both the
governors and the citizens, because a suffciently pugnacious
secret police will eventually "have a file on everybody,"
including its own creators. This leads to another infinite
regress: the more people will loathe the government, the more
power will be given to the secret police.
Thus, whether any of the hypothetical conspiracies mentioned
earlier really exist or not, a system of clandestine goverment
inevitably produces, in both the rulers and the ruled, a mood of
paranoia in which such conspiracy theories flourish.
This escalating sense of suspiciousness is accelerated by the
fact that every secret-police organization engages in both the
collection of information and the production misinformation.
That is, you score points in the secret-police game both by
hoarding signals (information units)---that is, by hiding facts
from competitive players---and by foisting false signals (fake
information units) on the other players. This creates the
situation which I call Optimum Fuckup, in which every participant
has rational (not neurotic) cause to suspect that every other
player may be attempting to deceive him, gull him, con him, dupe
him, and generally misinform him. As Henry Kissinger is rumored
to have said, "Anybody in Washington these days who isn't
paranoid is crazy!"
One could generalize the remark: anyone in the United States
today who isn't paranoid must be crazy!!!</p>
<p>**********************************
* "IF THE GOVERMENT DOESN'T *
* TRUST THE PEOPLE, WHY DOESN'T *
* IT DISSOLVE THEM AND ELECT A *
* NEW PEOPLE?" *
**********************************</p>
<p> The deliberate production of misinformation (or, as
intelligence agencies more euphemistically call it,
disinformation) creates a situation profoundly disorienting to
the philosopher, the scientist, and the ordinary Joe who wants to
know the best time to go to the bank. The desire to discover
"what-the-hell-is-really-going-on" (the definition of science
offered by physicist Saul-Paul Sirag) is totally incompatible
with the circulation of disinformation; we all need to know, at
least roughly, what the hell is really going on if we are not to
stumble around like blind robots colliding with things we weren't
told were there.
Maybe the UFO's really exist---or maybe the whole UFO
phenomenon is a cover for an intelligence operation. Maybe there
are black holes where space and time implode---or maybe the
entire black-hole cosmology was created to befuddle and mislead
Russian scientists. Maybe Jimmy Carter really exists---or maybe
he is, as the National Lampoon claims, an actor named Sidney
Goldfarb specially trained to project the down-home virtues that
the American people nostalgically seek. Perhaps only three men
at the top of the National Security Angency REALLY know the
answers to these questions---or perhaps those three are being
deceived by certain subordinates (as Lyndon Johnson was deceived
by the CIA about Vietnam) and are as disoriented as the rest of
us. Such is the logic of a Disinformation Matrix.
Personally, I find it easier to believe in UFO's than in black
holes or Jimmy Carter; but that may just indicate the damage to
my own brain caused by the Optimum Fuckup of the Disinformation
Matrix.
According to a recent survey 19 per cent of the population
believe the moon landings were faked by Stanley Kubrick and a
gang of special effects experts. Perhaps these archskeptics are
the sanest ones left among us. Who among the readers of this
file has a security clearance high enough to be ABSOLUTELY sure
that these ultraparanoids are wrong?</p>
<p> This general tendency toward chaos discord, and confusion,
once a secret police has been established, is complicated and
accelerated by Celine's Second Law, to wit: "Accurate
communication is only possible in a nonpunishing situation."
This is a very simple statement of the obvious, and means no more
than that everybody tends to lie a little, to flatter or to
protect themselves, when dealing with those who have power over
them, especially the power to punish. (this is why communication
between parents and children is notoriously befoolzled).
Every authoritarian structure can be visualized as a pyramid,
with very few at the top and very many at the bottom, as in the
flowchart of any corperation or bureaucracy. On each rung,
participants bear a burden of nescience in relation to those
above them. That is, they must be very, very careful that their
natural sensory activities as conscious organisms---the acts of
seeing, hearing, smelling, tasting, feeling, drawing inferences
from perception, etc.---be in accord with the wishes of those
above them. This is absolutely vital; job security depends on
it. It is much less important---a luxury that can easily be
discarded---that these perceptions be in accord with actual
reality.</p>
<p>*************************
* COMMUNICATION IS ONLY *
* BETWEEN EQUALS. *
*************************</p>
<p> For instance, in the FBI under J. Edgar Hoover, the agent had
to develop the capacity to see godless communists everywhere.
Any agent whose perceptions indicated that there were actually
very few godless communists anywhere in this country wold
experience what psychologists call cognitive dissonance: his or
her reality grid was at variance with the official reality grid
of the pyramidal authority structure. To talk about such
divergent perceptions at all would be to invite suspicions of
eccentricity, of intellectual wiseacreing, or of being oneself a
godless communist. The same would apply to any Dominican
Inquisitor of earlier centuries who lacked the capacity to see
witches everywhere. In such authoritarian situations, it is
important to see what the authorities see; it is inconvenient,
and possibly dangerous, to see what is actually there.
But this leads to an equal and opposite burden of omniscience
on those at the top, in the Eye of the authoritarian pyramid.
All that is forbidden to those at the bottom---the conscious
activities of perception andand evaluation---is demanded of the
master classes, the elite and the super-elite. They must attempt
to do the seeing, hearing, smelling, tasting, feeling, thinking,
and decisionmaking for the whole society.
But a man with a gun (the power to punish) is told only what
his target thinks will not cause him to pull the trigger. The
elite, with their burden of omniscience, face the underlings,
with their burden nescience, and receive only the feedback
consistent with their own preconceived notions. The burden of
omniscience becomes, in short, another and more complex burden of
nescience. Nobody really knows anything anymore, or if they do,
they are careful to hide the fact.
As the national security paradigm approaches (or attempts to
approach) the ideal infinite regress of spies-spying-on-spies-
spying-on-spies, etc., the resultant general trepidation causes
all persons to hide anything they know (if it differs from the
official reality), not only from their superiors, but from peers
and inferiors as well. Anybody, after all, might be part of the
nth-degree secret police. "One can't be too careful these days."
The burden of nescience becomes omnipresent. More and more of
reality becomes unspeakable.
But as Freud noted, that which is objectively repressed
(unspeakable) soon becomes subjectively repressed (unthinkable).
Nobody likes to feel like a coward and a liar constantly. It is
easier to cease to notice where the official reality grid differs
from sensed experience. Thus Optimun Fuckup gradually becomes
Terminal Fuckup, and rigiditus bureaucraticus sets in; this is
the last stage before all brain activity ceases, and the society
is intellectually dead.
Celine's Third Law is like unto the first two, and holds that
AN HONEST politician is a national calamity.
At first glance, this seems preposterous. People of all
shades of opinion agree that at least on the axiom that we need
more honest politicians, not more crooked ones. Please remember,
however, that people of all shades of opinion once agreed that
the Earth is flat.
Your typical dishonest politician (bocca grande normalis) is
interested only in enriching himself at the public expense, a
goal he shares with most of his fellow citizens, especially
doctors and lawyers. This is normal behavior for our primate
species, and society has always been able to endure and survive
it.
********************************
* NOBODY KNOWS ANYTHING, OR IF *
* THEY DO, THEY ARE CAREFUL TO *
* HIDE THE FACT! *
********************************</p>
<p> An honest politician (bocca grande giganticus) is far more
dangerous. He or she is sincerley commited to bettering society
by political action. In practice, that means by writing and
enacting more laws. Indeed, many groups of idealistic citizens
publish rating sheets on politicians every year, and those who
have created more laws are estimated as having higher value than
those who are frequently absent when bills are voted upon. The
assumption is that adding more laws to statute books is a
positive achievement, like adding more money to our paychecks or
more art works to a museum.
A little thought, however, shows that this assumption is not
tenable. Every law creates a whole new criminal class; for
instance, when marijuana was illegalized in 1937, several hundred
thousand formerly law-abiding citizens became criminals
overnight, by Act of Congress. As more and more laws are passed,
more and more citizens become criminals. The chief cause of the
rising crime rate is the rising number of laws being enacted. An
honest politician, who keeps his nose to the grindstone and
enacts several hundered laws in the course of his career, thereby
produces as many as several million new criminals. </p>
<p> It is furthermore mathematically demonstrable that the more
laws there are, the more restrictions there are on the freedom of
the individual. If there were, say, only three laws in a given
society---e.g., Thou shalt not kill; thau shalt not steal; thou
shalt not lie or defraud---there would be only three restrictions
on freedom, which all rational persons would accept as obviously
necessary to the maintenance of order. When there are several
hundred thousand restrictions on freedom, most of which are felt
as extremely irksome by large segments of the populace.
In fact, it would take a brigade of lawyers several weeks,
minutely examining your affairs, to determine if you are a
criminal. Certainly, no ordinary citizen has the time or
research facilities to discover if he or sshe is in violation of
one out of skillions of laws currently on our statute books. In
many cases, two lawyers consulted independently will give
opposite opinions about whether or not a given course of action
is in violation of the statutes.
And new laws are being enacted all the time. Obviously,
unless there is a sudden paper shortage, the number of laws on
the books will eventually reach the point satirized by T.H.White,
in which "everything not prohibited is compulsory." It would
then probably only take a few years or decades more for a cadre
of honest politicians diligently writing even more laws to reach
the complementary point where "everything not compulsory is
prohibited."
*********************************
* EVERY LAW CREATES A WHOLE *
* NEW CRIMINAL CLASS OVERNIGHT! *
*********************************</p>
<p> At that stage the nightmare world of Orwell's 1984 will be
achieved. Crooked politicians, merely interested in the normal
human activity of making themselves rich and comfortable, could
never create that ultimate horror; but honest and idealistic
politicians bring us closer to it every day, with every new law
they enact.
These three generalizations---that national security produces
national insecurity; that authoritarianism produces
miscommunication and eventual idiocy; and that honest politicians
are a plague upon society---will be found to fully explain the
Decline and Fall of Rome, the Decline and Fall of the British
Empire, and the Decline and Fall of any country you care to name.
They are as universal as Newton's laws of motion and apply to
ALL cases. Of course, the American Sociological Association says
I am mad. Mad, am I? They said the Wright Brothers were mad.
They said Edison was mad. They said Baron Frankenstein was
mad...</p>
<p>HABARD CELINE was trained in contract law and naval engineering
but claims he acquired his real education playing the piano in a
whorehouse. He is captain of the world's largest yellow
submarine, the Leif Erikson, and president of Gold and Appel
Inc., an import-export firm that has frequently aroused the
suspicions of law enforcement agencies ("137 arrests and no
convictions," Hagbard brags). Some claim that he is a master of
disguise and has successfully passed himself off under such
alternative identities as Howard Cork, Carl Cory, Hugh Crane,
Clutch Cargo, Captain Nemo, etc., and has appeared in countless
epics and sagas.
I am mad. </p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron 415-935-5845
Just Say Yes 415-922-2008
Rat Head 415-524-3649
Cheez Whiz 408-363-9766</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
<p></p></xml>

180
regexConsp/christ-c.xml Normal file
View File

@ -0,0 +1,180 @@
<xml><p>CHRISTIANITY AND FREEDOM</p>
<p>By JACOB G. HORNBERGER</p>
<p>Many Americans believe that by supporting the Welfare State,
they are fulfilling God's great commandment to "love thy
neighbor as thyself." Having been taught in public schools
since childhood that the Welfare State helps needy people,
Americans usually are filled with a deep sense of guilt and
embarrassment whenever they object to any aspect of
governmental assistance for others.</p>
<p>Of course, government officials foster these feelings in order
to minimize resistance to the Welfare State. For whenever a
citizen objects to any part of the welfare system in America,
he inevitably is assaulted by political officials with such
accusations as: "You hate the poor!"; "You are a racist!"; and
"You hate God!" These tactics usually are quite effective in
breaking down resistance to welfare programs. And the usual
result is that Americans call for reform, rather than
elimination, of the Welfare State.</p>
<p>But, in actuality, the Welfare State is founded on absolutely
immoral principles. And not only does a person not further
God's work by advocating or defending the Welfare State, he
instead denigrates it.</p>
<p>One can imagine the following scenario when a new arrival gets
to the pearly gates:</p>
<p> St. Peter: What did you do to fulfill God's commandment
to love thy neighbor as thyself?</p>
<p> Applicant: I have here my income tax returns, the
Internal Revenue Code, and the Federal Register.</p>
<p> St. Peter: What meaning do these items have?</p>
<p> Applicant: St. Peter, you obviously are not familiar with
the Welfare State of the United States of America. These
items show how much of my tax money was used by the
government to help others in need. So, please step aside
and let me in.</p>
<p> St. Peter: You were participating in a way of life which
constituted a wilful violation of God's sacred
commandment against stealing?</p>
<p> Applicant: Stealing? What are you talking about? Through
my tax payments, people were helped.</p>
<p> St. Peter: Was not the political process used to take
money from people against their will in order to
redistribute to others? Were you not supporting and
participating in this evil way of life?</p>
<p> Applicant: Oh! No, that wasn't me. That was the
politicians and bureaucrats. I just voted for them, just
like other patriotic Americans. Don't blame me for the
stealing. Just give me credit for all the good that was
done with the loot.</p>
<p>If I held a gun to a person's head, and demanded "Your money
or your life!," most people would believe that I had committed
an immoral (and illegal) act. Suppose I needed the money for
my (or someone else's) education. Would this change the
immoral (and illegal) nature of my act? Most people would
respond in the negative. While punishment might be mitigated
due to extenuating circumstances, it remains morally (and
legally) wrong to steal, no matter how great the need for
another person's money.</p>
<p>But the interesting phenomenon about the Welfare State is that
many people believe that by making the exact same act legal--
that is, by enshrining it into their political system--it
somehow is converted into a moral act. In other words, in the
Welfare State, people vote for someone who is given the legal
power to take a person's money in order to give it to someone
else; then, it is believed that this political act, immoral if
committed by a private individual, somehow becomes moral
because it is now performed by a democratically elected public
official.</p>
<p>We must also consider the matter of free will--one of the
greatest gifts which God bestowed on human beings. He
obviously loved us so much that we have been given the freedom
even to deny Him (and our neighbor). In other words, while we
are told to love Him and others, we are not compelled by Him
to do so.</p>
<p>One of the best examples of this wide ambit of freedom is
found in the story of "The Danger of Riches" in the New
Testament. A rich man approached Jesus and asked, "Teacher,
what good must I do to possess everlasting life?" After the
man advised Jesus that he already kept all of the
commandments, Jesus told him, "If you seek perfection, go,
sell your possessions, and give to the poor. You will then
have treasure in heaven. Afterward, come back and follow me."
Unable to let go of his material wealth, however, the man went
away sad.</p>
<p>The story, of course, is valuable in advising people of the
dangers of spiritual or psychological attachment to material
things. But the lesson it teaches is important in another way:
After the young man chose to reject the suggestion to give
everything he had to the poor, Jesus did not ask the political
authorities to seize the man's possessions and redistribute
them to the poor. In other words, he did not force the man to
comply with the suggestion. Since the man had been given the
freedom to choose, the choice he made, although not the
desired one, was honored.</p>
<p>It is the vital importance of freedom of choice that advocates
of the Welfare State so often forget. They favor "freedom" but
only when the person chooses the "right" way. In other words,
the person is told, "It is morally and ethically correct that
you should share your possessions with others, and you are
free to make this decision in your own way . . . but if you
choose the wrong way, we shall simply take your money from
you, against your will, and do with it what you should have
done with it."</p>
<p>It is the great principles of freedom of choice and individual
responsibity on which the United States was founded. By and
large, our American ancestors were free to engage in a
tremendously wide range of choices as long as they did not
inflict violence or fraud on others. And early Americans
believed that the primary purpose of government was to protect
the exercise of choice rather than interfere with it. Thus,
for the first century of America's history, there was, for
example, neither income taxation nor welfare.</p>
<p>Does this mean that our ancestors were evil and mean for not
providing a Welfare State as their descendants have? Of course
not. It simply means that they believed that each individual
should be free to do what he wants with his own money even
when, and especially when, it is not in accordance with the
wishes of the majority of his fellow citizens. And the irony
was that 19th-century America was not only the most prosperous
nation in history but also the most charitable nation in
history.</p>
<p>But unfortunately, the American people of the 20th century
have rejected and abandoned that philosophy. The idea now is
that people must be forced to be "good" through the political
plunder of the Welfare State. Money is taken from people
against their will so that it can be given to those who need
it. And the taxpayers claim "credit" for all of the "good"
which the political authorities do with their money.</p>
<p>The result, of course, is that the government has become the
means by which everyone is trying to live at the expense of
everyone else. Everyone is trying to get his "fair" share of
the loot while, at the same time, blocking out of his mind
that it is being stolen from his friends, neighbors, and
fellow citizens across the land. And everyone is trying to get
his "fair" share of the "credit" while doing everything he can
to protect his own pocketbook.</p>
<p>At the end of the year, it is important to count our
blessings. Fortunately, we live in a nation in which, by and
large (and with many exceptions), the government is
constitutionally prohibited from interfering with our
religious, intellectual, and political activities. But it is
also important, at the beginning of the new year, to make
resolutions: Let us resolve to dedicate ourselves to ending
the Welfare State by recapturing the vision of freedom,
private property, and limited government which guided our
American ancestors.</p>
<p>Mr. Hornberger is founder and president of The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.</p>
<p>------------------------------------------------------------
From the December 1990 issue of FREEDOM DAILY,
Copyright (c) 1990, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.
</p></xml>

251
regexConsp/chron.xml Normal file
View File

@ -0,0 +1,251 @@
<xml><p>
CHRONOLOGY OF SECRET SOCIETIES
Excerpted from THE OCCULT CONSPIRACY
by Michael Howard
Published by Destiny Books
Pages 179 - 183
------------------------------------------------------------------</p>
<p> 40,000 BCE
Early establishment of Mystery schools, as depicted in the Lascaux
cave paintings.</p>
<p> 30,000 BCE
According to some occult traditions this period saw the
colonization of Asia and Australasia by the inhabitants of the
lost continent of Lemuria or Mu. Goddess worship and matriaarchal
cultures established worldwide.</p>
<p> 10,000 BCE
Evidence suggestive of early contact between extraterrestials and
Stone Age tribes in Tibet.</p>
<p> 9,000 - 8,000 BCE
Estimated date of the destruction of Atlantis, according to some
occult traditions. The Atlantean priesthood flee to establish
colonies in the British Isles, Western Europe, North Africa and
South America. Rise of the Northern Mystery Tradition centered on
the island of Thule and the Aryan culture. Invention of the runic
alphabet.</p>
<p> 5,000 BCE
First primitive cities established in the Middle East.
Agriculture begins with domestication of animals such as sheep and
goats. Possible contact between extraterrestials and early
Sumerian culture.</p>
<p> 5,000 - 3,000 BCE
Formation of the two lands in pre-dynastic Egypt ruled by
outsiders (Isis and Osiris). The Egyptian pantheon of gods
established including Horus, Thoth, Set, Ra, Ptah and Hathor.
Pharoahs regarded as the divine representatives of the Gods.</p>
<p> 3,000 - 2,000 BCE
Building of burial mounds and chambered tombs in Western Europe
and the Mediterranean area; the Sphinx and the Great Pyramids of
Giza and Cheops of Egypt; and the ziggurat (Towers of Babel) in
Ur. Sarmoung Brotherhood founded in Babylon.</p>
<p> 2,000 - 1,000 BCE
Reign of Thothmes III in Egypt (c. 1480). Foundation of the
Rosicrucian Order. Reign of Akhenaton (c. 1370) who establishes
the mystical Brotherhood of Aton dedicated to the worship of the
Sun as a symbol of the Supreme Creator. Erection of Stonehenge
and other megalithic stone circles in the British Isles. Reign of
Ankhenaton's son Tutankhamun who re-establishes the old pantheon
of Egyptian gods and goddesses. Moses leads Children of Israel
out of slavery in Egypt during the reign of Ramses II to the
promised land of Canaan.</p>
<p> 1,000 - 500 BCE
Foundation of the Dionysian Artificers. The building of Solomon's
temple (c. 950). Establishment of the city states of Greece and
the Olympic pantheon of gods to replace earlier Nature worship.
First temples erected in Mexico, Peru and southwest North America.
Celts invade Western Europe. Decline of Goddess worship and rise
of patriarchal sky gods personified by priest-kings. Rome founded
in 750.</p>
<p> 500 BCE - 001 CE
Celtic culture established in Britain. The foundation of Druidic
wisdom colleges in Gaul and the British Isles. Odin recognized as
major god in the Northern Mysteries replacing the Mother Goddess
and is credited with inventing the runes. Buddha, Lao Tze,
Confucius, Pythagoras, Plato and Zoroaster preach their new
religions and philosophies. Maya culture in South America.
Establishment of Eleusinian mystery cults. Rise of the Essene
sect in Palestine and Judea. Birth of Jesus of Nazareth.</p>
<p> 001 - 400 CE
Jesus possibly travels to India, Tibet and Britain to be initiated
into the esoteric traditions of East and West. Crucified for his
radical political and religious ideas (c. 33). Joseph of
Arimanthea establishes first Celtic Church at Glastonbury (c. 37).
Invasion of Britain by Roman legions and suppression of the Druids
(40 - 60). Paul travels to Asia Minor and Greece preaching his
version of the gospel (50). Jewish revolt against Roman rule led
by Zealots (66). Essenes suppressed and Dead Sea Scrolls hidden
in caves. Temple in Jerusalem destroyed by Romans (70). New
testament written. The Nazarenes break away from Judasim to found
the Christian Church (c. 80). Ormus is converted to Esoteric
Christianity by Mark. Mithrasim and the Mysteries of Isis compete
with Christianity in the Roman Empire. Mani, a Persian high
priest of Zoroastrianism, is crucified (276). Emperor Constantine
declares Christianity the official religion of the Roman Empire.
The Council of Nicea defines heresy, condemns paganism and lays
the theological foundation for the Catholic or Universal Church
(325). Constantine's successor Julian the Apostate (361 - 363)
briefly re-establishes the pagan old religion. Emperor Theodosius
outlaws the worship of the pagan gods in Rome and closes the pagan
temples (378). Invasion of Rome, Greece and Europe by the
barbarians led by Atilla the Hun (395-480). Withdrawal of the
Roman legions from Britain (395). Foundation of the Order of
Comacine by ex-members of the Roman College of Architects.</p>
<p> 500 - 1,000 CE
Mohammed founds Islam (dies 632). Celtic Church outlawed by
Council of Whitby (664). Foundation of first Sufi secret
societies (c. 700). First written translation of Emerald Tablet
of Hermes Trismegistus. Charlemagne founds alleged first
Rosicrucian Lodge in Toulouse (898). Foundation of the Cathars,
Druzes and Yezedi (900). Heretical Catholic monks found first
Rosicrucian college (1,000).</p>
<p> 1000 - 1400 CE
Foundation of the Order of the Devoted of Assassins by
Hasan-i-Sabbah (1034-1124) and the Order of St John (1050). First
Crusade to the Holy Land (1095). Capture of the city of Jerusalem
by Godfrey de Bouillan, founder of the Priory of Sion (1099).
Assassins infiltrate Thuggee cult in India. Foundation of the
Order of the Knights of the Temple of Solomon in Jerusalem (1118).
Charter granted to the Priory of Sion by Pope Alexander II (1178).
Crusade launched against Cathars (1208). Inquistion created to
fight heresy (1215). Massacre of the Cathars at Montsegur in
Southern France (1241). Troubadours practising their cult of
courtly love. Occult schools teaching the Cabbala and alchemy
established in Spain by the Moors. Count Rudolf von Hapsburg
crowned as Holy Roman Emperor (1273). Knights Templars arrested
by King Philip of France on charges of devil worship, heresy and
sexual perversion (1307). Last official Grand Master of the
Templars, Jacques de Molay, burnt at the stake and the Order goes
underground (1314).</p>
<p> 1400 - 1600 CE
Alleged life of Christian Rosenkreutz (1379-1482). Foundation
of the Order of the Garter by Edward III (1348). First
publication of the Corpus Heremeticum by the Medici family in
Italy (1460). Publication of Malleus Malifiracum and the papal
bull of Pope Innocent which began the medieval witch hunting
hysteria (1484 and 1486). Martin Luther begins Reformation
(1521). Henry Agrippa refers to the Templars as Gnostics and
worshippers of the phallic god Priapus (1530). Life of Dr John
Dee (1527-1608). Foundation of the British Secret Service by Sir
Francis Walsingham. Birth of Johann Valenti Andrea (1586). Life
of Sir Francis Bacon (1561-1626). Defeat of the Spanish Armada,
with magical help from the New Forest Witches (1588).</p>
<p> 1600 - 1700 CE
Foundation of the Virginia Company by James I (1606). The
Romanovs become Czars of Russia (1613). Publication of
Rosicrucian manifesto (1614). Life of Elias Ashmole (1617-1692).
Voyage of the Mayflower to New England and the publication of Sir
Francis Bacon's novel The New Atlantis (1620). Establishment of
the pagan community of Merrymount in Massachusetts by Thomas
Morton. English Civil War begins (1642). First English Mason
guild accepts non-stonemasons into its meetings (c. 1646).
Charles I convicted of treason and beheaded (1649). Oliver
Cromwell allegedly makes pact with the Devil in order to retain
power. Introduction of Freemasonry to American colonies by Dutch
settlers (1658). Order of Pietists founded in Pennsylvania
(1694).</p>
<p> 1700 - 1800 CE
Birth of the Comte de Saint-Germain (1710). Masonic Grand Lodge
of England and Druid Order founded (1717). First Masonic lodge
founded in France (1721)&gt; Benjamin Franklin initiated as Mason
(1731). Chevalier Alexander Ramsey informs French Masons that
they are heirs to the Templar tradition (1736). Roman Church
condemns Masonry (1738). Birth of Count Cagliostro. Comte de
Saint-Germain involved in Jacobite plot to restore Stuart dynasty
to the English Throne (1743). Society of Flagellants and Skopski
founded in Russia (1750). George Washington initiated as a Mason
(1752). Sir Francis Dashwood founds the Hell Fire Club. Franklin
visits England to discuss the future of American colonies with
Dashwood (1758). Foundation of the Rite of the Strict Observance
by Baron von Hund based on the Templar tradition. Frederick of
Prussia founds Order of the Architects of Africa and uses the
title Illuminati to describe his neo-Masonic lodges (1768).
Franklin elected Grand Master of the Nine Sisters lodge in Paris
(1770). Grand Orient founded in France (1771). Boston Tea Party
(1773). Washington appointed Commander-in-Chief of the new
American Army (1775). Order of Perfectibilists or Illuminati
founded. American Revolution (1776). Czar Peter founds the
Secret Circle (1778). Supposed death of the Comte Saint-Germain
(1784). Grand Masonic Congress allegedly plots French Revolution.
Cagliostro involved in Diamond Necklace Affair. Illuminati banned
in Bavaria and goes underground (1785). French Revolution (1789).
Illuminist conspiracy to overthrow the Hapsburgs (1794).</p>
<p> 1800 - 1900 CE
Count Grabinka founds secret society in St. Petersburg based on
Martinism and Rosicrucianism (1803). French republican plot to
assassinate Napoleon by placing a bomb under his coach, led by
occultist Fabre d'Olivet. Emperor Napoleon takes control of
French Masonry (1805). Revived Templar Order in France celebrates
the martyrdom of Jacques de Molay with public requiem (1808).
Foundation of the Order of Sublime Perfects (1809). Eliphas Levi
(1810-1875) reveals the secret symbolism of the Templar idol
Baphomet. Czar Alexander I and Emperor Francis von Hapsburg unite
to defeat Italian revolution incited by secret societies. John
Quincy Adams, initiate of the Dragon Society, is elected US
President (1820). Czar Alexander outlaws Masonry in Russia
(1822). Decembrist secret society attempts coup when Czar
Alexander allegedly dies (1825). AntiMasonic Party founded in US
to combat secret societies in American politics (1828). Wagner
joins the Vaterlandsverein, a secret society dedicated to the
formation of a pan-European federation of nations. Masonic
convention at Strasbourg allegedly plots second French Revolution
(1848). Napoleon III condemns Grand Orient for dabbling in
radical politics (1850). Paschal Randolph founds Hermetic
Brotherhood of the Light (1858). Abraham Lincoln is assassinated
(1865). Klu Klux Klan founded (1866). Society of Rosicrucians in
Anglia founded (1867). Foundation of the Theosophical Society by
Madame Blavasky on instructions of the Great White Brotherhood.
Birth of Aleister Crowley (1875). Mysterious suicide of ArchDuke
Rudolph von Hapsburg at a hunting lodge at Mayerling (1889).
Foundation of the Hermetic Order of the Golden Dawn (1888).
Assassination of Empress Elizabeth von Hapsburg by anarchist
(1898).</p>
<p> 1900 - 1897 CE
Foundation of the Ordo Templi Orientis (1900). International
Order of CoFreemasonry founded in 1902. Publication of The
Protocols of the Wise Men of Zion in Russia (1905). Foundation of
the Ancient and Mystical Order of the Rose Crucis (1909). Black
Hand Society founded in 1911. Aleister Crowley accepted as head
of the British OTO. Order of the Temple of the Rosy Cross founded
in 1912. Assassination of ArchDuke Franz Ferdinand and
Archduchess Sophia von Hapsberg. Attempted murder of Rasputin.
WWI begins in 1914. Kaiser Wilhelm abdicates. Hapsburg dynasty
is overthrown. Bolshevik Revolution in Russia (1917-1918).
Foundation of German Workers Party by Thule Society (1919).
Hitler joins GWP and changes its name to the National Socialist
Party (1920). Crowley employed by MI6. Cardinal Roncalli, later
Pope John XXIII, allegedly joins Rosicrucian Order. Hitler
becomes first chancellor of the Third Reich (1933). Roosevelt
places Illuminist symbol of eye in triangle on the dollar bill
(1935). Nazi invasion of England prevented by New Forest Witches
(1940). Rudolf Hess lured to Britain on peace mission by fake
astrological data (1941). Order of the Temple revived in France
(1952). First Bilderberg meeting in 1954. Foundation of the P2
Lodge (1960). Death of Pope Paul VI, election and alleged murder
of Pope John Paul I, and election of Pope John Paul II (1978).
Exposure of P2 conspiracy. Attempt to assassinate John Paul II
(1981). L'Ordre Internationale Chevelresque Tradition Solaire
founded on instructions of the revived Order of the Temple in
France (1984).</p>
<p> <special>EOF</special>
5 January 1991</p>
<p> </p></xml>

315
regexConsp/cia-sws.xml Normal file
View File

@ -0,0 +1,315 @@
<xml><p>
Article: 569 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: Top Secret: How To Kill--"The CIA's Secret Weapons Systems"
Keywords: our culture has lost its moral, ethical, and spiritual foundations
Organization: Silicon Graphics, Inc.
Date: Wed, 8 Apr 1992 15:56:51 GMT
Lines: 321</p>
<p> unless we know MUCH MORE about the atrocities committed "in the interests
and name of `national security,'" how can we possibly become sufficiently
motivated and driven to dedicate our energies towards changing this form
of "government" by lies, dissembling, expediency, profit-as-god, and
murder? we have no idea what is "done in our name." if we did, we would
no longer be able to participate in its commoditized seductiveness because
we would not be able to look ourselves in the mirror or sleep at night.
--ratitor</p>
<p> the following is taken from the June, 1978 issue of "Gallery" magazine:
__________________________________________________________________________
THE CIA'S SECRET WEAPONS SYSTEMS
by Andrew Stark</p>
<p> Exploding wine bottles, guns constructed out of pipes,
bullets made of teeth, aspirin explosives: they sound like
props from a second-rate spy story. Horrifyingly enough,
they are real. The CIA has spent a great deal of its time--
and your money--developing countless bizarre weapons for
assassination, sabotage, and mass destruction. If that's
news to you, it's because the CIA doesn't want these
products, some of which are quite easy to put together, to
fall into the "wrong hands." As for whether they are in the
right hands now--judge for yourself.</p>
<p> The CIA has developed many exotic and sophisticated devices
intended for use in interrogation, sabotage, and assassination.
These weapons are necessary--if you grant that what the CIA itself
does is necessary. If the CIA wants to eliminate a key KGB agent
operating in Hungary, it faces certain problems. It would be
virtually impossible to slip a deadly weapon, such as a gun or
bomb, past Hungarian customs officials. Thus, the CIA assassin
must assemble his weapon from commonly obtainable materials after
he crosses the border.
The CIA agent might decide to construct a urea nitrate
explosive, commonly known as a urine bomb. This weapon is quite
deadly, easily exploded, and consists primarily of nitric acid and
urine. The urine bomb is one of literally hundreds of murderous
weapons in the CIA arsenal.
"The New York Times" of September 26, 1975 revealed the
existence of guns that shoot cobra-venom darts. Then there was the
shoe polish compound intended to make Fidel Castro's beard fall
out, so that he would lose his "charisma." And CIA laboratories in
Fort Monmouth, New Jersey developed the famous rifle that shoots
around corners.
Some CIA weapons are designed to kill many people--deadly germs
can be released in subways; others are intended to kill a single,
specific individual--the Borgia ring contains deadly poison to be
slipped into a victim's drink; and still others are standard
weapons supplied for such missions as overthrowing the Allende
government in Chile in 1973.
The information about CIA weapons that you will read in this
article generally has not been made public before. It was not
intended to be. But your tax dollars pay for these devices; it is
your right to know about them.
There is a booklet, written in 1977 and distributed to a select
group of U.S. mercenaries, titled "CIA Improvised Sabotage
Devices." This instructional guidebook, part of "the Combat
Bookshelf," was published by Desert Publications, P.O. Box 22005,
Phoenix, Arizona 85028. If you want to know how the CIA turns a
cigar box into an explosive that can destroy a 10,000-gallon
capacity storage tank, then "CIA Improvised Sabotage Devices" is
what you should read. You will need it if you want to build the
"Water-Drip Electric Delay," a bomb that requires little more than
wood scrap, a tin can, and a battery. The "Pocket Watch Electric
Delay" requires little more than a watch, a screw, and a battery.
The "Mousetrap Electric Release" is another bomb, this one
requiring a mousetrap, a trip wire, a battery, and little else. It
is described as "an excellent device to use with bazooka rockets
against trucks, tanks, or locomotives." The "Chemical
Instantaneous Initiator" is made from a sugar-chlorate mix and is
effective in sabotaging trains. The "Martini Glass Shaped Charge"
is a bomb that also can be made out of a beer can. You might want
to try to construct the "Vehicle Booby Trap." The "Potassium
Chlorate and Sugar Igniter" and the "Sawdust, Moth Flakes, and Oil
Incendiary" can be made with only what you see in their titles.
For these and more than fifty other CIA devices, step-by-step
instructions on how to make them and illustrations of what they
should look like when completed are given. Turn a wine bottle into
a bomb. Build a land-mine rocket. Manufacture napalm in your
basement. Even the simple how-tos of causing a dust explosion can
be found in "CIA Improvised Sabotage Devices."
Why is the CIA so deeply involved in sabotage techniques? The
CIA might think it is in this country's interest to delay
scientific work being done by another nation. Or, the CIA might
want to disrupt a nation's economy in the hope that the resulting
chaos will lead to civil unrest and the overthrow of the existing
government (some of this actually happened in Chile). The original
John Rockefeller used such tactics against his competitors. He
simply had their refineries blown up.
Another pamphlet the CIA would not like you to see is titled
"How to Kill," written by John Minnery, edited by Robert Brown and
Peder Lund, and published by Paladin Press, Box 1307, Boulder,
Colorado 80306. The reason the CIA would prefer that you not see
this eighty-eight-page pamphlet, which is unavailable at bookstores
and newsstands, is because it contains a number of "ingenious"
methods of doing what the title says. Also, Paladin Press, which
published a book called "OSS Sabotage and Demolition Manual," is
widely regarded by journalists as an organization with close ties
to mercenary groups and the CIA. Paladin Press doesn't want you to
know that, but how else could they have published the "OSS Sabotage
and Demolition Manual?" The Office of Strategic Services was the
precursor of today's CIA.
This writer's call to Colorado yielded the following
conversation:</p>
<p> "How could you publish the "OSS Sabotage and Demolition Manual,"
I asked Peter Lund, editor and publisher of Paladin Press, "if your
organization, at the least, was not dealing with former OSS agents?
And what about "How to Kill?"
"I don't talk to journalists," Lund said.
"You're called the Paladin Press. You must publish books. Can
I order them?"
"No."
"Why not? You're a publisher, aren't you?"
"We're afraid our publications might fall into the wrong hands."
"What are the right hands?" I asked.
"I don't talk to journalists."
"Have you ever heard of Desert Publications?" I asked.
"A fine outfit," Lund said. "If they recommend you, I'll send
you our material."
"That's my problem," I said. "They don't seem to have a phone
number."
"Well, they're a good group."
"Listen," I said, "wasn't your group, and Desert Publications
besides, involved in CIA mercenary activity in Africa?"
"I don't know anything about that."
"Were you in the Special Forces?"
"July 1967 to July 1968 in Vietnam."
"Were you CIA?"
"I was MACV [Military Armed Forces Command Vietnam]."
"You weren't affiliated with CIA?"
"I didn't say that."
"What do you say?"
"We did joint operations with CIA on the Phoenix Program."
"Wasn't that a murder operation?"
"No. It was snatching people."</p>
<p> The Phoenix Program was designed for a job that the CIA
euphemistically described as "eliminating the Viet Cong
infrastructure." In reality, it was a rampant reign of terror run
out of CIA headquarters at Langley, Virginia. Former CIA director
William Colby later termed the program "effective." The Phoenix
Program was a naked murder campaign, as proved by every realistic
report, ranging from the Bertrand Russell Tribunal to the Dellums
Committee to admissions by CIA agents themselves. The program
killed--and *none* of these killings occurred in combat--18,000
people, mostly women and children.
But what about Peder Lund, editor and publisher of Paladin
Press? The book he edited and published, "How to Kill," outlined a
surfeit of murder methods, horrific techniques of causing people to
die. For example:
"Without getting too deeply into the realm of the bizarre,"
wrote John Minnery, the author of "How to Kill" as he proceeded to
just that, "a specially loaded bullet made from a human tooth
(bicuspid) could be fired under the jaw or through the mouth into
the head. The tooth is a very hard bone, and its enamel shell
would allow it to penetrate into the brain. The intention here is
also to hide the cause of death because the examiner in his search
for a projectile will disregard bone fragments."
One last example from "How to Kill" should give you the flavor
of the book:</p>
<p> Lesson Nine: Hot Wire</p>
<p> "Essentially, the weapon is an electrified grid in the urinal
basin. This can take the form of a screen cover for the drain
or a metal grill. If the urinal is completely porcelain, the
screen must be added by the assassin. The drain cover is
connected to the electrical system of the washroom by means of
an insulated cord that is hidden behind the plumbing.
"What happens when the subject uses the urinal should be
obvious now. The subject's urine, which is a salty liquid and
a perfect conductor of electricity, makes contact with the
charged grid, and the shock will kill him."</p>
<p> This reporter's investigation revealed that the "Hot Wire" was
child's play compared to certain other CIA weapons devices. For
instance, I was able to obtain Volumes One and Two of the "CIA
Black Book" on improvised munitions, volumes that are stamped "for
official use only" on almost every page. It is obvious why the CIA
would like these books to remain secret. With elaborate
instructions, they describe how to make high explosives from
aspirin, how to construct a nail grenade, and how to turn a Coke
bottle into a bomb.
Described in detail in the "Black Book" is the previously
mentioned urea nitrate explosive, or, as it is known to the pros,
"the piss bomb." Instructions for the preparation of this weapon
assure the maker that animal urine will do as well as human; the
important thing is to have ten cups of it, boil it down to one cup,
and mix it with the nitric acid.
Also described in the "Black Book" is how to construct a pipe
pistol, which, as the name indicates, is a gun constructed out of a
pipe. Other weapons include a cooking syringe filled with poison
that can be stabbed into "the subject's" stomach; a cyanide gas
pistol; a throat cutter gauntlet knife (razor sharp and only an
inch or so in length); and a mixture of fertilizer and aluminum
powder that can be made into a powerful bomb.
Why build murder weapons out of such weird material? Is the CIA
insane?
No. In its own way, the whole thing is perfectly logical.
The pamphlet "How to Kill" explained it all: "As most of these
devices are homemade, this precludes the possibility of their being
traced. They are, in effect, `sanitized' and perfect for
assassinations, where weapons are prohibited, or where customs in
the hostile country are stringent, so these can be made from local
materials."
Being a contract killer for the CIA is not all roses. You
cannot kill in just any way. A number of attempts have been made
on Fidel Castro's life--some with the CIA and the Mafia
cooperating--and some of them may have failed because of
restrictions imposed on the potential assassins. It would be
unacceptable for Castro's murder to be laid at the door of the CIA.
This would make Castro a martyr in the eyes of his countrymen.
Thus, a method that would suggest death by natural causes must be
found.
Abundant speculation and considerable evidence suggest that the
CIA or some other government agency arranged for the "natural"
deaths of David Ferrie, Jack Ruby, George De Mohrenschildt, and
other potential witnesses into the assassination of John Kennedy.
Some methods of killing, like the injection of an air bubble into
the bloodstream, will often go unnoticed by medical examiners.
Another hard-to-trace method of killing is to mail a snake to
the victim. This is known as killing by long distance. A
disadvantage to this method is that the snake might bite an
innocent third party who just happens to open the package. The
advantage is that once the snake has struck, the evidence can
simply slither away.
Sometimes, as the CIA knows, killing has to be done at close
range. For this purpose, a valuable weapon is the ice pick with a
blood arrester attached. The blood arrester is a cloth wrapped
near the tip of the ice pick. When the pick is shoved into the
victim, the spurting blood is absorbed by the blood arrester.
People who see the victim fall will probably think he has had a
heart attack. While the onlookers try to help the victim, the
assassin uses this valuable ten or fifteen seconds to escape
unnoticed.
Often it is advisable to use what is called in the trade a
"quiet weapon." Silenced weapons can include pistols, rifles, and
even machine guns.
Poison is a quiet killer. Here is a partial list of the poisons
the CIA has become expert at administering: oil of bitter almonds;
ant paste; cadmium, used in vapor form, and death is delayed four
hours; radiator cleaner, also causing a delayed death;
Cantharides (Spanish Fly); ethyl mercury; and freon, heated by a
flame. These poisons and many others are listed in "How to Kill."
The author then cautions the reader:
"Unless otherwise stated, these poisons are either to be
injected into the subject, or taken orally by him by adding it to
his food. Use common sense in the application of these potions
and, if possible, double the O.D. necessary."
W.H. Bowart, in his book, "Operation Mind Control" described the
CIA's use of drugs: "In 1953, the CIA made plans to purchase ten
kilograms of LSD for use in `drug experiments with animals and
human beings.' Since there are more than 10,000 doses in a gram,
that meant the CIA wanted 100 million doses. The CIA obviously
intended to `corner the market' on LSD so that other countries
would not be ahead of the U.S. in their potential for `LSD
warfare.'"
Dr. Albert Hoffman, an early researcher into the uses of LSD,
was horrified by what the CIA was doing: "I had perfected LSD for
medical use, not as a weapon. It can make you insane or even kill
you if it is not properly used under medical supervision. In any
case, the research should be done by medical people and not by
soldiers or intelligence agencies."
Perhaps the most frightening weapon of all is the one that can
be used to alter weather and climate. It was used with
considerable success in Vietnam. It slowed troop movements with
heavy rains, and it destroyed the rice crop, as well. The danger
is that these climatological changes may become permanent,
affecting not only enemies of the United States, but also the
entire planet.
Finally, considerable evidence exists that the United States,
through the CIA, employed germ warfare during the Korean War. A
number of captured pilots testified that germ warfare was used, but
their testimony was dismissed as brainwashing. A Marine Corps
colonel named Frank H. Schwable signed a germ warfare confession
and, according to W.H. Bowart, "named names, cited missions,
described meetings and strategy conferences."
Schwable later repudiated his confession. But the charges of
germ warfare were taken up in front of the United Nations, and a
number of countries believed them.
The United States, incidentally, was later charged with using
nerve gas in Vietnam.
What you have read on these pages is pretty revolting stuff.
Yet, if the world ought to be saved from Communism, who can say it
is not necessary? One danger, of course, is that these terrible
weapons have been introduced into our body politic and have
produced strange and terrible fruits on our own native soil. When
assassination becomes government policy, when men are trained to
kill in every conceivable way, when morality is set aside for a
"higher good," can even the President of the United States consider
himself safe?</p>
<p> Andrew Stark is a pseudonym for a specialist on weaponry.</p>
<p>--
daveus rattus </p>
<p> yer friendly neighborhood ratman</p>
<p> KOYAANISQATSI</p>
<p> ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.</p></xml>

810
regexConsp/cia.xml Normal file
View File

@ -0,0 +1,810 @@
<xml><p>EX-CIA OFFICIAL SPEAKS OUT</p>
<p>By Greg Kaza</p>
<p> This article is reprinted from Full Disclosure. Copyright (c) 1986
Capitol Information Association. All rights reserved. Permission is hereby
granted to reprint this article providing this message is included in its
entirety. Full Disclosure, Box 8275, Ann Arbor, Michigan 48107. $15/yr.</p>
<p>Full Disclosure: I'd like to start out by talking about your well-known book,
`The CIA and the Cult of Intelligence.' What edition is that in today?</p>
<p>Marchetti: The latest edition came out last summer. Its the Laurel edition,
Dell paperback.</p>
<p>FD: Its gone through a couple of printings?</p>
<p>Marchetti: Yes. It was originally published by Alfred Knopf in hardback and
by Dell in paperback. That was in 1974 with Knopf and 1975 with Dell. Then a
few years later we got some more of the deletions back from the government,
so Dell put out a second printing. That would have been about 1979. Then
recently, during the summer of 1983, we got back a few more deletions and
that's the current edition that is available in good bookstores (laughs) in
Dell paperback, the Laurel edition.</p>
<p>Originally the CIA asked for 340 deletions. We got about half of those back
in negotiations prior to the trial. We later won the trial, they were
supposed to give everything back but it was overturned at the appellate
level. The Supreme Court did not hear the case, so the appellate decision
stood. We got back 170 of those deletions in negotiations during the trial
period. A few years later when the second paperback edition came out there
were another 24 deletions given back. The last time, in 1983, when the the
third edition of the paperback edition was published, there were another 35
given back. So there are still 110 deletions in the book out of an original
340.</p>
<p>As for the trial, the CIA sued in early 1972 to have the right to review and
censor the book. They won that case. It was upheld at the appellate court in
Richmond some months later, and again the Supreme Court did not hear the
case. Two years later we sued the CIA on the grounds that they had been
arbitrary, capricious and unreasonable in making deletions and were in
violation of the injunction they had won in 1972. We went before Judge Albert
V. Bryan Jr., and in that case, he decided in our favor. Bryan was the same
fourth district judge in Alexandria who heard the original case. He said that
there was nothing in the book that was harmful to national security or that
was logically classifiable. Bryan said the CIA was being capricious and
arbitrary. They appealed, and a few months later down in Richmond the
appellate court for the fourth district decided in the government's favor,
and overturned Bryan's decision. Again, the Supreme Court did not hear the
case. It chose not to hear it, and the appellate court's decision stood.</p>
<p>By this time, we had grown weary of the legal process. The book was published
with blank spaces except for those items that had been given back in
negotiations. Those items were printed in bold face type to show the kind of
stuff the CIA was trying to cut out. In all subsequent editions, the
additional material is highlighted to show what it is they were trying to cut
out.</p>
<p>Of course the CIA's position is that only they know what is a secret. They
don't make the national security argument because that is too untenable these
days. They say that they have a right to classify anything that they want to,
and only they know what is classifiable. They are establishing a precedent,
and have established a precedent in this case that has been used subsequently
against ex-CIA people like Frank Snepp and John Stockwell and others, and in
particular against Ralph McGee. They've also used it against (laughing), its
kind of ironic, two former CIA directors, one of whom was William Colby.
Colby was the guy behind my case when he was director. In fact, he was sued
by the CIA and had to pay a fine of I think, about $30,000 for putting
something in that they wanted out about the Glomar Explorer. He thought they
were just being, as I would say, ``arbitrary and capricious,'' so he put it
in anyway, was sued, and had to pay a fine. Admiral Stansfield Turner was
another who, like Colby when he was director, was the great defender of
keeping everything secret and only allowing the CIA to reveal anything. When
Turner got around to writing his book he had the same problems with them and
is very bitter about it and has said so. His book just recently came out and
he's been on a lot of TV shows saying, ``Hells bells, I was director and I
know what is classified and what isn't but these guys are ridiculous,
bureaucratic,'' and all of these accusations you hear. It is ironic because
even the former directors of the CIA have been burned by the very precedents
that they helped to establish.</p>
<p>FD: What are the prospects for the remaining censored sections of your book
eventually becoming declassified so that they are available to the American
people?</p>
<p>Marchetti: If I have a publisher, and am willing to go back at the CIA every
year or two years forcing a review, little by little, everything would come
out eventually. I can't imagine anything they would delete. There might be a
few items that the CIA would hold onto for principle's sake. Everything that
is in that book, whether it was deleted or not, has leaked out in one way or
another, has become known to the public in one form or another since then. So
you know its really a big joke.</p>
<p>FD: Looking back on it, what effect did the publication of the `The CIA and
the Cult of Intelligence' have on your life?</p>
<p>Marchetti: It had a tremendous effect on my life. The book put me in a
position where I would forever be persona non grata with the bureaucracy in
the federal government, which means, that I cannot get a job anywhere, a job
that is, specific to my background and talents. Particularly if the company
has any form of government relationship, any kind of government contract.
That stops the discussions right there. But even companies that are not
directly allied with the government tend to be very skittish because I was so
controversial and they just don't feel the need to get into this. I have had
one job since leaving the CIA other than writing, consulting and things like
that, and that was with an independent courier company which did no business
with the government, was privately owned, and really didn't care what the
government thought. They ran their own business and they hired me as their
friend. But every other job offered to me always evaporates, because even
those individuals involved in hiring who say they want to hire me and think
the government was wrong always finish saying, ``Business is business. There
are some people here who do not want to get involved in any controversial
case.'' Through allies or former employees somebody always goes out of their
way to make it difficult for me, so I never have any other choice but to
continue to be a freelance writer, lecturer, consultant, etcetera, and even
in that area I am frequently penalized because of who I worked for.</p>
<p>FD: The government views you as a troublemaker or whistleblower?</p>
<p>Marchetti: As a whistleblower, and, I guess, troublemaker. In the
intelligence community, as one who violated the code.</p>
<p>FD: The unspoken code?</p>
<p>Marchetti: Right. And this has been the fate of all those CIA whistleblowers.
They've all had it hard. Frank Snepp, Stockwell, McGee, and others, have all
suffered the same fate. Whistleblowers in general, like Fitzgerald in the
Department of Defense, who exposed problems with the C-5A, overruns, have
also suffered the same kind of fate. But since they were not dealing in the
magical area of national security they have found that they have some leeway
and have been able to, in many other cases, find some other jobs. In some
cases the government was even forced to hire them back. Usually the
government puts them in an office somewhere in a corner, pays them $50,000 a
year, and ignores them. Which drives them crazy of course, but thats the
government's way of punishing anybody from the inside who exposes all of
these problems to the American public.</p>
<p>FD: Phillip Agee explains in his book the efforts of the CIA to undermine his
writing of `Inside The Company' both before and after publication. Have you
run into similar problems with extralegal CIA harassment?</p>
<p>Marchetti: Yes. I was under surveillance. Letters were opened. I am sure our
house was burglarized. General harassment of all sorts, and the CIA has
admitted to some of these things. One or two cases, because the Church
Committee found out. For example, the CIA admitted to working with the IRS to
try and give me a bad time. The Church Committee exposed that and they had to
drop it. They've admitted to certain other activities like the surveillance
and such, but the CIA will not release to me any documents under the Freedom
of Information Act. They won't release it all -- any documents under FOIA,
period.</p>
<p>FD: About your time with the CIA?</p>
<p>Marchetti: No, about my case. I only want the information on me after leaving
the agency and they just refuse to do it. They've told me through friends
``You can sue until you're blue in the face but you're not going to get
this'' because they know exactly what would happen. It would be a terrible
embarrassment to the CIA if all of the extralegal and illegal activities they
took became public.</p>
<p>The most interesting thing they did in my case was an attempt at entrapment,
by putting people in my path in the hopes that I would deal with these
people, who in at least one case turned out to be an undercover CIA operator
who was, if I had dealt with him, it would have appeared that I was moving to
deal with the Soviet KGB. The CIA did things of that nature. They had people
come to me and offer to finance projects if I would go to France, live there,
and write a book there without any censorship. Switzerland and Germany were
also mentioned. The CIA used a variety of techniques of that sort. I turned
down all of them because my theory is that the CIA should be exposed to a
certain degree in the hope that Congress could conduct some investigation out
of which would come some reform. I was playing the game at home and that is
the way I was going to play. Play it by the rules, whatever handicap that
meant. Which in the end was a tremendous handicap.</p>
<p>But it did work out in the sense that my book did get published. The CIA drew
a lot of attention to it through their attempts to prevent it from being
written and their attempts at censorship, which simply increased the appetite
of the public, media, and Congress, to see what they were trying to hide and
why. All of this was happening at a time when other events were occurring.
Ellsberg's Pentagon Papers had come out about the same time I announced I was
doing my book. Some big stories were broken by investigative journalists. All
of these things together, my book was part of it, did lead ultimately to
congressional investigations of the CIA. I spent a lot of time behind the
scenes on the Hill with senators and congressman lobbying for these
investigations and they finally did come to pass.</p>
<p>It took awhile. President Ford tried to sweep everything under the rug by
creating the Rockefeller Commission, which admitted to a few CIA mistakes but
swept everything under the rug. It didn't wash publicly. By this time, the
public didn't buy the government's lying. So we ultimately did have the Pike
Committee, which the CIA and the White House did manage to sabotage. But the
big one was the Church Committee in the Senate which conducted a pretty broad
investigation and brought out a lot of information on the CIA. The result of
that investigation was that the CIA did have to admit to a lot of wrongdoing
and did have to make certain reforms. Not as much as I would have liked. I
think everything has gone back to where it was and maybe even worse than what
it was, but at least there was a temporary halt to the CIA's free reign of
hiding behind secrecy and getting away with everything, up to and including
murder. There were some changes and I think they were all for the better.</p>
<p>FD: So instead of some of the more harsher critics of the CIA who would want
to see it abolished you would want to reform it?</p>
<p>Marchetti: Yes. Its one of these things where you can't throw out the baby
with the bathwater. The CIA does do some very good and valuable and
worthwhile and legal things. Particularly in the collection of information
throughout the world, and in the analysis of events around the world. All of
this is a legitimate activity, and what the CIA was really intended to do in
the beginning when they were set up. My main complaint is that over the years
those legitimate activities have to a great extent been reduced in
importance, and certain clandestine activities, particularly the covert
action, have come to the fore. Covert action is essentially the intervention
in the internal affairs of other governments in order to manipulate events,
using everything from propaganda, disinformation, political action, economic
action, all the way down to the really dirty stuff like para-military
activity. This activity, there was too much of it. It was being done for the
wrong reasons, and it was counterproductive. It was in this area where the
CIA was really violating U.S. law and the intent of the U.S. Constitution,
and for that matter, I think, the wishes of Congress and the American people.
This was the area that needed to be thoroughly investigated and reformed. My
suggestion was that the CIA should be split into two organizations. One, the
good CIA so to speak, would collect and analyze information. The other part,
in the dirty tricks business, would be very small and very tightly controlled
by Congress and the White House, and if possible, some kind of a public board
so that it didn't get out of control.</p>
<p>My theory is, and I've proved it over and over again along with other people,
is that the basic reason for secrecy is not to keep the enemy from knowing
what you're doing. He knows what you're doing because he's the target of it,
and he's not stupid. The reason for the CIA to hide behind secrecy is to keep
the public, and in particular the American public, from knowing what they're
doing. This is done so that the President can deny that we were responsible
for sabotaging some place over in Lebanon where a lot of people were killed.
So that the President can deny period. Here is a good example: President
Eisenhower denied we were involved in attempts to overthrow the Indonesian
government in 1958 until the CIA guys got caught and the Indonesians produced
them. He looked like a fool. So did the N.Y. Times and everybody else who
believed him. That is the real reason for secrecy.</p>
<p>There is a second reason for secrecy. That is that if the public doesn't know
what you are doing you can lie to them because they don't know what the truth
is. This is a very bad part of the CIA because this is where you get not only
propaganda on the American people but actually disinformation, which is to
say lies and falsehoods, peddled to the American public as the truth and
which they accept as gospel. That's wrong. It's not only wrong, its a lie and
it allows the government and those certain elements of the government that
can hide behind secrecy to get away with things that nobody knows about. If
you carefully analyze all of these issues that keep coming up in Congress
over the CIA, this is always what is at the heart of it: That the CIA lied
about it, or that the CIA misrepresented something, or the White House did
it, because the CIA and the White House work hand in glove. The CIA is not a
power unto itself. It is an instrument of power. A tool. A very powerful tool
which has an influence on whoever is manipulating it. But basically the CIA
is controlled by the White House, the inner circle of government, the inner
circle of the establishment in general. The CIA is doing what these people
want done so these people are appreciative and protective of them, and they
in turn make suggestions or even go off on their own sometimes and operate
deep cover for the CIA. So it develops into a self-feeding circle.</p>
<p>FD: Spreading disinformation is done through the newsmedia.</p>
<p>Marchetti: Yes. Its done through the newsmedia. The fallacy is that the CIA
says the real reason they do this is to con the Soviets. Now I'll give you
some examples. One was a fellow by the name of Colonel Oleg Penkovsky.</p>
<p>FD: Penkovsky Papers?</p>
<p>Marchetti: Yes. I wrote about that in `The CIA and the Cult of Intelligence.
The Penkovsky Papers was a phony story. We wrote the book in the CIA. Now,
who in the hell are we kidding? The Soviets? Do we think for one minute that
the Soviets, who among other things captured Penkovsky, interrogated him, and
executed him, do you think for one minute they believe he kept a diary like
that? How could he have possibly have done it under the circumstances? The
whole thing is ludicrous. So we're not fooling the Soviets. What we're doing
is fooling the American people and pumping up the CIA. The British are
notorious for this kind of thing. They're always putting out phony
autobiographies and biographies on their spies and their activities which are
just outright lies. They're done really to maintain the myth of English
secret intelligence so that they will continue to get money to continue to
operate. Thats the real reason. The ostensible reason is that we were trying
to confuse the Soviets. Well that's bullshit because they're not confused.</p>
<p>One of the ones I think is really great is `Khruschev Remembers.' If anybody
in his right mind believes that Nikita Khruschev sat down, and dictated his
memoirs, and somebody -- Strobe Talbot sneaked out of the Soviet Union with
them they're crazy. That story is a lie. That book was a joint operation
between the CIA and the KGB. Both of them were doing it for the exact same
reasons. They both wanted to influence their own publics. We did it our way
by pretending that Khruschev had done all of this stuff and we had lucked out
and somehow gotten a book out of it. The Soviets did it because they could
not in their system allow Khruschev to write his memoirs. Thats just against
everything that the Communist system stands for. But they did need him to
speak out on certain issues. Brezhnev particularly needed him to
short-circuit some of the initiatives of the right wing, the Stalinist wing
of the party. Of course the KGB was not going to allow the book to be
published in the Soviet Union. The stuff got out so that it could be
published by the Americans. That doesn't mean that the KGB didn't let copies
slip into the Soviet Union and let it go all around. The Soviets achieved
their purpose too.</p>
<p>This is one of the most fantastic cases, I think, in intelligence history.
Two rival governments cooperated with each other on a secret operation to
dupe their respective publics. I always wanted to go into much greater length
on this but I just never got around to it. Suffice it to say that TIME
magazine threatened to cancel a two-page magazine article they were doing on
me and my book if I didn't cut a brief mention of this episode out of the
book.</p>
<p>FD: How was this operation initially set up?</p>
<p>Marchetti: I don't know all of the ins and outs of it. I imagine what
happened is that it probably started with somebody in the Soviet Politburo
going to Khruschev and saying, ``Hey, behind the scenes we're having lots of
trouble with the right-wing Stalinist types. They're giving Brehznev a bad
time and they're trying to undercut all of the changes you made and all of
the changes Brehznev has made and wants to make. Its pretty hard to deal with
it so we've got an idea. Since you're retired and living here in your dacha
why don't you just sit back and dictate your memoirs. And of course the KGB
will review them and make sure you don't say anything you shouldn't say and
so on and so forth. Then we will get in touch with our counterparts, and see
to it that this information gets out to the West, which will publish it, and
then it will get back to the Soviet Union in a variety of forms. It will get
back in summaries broadcast by the Voice of America and Radio Liberty, and
copies of the book will come back in, articles written about it will be
smuggled in, and this in turn will be a big influence on the intelligentsia
and the party leaders and it will undercut Suslov and the right wingers.''
Khruschev said okay. The KGB then went to the CIA and explained things to
them and the CIA said, Well that sounds good, we'll get some friends of ours
here, the TIME magazine bureau in Moscow, Jerry Schecter would later have a
job in the White House as a press officer. We'll get people like Strobe
Talbot, who is working at the bureau there, we'll get these guys to act as
the go-betweens. They'll come and see you for the memoirs and everyone will
play dumb. You give them two suitcases full of tapes (laughs) or something
like that and let them get out of the Soviet Union. Which is exactly what
happened.</p>
<p>Strobe brought all of this stuff back to Washington and then TIME-LIFE began
to process it and put a book together. They wouldn't let anybody hear the
tapes, they didn't show anybody anything. A lot of people were very
suspicious. You know you can tell this to the public or anybody else who
doesn't have the least brains in their head about how the Soviet Union
operates and get away with it. But anybody who knows the least bit about the
Soviet Union knows the whole thing is impossible. A former Soviet premier
cannot sit in his dacha and make these tapes and then give them to a U.S.
newspaperman and let him walk out of the country with them. That cannot be
done in a closed society, a police state, like the Soviet Union.</p>
<p>The book was eventually published but before it was published there was
another little interesting affair. Strobe Talbot went to Helsinki with the
manuscript, where he was met by the KGB who took it back to Leningrad, looked
at it, and then it was finally published by TIME-LIFE. None of that has ever
been explained in my book. A couple of other journalists have made references
to this episode but never went into it. It's an open secret in the press
corps here in Washington and New York, but nobody ever wrote a real big story
for a lot of reasons, because I guess it's just the kind of story that it's
difficult for them to get their hooks into. I knew people who were then in
the White House and State Department who were very suspicious of it because
they thought the KGB...</p>
<p>FD: Had duped TIME?</p>
<p>Marchetti: Exactly. Once they learned this was a deal they quieted down and
ceased their objections and complaints, and even alibied and lied afterwards
as part of the bigger game. Victor Lewis, who was apparently instrumental in
all of these negotiations, later fit into one little footnote to this story
that I've often wondered about. Lewis is (was)... After all of this happened
and when the little furor that existed here in official Washington began
dying down, Victor Lewis went to Tel Aviv for medical treatment. He came into
the country very quietly but somebody spotted him and grabbed him and said,
``What are you doing here in Israel?'' ``Well I'm here for medical treatment,
'' Lewis said. They said, ``What?! You're here in Israel for medical
treatment?'' He said, ``Yes.'' They said, ``Well whats the problem?'' ``I've
got lumbago, a back problem, and they can't fix it in the Soviet Union. but
there's a great Jewish doctor here I knew in the Soviet Union and I came to
see him.'' That sounds like the craziest story you ever wanted to hear. But
then another individual appeared in Israel at the same time and some reporter
spotted him. He happened to be Richard Helms, then-director of the CIA. He
asked Helms what he was doing in Israel, and he had some kind of a lame
excuse which started people wondering whether this was the payoff. Helms
acting for the CIA, TIME-LIFE, and the U.S. government, and Lewis acting for
the KGB, Politburo, and the Soviet government. Its really a fascinating
story. I wrote about briefly in the book and it was very short. You'll find
it if you look through the book in the section we're talking about.
Publications and things like that. When I wrote those few paragraphs there
wasn't much further I could go, because there was a lot of speculation and
analysis.</p>
<p>Around the time my book came out, TIME magazine decided that they would do a
two-page spread in their news section and give it a boost. Suddenly I started
getting calls from Jerry Schecter and Strobe Talbot about cutting that part
out. I said I would not cut it out unless they could look me in the eye and
say I was wrong. If it wasn't true I would take the book and cut the material
out. But neither of them chose to do that. Right before the article appeared
in TIME I got a call from one of the editors telling me that some people
wanted to kill the article. I asked why and he said one of the reasons is
what you had to say about TIME magazine being involved in the Khruschev
Remembers book. I asked him, ``Thats it?'' I had talked to Jerry and Strobe
and this was their backstab. This editor asked me if I could find somebody
who could trump the people who were trying to have the article killed.
Somebody who could verify my credentials in telling the story. I said why
don't you call Richard Helms, who by that time had been eased out of office
by Kissinger and Nixon, and was now an ambassador in Teheran. So this editor
called Helms to verify my credentials (laughing) and Helms said, ``Yeah, he's
a good guy. He just got pissed off and wanted to change the CIA.'' So the
article ran in TIME. I think you're one of the very few people I've explained
this story to in depth.</p>
<p>FD: Did this operation have a name?</p>
<p>Marchetti: It probably did but I was already out of the agency and I don't
know what it was. But I do know it was a very sensitive activity and that
people very high up in the White House and State Department who you would
have thought would have been aware of it were not aware of it. But then
subsequently they were clearly taken into a room and talked to in discussions
and were no longer critics and doubters and in fact became defenders of it.</p>
<p>FD: Let me make sure I am clear about the CIA's motivation...</p>
<p>Marchetti: The CIA's motivation was that here we have a former Soviet premier
talking out about the events of his career and revealing some pretty
interesting things about his thinking and the thinking of others. All of
which shows that the Soviet Union is run by a very small little clique. A
very small Byzantine-like clique. There is a strong tendency to stick with
Stalinisn and turn to Stalinism but some of the cooler heads, the more
moderate types, are trying to make changes. Its good stuff from the CIA's
point of view and from the U.S. government's point of view. This is what
we're dealing with. This is our primary rival. Look at how they are. And
Khruschev had to dictate these things in secrecy and they had to be smuggled
out of the Soviet Union.</p>
<p>Things like this are very subtle in their consistency. It's not a black and
white thing on the surface. You might say, ``Well, what's wrong with that?''
What's wrong with that is that it is a lie. The truth would have been much
more effective. Nikita Khruschev was approached by the KGB and Soviet
Politburo to dictate his memoirs, which he did under their supervision, which
means we don't know if he is telling the whole story or the complete truth
because they had an opportunity to edit it. The Russians were so anxious to
get this information out so that it could come back to the Soviet Union for
two reasons. The first was to build international pressure. The second was to
build up internal pressure against the Stalinists. They were so anxious that
they were willing to make a deal with the CIA, and give us this material. So
that we could then prepare a book. Which we did. Thats the kind of a
government we are dealing with here. These are the kinds of people they are
and the kind of lies they live.</p>
<p>FD: Let's turn to world affairs for a moment. One of the events of recent
years that has always puzzled me is United States support for the Vanaaka
Party in what was once the New Hebrides Islands. In the late '70s, before the
New Hebrides achieved independence, there were basically two factions
fighting between themselves to see who would maintain control when the
colonial powers left. The British and the French had governed the New
Hebrides under a concept known as the condominium, and before independence,
the British and the labor movement in Australia threw their support behind
the ubiquitous socialist faction, in this case, the Vanaaka Party. The French
offered some behind-the-scenes support to the second faction, which was
basically pro-free market and pro-West. The U.S. under Jimmy Carter went
along with the British. Do you have any idea why this might have been done?</p>
<p>Marchetti: Offhand, I don't. The CIA has learned over the years that you
sometimes cannot support the people you would prefer to support, because they
just do not have the popular power to gain control or maintain control
without a revolution and things of that sort. The classic example is West
Berlin. Back in the '50s we were contesting with the Russians for influence
in Berlin. This was at a time when the Russians and East Germans were putting
tremendous pressure on to have West Berlin go almost voluntarily into the
Soviet bloc. The United States was struggling mightily to keep West Berlin
free. At that point in time the strong power in West Germany were the
Christian Democrats under Konrad Adenauer, and these were the people that we
were supporting.</p>
<p>The Christian Democrats, however, just did not have the wherewithal to save
West Berlin. The situation was such that the Social Democrats were the ones
who could save West Berlin. Not getting into all of the whys and wherefores
and policy positions, the Social Democrats also had a very charismatic person
named Willy Brandt. So by backing Willy Brandt and the Social Democrats,
instead of putting all of our eggs in the Christian Democratic Party basket,
Brandt and the Social Democrats were able to maintain a free West Berlin and
we were able to achieve our goal. There were some people in the CIA who
thought this was terrible, we were not being ideologically pure, and one of
them happens to be E. Howard Hunt, who actually considered Willy Brandt a KGB
spy. So there are times when you have to, I guess you would call it, choose
the lesser of two evils.</p>
<p>It might have been a miscalculated gamble. I don't have all of the facts, but
maybe the thinking was that if we left the pro-West faction in power we may
end up with a goddamned civil war.</p>
<p>FD: In retrospect, the Carter administration's decision seems even more
tragic and mistaken. Since coming to power the Vanaaka Party has consolidated
power in the new country, now known as Vanuatu, and established diplomatic
relations with governments like Cuba and Vietnam. Socialist Vanuatu has now
come to serve as a beacon of sorts for other independence movements in that
part of the world, such as the Kanaks in New Caledonia, who have subsequently
adopted socialism as their ideology. When I asked Jimmy Carter about this
during an interview recently he said he was sorry, but he did not remember
the episode. Is it possible that this may have been an incompetent blunder on
the part of the U.S. government? That somebody didn't do their homework, and
as a result those responsible for the decision didn't have all of the facts?</p>
<p>Marchetti: Absolutely. Absolutely. Yes. Its not the kind of an issue that
draws the most attention in Washington. As you just pointed out, Jimmy Carter
doesn't even remember it. I'm sure that decision was made pretty far down the
line. If Carter ever had to make a decision he probably doesn't even remember
it because it was probably staffed down because it was considered so
inconsequential at the time by Carter and everyone involved. They considered
it so inconsequential that they don't even remember it. It's something they
signed off on. My guess from what you have told me is that it was a mistake.</p>
<p>FD: You mentioned E. Howard Hunt earlier. I understand that you wrote an
article for a Washington-based publication about the assassination of John F.
Kennedy and Hunt sued the publication, charging libel. Could you give us some
background on this matter?</p>
<p>Marchetti: The article was written in the summer of 1978 and published by
SPOTLIGHT, a weekly newspaper that advertises itself as `The Voice of the
American Populist Party.' At the time I wrote the article for SPOTLIGHT the
House Select Committee on Assassinations was getting ready to hold its
hearings reviewing the Kennedy and King assassinations. I had picked up some
information around town that a memo had recently been uncovered in the CIA,
and that the CIA was concerned about it. I believe the memo was from James
Angleton, who at the time was chief of counterintelligence for Richard Helms.
I forget the exact date, but this memo was something like six years old,
while Helms was still in office as director.</p>
<p>The memo said that at some point in time the CIA was going to have to deal
with the fact that Hunt was in Dallas the day of the Kennedy assassination or
words to that effect. There was some other information in it, such as did you
know anything about it, he wasn't doing anything for me, and back and forth.
I had that piece of information, along with information that the House Select
Committee was going to come out with tapes that indicated there was more than
one shooter during the Kennedy assassination and that the FBI, or at least
certain people in the FBI, believed these tapes to be accurate and had always
believed that there was more than one shooter.</p>
<p>I was in contact with the House Select Committee, and they were probing real
deeply into things and they were very suspicious of the Kennedy
assassination. There were some other reporters working on the story at the
time, one in particular who has a tremendous reputation, and he felt there
was something to it. So we rushed into print at SPOTLIGHT with a story
saying, based on everything we put together, that we had this information,
and we tried to predict what was going to happen. In essence we said whats
going to happen is that the committee is going to unearth some new
information that there was more than one shooter and probably come up with
this memo, this internal CIA memorandum, and there will be some other things.
Then the CIA will conduct a limited hangout, and will admit to some error or
mistake, but then sweep everything else under the rug, and in the process
they may let a few people dangle in the wind like E. Howard Hunt, Frank
Sturgis, Jerry Hemming, and other people who have been mentioned in the past
as being involved in something related to the Kennedy assassination. It was
that kind of speculative piece.</p>
<p>What happened is that about a week after my article appeared in SPOTLIGHT the
Wilmington News-Journal published an article by Joe Trento. This was a longer
and more far-ranging article, in which he discussed the memo too but in
greater detail. A couple of weeks after that Hunt informed SPOTLIGHT that he
wanted a retraction. I checked with my sources and said I don't think we
should retract. I said we should do a follow-up article. Now by this time
some CIA guy was caught stealing pictures in the committee, some spy, so
things were really hot and heavy at the time. There was a lot of expectation
that the committee was going to do something, some really good work to bring
their investigation around. So I said to SPOTLIGHT let's do a follow-up
piece, but the publisher chickened out and said, nah, what we'll do is tell
Hunt we'll give him equal space. He can say whatever he wants to in the same
amount of space.</p>
<p>Hunt ignored the offer. A couple of months later Hunt comes to town for
secret hearings with the committee, and was heard in executive session. Hunt
was suing the publisher of the book `Coup D'Etat in America,' and deposed me
in relation to that case, and then he brought in, he tried to slip in, this
SPOTLIGHT article. I was under instructions from my lawyer not to comment. My
lawyer would have me refuse to answer on the grounds of journalistic
privilege, and also on the grounds of my relationship with the CIA. My lawyer
had on his own gone to the CIA before I gave my deposition and asked them
about this, and they said to tell me to just hide behind my injunction. I
told my lawyer I don't understand it, and he told me all that the CIA said is
that they hate Hunt more than they hate you and they're not going to give
Hunt any help. So that's what I did, and that was the end of it. We thought.</p>
<p>Two years after it ran Hunt finally sued SPOTLIGHT over my article. SPOTLIGHT
thought it was such a joke, all things considered, that they really didn't
pay any attention. I never even went to the trial. I never even submitted an
affidavit. I was not deposed or anything. The Hunt people didn't even try to
call me as a witness or anything. I was left out of everything. Hunt ended up
winning a judgment for $650,000. Now SPOTLIGHT got worried. They appealed and
the Florida Appellate Court overturned the decision on certain technical
grounds, and sent it back for retrial. The retrial finally occurred earlier
this year. When it came time for the retrial, which we had close to a year to
prepare for, SPOTLIGHT got serious, and went out and hired themselves a good
lawyer, Mark Lane, who is something of an expert on the Kennedy
assassination. They got me to become involved in everything, and we ended up
going down there and just beating Hunt's pants off. The jury came in, I
think, within several hours with a verdict in our favor. The interesting
thing was the jury said we were clearly not guilty of libel and actual
malice, but they were now suspicious of Hunt and everything he invoked
because we brought out a lot of stuff on Hunt.</p>
<p>Hunt lost, and was ordered to pay our court costs in addition to everything
else. He has subsequently filed an appeal and that's where its at now. It's
up for appeal. I imagine it will probably be another six months to a year
before we hear anything further on it. Based on everything I have seen, Hunt
doesn't have a leg to stand on because the deeper he gets into this the more
he runs the risk of exposing himself. We had just all kinds of material on
Hunt. We had a deposition from Joe Trento saying, yes, he saw the internal
CIA memo. We produced one witness in deposition, Marita Lorenz, who was
Castro's lover at one point, and she said that Hunt was taking her and people
like Sturgis and Jerry Hemmings and others and running guns into Dallas.
Lorenz said that a couple of days before the assassination Hunt met them in
Dallas and made a payoff. What they all were doing, whether it was connected
to the assassination, we don't know.</p>
<p>I think if Hunt keeps pursuing this, all that he's doing is setting the stage
for more and more people to come forward and say bad things about him, and
raise more evidence that he was in Dallas that day and that he must have been
involved in something. If it wasn't the assassination it must have been some
kind of diversionary activity or maybe it was something unrelated to the
assassination and the wires just got crossed and it was a coincidence at the
time.</p>
<p>One of the key points in the mind of the jury as far as we`ve been able to
tell at SPOTLIGHT is that Hunt to this day still cannot come up with an alibi
for where he was the day of the assassination. Hunt comes up with the
weakest, phoniest stories that he can't corroborate. Some guy who was drunk
came out of a bar and waved at him. His story doesn't match with that guy's
story. Hunt says he can produce his children to testify he was in Washington.
None of his children appeared at the trial. It's a very, very strange thing.
Hunt clearly was, in my mind, not in Washington doing what he says he was
doing Nov. 22, 1963. He was certainly not at work that day at the CIA. This
subject has come up before, whether he was on sick leave, an annual leave, or
where the hell he was. Hunt just cannot come up with a good alibi.</p>
<p>Hunt has gone before committees. The Rockefeller Committee, I believe he was
before the Church Committee, and before the House Select Committee. Nobody
will give Hunt a clean bill of health. They always weasel words. Their
comment on Hunt is always some sort of a way that can be interpreted anyway
that you want. You can say this indicates the committee looked into it and
they feel he wasn't involved. Or you can look at it and say the committee
looked into it and they have a lot of doubts about Hunt, and they're just
being very careful about what they are saying. Hunt himself will not tell you
what happened before these committees. He says that his testimony is
classified information. Well, if the testimony vindicates Hunt and provides
him with an alibi then why can't he tell us? The mystery remains.</p>
<p>FD: Do you believe it possible that the CIA knows where Hunt was Nov. 22,
1963, but just do not want to release that information?</p>
<p>Marchetti: That's my guess. I think that subsequently, by now, the CIA may
not have known where Hunt was at the time, and they may not have even
realized what he was up to until years after and years later when his name
started to be commonly mentioned in connection with the assassination. I
think by now the CIA probably knows where Hunt was and what he was doing or
have some very strong feelings about that, and they're not too happy about
it. But whatever it was, and is, that Hunt was involved in, it seems to be,
or would appear, that he was in or around Dallas about the time of the
assassination, involved in some kind of clandestine activity. It may have
been an illegal clandestine activity, even something the CIA was unaware of.
The CIA acts very strangely about this. The CIA will not give Hunt any help.
He got no help at all from the CIA in the preparation of his case against us
or in the presentation of his case. They just left him out there. Hunt
managed to scrounge up a couple of his CIA friends who on their own were
willing to give some help, but caved in right away. One guy didn't testify.
Another guy gave a stupid deposition in the middle of the night to us
(laughs) which wasn't worth the paper it was written on.</p>
<p>Helms gave a deposition which said nothing. No way would he go out on a limb
for Hunt. In my own mind, I have a feeling that the CIA knows where Hunt was
and what he was doing, and while they're not going to prosecute him for a lot
of reasons, they're involved in the cover-up themselves and don't want to
bring any embarrassment upon the agency. On the other hand, they feel if he
screws around and gets his own mit in the ringer, that's his own fault, and
we can cover our ass. Hunt, for his own part, apparently feels he has some
sort of pressure on the CIA that while it might not be strong enough to bring
them forward to defend him before any committee or in a court of law, its at
least strong enough for them not to take any overt action against him. So it
seems to me to be some kind of double graymail. Hunt's graymailing the CIA on
one hand and they're graymailing him on the other hand. Its a very, very
strange thing.</p>
<p>FD: Did Jerry Hemmings give a deposition? I understand he is still in prison.</p>
<p>Marchetti: I think Jerry might still be in. He asked not to give a deposition
or be called as a witness unless it was absolutely necessary, because he was
either coming toward the end of his term, or he was up for parole. He
preferred not to get involved. This was pretty much the attitude of another
individual who was mentioned, but I was left with the feeling that if push
really came to shove, these people could be brought forward. Now what they
know, or whether they were going to risk perjury, which is a pretty big
gamble when you`re dealing with Mark Lane, particularly on this subject. He's
not only a brilliant lawyer, but this is a subject he has a lot of background
in.</p>
<p>FD: Did Gordon Novel fit into this at all?</p>
<p>Marchetti: No.</p>
<p>FD: You mentioned that it is possible the CIA is withholding information on
Hunt's whereabouts Nov. 22, 1963. The CIA has been accused many times in the
past of engaging in a cover-up of the JFK assassination. Do you believe they
are still covering up in a lot of ways?</p>
<p>Marchetti: Oh yeah, I think so, I'd think not only they and the FBI, I think
everybody is covering up.</p>
<p>FD: Are they covering up necessarily to just keep the American people in the
dark about the episode, or cover-up because of their own guilt and complicity?</p>
<p>Marchetti: I think its both. I think it all started with when it happened. I
don't think anybody was really sure in Washington who was behind the
assassination. I think they were very fearful that if they didn't come up
with a lone nut theory, and in this case a lone nut who was removed from the
scene in a matter of days, that the American people might panic. They might
lose their faith in the government. They might lose their faith in the
institutions. They might begin to point fingers at all kinds of people. The
Russians. The Cubans. Other elements of our society like the right wing and
organized crime and so on. I think there was a consensus in the minds of the
establishmentarians in our government which was that we should put this to
bed as quickly and as quietly as possible. We'll make a hero out of Kennedy
and let's forget about it. And then of course they did have to have a Warren
Commission, a blue-ribbon panel which would have the right people on it and
then we'll lay the thing to rest officially. Which is essentially what
happened. They didn't hear a lot of evidence. They ignored evidence. Evidence
was hidden. Evidence was destroyed. I think it was pretty much clear that
nobody was being absolutely forthcoming.</p>
<p>The former head of the CIA, Allen Dulles, even said he would lie to the
people about anything he considered to pertain to national security. Dulles
said he would lie to the people if he had to. I think the Kennedy
assassination was laid to rest by the establishment and it became just a
suspicion in the minds of the people. Then came the revelations. I think by
now everybody involved was deeply involved in the coverup, that that maybe
became even more paramount than the question of who did kill Kennedy and why.
To admit that we covered up from the very begining, and that we've been
covering up ever since, I think, would be more devastating than it would have
been a few years ago to say O.K., we've looked into it, and figured it out,
it was CIA renegades, or whoever was responsible for murdering Kennedy. I
think by now there are just too many people that feel they may have started
out originally for the most noble of motives but they cannot adjust to it. We
saw it with the Watergate affair, and see it every day in life. Once somebody
starts lying and covering up it just snowballs. It just keeps going on and on
and on and on. It keeps getting harder and harder and harder to determine the
truth. I think it's pretty difficult for somebody in 1985 to come forward and
say, yes, I was part of a cover-up, 22 years ago. What he's saying is that
I've lived a lie all of my life. I don't think we're ever going to get the
answer, frankly. I don't think we're every going to get the answer to the
story.</p>
<p>FD: You're pessimistic about the American people discovering the real truth
about the JFK assassination?</p>
<p>Marchetti: This is not to say that 50 years from now that some historian may
get access to some material when everybody is dead and buried, and might be
able to put together a pretty accurate story. But even then, with all of the
time that has gone by, the myth will have been established. You have those
people that will say, ``Ugh. Conspiracy theorists,'' while other people will
say, ``I never believe the government.'' But it will have no effect.</p>
<p>FD: So you believe it will only be time that will reveal the full truth about
the JFK assassination? The truth won't be revealed because of another big
government scandal like Watergate, or a president who is committed to seeing
that the case is solved?</p>
<p>Marchetti: One of the presidents who might have unearthed all this, actually
a potential president was Bobby Kennedy, but he got rubbed out.</p>
<p>FD: Bobby Kennedy made a statement three days before he was murdered that he
felt only the office of the presidency could get at the truth.</p>
<p>Marchetti: I'm not sure if thats possible. I wonder in my own mind if, let's
say, Teddy Kennedy would be elected president. I wonder if he, one, would
have the courage to reopen the case at this point in time knowing everything
he knows about it probably. And two, if he had the courage, would he have the
muscle to be able to resolve it completely and fully to the satisfaction of
everyone? I think there are those things in life you either resolve at the
time or never. After awhile, as the years pass by, it becomes more and more
difficult until it is impossible.</p>
<p>FD: The American people are told that they choose their leaders and run the
government. Is this true, or is it the invisible state within a state, the
intelligence community?</p>
<p>Marchetti: I don't think the intelligence community, although it is an
invisible arm of the government, runs it. I think the people who run the
country are the same people who usually run things not only here but all over
the world. The powerful economic interests, whether they are bankers, or
industrialists, or whatever. The real solid inner core of the establishment.
These are the movers and shakers, but they don't have absolute power. They
may not want a certain person to get nominated by a certain party. In some
cases they may not even be able to stop them from getting to power or using
it. Generally speaking, they have more influence on the government than the
other people do. Its manifested itself in all sorts of ways. There are all of
these forces at work.</p>
<p>FD: One last question: PSI. Both the CIA and the KGB had a great interest in
this area. One of the things I know the CIA did, attempt to recruit KGB
agents in the afterlife. Are you familiar with this?</p>
<p>Marchetti: I do know there was great interest in this whole area of
parapsychology, for whatever benefit may have been achieved. Not only the
CIA, but the Pentagon was involved, and for that matter, the KGB. Everybody
has apparently examined it. There were a lot of stories floating around the
CIA that they had tried to contact old agents like Penkovsky, who had been
captured and killed, executed by the Soviet Union, in the hope that they
could derive additional information. To my knowledge none of this stuff
really worked.</p>
<p>FD: Thank you, Victor Marchetti.
could derive additional information. To my knowledge none of this stuff
really worked.</p>
<p>FD: Tha</p></xml>

1749
regexConsp/cia_info.xml Normal file

File diff suppressed because it is too large Load Diff

887
regexConsp/ciabwash.xml Normal file
View File

@ -0,0 +1,887 @@
<xml><p>SEE NOTES AT END FOR INFO ON SOURCES OF THESE DOCUMENTS</p>
<p> CENTRAL INTELLIGENCE AGENCY
WASHINGTON 25, D. C.</p>
<p> OFFICE OF THE DIRECTOR 25 APR 1956
-------------------------------------------------------------------------------</p>
<p> MEMORANDUM FOR: The Honorable J. Edgar Hoover
Director, Federal Bureau of Investigation</p>
<p> SUBJECT : Brainwashing</p>
<p> The attached study on brainwashing was prepared by my
staff in response to the increasing acute interest in the
subject throughout the intelligence and security components
of the Government. I feel you will find it well worth your
personal attention. It represents the thinking of leading psy-
chologists, psychiatrists and intelligence specialists, based
in turn on interviews with many individuals who have had
personal experience with Communist brainwashing, and on
extensive research and testing. While individuals specialists
hold divergent views on various aspects of this most complex
subject, I believe the study reflects a synthesis of majority
expert opinion. I will, of course, appreciate any comments
on it that you or your staff may have.</p>
<p> (signed)
Allen W. Dulles
Director</p>
<p> ENCLOSURE</p>
<p> OA 53-37
-------------------------------------------------------------------------------</p>
<p> A REPORT ON COMMUNIST BRAINWASHING</p>
<p> The report that follows is a condensation of a study by train-
ing experts of the important classified and unclassified information
available on this subject.</p>
<p>BACKGROUND</p>
<p> Brainwashing, as a technique, has been used for centuries and
is no mystery to psychologists. In this sense, brainwashing means
involuntary re-education of basic beliefs and values. All people
are being re-educated continually. New information changes one's
beliefs. Everyone has experienced to some degree the conflict that
ensues when new information is not consistent with prior belief.
The experience of the brainwashed individual differs in that the in-
consistent information is forced upon the individual under controlled
conditions after the possibility of critical judgment has been re-
moved by a variety of methods.</p>
<p> There is no question that an individual can be broken psycholog-
ically by captors with knowledge and willingness to persist in tech-
niques aimed at deliberately destroying the integration of a personal-
ity. Although it is probable that everyone reduced to such a confused,
disoriented state will respond to the introduction of new beliefs, this
cannot be stated dogmatically.</p>
<p>PRINCIPLES OF HUMAN CONTROL AND REACTION TO CONTROL</p>
<p> There are progressive steps in exercising control over an individ-
ual and changing his behaviour and personality integration. The fol-
lowing five steps are typical of behaviour changes in any controlled
individual:</p>
<p> 1. Making the individual aware of control is the first stage in
changing his behaviour. A small child is made aware of the physical
and psychological control of his parents and quickly recognizes that
an overwhelming force must be reckoned with. So, a controlled adult
comes to recognize the overwhelming powers of the state and the im-
personal, "incarcerative" machinery in which he is enmeshed. The in
-dividual recognizes that definite limits have been put upon the ways
he can respond.</p>
<p>(Approved for Release) (62-80750-2712X)
(Date: 8 FEB 1984)</p>
<p> OA 53-37</p>
<p> 2. Realization of his complete dependence upon the controll-
ing system is a major factor in the controlling of his behavior.The con-
trolled adult is forced to accept the fact that food, tobacco,praise,
and the only social contact that he will get come from the very in-
terrogator who exercises control over him.
-------------------------------------------------------------------------------</p>
<p> 3. The awareness of control and recognition of dependence re-
sult in causing internal conflict and breakdown of previous patterns
of behaviour. Although this transition can be relatively mild in
the case of a child, it is almost invariably severe for the adult
undergoing brainwashing. Only an individual who holds his values
lightly can change them easily. Since the brainwasher-interrogators
aim to have the individuals undergo profound emotional change, they
force their victims to seek out painfully what is desired by the
controlling individual. During this period the victim is likely to
have a mental breakdown characterized by delusions and hallucinat-
ions.</p>
<p> 4. Discovery that there is an acceptable solution to his prob-
lem is the first stage of reducing the individual's conflict. It
is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror
of internal conflict would cease and that perhaps they would not,
after all, be driven insane. It is at this point that they are pre-
pared to make major changes in their value-system. This is an
automatic rather than voluntary choice. They have lost their a-
bility to be critical.</p>
<p> 5. Reintergration of values and identification with the cont-
rolling system is the final stage in changing the behaviour of the
controlled individual. A child who has learned a new, socially de-
sirable behaviour demonstrates its importance by attempting to as-
apt the new behaviour to a variety of other situations. Similar
states in the brainwashed adult are</p>
<p> (SECTION DELETED BY CIA)</p>
<p> 2</p>
<p> OA 53-37</p>
<p>pitiful. His new value-system, his manner of perceiving,organizing,and
-------------------------------------------------------------------------------
giving meaning to events, is virtually independent of his former value-
system.He is no longer capable of thinking or speaking in concepts other
than those he has adopted. He tends to identify by expressing thanks to
his captors for helping him see the light.Brainwashing can be achieved
without using illegal means.Anyone willing to use known principles of
control and reactions to control and capable of demonstrating the patience
needed in raising a child can probably achieve successful brainwashing.</p>
<p>COMMUNIST CONTROL TECHNIQUES AND THEIR EFFECTS</p>
<p> A description of usual communist control techniques follows.</p>
<p> 1. Interrogation. There are at least two ways in which "interro-
gation" is used:
a. Elicitation, which is designed to get the individual to
surrender protected information, is a form of interrogation. One major
difference between elicitation and interrogation used to achieve
brainwashing is that the mind of the individual must be kept clear to
permit coherent, undistorted disclosure of protected information.
b. Elicitation for the purpose of brainwashing consists of
questioning,argument,indoctrination,threats,cajolery,praise,hos-
tility, and a variety of other pressures. The aim of this interrogation
is to hasten the breakdown of the individual's value system and to encourage
the substitution of a different value-system. The procurement of protected
information is secondary and is used as a device to increase pressure upon
the individual. The term "interrogation" in this paper will refer, in
general, to this type. The "interrogator" is the individual who conducts
this type of interrogation and who controls the administration of the other
pressures. He is the protagonist against whom the victim develops his con-
flict, and upon whom the victim develops a state of dependency as he seeks
some solution to his conflict.</p>
<p> 2. Physical Torture and Threats of Torture. Two types of physical
torture are distinguishable more by their psychological effect in induc-
ing conflict than by the degree of painfulness:</p>
<p> a. The first type is one in which the victim has a passive role
in the pain inflicted on him (e.g.,beatings). His conflict involves the
decision of whether or not to give in to demands in order to avoid further
pain. Generally, brutality of this type was not found to achieve the
desired results. Threats of torture were found more effective, as fear
of pain causes greater conflict within the individual than does pain it-
self.</p>
<p> 3</p>
<p> OA 53-37 </p>
<p> b. The second type of torture is represented by requiring the
individual to stand in one spot for several hours or assume some other
pain-inducing position. Such a requirement often engenders in the indi-
vidual a determination to "stick it out." This internal act of resistance
-------------------------------------------------------------------------------
provide a feeling of moral superiority at first. As time passes and his
pain mounts,however, the individual becomes aware that it is his own
original determination to resist that is causing the continuance of pain.
A conflict develops within the individual between his moral determination
and his desire to collapse and discontinue the pain. It is this extra
internal conflict, in addition to the conflict over whether or not to give
in to the demands made of him, that tends to make this method of torture
more effective in the breakdown of the individual personality.</p>
<p> 3. Isolation. Individual differences in reaction to isolation are
probably greater than to any other method. Some individuals appear to
be able to withstand prolonged periods of isolation without deleterious
effects, while a relatively short period of isolation reduces others to
the verge of psychosis. Reaction varies with the conditions of the iso-
lation cell. Some sources have indicated a strong reaction to filth and
vermin, although they had negligible reactions to the isolation. Others
reacted violently to isolation in relatively clean cells. The predominant
cause of breakdown in such situations is a lack of sensory stimulation
(i.e.,grayness of walls,lack of sound,absence of social contact,etc.).
Experimental subjects exposed to this condition have reported vivid hal-
licinations and overwhelming fears of losing their sanity.</p>
<p> 4. Control of Communication. This is one of the most effective
methods for creating a sense of helplessness and despair. This measure
might well be considered the cornerstone of the communist system of con-
trol. It consists of strict regulation of the mail,reading materials,
broadcast materials, and social contact available to the individual. The
need to communicate is so great that when the usual channels are blocked,
the individual will resort to any open channel, almost regardless of the
implications of using that particular channel. Many POWs in Korea, whose
only act of "collaboration" was to sign petitions and "peace appeals,"
defended their actions on the ground that this was the only method of
letting the outside world know they were still alive. May stated that
their morale and fortitude would have been increased immeasurably had
leaflets of encouragement been dropped to them. When the only contact
with the outside world is via the interrogator, the prisoner comes to
develop extreme dependency on his interrogator and hence loses another
prop to his morale.</p>
<p> Another wrinkle in communication control is the informer system.
The recruitment of informers in POW camps discouraged communication</p>
<p> 4</p>
<p> OA 53-37</p>
<p>between inmates.POWs who feared that every act or thought of resistance
-------------------------------------------------------------------------------
would be communicated to the camp administrators, lost faith in their
fellow man and were forced to "untrusting individualism." Informers are
also under several stages of brainwashing and elicitation to develop
and maintain control over the victims.</p>
<p> 5. Induction of Fatigue. This is a well-known device for breaking
will power and critical powers of judgment. Deprivation of sleep results
in more intense psychological debilitation than does any other method of
engendering fatigue. The communists vary their methods. "Conveyor belt"
interrogation that last 50-60 hours will make almost any individual com-
promise, but there is danger that this will kill the victim. It is safer
to conduct interrogations of 8-10 hours at night while forcing the prisoner
to remain awake during the day. Additional interruptions in the remaining
2-3 hours of allotted sleep quickly reduce the most resilient individual .
Alternate administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression.</p>
<p> Fatigue, in addition to reducing the will to resist,also produces
irritation and fear that arise from increased "slips of the tongue." for-
getfulness, and decreased ability to maintain orderly thought processes.</p>
<p> 6. Control of Food,Water and Tobacco. The controlled individual
is made intensely aware of his dependence upon his interrogator for the
quality and quantity of his food and tobacco. The exercise of this con-
trol usually follows a pattern. No food and little or no water is per-
mitted the individual for several days prior to interrogation.When the
prisoner first complains of this to the interrogator, the latter expresses
surprise at such inhumane treatment. He makes a demand of the prisoner.
If the latter complies,he receives a good meal. If he does not, he gets
a diet of unappetizing food containing limited vitamins,minerals, and
calories. This diet is supplemented occasionally by the interrogator if
the prisoner "cooperates." Studies of controlled starvation indicate
that the whole value-system of the subjects underwent a change. Their
irritation increased as their ability to think clearly decreased. The
control of tobacco presented an even greater source of conflict for heavy
smokers. Because tobacco is not necessary to life, being manipulated by
his craving for it can in the individual a strong sense of guilt.</p>
<p> 7. Criticism and Self-Criticism. There are mechanisms of communist
thought control. Self-criticism gains its effectiveness from the fact
that although it is not a crime for a man to be wrong, it is a major crime
to be stubborn and to refuse to learn. Many individuals feel intensely re-
lieved in being able to share their sense of guilt. Those individuals</p>
<p> 5</p>
<p> OA 53-37</p>
<p>however, who have adjusted to handling their guilt internally have dif-
ficulty adapting to criticism and self-criticism. In brainwashing ,after
a sufficient sense of guilt has been created in the individual, sharing
and self-criticism permit relief. The price paid for this relief, how-
-------------------------------------------------------------------------------
ever, is loss of individuality and increased dependency.</p>
<p> 8. Hypnosis and Drugs as Controls. There is no reliable evidence
that the communists are making widespread use of drugs or hypnosis in
brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and "mood swings."</p>
<p> 9. Other methods of control, which when used in conjunction with the
basic processes, hasten the deterioration of prisoners' sense of values
and resistance are:</p>
<p> a. Requiring a case history or autobiography of the prisoner
provides a mine of information for the interrogator in establishing and
"documenting" accusations.</p>
<p> b. Friendliness of the interrogator , when least expected, up-
sets the prisoner's ability to maintain a critical attitude.</p>
<p> c. Petty demands, such as severely limiting the allotted time
for use of toilet facilities or requiring the POW to kill hundreds of
flies, are harassment methods.</p>
<p> d. Prisoners are often humiliated by refusing them the use of
toilet facilities during interrogator until they soil themselves. often
prisoners were not permitted to bathe for weeks until they felt contempti-
ble.</p>
<p> e. Conviction as a war criminal appears to be a potent factor
in creating despair in the individual. One official analysis of the pres-
sures exerted by the ChiComs on "confessors" and "non-confessors" to
participation in bacteriological warfare in Korea showed that actual trial
and conviction of "war crimes" was overwhelmingly associated with breakdown
and confession.</p>
<p> f. Attempted elicitation of protected information at various
times during the brainwashing process diverted the individual from aware-
ness of the deterioration of his value-system. The fact that, in most
cases, the ChiComs did not want or need such intelligence was not known
to the prisoner. His attempts to protect such information was made at
the expense of hastening his own breakdown.</p>
<p> 6</p>
<p> OA 53-37</p>
<p>THE EXERCISE OF CONTROL: A "SCHEDULE" FOR BRAINWASHING
-------------------------------------------------------------------------------
From the many fragmentary accounts reviewed, the following appears
to be the most likely description of what occurs during brainwashing .</p>
<p> In the period immediately following capture, the captors are faced
with the problem of deciding on best ways of exploitation of the prisoners.
Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological "softening-up" which
includes: limited unpalatable food rations,withholding of tobacco,possi-
ble work details,severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness,limitation of sleep such as requiring
a subject to sleep with a bright light in his eyes. Apparently the inter-
rogation and autobiographical ,material, the reports of the prisoner's be-
haviour in confinement, and tentative "personality typing" by the interro-
gators, provide the basis upon which exploitation plans are made.</p>
<p> There is a major difference between preparation for elicitation and
for brainwashing .Prisoners exploited through elicitation must retain suffi-
cient clarity of thought to be able to give coherent,factual accounts. In
brainwashing , on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defense, the controlled individual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes.</p>
<p> The most important aspect of the brainwashing process is the interro-
gation. The other pressures are designed primarily to help the interrogator
achieve his goals. The following states are created systematically within
the individual . These may vary in order, but all are necessary to the
brainwashing process:</p>
<p> 1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.</p>
<p> 2. An initial reaction of "surprise."</p>
<p> 3. A feeling of uncertainty about what is required of him.</p>
<p> 4. A developing feeling of dependence upon the interrogator .</p>
<p> 5. A sense of doubt and loss of objectivity.</p>
<p> 6. Feelings of guilt.</p>
<p> 7</p>
<p> OA 53-37</p>
<p> 7. A questioning attitude toward his own value-system.</p>
<p> 8. A feeling of potential "breakdown," i.e.,that he might go crazy.
-------------------------------------------------------------------------------
9. A need to defend his acquired principles.</p>
<p> 10. A final sense of "belonging" (identification).</p>
<p> A feeling of helplessness in the face of the impersonal machinery
of control is carefully engendered within the prisoner. The individual
who receives the preliminary treatment described above not only begins
to feel like an "animal" but also feels that nothing can be done about
it. No one pays any personal attention to him. His complaints fall on
deaf ears. His loss of communication, if he has been isolated, creates
a feeling that he has been "forgotten." Everything that happens to him
occurs according to an impersonal; time schedule that has nothing to do
with his needs. The voices and footsteps of the guards are muted. He
notes many contrasts,e.g.,his greasy,unpalatable food may be served
on battered tin dishes by guards immaculately dressed in white. The
first steps in "depersonalization" of the prisoner have begun. He has
no idea what to expect. Ample opportunity is allotted for him to ruminate
upon all the unpleasant or painful things that could happen to him. He
approaches the main interrogator with mixed feelings of relief and
fright.</p>
<p> Surprise is commonly used in the brainwashing process. The prisoner
is rarely prepared for the fact that the interrogators are usually friendly
and considerate at first. They make every effort to demonstrate that
they are reasonable human beings. Often they apologize for bad treatment
received by the prisoner and promise to improve his lot if he, too, is
reasonable. This behaviour is not what he has steeled himself for. He
lets down some of his defenses and tries to take a reasonable attitude.
The first occasion he balks at satisfying a request of the interrogator ,
however, he is in for another surprise. The formerly reasonable inter-
rogator unexpectedly turns into a furious maniac. The interrogator is
likely to slap the prisoner or draw his pistol and threaten to shoot him.
Usually this storm of emotion ceases as suddenly as it began and the in-
terrogator stalks from the room. These surprising changes create doubt
in the prisoner as to his very ability to perceive another person's moti-
vations correctly. His next interrogation probably will be marked by im-
passivity in the interrogator 's mien.</p>
<p> A feeling of uncertainty about what is required of him is likewise
carefully engendered within the individual . Pleas of the prisoner to
learn specifically of what he is accused and by whom are side-stepped by</p>
<p> 8</p>
<p> OA 53-37</p>
<p>the interrogator. Instead, the prisoner is asked to tell why he thinks
-------------------------------------------------------------------------------
he is held and what he feels he is guilty of. If the prisoner fails to
come up with anything, he is accused in terms of broad generalities (e.g.,
espionage, sabotage,acts of treason against the "people"). This us-
ually provokes the prisoner to make some statement about his activities.
If this take the form of a denial, he is usually sent to isolation on
further decreased food rations to "think over" his crimes. This process
can be repeated again and again. As soon as the prisoner can think of
something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it.</p>
<p> Meanwhile a strong sense of dependence upon the interrogator is
developed. It does not take long for the prisoner to realize that the
interrogator is the source of all punishment , all gratification,and all
communication. The interrogator , meanwhile,demonstrates his unpredict-
bility. He is perceived by the prisoner as a creature of whim. At
times, the interrogator can be pleased very easily and at other times
no effort on the part of the prisoner will placate him. The prisoner
may begin to channel so much energy into trying to predict the behaviour
of the unpredictable interrogator that he loses track of what is happen-
ing inside himself.</p>
<p> After the prisoner has developed the above psychological and emotional
reactions to a sufficient degree, the brainwashing begins in earnest.
First, the prisoner's remaining critical faculties must be destroyed.
He undergoes long, fatiguing interrogations while looking at a bright
light. He is called back again and again for interrogations after min-
imal sleep. He may undergo torture that tends to create internal con-
flict. Drugs may be used to accentuate his "mood swings." He develops
depression when the interrogator is being kind and becomes euphoric when
the interrogator is threatening the direst penalties. Then the cycle is
reversed. The prisoner finds himself in a constant state of anxiety
which prevents him from relaxing even when he is permitted to sleep.
Short periods of isolation now bring on visual and auditory hallucinations.
The prisoner feels himself losing his objectivity. It is in this state
that the prisoner must keep up an endless argument with the interrogator .
He may be faced with the confessions of other individuals who "collabo-
rated" with him in his crimes. The prisoner seriously begins to doubts
his own memory. This feeling is heightened by his inability to recall
little things like the names of the people he knows very well or the date
of his birth. The interrogator patiently sharpens this feeling of doubt
by more questioning. This tends to create a serious state of uncertainty
when the individual has lost most of his critical faculties.</p>
<p> 9</p>
<p> OA 53-37</p>
<p> The prisoner must undergo additional internal conflict when strong
feelings of guilt are aroused within him. As any clinical psychologist
is aware, it is not at all difficult to create such feelings. Military
servicemen are particularly vulnerable. No one can morally justify kill-
-------------------------------------------------------------------------------
ing even in wartime. The usual justification is on the grounds of neces-
sity or self-defense. The interrogator is careful to circumvent such
justification. He keeps the interrogation directed toward the prisoner's
moral code. Every moral vulnerability is exploited by incessant question-
ing along this line until the prisoner begins to question the very fun-
damentals of his own value-system. The prisoner must constantly fight a
potential breakdown. He finds that his mind is "going blank" for longer
and longer periods of time. He can not think constructively. If he is
to maintain any semblance of psychological integrity, he must bring to
an end this state of interminable internal conflict. He signifies a
willingness to write a confession.</p>
<p> If this were truly the end, no brainwashing would have occurred.
The individual would simply have given in to intolerable pressure. Ac-
tually, the final stage of the brainwashing process has just begun. No
matter what the prisoner writes in his confession the interrogator is
not satisfied. The interrogator questions every sentence of the confes-
sion. He begins to edit it with the prisoner. The prisoner is forced
to argue against every change. This is the essence of brainwashing.
Every time that he gives in on a point to the interrogator, he must re-
write his whole confession. Still the interrogator is not satisfied.
In a desperate attempt to maintain some semblance of integrity and to
avoid further brainwashing, the prisoner must begin to argue that what
he has already confessed to is true. He begins to accept as his own the
statements he has written. He uses many of the interrogator's earlier
arguments to buttress his position. By this process,identification
with the interrogator's value-system becomes complete. It is extremely
important to recognize that a qualitative change has taken place within
the prisoner. The brainwashed victim does not consciously change his
value-system; rather the change occurs despite his efforts. He is no
more responsible for this change than is an individual who "snaps" and
becomes psychotic. And like the psychotic, the prisoner is not even
aware of the transition.</p>
<p>DEFENSIVE MEASURES OTHER THAN ON THE POLICY AND PLANNING LEVEL</p>
<p> 1. Training of Individuals potentially subject to communist control.</p>
<p> Training should provide for the trainee a realistic appraisal
of what control pressures the communists are likely to exert and what
the usual human reactions are to such pressures. The trainee must learn</p>
<p> 10</p>
<p> OA 53-37</p>
<p>the most effective ways of combatting his own reactions to such pressures
-------------------------------------------------------------------------------
and he must learn reasonable expectations as to what his behaviour should
be. Training has two decidedly positive effects; first, it provides the
trainee with ways of combatting control; second, it provides the basis
for developing an immeasurable boost in morale. Any positive action that
the individual can take, even if it is only slightly effective, gives him
a sense of control over a situation that is otherwise controlling him.</p>
<p> 2. Training must provide the individual with the means of
recognizing realistic goals for himself.</p>
<p> a. Delay in yielding may be the only achievement that can be
hoped for. In any particular operation, the agent needs the support of
knowing specifically how long he must hold out to save an operation, pro-
tect his cohorts, or gain some other goal.</p>
<p> b. The individual should be taught how to achieve the most favor-
able treatment and how to behave and make necessary concessions to
obtain minimum penalties.</p>
<p> c. Individual behavioural responses to the various communist
control pressures differ markedly. Therefore, each trainee should know
his own particular assets and limitations in resisting specific pressures.
He can learn these only under laboratory conditions simulating the actual
pressures he may have to face.</p>
<p> d. Training must provide knowledge of the goals and the restric-
tions placed upon his communist interrogator. The trainee should know
what controls are on his interrogator and to what extent he can manipulate
the interrogator. For example, the interrogator is not permitted to fail
to gain "something" from the controlled individual. The knowledge that,
after the victim has proved that he is a "tough nut to crack" he can some-
times indicate that he might compromise on some little point to help the
interrogator in return for more favorable treatment, may be useful in-
deed. Above all, the potential victim of communist control can gain a
great deal of psychological support from the knowledge that the communist
interrogator is not a completely free agent who can do whatever he wills
with his victim.</p>
<p> e. The trainee must learn what practical cues might aid him in
recognizing the specific goals of his interrogator. The strategy of defense
against elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the individual may hasten his own
state of mental confusion; whereas, to prevent brainwashing, maintaining
clarity of thought processes is imperative.</p>
<p> 11</p>
<p> OA 53-37</p>
<p> f. The trainee should obtain knowledge about communist "carrots"
as well as "sticks." The communists keep certain of their promises and al-
ways renege on others. For example, the demonstrable fact that "informers"
receive no better treatment than other prisoners should do much to prevent
-------------------------------------------------------------------------------
this particular evil. On the other hand, certain meaningless concessions
will often get a prisoner a good meal.</p>
<p> g. In particular, it should be emphasized to the trainee that,
although little can be done to control the pressures exerted upon him, he
can learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about in-
ternal conflict and conflict-producing mechanisms. He should learn to
recognize when someone is trying to arouse guilt feelings and what be-
havioural reactions can occur as a response to guilt.</p>
<p> h. Finally, the training must teach some methods that can be utilized
in thwarting particular communist control techniques:</p>
<p> Elicitation. In general, individuals who are the hardest to inter-
rogate for information are those who have experienced previous interroga-
tions. Practice in being the victim of interrogation is a sound train-
ing device.</p>
<p> Torture. The trainee should learn something about the principles of
pain and shock. There is a maximum to the amount of pain that can actually
be felt. Any amount of pain can be tolerated for a limited period of
time. In addition, the trainee can be fortified by the knowledge that there
are legal limitations upon the amount of torture that can be inflicted
by communist jailors.</p>
<p> Isolation. The psychological effects of isolation can probably be
thwarted best by mental gymnastics and systematic efforts on the part of
the isolate to obtain stimulation for his neural end organs.</p>
<p> Controls on Food and Tobacco. Foods given by the communists will
always be enough to maintain survival. Sometimes the victim gets unex-
pected opportunities to supplement his diet with special minerals,vitamins
and other nutrients (e.g.,"iron" from the rust of prison bars). In some
instances, experience has shown that individuals could exploit refusal to
eat. Such refusal usually resulted in the transfer of the individual to
a hospital where he received vitamin injections and nutritious food. Evi-
dently attempts of this kind to commit suicide arouse the greatest concern
in communist officials. If deprivation of tobacco is the control being
exerted. the victim can gain moral satisfaction from "giving up" tobacco.
He can't lose since he is not likely to get any anyway.</p>
<p> 12</p>
<p> OA 53-37</p>
<p> Fatigue. The trainee should learn reactions to fatigue and how to
-------------------------------------------------------------------------------
overcome them insofar as possible. For example, mild physical exercise
"clears the head" in a fatigue state.</p>
<p> Writing Personal Accounts and Self-Criticism. Experience has in-
dicated that one of the most effective ways of combatting these pressures
is to enter into the spirit with an overabundance of enthusiasm. Endless
written accounts of inconsequential material have virtually "smothered"
some eager interrogators. In the same spirit, sober, detailed self-
criticisms of the most minute "sins" has sometimes brought good results.</p>
<p> Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an individual's
duties may become mutually incompatible in this situation. Take the ex-
ample of a senior grade military officer. He has the knowledge of sensitive
strategic intelligence which it is his duty to protect. He has the respon-
sibility of maintaining the physical fitness of his men and serving as
a model example for their behaviour. The officer may go to the camp
commandant to protest the treatment of the POWs and the commandant as-
sures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another. The
officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for
any other behaviour if he does his utmost to carry out his highest priority
responsibility. There is considerable evidence that many individuals
tried to evaluate the priority of their responsibilities on their own,
but were in conflict over whether others would subsequently accept their
evaluations. More than one individual was probably brainwashed while he
was trying to protect himself against elicitation.</p>
<p>CONCLUSIONS</p>
<p> The application of known psychological principles can lead to an
understanding of brainwashing.</p>
<p> 1. There is nothing mysterious about personality changes resulting
from the brainwashing process.</p>
<p> 2. Brainwashing is a complex process. Principles of motivation,
perception, learning, and physiological deprivation are needed to account
for the results achieved in brainwashing.</p>
<p> 3. Brainwashing is an involuntary re-education of the fundamental
beliefs of the individual. To attack the problem successfully, the brain-
washing process must be differentiated clearly from general education
methods for thought-control or mass indoctrination, and elicitation.</p>
<p> 13</p>
<p> OA 53-37</p>
<p> 4. It appears possible for the individual,through training,to
develop limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting in-
dividual emotional reactions to brainwashing techniques rather than to-
-------------------------------------------------------------------------------
ward thwarting the techniques themselves.</p>
<p> 15 August 1955</p>
<p> 14</p>
<p> =====================================================================
(note Declassified)</p>
<p> SECRET</p>
<p> CENTRAL INTELLIGENCE AGENCY
WASHINGTON 25, D. C.</p>
<p> 19 JUN 1964</p>
<p> (Commission No. 1131)</p>
<p> MEMORANDUM FOR: Mr. J. Lee Rankin
General Counsel
President's Commission on the
Assassination of President Kennedy</p>
<p> SUBJECT : Soviet Brainwashing Techniques</p>
<p> 1. Reference is made to your memorandum of 19 May 1964,
requesting that materials relative to Soviet techniques in mind
conditioning and brainwashing be made available to the Commission.</p>
<p> 2. At my request, experts on these subjects within the CIA
have prepared a brief survey of Soviet research in the direction
and control of human behavior, a copy of which is attached. The
Commission may retain this document. Please note that the use
of certain sensitive materials requires that a sensitivity indicator
be affixed.</p>
<p> 3. In the immediate future, this Agency will make available
to you a collection of overt and classified materials on these subjects,
which the Commission may retain.</p>
<p> 4. I hope that these documents will be responsive to the
Commission's needs.</p>
<p> (SIGNED)</p>
<p> (DECLASSIFIED) Richard Helms
(By C.I.A.) Deputy Director for Plans
(letter of ___________)
(---------------------)</p>
<p> Attachment</p>
<p> CD 1131 SECRET</p>
<p> MEMORANDUM</p>
<p> SUBJECT: Soviet Research and Development in the Field of
Direction and Control of Human Behavior.</p>
<p> 1. There are two major methods of altering or controlling
human behavior, and the Soviets are interested in both. The first
is psychological; the second, pharmacological. The two may be
used as individual methods or for mutual reinforcement. For
long-term control of large numbers of people, the former method
is more promising than the latter. In dealing with individuals,
the U.S. experience suggests the pharmacological approach (assisted
by psychological techniques) would be the only effective method.
Neither method would be very effective for single individuals on
a long term basis.</p>
<p> 2. Soviet research on the pharmacological agents producing
behavioral effects has consistently lagged about five years behind
Western research. They have been interested in such research,
however, and are now pursuing research on such chemicals as
LSD-25, amphetamines, tranquillizers, hypnotics, and similar
materials. There is no present evidence that the Soviets have
any singular, new, potent drugs to force a course of action on
an individual. They are aware, however, of the tremendous drive
produced by drug addiction, and PERHAPS could couple this with
psychological direction to achieve control of an individual.</p>
<p> 3. The psychological aspects of behavior control would include
not only conditioning by repetition and training, but such things as
hypnosis, deprivation, isolation, manipulation of guilt feelings,
subtle or overt threats, social pressure, and so on. Some of the
newer trends in the USSR are as follows:</p>
<p> SECRET CD 1131
PAGE 1</p>
<p> a. The adoption of a multidisciplinary approach integrating
biological,social and physical-mathematical research in attempts
better to understand, and eventually, to control human behavior in a
manner consonant with national plans.</p>
<p> b. The outstanding feature, in addition to the inter-
disciplinary approach, is a new concern for mathematical approaches to
an understanding of behavior. Particularly notable are attempts to use
modern information theory, automata theory, and feedback concepts in
interpreting the mechanisms by which the "second signal system," i.e.,
speech and associated phenomena, affect human behavior. Implied by this
"second signal system," using INFORMATION inputs as causative agents
rather than chemical agents, electrodes or other more exotic techniques
applicable, perhaps, to individuals rather than groups.</p>
<p> c. This new trend, observed in the early Post-Stalin Period,
continues. By 1960 the word "cybernetics" was used by the Soviets to
designate this new trend. This new science is considered by some as
the key to understanding the human brain and the product of its
functioning--psychic activity and personality--to the development of
means for controlling it and to ways for molding the character of the
"New Communist Man". As one Soviet author puts it: Cybernetics can be
used in "molding of a child's character, the inculcation of knowledge
and techniques, the amassing of experience, the establishment of social
behavior patterns...all functions which can be summarized as 'control'
of the growth process of the individual." 1/Students of particular
disciplines in the USSR, such as psychologist and social scientists,
also support the general cybernetic trend. 2/ (Blanked by CIA)</p>
<p> 4. In summary, therefore, there is no evidence that the Soviets
have any techniques or agents capable of producing particular behavioral
patterns which are not available in the West. Current research indi-
cates that the Soviets are attempting to develop a technology for
controlling the development of behavioral patterns among the citizenry
of the USSR in accordance with politically determined requirements of
the system. Furthermore, the same technology can be applied to more
sophisticated approaches to the "coding" of information for transmittal
to population targets in the "battle for the minds of men." Some of the
more esoteric techniques such as ESP or, as the Soviets call it,
"biological radio-communication", and psychogenic agents such as LSD,</p>
<p> SECRET CD 1131
PAGE 2</p>
<p> are receiving some overt attention with, possibly, applications in mind
for individual behavior control under clandestine conditions. However,
we require more information than is currently available in order to
establish or disprove planned or actual applications of various
methodologies by Soviet scientists to the control of actions of
articular individuals.</p>
<p> References</p>
<p> 1. Itelson, Lev, "Pedagogy: An Exact Science?" USSR October 1963,
p. 10.
2. Borzek, Joseph, "Recent Developments in Soviet Psychology,"
Annual Review of Psychology, Vol. 15, 1964, p. 493-594.</p>
<p> SECRET CD 1131</p>
<p> PAGE 3</p>
<p> The first letter and attachment are from DECLASSIFIED
DOCUMENTS 1984 microfilms under MKULTRA (84) 002258, published
by Research Publication Woodbridge, CT 06525. Some original
markings were not retyped, but the content is the same. </p>
<p> The second letter and attachment are from the Warren
Commission documents. Notice should be paid to the different
tone Helms gives to his letter, keeping in mind he was found
guilty of lying to Congress. He places greater emphasis on
"Soviet" practices and tries to diminish breakthroughs gained
by Americans. Some thought should be given as to WHY the
Warren Commission sought such documents (remembering that
ALLEN DULLES was a member of that Commission). They were
exploring the Manchurian candidate theory. It was revealed
during the Church Committee hearings of 1975 that Helms had
been in charge of Project AMLASH, a program to assassinate
Castro (Cuba),Trujillo (Dominican Republic), Diem (RVN),
Schneider (Chile) using MAFIA figures John Roselli and Santos
Trafficante to do the job. </p>
<p> Care was used to insure lines appear in same length and order.
Page length will have to be adjusted if you desire to print
this. Look for other specials soon. David John Moses.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Salted Slug Systems Strange 408-454-9368
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Tomorrow's 0rder of Magnitude Finger_Man 408-961-9315
My Dog Bit Jesus Suzanne D'Fault 510-658-8078</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

560
regexConsp/ciactrlf.xml Normal file
View File

@ -0,0 +1,560 @@
<xml><p>
Article: 571 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: How the CIA turned `being directed by the NSC' into `getting approval'
Keywords: the compartmentalized "need to know" security lid locks up the govn't
Organization: Silicon Graphics, Inc.
Date: Fri, 10 Apr 1992 18:01:36 GMT
Lines: 573</p>
<p> . . . Control of a good share of what the Pentagon is doing is
more important to the CIA than control over the government of
Jordan or Syria. . . .
When the CIA wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the CIA to get
a favorable reading from the "Forty Committee" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the NSC intrastructure, and then,
by clamping on a security id, it makes others believe that the CIA
had orders from the NSC or perhaps even from the President, when in
fact it did not.</p>
<p> the following appeared in the 7/75 issue of "Genesis:"
_____________________________________________________________________
How the CIA Controls President Ford
By L. Fletcher Prouty
reprinted here with permission of the author</p>
<p> In this monstrous U.S. government today, it's not so much what
comes down from the top that matters as what you can get away with
from the bottom or from the middle--the least scrutinized level.
(Contrary to the current CIA propaganda as preached by William
Colby, Ray Cline, Victor Marchetti and Philip Agee, who say,
incorrectly, "What the Agency does is ordered by the President.")
As with the Mafia, crime is a cinch if you know the cops and the
courts have been paid off. With the Central Intelligence Agency,
anything goes when you have a respected boss to sanctify and bless
your activities and to shield them from outside eyes.
Such a boss in the CIA was old Allen Dulles, who ran the Agency
like a mother superior running a whorehouse. He knew the girls
were happy, busy, and well fed, but he wasn't quite sure what they
were doing. His favorites, all through the years of his prime as
Director of Central Intelligence, were such stellar performers as
Frank Wisner, Dick Bissell, George Doole, Sheffield Edwards, Dick
Helms, Red White, Tracy Barnes, Desmond Fitzgerald, Joe Alsop, Ted
Shannon, Ed Lansdale and countless others. They were the great
operators. He just made it possible for them to do anything they
came up with.
When Wisner and Richard Nixon came up with the idea of mounting
a major rebellion in Indonesia in 1958, Dulles saw that they got
the means and the wherewithal. When General Cabell and his Air
Force friends plugged the U-2 project for Kelly Johnson of
Lockheed, Dulles tossed it into the lap of Dick Bissell. When Dick
Helms and Des Fitzgerald figured they could play fun and games in
Tibet, Dulles talked to Tom Gates, then Secretary of Defense, and
the next we knew CIA agents were spiriting the Dalai Lama out of
Lhasa, CIA undercover aircraft were clandestinely dropping tons of
arms, ammunitions, and supplies deep into Tibet and other planes
were reaching as far as northwestern China to Koko Nor.
While he peddled the hard-won National Intelligence Estimates to
all top offices and sprinkled holy water over the pates of our
leaders, Dulles dropped off minor miracles along the way to
titillate those in high places. If you win the heart of the queen
and convert her to your faith, you can control the king. This
works for the Jesuits. It worked well for the CIA. Allen Dulles
was no casual student and practitioner of the ancient art of
religion. He was an expert in the art of mind-control. He learned
how to operate his disciples and his Agency in the ways of the
cloth.
But for every Saint and every Sinner in the fold there must be
an order of monks, and the Agency has always been the haven for
hundreds of faceless, nameless minions whose only satisfaction was
the job well done and the furtherance of the cause. One of the
most remarkable--and surely the best--of these was an agent named
Frank Hand.
In my book, "The Secret Team," written during 1971 and 1972, I
mentioned that the most important agent in the CIA was an almost
unknown individual who spent most of his time in the Pentagon. At
that time I did not reveal his name; but a small item in a recent
obituary column stated that:</p>
<p> "Frank Hand, 61, a former senior official of the CIA, died in
Marshall, Minn. . . . (he was) a graduate of Harvard Law
School. He had served with the CIA from 1950 until
retirement in 1971."</p>
<p> After a life devoted to quiet, effective, skillful performance
of one of the most important jobs in the worldwide structure of
that unparalleled agency, all that the CIA would publicly say of
Frank Hand was that he was a "senior official."
Ask Dick Helms, Ed Lansdale, Bob McNamara, Tom Gates or Allen
Dulles or John Foster Dulles, if they were with us today, and they
all would tell us stories about Frank Hand. They would do more to
characterize the nature and the sources of power which make use of
and control the CIA than has ever been told before. He was that
superior operative who made big things work unobtrusively.
You might have been one of the grass-green McNamara "whiz kids,"
lost in the maze of the Pentagon Puzzle Palace, who came upon a
short, Hobbit-like, pleasant man who knew the Pentagon so well that
you got the feeling he was brought in with the original load of
concrete. Thousands of career men to this day will never realize
that Frank Hand was a "Senior Official" of the CIA and not one of
their civilian cohorts. To my knowledge he never worked anywhere
else. I was there in 1955 and he was there. I left in December
1963, and he was at my farewell party. He must have spent some of
his time at the agency; but it must have been before 1955. If he
had a dollar for every trip he made in those busy years between the
Pentagon and the CIA he would have died a very wealthy man. He
popularized the Agency term "across the river" and the "Acme
Plumbers" nickname for agents of the CIA. (A term later to be
confused by Colson and John Ehrlichman, among others, with the use
of the term "White House Plumbers" of Watergate fame. Someone knew
that Hunt, McCord, the Cubans, Haig, Butterfield and others all had
CIA backgrounds and connections and therefore were "Plumbers."
Only the insiders knew about the real "Acme Plumbers.")
Frank was as much at home with Allen Dulles as he was with the
famous old supersleuth, General Graves B. Erskine, and as he was
with Helms, Colby, or Fitzgerald. Ian Fleming may have popularized
the spy and the undercover agent as a flashing James Bond type;
but in the reality of today's world the great ones are more in the
mold of Frank Hand and "The Spy Who Came In From The Cold."
There has long existed a "golden key" group of agency and
agency-related supermen. They came from the CIA, the Pentagon, the
Department of State, the White House and other places in government
or from the outside. They have kept themselves inconspicuous and
they meet in the evening away from their offices. They are the men
who open the doors of big government to industry-banking law and to
the multinational corporate centers of greed and power. Their
strength lies in their common awareness of the ways in which real
power is generated in the government, the real power that controls
activities of the government. In many instances this is the power
of being able to keep something from happening, rather than to make
it happen. For example, if the President is murdered, real power
involves the control of government operations sufficient to make
any investigation ineffective and to assure that the government
will do nothing even if the investigation should turn up something.
Real power is the ability to keep the government bureaucracy from
going into action when the price of petroleum and wheat is doubled
or tripled by avaricious international monopolies.
Some of these "gold key" members have surfaced and have accepted
publicity, as did Des Fitzgerald, Allen Dulles, Tracy Barnes and
others. Frank never did. He was so anonymous that even his
friends could not find him.
The Agency covered for Frank Hand as it did for few others. The
James Bonds of this world may be the idols of the Intelligence
coterie; but if you are a Bill Colby, Dick Helms, or Allen Dulles,
you know the real value of an indispensable agent. Frank was their
man in the Pentagon, and the Pentagon was always the indispensable
prime target of the CIA. When the chips are down, the CIA could
care less about overturning "Communism" in Cuba or Chile. What
really matters is its relative power in the U.S. Government.
Control of a good share of what the Pentagon is doing is more
important to the CIA than control over the government of Jordan or
Syria.
Once, when the CIA wanted to move a squadron (twenty-five) of
helicopters from Laos to South Vietnam, long before the troubles
there had become a war, I turned down the request from the Deputy
Director of Central Intelligence in the name of the Secretary of
Defense for no other reason than the fact that I did not find that
project on the approved list of the National Security Council's
"Forty Committee" (then called the 5412/2 committee). That meant
the agency had neither been directed by the National Security
Council to move those helicopters into Vietnam, nor had it received
authorization for such a tactical movement. In other words, the
planned intervention into South Vietnam with a squadron of
helicopters would at that time have been unlawful as an
intervention into the internal affairs of another country.
This denial then, in 1960, effectively blocked the CIA from
being able to move heavy war-making equipment into Vietnam. The
helicopters were actually U.S. Marine Corps property on "loan" from
Okinawa to the CIA for clandestine operations in Laos.
At that time my immediate superior was General Graves Erskine,
the Assistant to the Secretary of Defense for Special (Clandestine)
Operations, and the man then responsible for all military support
of clandestine operations of the CIA. Also at that time, Frank
Hand, "worked for" Erskine. Of course, this was a cover
assignment--"cover slot" as it was known to us and to the CIA.
Frank had a regular office in the Pentagon.
No sooner had the CIA request been turned down than someone near
the top of the agency called Frank and told him about it. In his
smiling and friendly way he came into my office, carrying two cups
of coffee, and began some talk about music, travel, or golf. Then,
as was his practice, he would get the subject around to his point
with such a comment as, "Fletch, who do you suppose took a call
here about the choppers in Laos?" and we would be off.
The special ability he possessed was best evidenced by the
process he would set in motion once he discovered a problem that
affected the ambitions of the agency. He would talk about the
choppers with Erskine. Then he would drop in to see the Chief of
Naval Operations and perhaps the Commandant of the Marine Corps.
He would talk with some of the other civilian Assistant
Secretaries. In other words, he would go from office to office
like a bee spreading pollen, titillating only the most senior
officers and civilian officials with the most "highly sensitive"
tidbits about the CIA's plans for Vietnam. In this manner he would
find out what the real thinking in the Pentagon might be, and where
there might be real opposition to such an idea--such as in the
Marine Corps, which knew it would never get compensation for those
expensive helicopters and for the loss of time of all their support
people. He would also find out where there would be support, as
with the ever-eager U.S. Army Special Forces, most of whose senior
officers had been with the CIA.
Then he would drop out of the picture for awhile to travel back
to the old CIA headquarters, on the hill that overlooks what is now
the Watergate complex, for a long talk with Allen Dulles or the
Deputy Director, General Cabell. On matters involving the
clandestine services he would also stop by the old headquarters
buildings, that lined the reflecting pool near the Lincoln
Memorial, to talk with Dick Helms, Desmond Fitzgerald, and other
operators. Within a day or two he would have them fully briefed on
the steps to be taken in order to win over the Defense Department;
or failing that, how to overpower and outmaneuver the Pentagon in
the Department of State and the White House.
The foregoing is a "case study" on the important subject of how
the CIA really operates and what it believes is its top priority.
The propaganda being spread around today by the CIA and its
propagandists that, "What the CIA does is ordered by the
President," is totally untrue in all but .00001 percent of actual
historical cases. It is much more factual to say that, "What the
CIA does is to find ways to initiate major foreign policy moves
without having the President find out--or at least without
discovery until it is too late."
"It is in precisely that manner that the CIA today works around,
beneath and behind the White House to effect policies that could
influence the survival of the nation and the world. "Gold Key"
operatives are, at this very moment, carrying out CIA game plans
entirely outside the power of President Ford's ability to affect
their activities. He is totally without knowledge of most of them,
and therefore powerless to stop or alter them.
In the case of the helicopters, Frank Hand was able to convince
Allen Dulles that the disapproval from the Secretary of Defense,
via my office, was real and that the Secretary would, at that time,
be unlikely to change his mind. Frank also could report that the
position of other top-level assistants was so cool to stepping up
the hardware *involvement* of the military in Vietnam, in 1960,
that none of them would likely attempt to persuade the Secretary to
change his policy of limited involvement.
Fortified with the information gleaned by Frank Hand, Allen
Dulles would have two primary options: drop the idea of moving
helicopters into Vietnam, or bypass the Secretary of Defense for
the time being by going to the White House for support. In 1960
this was a crucial decision. The huge attempt to support a
rebellion in Indonesia had failed utterly, the U-2 operations had
been curtailed because of the Gary Powers incident, the far-
reaching operations into Tibet had come to a halt by Presidential
directive and anti-Castro activities were limited to minor forays.
And at that time the large-scale (large for CIA) war in Laos had
become such a disaster that the CIA wanted no more of it. Dick
Bissell, the chief of the Clandestine Services, had written strong,
personal letters to Tom Gates, the Secretary of Defense, wondering
openly what to do about the 50,000 or more miserable Laotian Meo
tribesmen the CIA had moved into the battle zones of Laos and then
had deserted with no plans for their protection, resupply, care or
feeding. The CIA badly wanted to be relieved of the war that they
had started and then found they could not handle. They wanted to
transfer and thus preserve the agency's assets, including the
helicopters, to the bigger prospects in Vietnam.
So, in 1960, if Allen Dulles dropped the idea of moving his
assets from Laos, he would not only have lost those helicopters
back to the Marine Corps but he would have seriously jeopardized
the CIA's undercover leadership role in the development of the war
in Vietnam, which it had been fanning since 1954.
This was a crucial decision for both the CIA and for those who
wished to contain the agency. If those who wished to put the CIA
genie back in the bottle had been able at that time to prevent the
move of those CIA assets into Vietnam, Dulles would have had to
disband them: helicopters, B-26 bombers from the Indonesian
fiasco, tens of thousands of rifles and other weapons, C-46, C-54
and other Air America-supported heavy transport aircraft, U-2
operations over Indochina, radar and other clandestine equipment,
C-130's specially modified for deep Tibetan operations, and much
more. From the point of view of the CIA, the helicopters were
simply the tip of the iceberg, and the decision was its most
important in that decade.
Typically, in his unwitting Mother Superior-style, which
included bulldog tenacity, Dulles chose the route to the White
House. Here again he could rely strongly on Frank Hand. Working
with Hand in Erskine's office was the CIA's other best agent, Major
General Edward G. Lansdale, who had long served in the CIA. Like
Hand, he had unequalled contacts in the Department of State and in
the White House. In support of Dulles, they contacted their
friends there and began a subtle and powerful move destined to
prepare the way for what would appear to be a decision by President
Eisenhower. This was an important feature of the "case study":
The *apparent* Presidential decision.
When the CIA wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the CIA to get
a favorable reading from the "Forty Committee" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the NSC intrastructure, and then,
by clamping on a security id, it makes others believe that the CIA
had orders from the NSC or perhaps even from the President, when in
fact it did not.
Thus it was that, about two weeks from the day that I received
that first call requesting the movement of the squadron of
helicopters, received word from General Erskine that he had been
"officially" informed that the White House (Forty Committee) had
approved the secret operation. The helicopters were moved into
Vietnam. They were the first of thousands.
The great significance of this incident is to point out how the
CIA works powerfully, deftly, and with great assurance at any level
of our government to get anything it wants done. But the anecdote
shows only the surface coating of the application of the CIA
apparatus.
One year earlier, in 1959, Frank Hand had directed a Boston
banker to my office. At that time I worked in the Directorate of
Plans in Air Force headquarters and my work was top secret. Few of
my contemporaries in the Pentagon knew that I was in charge of a
global U.S. Air Force system created for the dual purpose of
providing Air Force support for the CIA and for protecting the best
interests of the USAF while performing that task. My door was
labeled simply, "Team B"; yet that Boston banker knocked and
entered with assurance. Somehow he knew what my work was and he
knew that I might be able to help him.
In 1959 there were very few helicopters in all of the services,
and military procurement of those expensive machines was at an
all-time low. The Bell Helicopter Company was all but out of
business, and its parent company, Bell Aerospace Corp., was having
trouble keeping it financially afloat. Meanwhile, the shrewd Royal
Little, President of the Providence-based Textron Company, had a
good cash position and could well afford the acquisition of a
loser. Textron and the First National Bank of Boston got together
to talk helicopters. Neither one knew a thing about them. But men
in First Boston were close to the CIA, and they learned that the
CIA was operating helicopters in Laos. What they needed to know
now was, "What would be the future of the military helicopter, and
would the use of helicopters in South East Asia escalate if given a
little boost--such as moving a squadron from Laos to Vietnam?" The
CIA could tell them about that, and Frank Hand would be the man who
could get them to the right people in the Pentagon.
The banker from Boston phrased his questions as though he
believed that the helicopters in Laos were somehow operating under
the Air Force, and then went on to ask about their tactical
significance and about the possible increase of helicopter
utilization for that kind of warfare. This was at a time when not
even newspapers had reported anything like the operation of such
large and expensive aircraft in that remote war. We had a rather
thorough discussion and then he left. He called me several times
after that and visited my office a month or two later.
As the record will show, Textron did acquire the Bell Helicopter
Company and the CIA did step up use of helicopters to the extent
that one of the CIA's own proprietary companies, Asia Aeronautics
Inc., had more than four thousand men on each of two bases where
helicopters were maintained. Most of those men were involved in
their maintenance--Bell Helicopters, no less!
Orders for Bel Helicopters for use in Vietnam exceeded $600-
million. Anyone wanting to know more about how the U.S. got so
heavily ($200-billion and the loss of 58,000 American lives)
involved in Indochina need look no further. This was the pattern
and the plan.
At the present time, when the White House, the House, and the
Senate are all investigating the CIA, it is important to understand
the CIA and to put it all in the proper perspective. It is not the
President who instructs the CIA concerning what it will do. And in
many cases it is *not* even the Director of Central Intelligence
who instructs the CIA. The CIA is a great, monstrous machine with
tremendous and terrible power. It can be set in motion from the
outside like a programmer setting a computer in operation, and then
it covers up what it is doing when men like Frank Hand--the real
movers--put grease on the correct gears. And in a majority of
cases, the power behind it all is big business, big banks, big law
firms and big money. The agency exists to be used by them.
Let no one misunderstand what I mean. It was President Lyndon
B. Johnson who on more than one occasion said that the CIA was
"operating a damn Murder Inc. in the Carribean." In other words,
he knew it was doing this--and he was the President! This
knowledge has been recently confirmed by Defense Secretary James
Schlesinger (who is a former head of the CIA) and others by their
admission that they told the agency to end all "terminations." But
Lyndon Johnson was powerless to do anything about it. This is an
astounding admission from a President, the very man from whom, the
CIA says, it always gets its instructions.
The present concern over "domestic surveillance" and such other
lean tidbits--most important to you and me as they are--is not
important to the CIA. It can easily dispense with a James Angleton
or even a Helms or a Colby (just look at the list of CIA bigwigs
who have been fired--Allen Dulles, Frank Wisner, Dick Bissell, Dick
Helms, and now perhaps Colby); but the great machine will live on
while Congress digs away at the Golden Apples tossed casually aside
by the CIA--the supreme Aphrodite of them all. Notice that the
agency cares little about giving away "secrets" in the form of
cleverly written insider books such as those by Victor Marchetti
and Philip Agee. The CIA just makes it look as though it cared
with some high-class window dressing. Actually the real harm to
the American public from those books is to make people believe that
certain carefully selected propaganda is true.
In the story of Frank Hand we come much closer to seeing exactly
how the CIA operates to control this government and other foreign
governments. It is still operating that way. Today it is
President Ford who is the unwitting accessory.</p>
<p> * * * * * * * *</p>
<p> the following is taken from an article Fletcher Prouty wrote
for the February 1986 issue of "Freedom" magazine, entitled,
"Why Vietnam? The Selection and Preparation of the
Battlefield For America's Entry into the Indochina War," Part
7 in a Series on the Central Intelligence Agency. i include
it to amplify on the curious visit Colonel Prouty received in
1959 from the vice president of the First National Bank of
Boston and how it demonstrates that</p>
<p> There was only one way that vice president of the First
National Bank of Boston could have come directly to my
office in the Pentagon. The CIA had sent him there.
This is one of the most important "truly confidential"
roles of the agency. The CIA is the best friend of the top
executives of America's biggest businesses, and it works for
them at home and abroad. It is always successful in the
highest echelons of government and finance. . . .
Translated into everyday terms, Casey's CIA, as was Allen
Dulles' CIA, is one of the true bastions of power as a
servant of the American and transnational business and
financial community.</p>
<p> --ratitor</p>
<p> ______________________________________________________________________
| |
| Helicopters in Vietnam |
| |
| Toward the end of World War II, a small number of |
| helicopters made their appearance in military operations. |
| During the costly battle for Okinawa, in the summer of 1945, |
| General Joseph Stilwell--famed for his role as commander in |
| the China-Burma-India theater of the war--began to use an |
| early model of the Sikorsky helicopter as a"command car." |
| During the early 1950s, the Korean War gave the |
| helicopter industry a much needed boost and several models |
| were used there. After the Korean War, the use of |
| helicopters in all services was severely curtailed by high |
| costs of procurement and by the enormous amounts of time and |
| money required to keep them in operation. By 1959 almost |
| all helicopter manufacturers were broke, or at least on very |
| hard times. This included the Bell Helicopter Company in |
| Buffalo, New York. |
| The helicopters used on operational missions into Laos, |
| mentioned in this article, were the only military |
| helicopters anywhere in the world getting regular and |
| frequent tactical use. However, their very existence in |
| Thailand and their employment in Laos were secrets. They |
| had been moved from Okinawa to Thailand and were supported |
| by my office in the Pentagon. |
| One day, in 1959, a man entered my office to discuss |
| helicopters. |
| Because of the nature of the work my office was doing, |
| this was an infrequent event. Outside the door of the |
| office there was a small blue card that read: |
| |
| Air Force Plans |
| "Team B" |
| Chief--Lt. Col. L. F. Prouty |
| |
| That card by the door drew little attention, and it was |
| meant to be that way. Then how did this civilian visitor |
| from the outside world know that "Team B" was the place he |
| wanted to visit--for business purposes? |
| He introduced himself as a vice president of the First |
| National Bank of Boston. He said he was interested in the |
| tactical utilization of helicopters. Somehow he had been |
| directed to "Team B." "Team B" had been established in 1955 |
| to provide "military support of the clandestine activities |
| of the CIA." The use of helicopters in Laos was a |
| clandestine operation of the CIA. |
| My visitor knew quite a bit about the helicopters in |
| Thailand. He wanted to know if this utilization of large |
| helicopters on tactical missions was a harbinger of more |
| helicopters or was it simply a make-work project? Then he |
| got to the reason for his visit. |
| He said that the Textron Company of Providence, Rhode |
| Island, was a major customer of his bank. Textron was in a |
| good cash position and the bank was advising them to |
| diversify and acquire a marginally viable company for tax |
| purposes and with an eye to future value. |
| To the First National Bank of Boston the helicopter |
| business and specifically the Bell Helicopter Company in |
| Buffalo appeared to be a prime prospect on both counts. |
| Textron was interested. The only problem was the market. |
| Would there ever be an interest in and a need for |
| helicopters by the military, meaning in big numbers? The |
| Laotian operation was the only show in town. |
| Because of the role being played by my office in support |
| of the use of helicopters in Southeast Asia, I already knew |
| the Bell people well both in Washington, D.C., and Buffalo. |
| I knew Bill Gesel, the president of Bell Helicopter. I knew |
| they were competent, but in trouble for lack of orders. |
| I described the helicopter as a useful vehicle of limited |
| potential, but rather well suited for covert operations. In |
| simple terms, the helicopter was too costly for the regular |
| military budget, but, as a rule, covert operations had money |
| to burn. That was the kind of money helicopters needed. |
| Because of the trend of covert operations in Southeast Asia, |
| I believed the demand for helicopters would increase. |
| As events later transpired, the First National Bank of |
| Boston, of which this man was a vice president, was |
| instrumental in getting Textron to acquire the Bell |
| Helicopter Company. This was the beginning of the Textron |
| acquisition of Bell and of the great success Bell had in |
| selling helicopters for use in Indochina. As we all know |
| now, the Bell "Huey" helicopter was the unsung hero of the |
| struggle in Vietnam. Thousands were used there. |
| On one occasion, while I was at lunch at the Army and |
| Navy Club in Washington, Bill Gesel, still president of |
| Bell, came by my table and pulled a check out of his pocket |
| that was in the range of nine figures--hundreds of millions |
| of dollars. Needless to say, Bell was doing well. Textron |
| was doing well. The First National Bank of Boston had |
| earned its fees and, as a result, the remains of hundreds of |
| Hueys are scattered all over the countryside of Vietnam. |
| The Huey had become the famous "gun ship" of that war. |
| There was only one way that vice president of the First |
| National Bank of Boston could have come directly to my |
| office in the Pentagon. The CIA had sent him there. |
| This is one of the most important "truly confidential" |
| roles of the agency. The CIA is the best friend of the top |
| executives of America's biggest businesses, and it works for |
| them at home and abroad. It is always successful in the |
| highest echelons of government and finance. |
| This is the way things were more than 25 years ago. You |
| may be assured these successes have not diminished under the |
| current director of central intelligence, William J. Casey, |
| a true friend of business. |
| During a speech, delivered in December 1979 before an |
| American Bar Association workshop on "Law, Intelligence and |
| National Security," Casey said that he would like to see the |
| CIA be a place "in the United States government to |
| systematically look at the economic opportunities and |
| threats in a long-term perspective, . . . [to] recommend, or |
| act on the use of economic leverage, either offensively or |
| defensively for strategic purposes." |
| Translated into everyday terms, Casey's CIA, as was Allen |
| Dulles' CIA, is one of the true bastions of power as a |
| servant of the American and transnational business and |
| financial community. |
| |
|____________________________________________________________________|</p>
<p>--
daveus rattus </p>
<p> yer friendly neighborhood ratman</p>
<p> KOYAANISQATSI</p>
<p> ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating. 5. a state of life that calls for another way of living.
</p></xml>

1234
regexConsp/ciawars.xml Normal file

File diff suppressed because it is too large Load Diff

1636
regexConsp/cnch0020.xml Normal file

File diff suppressed because it is too large Load Diff

1329
regexConsp/cncia006.xml Normal file

File diff suppressed because it is too large Load Diff

1566
regexConsp/cncia010.xml Normal file

File diff suppressed because it is too large Load Diff

1238
regexConsp/cncia022.xml Normal file

File diff suppressed because it is too large Load Diff

1431
regexConsp/cncia024.xml Normal file

File diff suppressed because it is too large Load Diff

1178
regexConsp/cncia028.xml Normal file

File diff suppressed because it is too large Load Diff

1389
regexConsp/cncja006.xml Normal file

File diff suppressed because it is too large Load Diff

2424
regexConsp/cncjb017.xml Normal file

File diff suppressed because it is too large Load Diff

2168
regexConsp/cncka002.xml Normal file

File diff suppressed because it is too large Load Diff

1444
regexConsp/cncka003.xml Normal file

File diff suppressed because it is too large Load Diff

190
regexConsp/coldfusi.xml Normal file
View File

@ -0,0 +1,190 @@
<xml><p> Host Element Fusion</p>
<p> Unpublished Work
Copyright (c) 1990
Earl Laurence Lovings</p>
<p>1. Proton (1 Hydrogen 1) Energy: 938.3 Mev = 1.007825 amu
2. Neutron (1 Neutron 0) Energy: 939.6 Mev = 1.008665 amu
3. Deuterium (2 Hydrogen 1) = 2.014102 amu
4. [(1 Neutron 0) + (1 Hydrogen 1) - electron] =
(939.6 Mev + 938.3 Mev - .511 Mev) = 1877.389 Mev =
2.015447128 amu
5. [(1 Neutron 0) - (1 Hydrogen 1) + electron] =
(939.6 Mev - 938.3 Mev + .511 Mev) = 1.811 Mev =
1.9441763 x 10 - 03 amu
6. (105 Palladium 46) = 104.905064 amu
7. (103 Rhodium 45) = 102.905511 amu</p>
<p>The host element fusion experiment begins with a Palladium
electrode submersed in Deuterium. A energy source is supplied,
which enables the fusion process to begin. My theory on this
subject is explained below:</p>
<p>The Deuterium atoms are allowed inside the Palladium electrode due
to the electric field on the electrode. Once the Deuterium atoms
are inside, the Deuterium causes the Palladium to become unstable.
This is done by this process:</p>
<p>[ (105 Pd 46 - (1 Neutron 0 + 1 Hydrogen 1 - electron) +
(1 Neutron 0 - 1 Hydrogen 1 + electron)] or,
[ 104.905064 amu - 2.015447128 amu + 1.9441763 x 10-03 amu] =
102.8916 amu.</p>
<p>The closest element Palladium can try to become stable is
(103 Rhodium 45).</p>
<p>Take Palladium's new mass and subtract it with Rhodium's mass.
(103 Rhodium 45) - 102.8916 amu, or
102.905511 amu - 102.8916 amu = 1.394653 x 10-02 amu.</p>
<p>To find out how many electrons that is equivalent to:
(1.394653 x 10-02 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
25.42309 electrons</p>
<p>This is the amount of electrons required to be ionized to enable
host element fusion with Deuterium. </p>
<p>That is the first process of host element fusion. </p>
<p>The second process begins when the ionized electrons from the
palladium atom shields the deuterium atoms to allow host element
fusion.</p>
<p> The Equation:</p>
<p>Q = [(2 Hydrogen 1) + (2 Hydrogen 1) + (25.423 e) -
(1877.389 Mev) + (1.811 Mev) - (2 Hydrogen 1)] x 931.5 Mev or,</p>
<p>Q = [(2.014102 amu + 2.014102 amu + .01394653 amu - 2.015447 amu
+ 1.944176 x 10-03 amu - 2.014102 amu)] x 931.5 Mev</p>
<p>Q = 13.55 Mev</p>
<p>You must realize for this process to work for host element fusion,
you have to have a host element before Deuterium will fuse.
My equation also theoretically works for known Deuterium fusion
processes.</p>
<p> Known Equation:</p>
<p>1. [(2 Hydrogen 1) + (2 Hydrogen 1)] -&gt; (3 Helium 2) +
(1 Neutron 0)] = or,</p>
<p> [(2.014102 amu + 2.014102 amu - 3.016030 amu - 1.008665 amu) x
(931.5 Mev/amu)] = Q = 3.27 Mev</p>
<p>My Equation: </p>
<p>Host Element = (3 Helium 2) + (1 Neutron 0)
[(3 Helium 2) + (1 Neutron 0) - 1877.389 Mev + 1.811 Mev] =
[3.016030 amu + 1.008665 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.011192 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)</p>
<p>(2.014102 amu) - 2.011192 amu = 2.909899 x 10-03 amu excess mass
convert to electrons</p>
<p>(2.909899 x 10-03 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
5.304445 electrons</p>
<p>Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 5.30444e - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.909899x10-03 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu)</p>
<p>Q = 3.27 Mev</p>
<p> Known Equation:</p>
<p>2. [(2 Hydrogen 1) + (2 Hydrogen 1) -&gt; (4 Helium 2)] = or,
[(2.014102 amu + 2.014102 amu - 4.002603 amu)] x
(931.5 Mev/amu) = Q = 23.85 Mev
My Equation: </p>
<p>Host Element = (4 Helium 2)
[(4 Helium 2) - 1877.389 Mev + 1.811 Mev] =
[(4.002603 amu - 2.015447 amu + 1.944176x10-03 amu)] = 1.9891 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)</p>
<p>(2.014102 amu) - 1.9891 amu = 2.500188 x 10-02 amu excess mass
convert to electrons</p>
<p>(2.500188 x 10-02 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
45.57585 electrons</p>
<p>Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 45.58 electrons - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.500188x10-02 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =</p>
<p>Q = 23.85 Mev</p>
<p> Known Equation:</p>
<p>3. [(2 Hydrogen 1) + (2 Hydrogen 1) -&gt; (3 Hydrogen 1) +
(1 Hydrogen 1) = or,</p>
<p>[(2.014102 amu + 2.014102 amu - 3.016050 amu - 1.007825 amu)] x
(931.5 Mev/amu) = Q = 4.03 Mev</p>
<p>My Equation: </p>
<p>Host Element = (3 Hydrogen 1) + (1 Hydrogen 1)
[(3 Hydrogen 1) + ( 1 Hydrogen 1) - 1877.389 Mev + 1.811 Mev] =
[3.016050 amu + 1.007825 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.010372 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 Hydrogen 1)</p>
<p>(2.014102 amu - 2.010372 amu) = 3.729582x10-03 amu excess mass
convert to electrons</p>
<p>(3.729582x10-03 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
6.798641 electrons</p>
<p>Now the fusion of Deuterium atoms
[(2 Hydrogen 1) + (2 Hydrogen 1) + 6.799 electrons - 1877.389 Mev
+ 1.811 Mev - (2 Hydrogen 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 3.7296x10-03 amu - 2.015447 amu +
1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =
Q = 4.03 Mev</p>
<p> Known Equation:</p>
<p>4. [(1 Hydrogen 1) + (1 Hydrogen) -&gt; (2 Hydrogen 1) +(electron)=
[(1.007825 amu + 1.007825 amu - 2 electrons - 2.014102 amu)]
x (931.5 Mev/amu) = Q = .42 Mev</p>
<p>My Equation:</p>
<p>Host Element = (2 Hydrogen 1)
[(2 Hydrogen 1) - 1877.389 Mev + 1.811 Mev] =
[(2.014102 amu - 2.015447128 amu + 1.9441763x10-03 amu)] =
5.990302x10-04 amu</p>
<p>The element whose mass is closest to the new unstable "element"
is (1 Hydrogen 1)</p>
<p>(1.007825 amu - 5.990302x10-03 amu) = 1.007226 amu excess mass
convert to neutrinos</p>
<p>(1.007226 amu x 931.5 Mev/amu) / (.42 Mev/neutrinos) =
2,233.884 neutrinos</p>
<p>Now the fusion of 1 Hydrogen 1 atoms</p>
<p>[(1 Hydrogen 1) + (1 Hydrogen 1) + 2,234 neutrinos - 2 electrons
- 1877.389 Mev + 1.811 Mev - (1 Hydrogen)] x 931.5 Mev/amu =
[(1.007825 amu + 1.007825 amu + 1.007226 amu - .001097 amu
-2.015447128 amu + 1.9441763x10-03 amu - 1.007825 amu)]
x 931.5 Mev/amu = Q = .42 Mev
</p></xml>

681
regexConsp/compse.xml Normal file
View File

@ -0,0 +1,681 @@
<xml><p>
The Computational Self
by Robert M. Galatzer-Levy, M.D.
180 North Michigan Avenue
Chicago, Illinois 60601
CIS PPN 72255,1101
This is a paper original delivered at the First Annual Mathematics
and Psychoanalysis Meeting in New York, N.Y. on June 6, 1988. Any
comments are very welcome.
What I have to say today is more by way of posing a problem
and indicating an area where I suspect the solution to lie than a
coherent presentation of a new theory. I am going to talk about
some elementary ideas from a branch of psychoanalysis called self
psychology and some elementary ideas from computer science that
seem to me to provide a framework for thinking about the self of
self psychology and then invite you all to let me know whether what
I have said has made sense and whether you can see directions for
the development of these notions.
Freud's effort to explain mental life on the basis of drives
that are the psychological representations of biological
disequilibria fell on hard times as he tried to work out the theory
in detail. He introduced a new entity, the ego, dangerously close
to a homunculus within the mind, that performed certain functions
and vigorously protected itself from being "overwhelmed" or
traumatized. The ego's functions included managing the persons
relation to reality, regulations of drives, object relations,
thought processing, defensive functions, perceptions and motor
activity, and integration of all other psychological functions -
its so called synthetic function.
The concept of the ego became the center of American
psychoanalytic theory in the forties ,fifties and sixties. Despite
heroic, rigorous efforts to sharpen the terms's meaning, the
confusion Freud left between the ego and the subjective experience
of the self continued. This persistent confusions was not merely
the result of intellectual sloppiness. Nor was it, as Bruno
Bettleheim proposes, the result of Freud's English translators'
discomfort the soul-like implications of the Freud's original idea.
The difficult is more fundamental. The terminologic and theoretic
confusion reflected a clinical reality.
It often happens that people who functioned badly in the areas
called "ego functions" also have major disturbances in their
experience of the self and that the two types of difficulty are
exacerbated or diminished in concert. The idea of the ego as a
unitary entity is not just as a convenient, if confusing, name for
the set of functions described earlier, a sort of waste basket for
what is neither id nor superego. The term reflect the commonly
observed covariation in these functions.
The systematic exploration of the self experience began in
psychoanalysis in the years following the second world war, though,
of course the concept of self has been the object of study since
the dawn of civilization. Although he had significant
psychoanalytic precursors, notably in the work of Paul Federn, Erik
Erikson was the first to propose that the core of much
psychopathology lies in disorders of self experience. Erikson's
concept of identity, which amalgamated the many sources of beliefs
about who one is is both evocative of common experience and proved
clinically useful. Many kinds of difficultly, as well a normal, and
supernormal psychological development can be usefully explored as
experiences of loss or diffusion of identity or attempts to
establish a satisfactory identity where one was lacking.
Erikson's work is problematic from a psychoanalytic point of
view for two reasons. First, reading Erikson carefully one
discovers that his wonderful portrayal of emotional states through
imagery, metaphor and clinical detail is not matched by explicit,
clear theoretical formulations. Second, his writings often focus
on external environmental effects rather than people's
psychological worlds and the manner of their construction.
Erikson never systematically described his therapeutic
approach to his patients. However, it is clear that he consistently
placed a positive connotation on his patients' struggles. He
demonstrated how manifest psychopathology could be understood as
potentially successful attempts to achieve valuable identities,
that while there might be difficulties in the way the patient's
basic project and his ways of attempting to accomplish it were
closer to healthy development than the patient or the society might
recognize. Erikson's psychobiographical studies of Luther, Gandhi,
Hitler and Shaw are messages to readers, many of them young, about
the value of their struggles to form workable identities. Erikson's
implicit view is that an appreciative stance toward the patients'
struggles which include or dominated by external realities is
therapeutic.
In the years following the second world war Harry Stack
Sullivan, observed that the experience of the self of many of his
schizophrenic patients was grossly disturbed. Borrowing from the
Chicago School of Sociology, most notably George Herbert Mead,
Sullivan conceptualized the self as a summation of social roles,
some of them retained without full awareness from archaic periods
of development. In this "interpersonal theory" of psychology
pathology resulted from a self system that was internal incongruent
or problematic in terms of the environment. Therapeutic
intervention consisted in understanding and appropriately revising
the self system in the light of more mature and current
understanding. What is central to our discussion is Sullivan's view
that the self system was both the product of the external
environment and made no sense whatever outside of a social system.
Several analysts, notably Klein, Winnicott, Khan, Fairburn,
Bion, Spitz, and Modell emphasized the role of holding environment,
environmental container or the "mother" in the development of the
self. From their very different perspectives each emphasized how
the self's growth required an external situation of being "held"
as the emerging and vulnerable self gained strength and autonomy.
People whose psychopathology centered in problematically self
development, a condition that all these authors equated with
difficulties in the first two years of life, could work out their
problems if provided with an analytic situation that allowed them
to reengage those phases with the analyst experienced as the
archaic maternal environment of that era. Some of these analysts
believed, like Melaine Klein, that these very early situations
involved inherent conflicts that now be resolved through
interpretation in analysis. Others like Donald Winnicott held that
new experiences, "beyond interpretation," with a good-enough object
were needed so that the developmental failure could be righted
through new development. The theoretical formulations of many of
these authors was either so inherently fantastic, or so abstruse,
or so unsystematic that their work has had relatively little
influence on psychoanalytic theory beyond the range of their
immediate followers. It is only now being integrated into the
mainstream of psychoanalytic thought.
Margaret Mahler and her coworkers also concerned themselves
with he early development of the self. They centered their
attention on the era of late toddlerhood that involved the
difficulties of the child emerging from a state they called
"symbiosis" in which the experience of the self includes the care
taking environment into a state of being an individual in one's own
right. Based on treatment experiences with youngsters and adults
who seemed to have difficulties in the area of the self experience
and observations of toddlers, which unfortunately were dominated
by their preexisting theory, Mahler and her group concluded that
much of the difficulty in self experience arose from a failure to
adequately separate from the mother of infancy. Although there are
many well informed analysts who would disagree with me, I will
assert that the overwhelming data of infant and later developmental
studies demonstrate that Mahler's symbiotic phase is not part of
normal development nor is separateness, in the sense she meant it,
characteristic of ordinary or healthy more mature psychological
function.
However the clinical observations that lead to Mahler's
thinking and that have been explained in terms of her theories are
certainly common. That is, there are many people who seem to have
shaky experiences of themselves and function with a conflicting
notions that on the one hand they desperately need other people if
they are to function at all reasonably and that some core aspect
of themselves is in danger precisely in these urgently needed
interactions.
Starting in the sixties in Chicago Heinz Kohut initiated a
psychoanalytic study of disorders of the self. His approach to
these researches was methodologically distinct and is worth a
moment's pause. First he took a radical position, that he claimed,
incorrectly at the time, to be a standard one, that psychoanalytic
data was collected in a manner different from that of the natural
sciences. He asserted that it is possible and usually to
immediately comprehend complex psychological configurations in
others and that such understanding ordinary mode of operation of
the working analyst. Empathy for other's internal states, as a mode
of comprehension, was, for Kohut, similar to the way we perceive
faces - as a complete and immediate gestalt. Analytic training and
technique are designed to maximize the analyst's ability to use
this investigative tool and to overcoming its pitfalls, just a
training in microscopy enables us to vastly extend ordinary visual
capacities. While Kohut claimed to be making explicit what everyone
did anyway, his position, right or wrong, was deeply antithetical
to Freud's view of psychoanalysis as a natural science-like
investigation and also Hartman's explicit statements that empathy
in the sense that Kohut meant it had no appropriate role in
psychoanalytic investigation.
A second, and less problematically, position about
psychoanalytic investigative method was Kohut's position on
transference. In his early writings on self psychology Kohut
assumed that the only data to be taken seriously in psychoanalysis
were the data of the transference. The various stories the patient
told, the analyst's conceptual framework and responses and all the
other stuff the analyst commonly use to frame a picture of the
patient's psychology was of minimal importance compared to the job
of describing and understanding the interaction between patient
and analyst. Kohut also believed that premature interpretations to
the effect that the patient was avoiding knowing something about
himself often interfered with the full blossoming of the
transference. According to Kohut, premature interpretations,
particularly premature interpretations of defense often resulted
in the analyst discovering evidence that confirmed their
preexisting notions because they misunderstood possibly contrary
clinical facts as representative of the patients' avoidance of
already known realities.
Using empathy and the exploration of transference as their
primary tools, Kohut and his students treated a group of patients
whose distress took three overlapping forms. One group of patients
suffered from feelings of depletion, emptiness, triviality and/or
fragmentation. These experiences often took symbolic expression in
the form of hypochondriasis. Another set of patients were engaged
in activities that seemed enormously driven or addictive such as
sexual promiscuity and perversion, shop lifting, desperately
clinging relations to other people and substance abuse. Finally,
some of the patients had chronic and acute states of tantrum like
rage.
In analysis, at least as conducted by Kohut and his followers,
these patients developed characteristic attitudes to the analyst
that Kohut labeled selfobject transferences. Characteristically,
often against considerable internal resistance, these patients came
to experience the analyst as essential to their well being. His
physical or psychological absence variously precipitated great
distress and/or the reemergence of symptoms that had been
previously remitted. For example, a young man who had entered
analysis much distressed by his promiscuous homosexual behavior
reported what for him was a major business success during a
session. The analyst, noting that the patient's anxiety had
interfered with an even greater accomplishment, made the plausible
interpretation that the patient had inhibited himself from doing
even better because he experienced his business competitor as like
the analyst and feared the analyst's reprisal if the patient beat
him in competition. The interpretation was bolstered by several
significant details that made it plausible and the patient thought
it was "right on the mark" and promised "to try to do better next
time." Retrospectively he said he had felt irritable and "headachy"
during and immediately after the interpretation was given. That
evening he returned to a gay pornographic movie theatre were there
was much sexual activity among the patrons. Before the analysis
this was one of his regular haunts but he had stopped patronizing
the theatre many months before. The patient allowed several men to
perform fellatio on him. He felt angry and painfully excited as he
thought the fallators really appreciated what he had. In response
to what he felt was the analysts inadequately appreciative response
the patient had desperately turned to a more concrete indication
that someone could appreciate his accomplishments. Another patient
experienced every weekend as "like being sent away to live in the
Sahara in a desert" and the return to the analysis as "like coming
back to the oasis."
When their feelings are not interrupted these patients like
these experience the analyst in characteristic ways that Kohut
described with oversimplifying systemticity. Some patients
idealized the analyst seeing in him the embodiment of strength and
good and feeling alive and whole in his presence. Others find
relief in the sense of being in a unity with their analyst, or
being like him or being appreciated by him. Interruptions in these
states of mind commonly bring with them inordinate distress or
symptoms which could be reasonably understood as experiences of a
fragmented or devitalized self or attempts to avoid those
experiences.
From these clinical experiences Kohut posited that there were
a group of people for whom the maintenance of a satisfactory self
experience was centrally important because it was so problematic.
The analyses of these patients was characterized by the use of the
analyst to maintain the a cohesive and vital self by using the
image of the analyst as part of the self or as a support for the
self. Any interruption in the capacity to use the analyst in this
manner lead to the reemergence of problems in this area. The
situation within the analysis was equated with postulated normal
developmental states in which the caretaker ordinarily performs the
functions for the self. These functions Kohut called selfobject
functions and he believed his patients to be suffering from
disorders of the self resultant on traumatic failures of early
selfobject functions. As in normal development small, empathically
supported, failures in the selfobject function allow patients to
identify with the image of the way the analyst should have
functioned and to make those functions more their own. However
mental health does not consist in giving up self objects. Kohut
asserted that selfobject functions normally continue across the
course of life and that it is their qualities, not their existence,
that is altered with maturity. (Having made this assertion Kohut
never elaborated or demonstrated it. Recently Bertram Cohler and
myself have undertaken the task of exploring the empirical evidence
for Kohut's position.)
Kohut's findings, and the findings of many of those who have
examined the psychology of the self from other viewpoints, have
been questioned in too apparently distinct ways, whose
interconnection I will show you in a moment.
The first objection is that Kohut's theories serve to avoid
painful psychological truths. Many of the phenomena Kohut observed
had been observed previously and classified as defensive
operations. For example, idealizations of the analyst were commonly
understood as ways both to avoid knowing of the unconscious
demeaning of the analyst and to arrange for disappointments when
the analyst fails to live up to the idealization as he inevitably
must. The idea that the patient "needs" the analyst to function in
some certain fashion lest his core being be seriously damaged could
be understood as a fantasied misunderstanding designed to
rationalize wishes whose non-fulfillment may be extremely
frustrating but not inherently, must less psychologically fatally,
damaging.
The second set of objections has to do with the theory of the
self. Kohut never clearly defines his central concept of the self.
Essentially he says that everyone knows from experience what the
self is and leaves it at that. After studying the many discussions
of the meaning of the "self" in the psychoanalytic literature one
is reminded of the Buddha's comments on the self. He said that
those who believe in the self are like "a man who says that he is
in love with the most beautiful woman in the land, but is unable
to specify her name, her family or her appearance" (Digha Nikaya
I 193, quoted in Carrithers (1983).) The essential theoretical
difficulty was clarified by Meissner who pointed out that the term
self as habitually used by Kohut and most other writers whose work
places the self at the center of psychological life, is
consistently used to refer to both a psychological representation
and also a psychological agent. Although more systematic
researchers, for example Hartman, limit the concept of self to a
psychological representation of the person, they also give the self
a markedly subsidiary role in psychology. Meissner's argument is
quite similar to Schafer's later discussions of internalization in
which Schafer observed that the elaborate analytic theories of
internalization were in fact nothing more then the translation into
psychoanalytic jargon of unconscious fantasies and did not, in his
view represent, represent actual psychological mechanism and in
fact obscured, what actually happens when we have experience that
had been described as the taking in of another person or aspects
of that person.
The two problems with self psychology, its use as a defense
against painful insight and its confusion of agent and image, are
related. Notice that if the self is "only" a psychological
representation it would follow that the patient's idea that had
will be dysfunctional as a direct result of some impairment in this
representation seems mistaken - or at least so it seemed to many
thoughtful psychoanalysts. Only the impairment of some mental
agency could really result in dysfunction. It was if the patient
complained that his car did not function because part of a picture
of the vehicle had been obliterated. The idea that the patient is
in error in this regard supports the clinical stance that the
patient's fears in these matters are not an accurate assessment of
the situation but rather fantasies motivated by their unconscious
desires to hide deeper psychological realities.
Now of course we all know that there are "mere"
representations that are very good for actually doing things and
whose faultiness causes no end of problems. These representations
are called programs.
Now, I suspect that once stated the notion that the self is
a program which like other programs is capable of change by
altering its representation and at the same time is an active agent
is neither a surprising or remarkable idea. However, when one
notices that fifty years or so of both clinical and theoretic
psychoanalytic thinking about the self has been profoundly
influenced by the idea that the existence of such an object is a
logical impossibility the point seems more worth making. The other
advantage of making this point is that it invites us to use what
we know about programs to think about the self and suggests the
systematic characterization of the self as a program.
Let us begin the selfobject function whose enemies are want
to equate it with some form of mysticism. We know, of course, that
programs have meaning and function only within computational
environments. An inappropriate computational environment can alter
the meaning and operation of the program or render it altogether
meaningless. For example a routine that calls a global variable
gives a different value depending on the value of that variable;
a program written in C for which one has no compiler is totally
useless. The use of the term "computation environment" in computer
science is relative to the process being discussed and only has
meaning once one specifies what program is being referred to. An
expression only has meaning within an environment. Having bound a
global variable that value then becomes part of the computational
environment of the programs running within that context. Of course
from a different viewpoint the program that sets up the environment
for our first program itself has an environment. Thus ordinarily
we expect that program will "need" appropriate environments in the
same way that self psychology predicts that people need
selfobjects.
What one chooses to call program and what environment
obviously effects the picture of the situation that emerges and is
a function of the interest of the investigator. Similarly the
boundaries of the self depend on the point of view we adopt based
on the focus of our interests. It is only important to notice that
the choice is ours, not intrinsic to the system under study and
that it is important not to become confused about the principles
governing the entities we have defined. A few decades ago von
Bertalanfy made a minor industry of pointing out the inappropriate
application of conservation principles to "open" systems that were
mistakenly treated as having no energy flux across their
boundaries.
The mechanics of the selfobject or the environment is
naturally important but by no means definitive in terms of its
function. In one since it is obviously of considerable importance
whether a subroutine that is called is available in RAM, is
currently located on a easily accessed storage device or is located
on a tape that the machines operator must fetch and mount before
it can be used. In another sense these mechanical considerations
are of minor importance in our understanding of the program.
Likewise whether the capacity to be soothed is a readily available
group of psychological functions represented within the cranium,
the activity of a caretaker who is but a cry away or requires some
elaborate undertaking - say a few years of psychoanalysis - can be
regarded as involving no essential difference in this function.
Although he never would have put it in this way this is an
essential aspect of what Kohut was trying to point to in the idea
of the selfobject - something that functions as an essential aspect
of the self or of the support of the self but which because of the
mechanics of its availability is at times less efficiently
accessible than other aspects of the self that we are more
accustomed to including in our idea of the self. This computational
relative inaccessablity commonly is associated with the need for
particular perceptual inputs and computational assistance.
For instance the phenomenon of "social referencing" has been
studied extensively from a social psychological point of view.
Starting at about age seven months given a novel situation or a
situation with elements that suggest danger babies look to
caregivers for cues about whether to proceed and base their actions
on the caretaker's response. Toddlers as they move away from mother
in a play ground frequently turn around, checking mother's
expression before proceeding further. In the toddlers experience
the decision does not take its basis in the issue of whether
mother, as a person approves or disapproves of the action, rather
the mother's approving response registers as an impersonal "It is
okay." The toddler has not called the person "mother" in this
situation but has rather expanding his computational resources
which happen at the moment to be located in the being we would
refer to as his mother. The child needs loves nor hates the mother
in this context but does need her to function. If she is
functioning well like any computational resource he remains unaware
of her presence. It is only her failure of availability that makes
her of interest, just as we are generally unaware of our memories
except when we have difficulty recollecting something we need to
continue our thinking.
Those of you familiar with Marvin Minsky's work recently
summarized in The Society of Mind will recognize in these ideas a
particular application of the multi-hierarchy computational model
that can be used to explore processing within many levels of human
function from neurons to societal organizations. The issue of a
non-pejorative attitude to what we call mysticism comes to mind
here. Much of what is referred to as mystical might well be
considered as attempts to comprehend hierarchically higher
computational structures within the computational world of lower
order entities.
The self as a program does two important things that are the
subject of our constant attention in our analytic work. The program
monitors its own operation and ordinarily modifies itself in
response to such monitoring. The type of programs we are familiar
with in daily work with computers generally have facilities to
monitor and modify their own execution to a limited extent. Error
trapping of one type or other is virtually universally employed so
that unexpected or undesirable situations do not result in the
continuation of "business as usual" but instead lead to some kind
of branching in the process. In an "error" situation the new
execution often takes the form of enlarging the computational
environment to include the operator who is asked how to proceed or
to correct some situation that impedes the computation or to
authorize the use of additional computational resources. For
example if the execution of a program requires more than a certain
amount of time the systems operator may be asked whether to
continue or abort the execution.
Similarly, but much more extensively, the self is engaged in
a constant process of monitoring its own function and functional
needs, arranging for them to be met or attempting to compensate for
their not being met. We have already implicitly discussed the
ongoing monitoring of computational resources and the recognition
of the need to evoke devices such as the perception of other people
to serve as selfobjects. The detailed study of the nature,
functions and situations in which these additional computational
devices are called or where calls to such devices is avoided
constitutes a major area of psychoanalytic investigation that
encompasses much of object relations theory, including self
psychology, attachment theory, the concept of the transitional
object and the role of cultural experience.
In the von Neumann architecture computer design was dominated
by the wish to avoid programming errors. This was accomplished by
carefully separating data, programs and processing functions and
forcing sequential processing so that except in terms of the
overall duration of computation the outcome of a computation was
unaffected by the time required for each computational step.
Furthermore building this basic architecture requires the
anticipation at least the basic architecture of the system from
its beginning. It cannot result of the evolutionary piecing
together of elements designed for other functions as the brain must
have evolved.
The von Neuman architecture is so excellent an environment for
humans to design programs for that it dominated computer design for
almost four decades. However as von Neumann noted from early on
this architecture is a poor model for brain functioning. The
microsecond firing times of neurons are much to slow to allow
brains to do the things they do all the time with a von Neumann
machines. Furthermore brains are the result of a bioevolutionary
process, not a unitary design and its programmer is not an
individual who sets out to explicitly specify processes but an
environment with many other things on its mind than programming
brains. Of course we know from direct study of brains that they
operate through massively parallel processing.
Fortunately for those of us interested in brains and their
productions it has become clear that the technological limitations
inherent in the von Neumann architecture make it essential that
other architectures be explored in depth to make more capable
computers. The last five years has seen an explosion of
publications about parallel processing architecture and we will be
among the beneficiaries of the resultant intellectual advances.
But, of course, the problems that von Neumann sought to avoid
in computer design are precisely the problems that emerge in
parallel processing. It is simply much more difficult to predict
what is going to happen when things do not go on sequentially, when
the distinction between memory and processing is abandoned and
simple hierarchies of bindings are abandoned. Now rather then
building the absence of these difficulties into the architecture
of the system it becomes necessary to discover ways to overcome
them. A much more elaborate system of error trapping and control
becomes essential.
Parallel systems are highly vulnerable to internal conflicts
and instabilities. Attempts to remove these features from the
system usually entail the loss of precisely what has been gained
through parallelism. To give an very elementary but quite everyday
example, when a database can be updated through several different
inputs there is considerable danger that attempting simultaneous
updating of a record will result in loss of data or undesirable
results. Suppose I am making a deposit in my savings account at the
same time that interest is being calculated and recorded in the
same record. In many database systems the entire record is
retrieved updated and stored again. So in this instance the
original record is retrieved by both the deposit and the interest
function. Each, independently updates the record and then writes
it to the storage device. Either the deposit or the interest
payment, whichever is stored last, will be recorded but not both.
A simple solution that is used in many database systems is to make
the record available to only one potential input at a time by
locking it to other users while it is in the hands of a potential
inputter. In essence one suspends parallel processing and goes to
sequential processing in the face of such potential errors. This
is an awful solution for simple database management, although as
anyone who has worked with such a system knows it can be thoroughly
annoying. But such a general solution for a massively parallel
system would slow the whole thing to a snails pace. Thus special
mechanism for recognizing, protecting against and resolving
conflicts are expected to be a central aspect of massively parallel
system.
But notice how close we have gotten to the ordinary stuff of
psychoanalytic clinical work. A lot of what we do in analysis has
to do with successes and failures to resolve conflicts between
computational results achieved through parallel processing of
situations. To give a much oversimplified instance, a young man
who might displace a supervisor by putting forward his own ideas
expresses them but muddles their presentation. Analysis reveals
that his actions result from two parallel, conflicting computations
and an attempt to resolve that conflict. On the one hand are a
variety of factors including his wish for greater prestige and
material wealth that in turn reflect a long sequence of
developmental processes and on the other his assumption (which is
outside of awareness) that he will be harmed in various ways if he
pursues these wishes results in a state of conflict. This conflict
and potential conflicts are dealt with variously by some higher
order resolutions or through the isolation of the processes from
one another by a variety of means. The resulting action,
unfortunately called a "compromise formation" in psychoanalytic
jargon is an attempt to synthesize the results of these two groups
of computations.
An even greater danger to the system than partially
contradictory computational results is its own instability.
Computational process may become chaotic, disorganized or pass
through a catastrophe as we recognize in depth when we study them
in terms of dynamical systems. It is reasonable to expect that a
computational system can only function in anything like a
satisfactory manner if such situations is rigorously limited to
lower levels of function and if the system has extensive safeguards
against higher level catastrophes or chaos.
Again this is precisely what we find clinically. The most
central concerns in disorders of the self frequently are concerns
about discontinuous and disorderly change. A typical error trapping
procedure in the area where catastrophic change seems a danger is
to avoid all change whatsoever and to attempt to isolate the
computational processes from outside influences that might result
in change. Recently I described how the process of working through
in psychoanalysis, the repeated reexamination if slightly different
versions of paradigmatic situations within an analysis, could
usefully be regarded as the reestablishment of a Boltzman
algorithm-like psychological function by which existing "solutions"
are repeatedly and automatically reexamined both to achieve greater
optimality and to integrate data that may have been unavailable at
the time they were formed. I said that much psychopathology could
be usefully characterized as the interruption of this ordinary
process in the face of a perceived threat of disruption or
disorganization and that what we often think of as the curative
factor of working through is just the resumption of normal
psychological function.
This brings us to the third way in which the self differs from
the programs we are most familiar with from the study of computers.
The self is self developing. Here my opinions are somewhat
different from many of my psychoanalytic colleagues, so let me
spell them out briefly. As she attempted to explore the concepts
of normality and pathology in childhood, Anna Freud discovered that
the presence or absence of symptoms per se was not an adequate
guide in assessing children. She concluded that childhood was
normatively a period of change and development and these were its
primary tasks. The failure of such for such development to be
ongoing was the essence of psychological disturbance in childhood.
For Anna Freud, who had a clear picture of what psychological
health was like in adulthood, the task of childhood was move toward
such mature functioning and she posited a drive to "the completion
of development."
Three groups of observation impressed me into extending her
notion. First the past quarter century has yielded a massive
demonstration that human development normal continues across the
entire life course - that the idea of a definite mature
developmental state whether occurring with the resolution of the
Oedipus complex or the end of late adolescence or whenever else is
mistaken. Second there seem to be quite diverse ways to be
psychologically healthy which becomes readily apparent if we avoid
employing a priori notions of the meaning of health. Finally the
work begun by Marsh to the effect that programs can be written not
with specific goals in mind but rather that proceed to explore and
develop in area that are vaguely defined by such criteria as
"interestingness" corresponded so well to the observations of
workers like Piaget who found that exploration and development were
self motivating that it seemed likely that the human mind is such
a system. It thus seems reasonable to posit that an ongoing
function of the self is its own reorganization and development.
Indeed it was this point that first led to my interest in a
computation model of the self because the question of how the self
could be both agent and representation and in particular how it
could be an agent acting on itself as a representation has a long
standing concrete instaniation in Lisp. Lisp, one of the two oldest
high level programming languages in common use, was specifically
designed to manipulate list of symbols. Of course lisp programs are
themselves list of symbols so that lisp programs can be operated
on my lisp programs including the program itself. The species that
seemed so internally contradictory that analysts denied there
existence have in fact been around for a long time.
Now, of course such programs are not without very serious
problems - in particular they too can be much less stable and far
less predictable than those programs were program and data are kept
strictly separate. As with parallel processing one way to protect
from the dangers inherent in such a structure is to carefully limit
in advance the changes the program can make in itself. Another
possibility is to monitor the development of the program and
introduce error trapping and correction as untoward consequences
of the rewriting occur. A combination of the two approaches would
seem to be necessary. In a sequential system for example a fatal
error occurs if a real interminable loop is introduced into a
program. Here, however, parallelism and conflict can be of
considerable help. Freud's idea of a tripartite model of mind
essentially involves the parallel processing of data, the
consequent development and resolution of conflict so that a variety
of needs can be met through these various modes of processing. In
particular aspects of the mind can monitor the ongoing process of
the development of the self - interrupting and altering it when it
comes parlously close to instability or stagnation.
The hierarchical level at which these process can proceed are
various and new levels in the hierarchy seem to develop with
greater maturity. In particular greater capacities for abstraction
both from data and process appear to be a normal part of human
development. With these capacity comes increased abilities for
metacognition. Piaget's observation of the progressive decentering
of cognition with the related capacity, for example to think about
thinking, represents such an elaboration of abstraction
hierarchies.
Among the many objections that could be raised to my
discussion is the importance I lay on introspection and
subjectivity as a source of information about psychological
processes. From a computational viewpoint consciousness is an odd,
unnecessary, or at least peculiar phenomenon, while from the point
of view of classical psychoanalysis precisely what is most
interesting about people is barred from the conscious awareness.
Thus subjective reports about experience should be relatively
uninteresting to both groups. However, following Vygotsky and
Basch, I take a different point of view about consciousness.
Consciousness is a state that we employ when automatic functioning
becomes problematic. For example we only become aware of walking
when we stumble or when we are learning how to do it and only
attend to it in detail if something impedes are ability to walk.
It is thus precisely in areas of difficulty that we expect
awareness to appear. So it is the areas of difficulty that we
should find well represented in consciousness. Freud's idea of
bringing the unconscious into awareness then is nothing more then
the extension of this normal process into areas in which it is not
employed. In particular the mechanism of repression reflects a
special procedure to keep ideas separate from each other by not
bringing them into awareness. But more generally we can use
subjective experience as at least a preliminary guide to the
computational difficulty.
I am well aware of having painted the picture of the
computational self with extremely broad strokes and having done
violence to many subtle and important issues in the process. At the
same time I am impressed that psychoanalysts having discovered that
the Freudian and ego-psychological paradigms are inadequate have
largely abandoned the attempt to develop broad theories that
encompass the particular data of the psychoanalytic field, choosing
instead to focus on smaller more tractable problems and maintaining
an unavowed theoretical agnosticism.
An exception to this abandonment of theory lies in the work
of the self psychologists. However their conceptualizations,
especially those of Kohut, while evocative remain vague. I think
it is clear that the computational properties of the mind must find
representation in personal psychology. I have suggested one
possibility for how this may occur using the computational self as
the central organizer for my thinking and attempting to show how
ideas from computer science may yield models that are congruent
with our clinical experience. Just as I believe development is the
central activity of the self so to I believe development should be
the central goal of our intellectual activities. Thus if this
paper, despite its flaws does nothing more then stimulate some of
you to think along these lines and to help me do so more cogently
I will be satisfied.</p></xml>

1609
regexConsp/consp.xml Normal file

File diff suppressed because it is too large Load Diff

213
regexConsp/conspire.xml Normal file
View File

@ -0,0 +1,213 @@
<xml><p>From: Alan Lustiger <special>alu@pruxp.pr.att.com</special>
Newsgroups: rec.humor.funny
Subject: 25 QUESTIONS AND ANSWERS ABOUT THE "ATOM BOMB"
<info type="Message-ID"> S4dc.13e2@looking.on.ca</info>
Date: Tue, 12 Jan 93 4:30:03 EST
Lines: 209
25 QUESTIONS AND ANSWERS ABOUT THE "ATOMIC BOMB"
1. Is there any evidence that a thermonuclear device exploded over
Hiroshima in 1945?
No, absolutely none. According to leading historians and physicists,
the thermonuclear bomb was not invented until years after the supposed
detonation over Japanese territory.
2. Is there any evidence that a uranium-based "atom bomb" was ever dropped
onto Nagasaki, Japan?
Absolutely not. While many historians and journalists made this claim
in the late 40's and early 50's, everyone now agrees that no such
bomb ever exploded over Nagasaki. Yet there are some who still stubbornly
cling to this supposed "fact."
3. What are the materials needed to make an "atom bomb?"
Uranium-238 and plutonium-239.
4. Aren't these materials radioactive?
Highly so. Anybody who attempts to use these materials is endangering
his/her life.
5. Is it likely that nuclear scientists in the 40's would be
handling uranium and plutonium?
This would be highly unlikely. Very few people felt so threatened
by the Japanese to be willing to risk their lives on a theoretical
chance of a superbomb that could end a far-away war a little sooner.
6. Aren't there witnesses to the atomic bomb in Hiroshima?
The only "witnesses" that could possibly survived this supposed
explosion would have been blinded by the intense flash of light,
so their testimony is quite unreliable and contradictory.
7. According to conventional historians, was the uranium bomb tested
before supposedly being dropped over Hiroshima?
No. There was no testing whatsoever of a uranium bomb in Alamogordo
or anywhere else before Hiroshima.
8. Isn't that strange?
Yes. Typical weapons are tested for months and years before deployment;
there is no other weapon that according to the accepted "facts" deployed
before any testing whatsoever.
9. How many witnesses are there for all of the atomic tests allegedly
occuring during the fifties and sixties?
Very few, perhaps a few hundred, who claimed to have seen them.
10. What did the General Advisory Committee of the Atomic Energy
Commission say in their report of October 30, 1949?
They recommended strongly against the development of what they
called the "Super Bomb," which is simply a thermonuclear
bomb. They said that "A super bomb might become a weapon of
genocide."
11. Isn't this four years after Hiroshima and Nagasaki?
Yes. Obviously development of nuclear weapons occurred well
after their supposed implementation in 1945.
12. Is radioactivity dangerous?
Everything is radioactive to some extent.
13. What was the triggering method of the bomb that supposedly
was dropped on Hiroshima?
According to the standard historical accounts, it used a gun-
assembly trigger.
14. Wasn't the gun-assembly method of triggering abandoned
in the design stage?
Yes; according to these same sources the gun method would not
work with uranium-derived plutonium-239 because some of the
plutonium-239 absorbs a neutron to become plutonium-240, which
undergoes spontaneous fission, all before supercriticality,
causing a premature and very small explosion that is unusable
for the very purpose that it was supposedly designed for!
15. How do conventional historians rectify these two "facts?"
They don't even attempt to.
16. How many books have been written about the atomic bomb?
Many hundreds, as well as thousands of articles in magazines
and newspapers.
17. Why was Hiroshima "targeted," and not Tokyo?
Perhaps because no one had heard of Hiroshima, and no one knew anyone
from there. It would be far more difficult to claim that Tokyo was bombed
than Hiroshima and Nagasaki. In fact, most world maps from before "World
War Two" do not even mention these cities at all.
18. How does Japan benefit from the "atom bomb" story?
As a direct result of the "war," Japan has received billions of dollars
worth of US aid for its defense. Japan has essentially no defense
budget, so it can pour resources through MITI into defeating the US
economically, all while playing on the emotions of anti-"nuke" activists
about the "horrors" of nuclear weapons.
19. Wow, I never thought of that. How else do the Japanese
benefit from this story?
The Japanese now own major Hollywood studios, from which many war
movies are produced. Also, they play upon our sympathy for the
supposed "atom bomb" to blind us to the fact that this foreign
nation had taken over our semiconductor industry, many California
banks and practically the entire state of Hawaii.
This is all a part of the Japanese plot to take over the world.
According to the "Protocols of the Elders of the Orient," this
is a Japanese conspiracy all foretold by their ancient texts
that very few Anglo-Saxons have the ability to read.
19. How many people are supposed to have died in the explosions?
It is hard to say. Some sources say 60,000 in Hiroshima, others say
140,000. No attempt has been made to rectify the various numbers.
20. How many people die annually from car accidents in the US?
Over 50,000.
21. So, what makes Hiroshima so special?
Nothing, especially given the contradictory evidence about it.
22. Boy, I'm mad. What should I do about this?
Glad you asked. First, send me lots of money so we can spread this
message far and wide. Maybe we'll take out ads in college newspapers
or something.
Second, direct your anger at the Japanese. We are the victims, and
they are the aggressors. Make yourself feel important again by bashing
Japan at every opportunity. Japanese people are inherently evil, and
basically subhuman. They were never bombed, and if they would have been
they would have deserved it. Who do they think they are, anyway?
Yes, we Revisionists have all the answers. Life is a lot simpler than
you thought it was. Join us, and you won't have to be bothered anymore
by any feelings of guilt for your inherent hatred. We can justify it!
Oh, it's not the Japanese you hate, but the crippled? Hey - so do we!
It's easy: we don't like feeling uncomfortable around people in wheelchairs,
either! Who do they think they are, taking all the good parking spaces
when they were stupid enough to slip on a banana peel? IT'S A
CONSPIRACY! --See how easy it is to start? Now, just mix in a few
real facts, and start converting all of the otherwise messed-up
people to OUR CAUSE!
23. Wow! You mean that I could write stuff like this, too?
Sure! It's embarrasingly easy to write what we wrote above. In fact,
it's even superior to the usual anti-Semitic revisionist garbage,
because it has a higher percentage of REAL FACTS! Most of the
apparent "contradictions" above come from the facts that Nagasaki
was bombed by a plutonium bomb, not uranium; and that hydrogen
bombs are thermonuclear, not atomic bombs. Just juggle information
about the different types of bombs and mix them up so they seem to
be contradicting each other. It doesn't take ANY INTELLIGENCE
WHATSOEVER, and you can get lots of free air time on "48 Hours"!
Oh, I forgot to mention: I have a Japanese girlfriend who agrees
with EVERY WORD I've written above. Here she is:
"Yes, I am his Japanese girlfriend. I love him very much, and I've
always been troubled by my Japanese friends claiming to know people
who died in Hiroshima."
There you have it! Just throw some unverifiable opinions on top
of ridiculous proofs to STRENGTHEN YOUR CASE!
24. Couldn't I be arrested for this?
No! This country is founded on FREE SPEECH! But, just make sure
that you mention how much you are being persecuted for saying
your version of history. (More than three email messages a day
qualify for being called harrassment. Five may merit a lawsuit.)
25. Where can I get more information?
Go to a library. Take a book at random. Skim it. Then, decide how
that book is either for you or against you. If it is for you, quote
liberally and out of context. If against you, do the same.
DON"T LET YOURSELF GET CONFUSED BY THE FACTS! We certainly don't!
------------------------------------------------------------------
Alan LustigerINTERNET:lustiger@att.com UUCP:att!pruxp!alu
ATTMAIL:!alustiger CIS:72657,366
--
Selected by Maddi Hausmann. MAIL your joke (jokes ONLY) to funny@clarinet.com.</p></xml>

180
regexConsp/contra.xml Normal file
View File

@ -0,0 +1,180 @@
<xml><p>SOLDIER OF FORTUNE DIES MYSTERIOUSLY AFTER
TALKING TO CONGRESSIONAL INVESTIGATORS</p>
<p>by Vince Bielski and Dennis Bernstein</p>
<p> A county coroner in Los Angeles has yet to announce the
cause of death of Steven Carr, a 27-year-old U.S. mercenary who
has provided Congress with much of what it knows about weapons
shipments to the contras. Had Carr lived, he was also expected to
testified in federal court against 29 contra supporters allegedly
involved in cocaine trafficking, an assassination attempt on
former contra leader Eden Pastora and a scheme to kill U.S
Ambassador to Costa Rica Lewis Tambs.</p>
<p> While Detective Mel Arnold of the Los Angeles Police
Department said the department is investigating the possibility
that Carr was murdered, at this point he said there doesn't
appear to be any evidence of "foul play." But in the days before
his death, Carr told several people that he feared he would be
assassinated. He was "very paranoid and frightened" because of
his role as a witness, Carr's sister Ann of Naples, Fla., said.</p>
<p> Here is what the police are saying about Carr's death. He
died at 4 am on December 13 in a parking lot near his friend's
apartment in Van Nuys, Calif., where he was staying. In the
predawn hours on this Saturday morning, while his friend,
Jacqueline Scott, was asleep, Carr left the apartment for an
unknown reason. After spending an undetermined amount of time
outside, Carr began making noise which awoke Scott. Arnold said
he could not describe the type of noise Carr was making. Scott
found Carr in the parking lot, who was "distressed and having
coordination problems." Soon after he died from a "probable
cocaine overdose." Asked if the police found any physical
evidence of cocaine use in the area of the apartment or parking
lot, Arnold said "no comment."</p>
<p> Dan Sheehan, an attorney with the Christic Institute in
Washington which filed the law suit against the 29 contra
supporter, said Carr used cocaine, but called him "an educated
user." Martha Honey, a reporter for the BBC, became friends with
Carr while he was a mercenary in Costa Rica. She said Carr was
not the type of person who would kill himself because he was
under pressure. "Stevie was a survivor. He had this ability to get
himself in trouble but he always seemed to bounce back. He had a
great sense of humor."</p>
<p> The source of his fears were not just the contra
supporters whose alleged crimes he revealed, but also the U.S.
government. Carr said that while he was in Costa Rica, U.S.
embassy officials threatened to jail him if he squealed on their
contra operation in Costa Rica.</p>
<p> In April 1985 Carr was arrested by Costa Rican authorities
for violating the country's neutrality and sent to prison. Carr
was one of several mercenaries based in northern Costa Rica on
land owned and managed by a U.S. citizen and reported CIA
operative named John Hull. Evidence from several sources suggests
that the contras operate what amounts to a military base on
property controlled by Hull as well as an airbase for the
movement of cocaine from Columbia into the United States.</p>
<p> While in jail, Carr spilled the beans about the contra
operation. To reporters, he claimed that Hull had told him that
Hull was the CIA liaison to the contras and was receiving $10,000 a
month from the National Security Council to help finance the
operation. Carr told Honey why he was revealing such secrets:
"Carr said that the mercenaries had been led to believe that
their mercenary activity was sanctioned by top U.S. military and
Costa Rican officials. He was extremely bitter at having been
arrested."</p>
<p> Honey compiled information from Carr and other sources into
a book focusing on the role of Hull and other contra supporters in
the May 1984 assassination attempt against Pastora in Nicaragua
in which a bomb explosion killed eight people and injured
Pastora. Hull sued Honey, and her colleague Tony Avirgan, for
libel in May 1986. Carr received a subpoena to appear at the
trial, where he was to be a key witness for the reporters'
defense.</p>
<p> On May 16, Carr was released from jail. He later described
the events which took place in his life over the course of the
next week to Honey and an U.S. congressional aide involved in an
investigation of the arms supply network to the contras.</p>
<p> Carr said that Hull bailed him out of jail as a way of
persuading him to testify on Hull's behalf. Hull requested that
Carr testify that the reporters forced him to make the charges
against Hull, Carr said.</p>
<p> That same day, Carr said he went to the U.S. embassy to
determine why he was arrested for participating in a war that the
U.S. supports. He said he met with two officials, Kirk Kotula,
the counsel general and John Jones, the acting chief of the
consulute.</p>
<p> According to Honey's notes of her conversation with Carr
about his meeting with the officials, Carr said: "The officials
told me they knew all about Hull's contra operation and they had
me call him. He picked up the phone instantly, as if he had been
waiting for my call.</p>
<p> "They said if I go to court and testify in your behalf I'll
go to jail whether I tell the truth or not. I had no choice in
the matter. The embassy told me to get the hell out of Dodge or
I'd go back to La Reforma prison. They told me that the bus to
Panama leaves at 7:30 pm and to be on it," he said.</p>
<p> Carr spent the next three days staying at Honey's house. On
night of May 19, Carr left the house to visit a friend, and the
following day, the U.S. embassy told the court that Carr was in
their custody and that he would appear at the trial, Honey said.
However, Carr said on May 20, following U.S. embassy orders, he
took a bus to Panama, and with the help to the U.S. embassy
there, flew to Miami a few days later. Upon his return, Carr was
put in jail in Naples, Fla., for a prior offense.</p>
<p> Kotula said he had talked with Carr, but denied the he had
threatened him or forced him to leave Costa Rica. "That's not
true, at least by me. I did not threaten him with any such thing.
I couldn't do that, what would be the possible motive. I can't
put people in jail and I can't get people out of jail.</p>
<p> "I tried to convince Steve Carr when I first met him not to
go and join up with some bunch of guys. He was nothing but a
overgrown child who had read too many John Wayne comic books."</p>
<p> Jonathan Winer, an aide to Sen. John Kerry D-Mass., said
the Senator's office is investigating the matter. "There are
obviously some very serious questions regarding the U.S.
embassy's role in Steven Carr leaving Costa Rica," he said.</p>
<p> After Carr's return to the U.S., congressional investigators
said they had planned on bringing him before Congress. His
testimony, based on his participation on a March 6, 1985 arms
shipment from Fort Lauderdale to Ilogango Air Base in El
Salvador, would have linked Felix Rodriguez--the ex-CIA agent who
reportedly met with Donald Gregg, aide to Vice President George
Bush--to that weapons shipment, Sheehan said.</p>
<p> "He is the guy that can prove that the March 6
shipment of weapons that flew out of the Fort Lauderdale Airport
went to Ilopango airport," said Sheehan. "He witnessed and can
identify Felix Rodriguez as the guy who off loaded the weapons to
smaller planes which were then flown to Hull's ranch in Costa
Rica."</p>
<p> In early 1986, Carr and two other eye-witnesses told federal
authorities that several major players in the arms supply network
were involved in the shipment, including Tom Posey, head of the
mercenary group Civilian Materiel Assistance, Robert Owen,
reportedly a liaison to fired Lt. Col. Oliver North, and Hull,
Sheehan said.</p>
<p> With no criminal indictment by October, Sheehan alleged
before a congressional committee that the Justice Department had
engaged in a "willfull conspiracy...to obstruct justice....A
number of telephone calls were then placed to Mr. Kellner (the
U.S. Attorney in Miami) personally by Edwin Meese...instructing
Mr. Kellner 'to proceed very, very, very slowly' in any
investigation of this case." Kellner has said he
has talked with Meese about the case, but denied Sheehan's
allegation.</p>
<p> A grand jury has recently formed in Miami to reportedly hear
evidence about the March 6 weapons shipment. But the one person
who could have provided the grand jury with an eye-witness
account that the weapons were transported from U.S. soil to El
Salvador--evidence which is essential in making a case that the
U.S. Neutrality Act and the Arms Export Control Act were
violated--is now dead.</p>
<p> "A great deal of the information Carr provided did check
out. It will now be harder for anyone to bring a prosecution with
Steven's testimony now unavailable, and I think that is very
unfortunate," Winer said.
-----------------------------------------------------------------
e, and I think that is very
unfortunate,"</p></xml>

205
regexConsp/contrcia.xml Normal file
View File

@ -0,0 +1,205 @@
<xml><p>SECRET TEAM OF WEAPONS DEALERS
by Vince Bielski</p>
<p> A "secret team" of former CIA and military officials and
arms dealers are responsible for the covert weapons shipments to
Iran and the contras under the direction of fired White House
aide Lt. Col. Oliver North.</p>
<p> Members of the "secret team" came together in the secret war
against Cuba in 1961, and have since been involved in "political
assassination" programs in Laos, Vietnam, Chile and now
Nicaragua.</p>
<p> The "secret team," through an association with known Mafia
leaders, has resorted to opium and cocaine trafficking to
finance their operations.</p>
<p> Edwin Wilson, the ex-CIA operative convicted for selling
explosives to Libya's Moammar Gadhafi, was an active member.</p>
<p> These allegations are part of a lengthy affidavit filed this
week in a Miami federal court in support of a law suit brought
by Dan Sheehan, an attorney with the Christic Institute in
Washington. The suit names 29 alledged operatives in the contras
arms network as defendants.</p>
<p> The suit alleges that the defendants supplied the C-4
explosives which were used in the May 1984 assassination attempt
against contra leader Eden Pastora in Nicaragua in which eight
people were killed and Pastora injured. The plaintiffs, Martha
Honey and Tony Avirgan, are American journalists who are sueing
for personal injuries they suffered from the bombing.</p>
<p> The Christic Institute, a church funded public interest law
firm, has taken on controversial cases in the past, such as the
suit against Kerr McGree Nuclear Corporation on behalf of Karen
Silkwood. And it was while Sheehan was defending a sanctuary
worker that he received information which led him
into the investigation of the contra arms supply opertation.</p>
<p> In March 1984, he learned from a member of the Federal
Emergency Management Agency that FEMA had a highly secret plan to
"deputize" government and State National Guard personnel for the
purpose of interning 400,000 undocumented Central
Americans in detention centers in the event that President Reagan
launched "Operation Night-train"--a military invasion into
Central America.</p>
<p> The plan also called for the distribution from U.S. military
bases of hundreds of tons of weapons to be used by newly created
State Defense Forces, composed of civilians, who would help
enforce the "State of Domestic National Emergency" during the
invasion. Sheehan learned from a Louisiana State National Guard
Colonel that a State Defense Force in Louisiana planned to give
half of the weapons it received to the contras.</p>
<p> In Miami, former U.S. military personnel and active National
Guard units had organized a para-military organization, called
Civilian Military Assistance, to arm, train and fight with the
contras. The group, headed by Tom Posey, obtained "surplus"
military equipment from the 20th Special Forces Unit of the U.S.
Army in Alabama, Sheehan learned from a member of the group.</p>
<p> In June 1984, Sheehan was informed a man who
working with the para-military organization in helping arm the
contras also claimed to be a "personal representative to the
Contras of...Lt. Col. Oliver North." His name is Robert Owen.</p>
<p> One year later, Sheehan began putting this information into
a law suit when he learned that Posey, Owen and others
were allegedly involved in the bombing of the Pastora press
conference which caused physical and personal injury to the two
American reporters.</p>
<p> Sheehans investigation also led him to the discovery of a
"secret team" of former high ranking U.S. officials and officers
who oversaw the procurement and shipment of weapons to the
contras to to Iran. Through Posey, Owen and other they allegedly
supplied the explosives for the press conference bombing. The
"secret team" includes former high-ranking CIA officials Theodore
Shackley and Thomas Clines, ret. Air Force Gen. Richard Secord,
ex-CIA operative Edwin Wilson, and two arms dealers, Albert Hakim
(of Los Gatos) and Rafael Quintero, both of whom are U.S.
citizens.</p>
<p> In the affidavit, which cites 79 seperate sources, Sheehan
said he learned of the "secret team" from a former U.S.
intelligence officer who worked in Iran, a retired CIA officer,
and a former Air Force officer.</p>
<p> The intelligence officer discussed "the existence of a
'secret team' of former high-ranking American CIA officials,
former high-ranking U.S. military officials and Middle Eastern
arms merchants--who also specialized in the performance of covert
political assassinations of communists...(and) which carried on
its own, independent, American foreign policy--regardless of the
will of Congress,...the President,...or the (CIA)," the affidavit
reads.</p>
<p> The source said the "secret team" was set up in
1977 under the supervision of Shackley and Cline, who were then
with the CIA. Wilson worked with Gadhafi "to secretly train
Libyan anti-Shah of Iran terrorists in the use of deadly C-4
explosives," the affidavit reads. Wilson's real purpose was to
gather intelligence on the anti-Shah terrorist missions, and then
pass the information to Quintero, "who was responsible for the
assassination of these Libyan terrorists,"</p>
<p> Wilson was convicted for his dealings with Gadhafi, and
Shackley and Clines resigned under pressure from then-CIA
director Stansfield Turner. Shackley and Clines then join with
Secord and Hakim and "went private" continuing to run their
"secret team," the affidavit reads.</p>
<p> This group--initially through the Egyptian-American
Transport and Service Company--was "responsible for the entire
supply of weapons...to the Contras," when the CIA wasn't directly
providing them. They began arming the contras in August 1979,
after entering "into a formal contractual agreement with
Nicaraguan dictator Anastasio Somoza" despite President Carter's
order banning the sending of weapons to Somoza, the affidavit
reads.</p>
<p> The CIA took over in 1981, but when the 1984 ban on U.S.
support went into effect, North reactivated the private
merchants. Quintero, operating through a Florida based
corporation named Orca Supply Company--a company earlier set up
by Edwin Wilson--saw to it that the supplies were delivered to
the contras through John Hull, a U.S. citizen, who reportedly
operates a contra base in northern Costa Rica on land he owns.
Among the delivered weapons were the explosives used in the
Pastor bombing, the CIA source said.</p>
<p> To fund the contras, the "secret team" resorted to the
foreign military sales scheme used in Iran in which military
equipment is bought from the U.S. government at the
manufacturer's cost and sold to Iran at replacement cost. The
profits are then laundered through front companies.</p>
<p> The Examiner reported in July that Secord, partners with
Hakim in Standford Technology Trading Group International, was
involved in the 1981 sale of AWACS to Saudi Arabia, in which
money from that sale financed the contra operation.</p>
<p> In another report, the Examiner said the weapons were also
financed by an elaborate cocaine ring involing Columbia's largest
cocaine dealers in which the drug moves from Columbia,
through Hull's land, into the U.S at a level of one ton each
week.</p>
<p> When the Reagan Administration decided to undertake the
secret sales of arms to Iran in 1985, it was Shackley, Clines,
Hakim and Secord whom they used to carry out the mission, the
affidavit reads.</p>
<p>BACKGROUND</p>
<p> In 1961, Shackley, a CIA station chief in Miami, and his
deputy Clines, directed the covert war against Cuba. A special
unit formed to assassinate Castro, supervised by the "Mafia
Lieutenant Santo Trafficante," included Quintero--and Felix
Rodreguez and Luis Pasada Carillo--two ex-CIA agent who
reportedly operate the contras arms network at an El Salvador air
base. Pasada was involved in the 1976 mid-air bombing
of a Cuban passenger airliner.</p>
<p> After the covert war activists were caught smuggling narcotics
into the U.S. from Cuba, the operation was shut down, and Shackley
and Clines were transfered to Laos, where Shackley was made CIA
Deputy Chief of Station and Clines continued as his deputy.</p>
<p> According to the affidavit, Shackley and Clines directed a
secret program which trained and used Meo tribesmen "to
secretly assassinated over 100,000 non-combatant village mayors,
book-keepers, clerks and other civilian bureaucrats in Laos,
Cambodia and Thailand." The operation was funded by profits from
an illegal opium trade.</p>
<p> A commander the political assassination program was ret.
Army General John Singlaub, who has said publicly that he is
helping arm the contras. North, a Marine Corps Major at the time,
was one of Singlaub's deputies. Also involved with Shackley in
Laos was Secord, then an Air Force General, the affidavit
reads.</p>
<p> In 1971, Shackley and Clines, from their post the CIA's
Western Hemisphere operations, directed the "Track II" operation
in Chile which played a role in the assassination of Chilean
President Salvador Allende, the affidavit reads.</p>
<p> In 1974, the two directed the Phoenix project in Vietnam,
which carried out the political assassination of some 60,000 non-
Viet Cong civilians in an attempt to cripple Vietnam's political
institutions.</p>
<p> "With their secret CIA anti-communist extermination program
coming to a end,...(they) started their own private assassination
business..."</p>
<p>--------------------------------------------------------------</p>
<p> ) started their own private assassination
business..."</p>
<p>-----------------------</p></xml>

228
regexConsp/control.xml Normal file
View File

@ -0,0 +1,228 @@
<xml><p>RACISM, CONTROL, AND ROCK AND ROLL</p>
<p>By JACOB G. HORNBERGER</p>
<p>Civil rights laws are among the most repugnant forms of
political control in American society. Not only are they a
severe violation of the principles of freedom, they also have
totally failed to achieve their purported end -- the
elimination of racism in America.</p>
<p>Few intelligent people will deny that racial prejudice is
itself morally abhorrent. And being half-Mexican, I know from
personal experience that it is not pleasant to be at the
receiving end of prejudice against Hispanics (or half-
breeds!). But does the wrongful nature of racism mean that
such social conduct should be turned over to the coercive
power of government? NO!</p>
<p>First, how can an individual be considered free if government
officials have the power to coerce him, through fine or
imprisonment, to associate with people with whom he does not
desire to associate? It is the essence of individual liberty
to be able to choose one's friends and associates without
interference from the political authorities.</p>
<p>Moreover, the bedrock of freedom is private ownership of
property. How can a person be considered free if he can be
coerced, through fine or imprisonment, into selling what
supposedly belongs to him to a person to whom he would rather
not sell? It is the essence of private ownership of property
that a person have the right to do whatever he wants with his
own property, as long as it is peaceful.</p>
<p>Racial prejudice, of course, has long existed in American
society. No where was this better exemplified in this century
than in the segregation laws which American politicians and
bureaucrats enforced in the 1950s. Did segregation laws
guarantee the freedom and private property rights of
individuals? On the contrary! These equally offensive forms of
political control constituted the denial of individual freedom
and private property. Why? Because they prohibited blacks and
whites, through fine or imprisonment, from voluntarily
associating with each other in many social and business
contexts.</p>
<p>The crucial question is: Why did the politicians and
bureaucrats believe that segregation laws were necessary? Why
didn't they simply leave people free to discriminate or not on
a purely private basis? Why did they force them to
discriminate with segregation laws? Because they knew that the
market process would impose tremendous financial costs on
racists and ultimately break down racial barriers in America.</p>
<p>Are there any examples of where the market, rather than the
government, has accomplished this end? Yes! One of the best
examples involves one of the most controversial activities in
20th century America: rock and roll.</p>
<p>The story of rock and roll has been told in many books, among
which are You Say You Want a Revolution by Robert G. Pielke
and The Story of Rock by Carl Belz. From the very beginning,
it was the music of the young, and was hated and reviled by
the old. Why? Not simply because the music itself was
distasteful to adults. The animosity against rock and roll
went much deeper than that. Rock and roll shook the
foundations of values and beliefs held dear by grown-ups in
the 1950s.</p>
<p>One of the most important social teachings during that time
was that blacks were inferior to whites and, therefore, that
it was unacceptable for whites to associate with blacks. The
best example of this was found in government schools. With
segregation, and the battle against integration, in government
schools, American teenagers were taught by their parents and
government officials that it was socially detestable for
whites to be with blacks.</p>
<p>Along came rock and roll and turned that teaching upside down.
While rock and roll had its roots in various strands of
American music, i.e., country/western and gospel, its biggest
foundation was rhythm and blues or "race music" as it was
known in the 1950s. While whites were enjoying the sweet,
innocent sounds of the Big Bands, rhythm and blues, with its
especially strong sexual overtones, predominated among blacks.</p>
<p>It was natural for white parents to expect their children to
pursue their same musical interests. But it was not to be.
When Bill Haley's "Rock Around the Clock" was played in the
1955 movie, The Blackboard Jungle, a story of student protest
in a government school, rock and roll became the music of
choice for American teenagers.</p>
<p> While parents were resisting their children's growing
love for rock and roll, teenagers were listening to it on the
radio late at night (after their parents had gone to bed).
Many well-established radio stations refused to play the new
music, but teenagers would carefully search the radio band for
the few that did. (My favorite was an Oklahoma City station
more than 500 miles from my home.)</p>
<p>And along came Sam Phillips, the entrepreneur par excellence,
who shook the world by looking for a white man who sang like a
black man. One day the invisible hand of the market brought
into his studio the man who would become the King of Rock and
Roll, Elvis Presley. Elvis was hated and condemned by grown-
ups. But teenagers didn't care, and Elvis became the social
phenomenon of the century. (While on our way to a national
student council convention when I was in the 9th grade, a few
of us discovered that Elvis was staying in our motel. I
knocked on his door and asked if Elvis would come out to
visit. At about midnight, Elvis Presley came down to the pool
and spent some time visiting with a few of us. It did not take
long to see that he was a great person and that what grown-ups
were saying about him was untrue.)</p>
<p>The white racists were furious over the trend toward rock and
roll. But not just because teenagers were rejecting their
social teaching. Well-established financial interests were
getting hurt by the market process. Radio stations which
played only the "correct" music were losing market share and,
therefore, advertising revenue.</p>
<p>There was also a tremendous upheaval in the record business.
Small independent record companies called "indies" were
experiencing phenomenal growth rates by producing rock and
roll records. And the well-established record companies which
concentrated on the traditional music were losing a major
share of the market.</p>
<p>Rock and roll was providing a vehicle by which blacks could
out-compete whites and accumulate wealth. There were numerous
success stories; among the best known was Berry Gordy, Jr.,
and his Motown Records, who produced such rock and roll greats
as The Supremes, The Four Tops, Smokey Robinson and the
Miracles, and The Temptations. Blacks were getting wealthy,
and white racists were infuriated.</p>
<p>The market process was also bringing whites and blacks closer
together in other ways. Buddy Holly, who created some of the
most beautiful music ever written, shocked the black audience
at the Apollo Theater in New York City. (No white act had ever
played the Apollo!) And they loved him! White teenagers were
flocking to see Chuck Berry sing "Roll Over Beethoven,"
"Maybellene," and "Sweet Little Sixteen." And, horror of
horrors, white and black musicians were even travelling
together!</p>
<p>The world of racial separation for which adults longed in the
1950s was disintegrating among their children. And it was
occurring not as a result of government coercion but in spite
of it.</p>
<p>The response of the political authorities was not amusing. In
some cases, rock concerts were banned by ordinance. Musicians
were arrested on questionable charges. But the most tragic
abuse of political power came from the United States
government which, with its payola investigation, did
everything it could to destroy rock and roll.</p>
<p>Payola was a practice in which record companies would pay disc
jockies to promote their records. Payola was well-known and
well-established in the music business and had been going on
long before the advent of radio. But U.S. Congressmen had not
objected when musicians in the Big Band era were paid to play
a composer's music. It was only when rock and roll became
popular among the youth of America that the politicians' wrath
came in the form of a Congressional investigation of an
activity that was harming no one.</p>
<p>While the political investigation cast a wide net over rock
and roll, its ultimate brunt was felt by Alan Freed, a disc
jockey who was the first to coin the term "rock and roll."
Freed was one of the earliest and most successful promoters of
rock and roll, is generally recognized as the "Father of Rock
and Roll," and appeared in the rock and roll movie, Rock
Around the Clock. But all that ended with the Congressional
attempt to destroy rock and roll. In one of the ugliest abuses
of political power in American history, U.S. Congressmen
brutalized and butchered Alan Freed. He died a broken man in
1965 at the age of 43.</p>
<p>But the politicians and the racists, despite their fervent
hopes and valiant efforts, have never been able to destroy
rock and roll and its wonderful influence on American culture.</p>
<p>Reliance on the market, rather than government, to break down
racial barriers ensures that the costs of racial prejudice are
self-imposed rather than externally imposed. If the racist
radio station owner, for example, chooses not to play the
music of blacks, he foregoes the advertising revenue which
could be used to improve the lot of his family. He bears the
cost which his racial prejudice has induced him to impose upon
himself!</p>
<p>The market process also enables racists to vent their
prejudices by engaging in discrimination. Denying them this
opportunity does not eliminate the racism under which they
suffer; instead, it compresses it in a "pressure cooker" which
ultimately is bound to explode.</p>
<p>Rock and roll has been one of the most revolutionary cultural
phenomena in American history. It has produced some of the
world's most beautiful music. Of course, not all of its music
has been popular but that is the essence of a free society --
the legal protection of those peaceful activities which the
majority dislike.</p>
<p>But rock and roll did more than just contribute to the musical
heritage of the world. It also sent deep and profound quakes
through some of the most wrongful beliefs of American adults.
The social upheaval began with challenges to racial prejudice
but it did not end there. A few years later, appeared an
individual named Boy Dylan, one of the world's greatest poets
and ironically a product of America's government schools.
Through the message of his music, Dylan pierced the conscience
of a generation during the most controversial war in American
history.</p>
<p>Mr. Hornberger is founder and president of The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the October 1990 issue of FREEDOM DAILY,
Copyright (c) 1990, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.
</p></xml>

114
regexConsp/corpdem.xml Normal file
View File

@ -0,0 +1,114 @@
<xml><p></p>
<p>Subject: Corporate buyout of the Democratic Party</p>
<p>******************************
&gt;From the SF Examiner, Monday July 20, 1992.
Jeff Cohen and Norman Solomon (Jeff Cohen is founder
of FAIR, a media watchdog group; Norman Solomon is
a media critic.)</p>
<p>The Takeover of the Democratic Party</p>
<p> Thousands of journalists covered the Democratic National
Convention here. Almost all of them missed the biggest
story.
The story wasn't missed because it happened in the shadows
of in some smoke-filled back room. It was bypassed because of
ideological binders worn by so many in the conformist press.
The big story was the takeover of the Democratic Party by
big business.
Of course, the Democratic Party has always included hefty
doses of corporate interests. But in past years, they were
one of many competing forces in the party, along with
representatives of labor, minorities, senior citizens, women
and others.
The significance of this convention is that corporate America
has taken undisputed control - at least for now - of both major
political parties, not just the GOP.
How did so many in the political press corps miss the story?
Most establishment journalists seem blind to the fact that
corporations are thoroughly political institutions, seeking
ever-increasing influence over parties, legislation and government
regulation. (These businesses are, after all, the folks who
underwrite the news with their advertising.)
In political reporting, corporations are treated as benign, neutral,
invisible. Their political maneuvers are generally not news.</p>
<p> It's not that journalists are oblivious to political wheeling and
dealing by various groups. In the days before the convention,
political reporters scrutinized teachers unions, black activists,
senior-citizen groups, feminists, gay-rights advocates - denigrating
them as ``special interests'' who could ruin ``Clinton's convention''
by ``alienating middle-class voters.''
With so much media focus on these relatively powerless grass-roots
groups, powerful corporations - the country's REAL special
interests - ran off with the party.</p>
<p> ITEM: Two days before the convention, a ``Victory Train'' carried
congressional Democrats from Washington to New York. Accompanying
the party elite on the train ride were corporate lobbyists who
paid $10,000 to $25,000 for the right to mingle and shmooze.
The Democratic National Committee has been raking in money from
virtually every corporate interest needing a government
favor. The message to anti-poverty or consumer-rights activists:
No need for you to come on board. You can wait at the station.</p>
<p>ITEM: The Clinton-Gore ticket represents the seizure of the
party hierarchy by the Democratic Leadership Council, which
is typically euphemized in the media as a group of
``moderate'' Democratic politicians who want the party to
``speak for the middle class.'' (Clinton and Gore were
founders of the DLC; Clinton was its chair in 1990-91.)
The problem is that the DLC has no middle-class constituents.
It is bankrolled by - and speaks for - corporate America:
ARCO, Dow Chemical, Georgia Pacific, Martin Marietta, the
Tobacco Institute, the Petroleum Institute, etc.</p>
<p>ITEM: Clinton became the media-designated ``front-runner'' in
large part because he raised so much money early in the
campaign. The cash didn't come from middle-class folks.
As reported by the weekly In These Times, most of it
came from conservative business interests; investment
bankers, corporate lobbyists and Wall Street firms which
fund both major political parties.</p>
<p>ITEM: Two of Clinton's key fund-raisers were Robert Barry,
a longtime General Electric lobbyist, and Thomas H. Boggs
Jr., who ears $1.5 million a year as a lawyer-lobbyist
for the Washington firm of Patton, Boggs, and Blow.
Boggs' parents were members of Congress; his sister is
media pundit Cokie Roberts. His law firm boasts a computer
program that matches corporate donors with Congress members
who seek his help in raising money; a match depends on what
legislation is pending before Congress.</p>
<p>ITEM: The Boggs law firm also boasts partner Ron Brown,
chair of the Democratic Party. Some pundits have suggested
that since Brown in an African-American, the Clinton-Gore
ticket has less need of Jesse Jackson to mobilize the
black vote in November. But Ron Brown is far more familiar
with corporate boardrooms and government corridors than
grass-roots organizing. His clients have included an
array of U.S. and foreign business interests, as well as
the regime of Haitian dictator Jean Claude Duvalier.</p>
<p> When Jerry Brown spent his campaign denouncing
``Washington sleaze,'' he was referring to these kinds of
cozy corporate-government relations.
But mainstream media have demonstrated far less animus
toward corporate influence than toward Jerry Brown, who
was routinely described by journalists covering the
convention as ``disruptive,'' ``egotistical'' and a
``party pooper.''
Aided by this media slant, corporate insiders are
laughing all the way to the bank.</p>
<p>*******************************************</p>
<p>This is the real problem with our "democracy" - the voters have
very little influence over the choices. Those decisions have
already been made for us. We should feel glad about it, now
we don't have to make the difficult decisions...</p>
<p></p></xml>

140
regexConsp/cotd9311.xml Normal file
View File

@ -0,0 +1,140 @@
<xml><p>Subject: Conspiracy for the Day -- November 3, 1993
From: bfrg9732@uxa.cso.uiuc.edu (Brian F. Redman)
Date: 3 Nov 1993 00:02:07 GMT</p>
<p> Conspiracy for the Day -- November 3, 1993
=============================================
("Quid coniuratio est?")</p>
<p>-!---------------------------------------------------------------</p>
<p>The Search for the "Manchurian Candidate":
The CIA and Mind Control
by John Marks
[Excerpts]</p>
<p>By the 1950s, most "Americans knew something about the famous
trial of the Hungarian Josef Cardinal Mindszenty, at which the
Cardinal appeared zombielike, as though drugged or hypnotized.
Other defendants at Soviet 'show trials' had displayed similar
symptoms as they recited unbelievable confessions in dull,
cliche-ridden monotones. Americans were familiar with the idea
that the communists had ways to control hapless people, and [the
term 'brainwashing'] helped pull together the unsettling evidence
into one sharp fear."</p>
<p>Many Americans "saw the confessions as proof that the communists
now had techniques 'to put a man's mind in a fog so that he will
mistake what is true for what is untrue, what is right for what
is wrong, and come to believe what did not happen actually had
happened, until he ultimately becomes a robot.'"</p>
<p>"Given the incontrovertible evidence that the Russians and the
Chinese could, in a very short time and often under difficult
circumstances, alter the basic belief and behavior patterns of
both domestic and foreign captives, [it was argued that] there
must be a technique involved that would yield its secrets under
objective investigation."</p>
<p>Harold Wolff and Lawrence Hinkle "became the chief brainwashing
studiers for the U.S. government... Their secret report to [CIA
chief] Allen Dulles, later published in a declassified version,
was considered the definitive U.S. Government work on the
subject."</p>
<p>"The CIA built up its own elaborate brainwashing program
[which]... took its own special twist from our national
character. It was a tiny replica of the Manhattan Project,
grounded in the conviction that the keys to brainwashing lay in
technology. Agency officials hoped to use old-fashioned American
know-how to produce shortcuts and scientific breakthroughs... The
Agency's brainwashing experts gravitated to people more in the
mold of the brilliant -- and sometimes mad -- scientist."</p>
<p>CIA officials began to look for scientists and guinea pigs. "Some
of their experiments would wander so far across the ethical
borders of experimental psychiatry (which are hazy in their own
right) that Agency officials thought it prudent to have much of
the work done outside the United States."</p>
<p>Montreal hospital. One of Cameron's projects was an attempt to
"depattern" experimental subjects. "Cameron defined
'depatterning' as breaking up existing patterns of behavior... by
means of particularly intensive electroshocks, usually combined
with prolonged, drug-induced sleep... Cameron claimed he could
generate 'differential amnesia.' Creating such a state in which a
man who knew too much could be made to forget had long been a
prime objective [of CIA] programs."</p>
<p>Cameron's depatterning "normally started with 15 to 30 days of
'sleep therapy.' As the name implies, the patient slept almost
the whole day and night. According to a doctor at the hospital
who used to administer what he calls the 'sleep cocktail,' a
staff member woke up the patient three times a day for medication
that consisted of a combination of 100 mg. Thorazine, 100 mg.
Nembutal, 100 mg. Seconal, 150 mg. Veronal, and 10 mg. Phenergan.
Another staff doctor would also awaken the patient two or
sometimes three times daily for electroshock treatments... In
standard, professional electroshock, doctors gave the subject a
single dose of 110 volts, lasting a fraction of a second, once a
day or every other day. By contrast, Cameron used a form 20 to 40
times more intense, two or three times daily, with the power
turned up to 150 volts."</p>
<p>"The frequent screams of patients that echoed through the
hospital did not deter Cameron or most of his associates in their
attempts to 'depattern' their subjects completely. Other hospital
patients report beinng petrified by the 'sleep rooms,' where the
treatment took place, and they would usually creep down the
opposite side of the hall."</p>
<p>"The Agency sent the psychiatrist research money to take the
treatment *beyond this point*. Agency officials wanted to know
if, once Cameron had produced a blank mind, he could then program
in new patterns of behavior, as he claimed he could. As early as
1953 -- the year he headed the American Psychiatric Association
-- Cameron conceived a technique he called 'psychic driving,' by
which he would bombard the subject with repeated verbal
messages."</p>
<p>The CIA continued to fund Cameron's research. Then, in 1964, he
retired abruptly. "His successor, Dr. Robert Cleghorn, made a
virtually unprecedented move in the academic world of mutual
back-scratching and praise. He commissioned a psychiatrist and a
psychologist, unconnected to Cameron, to study his electroshock
work."</p>
<p>"The study-team members couched their report in densely academic
jargon, but one of them speaks more clearly now. He talks
bitterly of one of Cameron's former patients who needs to keep a
list of her simplest household chores to remember how to do
them... He continues, 'I probably shouldn't talk about this, but
Cameron -- for him to do what he did -- he was a very
schizophrenic guy, who totally detached himself from the human
implications of his work... God, we talk about concentration
camps. I don't want to make this comparison, but God, you talk
about ''we didn't know it was happening,'' and it was -- right in
our back yard.'"</p>
<p>"It cannot be said how many -- if any -- other Agency</p>
<p>Details are scarce, since many of the principal witnesses have
died, will not talk about what went on, or lie about it. In what
ways the CIA applied work like Cameron's is not known. What is
known, however, is that the intelligence community, including the
CIA, changed the face of the scientific community during the
1950s and early 1960s by its interest in such experiments."</p>
<p>-!---------------------------------------------------------------
Today's conspiracy brought to you by.......
Brian Francis Redman
.....................
: Aperi os tuum muto, :
: et causis omnium filiorum qui pertranseunt. :
: Aperi os tuum, decerne quod justum est, :
: et judica inopem et pauperem. :
: -- Liber Proverbiorum XXXI: 8-9 :
:...................:
(bfrg9732@uxa.cso.uiuc.edu) (72567.3145@compuserve.com)
</p></xml>

945
regexConsp/cowtown.xml Normal file
View File

@ -0,0 +1,945 @@
<xml><p> THE COWTOWN CONNECTION
by
M. Duke Lane
(CIS ID: 76004,2356)</p>
<p>Harold Weisberg once said about his Whitewash works that "there are no
theories in my books... they're factual."[1] The sentiment about factuality
has been echoed by many respectable researchers, who insist that "the Kennedy
case ought to be treated as a homicide, which is what it is." Aren't we
pressing for a final, legal investigation of the JFK murder to view all of
the evidence, new and old, holding it to the constraints of our legal system?
A common refrain, after all, is that the Warren Commission's investigation
and "conviction" of Lee Oswald would never have held up in a true adversarial
judicial proceeding.</p>
<p>Interestingly, we don't seem to hold ourselves to the same constraints. If
one researcher discovers something, even in error, we are apparently
permitted to cite that person's work, without certification, as established
fact. Many people complain when their own theories are held up to the same
critical light as we hold the official investigations, as if we aren't
beholden to the same burden of proof we assign them.</p>
<p>There has even been recent argument on both sides of this issue regarding
whether researchers' conclusions ought to be held up to critical peer review
or whether we should be allowed to follow our intuition and reach reasonable
conclusions... which can't be anything more than speculation, by
definition.[2] That we accept such speculation and/or incomplete
investigation as "fact" is exemplified by Robert Morrow's recently published
First Hand Knowledge (FHK),[3] in which he suggests that an apparent CIA
operative was detained in Fort Worth only a couple of hours after Kennedy's
assassination.</p>
<p>FHK is, by most people's estimation, a reprint of Morrow's earlier Betrayal,
this time, however, naming names and adding new information. One piece of
this "new information" is that an "unidentified suspect" taken into custody
in Fort Worth, 30 miles west of Dallas, was, in fact, David Atlee Phillips, a
former CIA operative who was based in Mexico City while Lee Harvey Oswald was
purportedly visiting Soviet and Cuban embassies in that city, and/or the
"Maurice Bishop" character said to be Cubans refugees' CIA contact for the
Bay of Pigs operation. What, the reader must wonder, was this man--of all
people--doing in that place at that time? This is information with curious
implications indeed!</p>
<p>As evidence of Phillips' apparent complicity in the murder, Morrow includes a
photo of Phillips beside the House Assassinations Committee's sketch of
"Bishop," which many researchers agree look strikingly similar. The photo is
included with the Phillips and "Bishop" pictures. The man, Morrow asserts,
bears an "uncanny resemblance" to Phillips/Bishop. Even while the angles of
the men's faces are different, making a direct comparison difficult if not
impossible, there does indeed appear to be a resemblance between them.</p>
<p>What was Phillips/Bishop doing in Fort Worth? The reader is left to wonder,
for Morrow cites Gary Shaw and Larry Ray Harris' Cover-Up[4] to state that no
record of this man's arrest exists and, in fact, the negatives of the
pictures taken of the arrest have disappeared from the files of The Fort
Worth Star-Telegram. Who but the government could manage such an obvious
cover-up, one must wonder. Who indeed?</p>
<p>Since I live near Fort Worth, I decided to look into this. This article will
take the reader roughly through the steps of my investigation into this
question. In the end, we will find that not only was Morrow "reaching," but
also that previous information was incomplete at best. While I cannot
possibly clear Phillips from any sort of involvement in the Bay of Pigs
episode or the Kennedy hit, it is quite clear that he was NOT the man in the
photo Morrow uses to implicate him. This is perhaps an abject lesson for the
reader not to take everything he reads at face value, no matter what the
credentials of an author may seem to be....</p>
<p>Let us pause for a moment to consider Morrow's works. Morrow, as we know,
claims to be a former CIA contract agent who supposedly delivered four
Mannlicher- Carcano 7.65mm rifles to David Ferrie for what he later
determined to be the JFK assassination, one of which he says he kept. In both
FHK and Betrayal, he discusses the purchase and delivery of these rifles to
Ferrie, who of course, cannot confirm or deny Morrow's allegation since he is
dead. Nor can Morrow's CIA connection be affirmed or refuted; we have no
choice but to either take the man at his word or not, since it is impossible
to prove one way or the other. That is simply the nature of the beast.</p>
<p>Likewise, we can either believe or disbelieve his accounts of the various
newly-named people's involvement in the planning, execution and/or cover-up
of the assassination. Certainly, the dust jacket overview and the author's
own preface to his new book paint a reasonably credible picture of the man
who claims to have "first hand knowledge" of the assassination. Knowing,
however, that there is no statute of limitations against prosecution in a
murder, how is it that Morrow can publicly come forward with an admission of
having participated in the most notorious murder of our time? Even aside from
prosecution, surely one must wonder at what repercussions he might suffer at
the hands of those whom he names as his accomplices, including the CIA.</p>
<p>These questions are handled adroitly enough even before the reader reaches
the book's introduction. "Mr Morrow," the dust jacket states, "has now come
forward with the truth because he believes the danger to his family is
reduced due to the impending release of the Congressional files on the
assassination," thereby assuring us that Morrow doesn't expect to become
another "mysterious death."</p>
<p>But what of the others he names? His own preface makes this clear: "More than
half the characters about to come to life on these pages have already been
put to death, tortured, exiled or silenced in strange and horrible ways."
They are either dead or otherwise will not rise to their own defense against
Morrow's accusations. It is worthwhile to note that David Atlee Phillips is
among the former, having died of cancer at his Arlington, VA, home on July 7,
1988.[5] He will not be stepping forward to clear his name, nor will Tracy
Barnes, another of the people Morrow names in FHK and who is also dead. The
rest of the "more than half" of Morrow's characters will likewise not be
coming forward to correct the record and provide true facts since they've
either been "put to death, tortured, exiled or silenced in strange and
horrible ways." The other half, we may reasonably conclude, have but bit
parts in Morrow's narrative, and aren't connected with the assassination, and
so have nothing to "fear."</p>
<p>Returning to the question of Phillips (or Bishop) having been arrested in
Fort Worth, we must bear these factors in mind. Gary Shaw and Larry Harris
have already told us that no record of the arrest exists and that negatives
of the photographs taken of this man have "disappeared" from the
Star-Telegram's files. Morrow has only added to the mystery by connecting the
CIA to this man, a factor which can apparently not be proven nor disproven.
Or can it?</p>
<p>Tom Tilson Tells Tall Tales
===========================</p>
<p>One of the first things I was curious about was whether this arrest had any
connection to the black sedan chase so often related to the events in Dealey
Plaza. This connection was bolstered by an article which appeared the day
after the assassination in The Dallas Morning News which told of a man having
been arrested in Fort Worth because he was said to be driving a car "linked
to the slayer."[6] Fort Worth was the apparent destination of the driver of
the black sedan headed westbound on the DFW Turnpike and chased by an
off-duty Dallas policeman.</p>
<p>This incident was first reported by Earl Golz in The Dallas Morning News[7]
nearly twenty years after the fact, and repeated by Jim Marrs in
Crossfire,[8] to which the reader is referred for additional information. In
addition, rumblings of a car having been found abandoned in Fort Worth later
in the day_naturally tied to the "black car chase"_raised even more
interesting possibilities. Was the man in the FHK photo the same one who
off-duty officer Tom Tilson chased from Dealey Plaza, and who may
subsequently have abandoned the car before having been arrested?</p>
<p>Unequivocally not. To begin with, it is apparent that there never was a car,
black or otherwise, where Tilson claimed he initially saw it. His interview
with Golz clearly states that he was driving along Commerce Street just
beyond the Stemmons Freeway bridge but not yet as far as the Triple Underpass
(the railroad bridge) when he saw a man run down the bridge abutment, toss a
long object (a rifle?) into the back seat, run around to jump into the
driver's seat and take off.</p>
<p>According to his daughter who was riding with him, "seconds before she saw
the fleeing man, the presidential limousine had just sped past his parked car
on the grass... and the limousine was turning onto Stemmons Freeway."[9] This
time roughly corresponds to the time that Mel McIntire took two photographs
of the limo emerging from under the railroad bridge and, shortly thereafter,
the Secret Service follow-up car turning onto Stemmons.[10] In neither photo
is there a "parked car on the grass." With the rest of the motorcade still in
Dealey Plaza, it is impossible that a car could have gotten to that spot in
time for Tilson to have seen it before passing under the Triple Underpass. It
simply wasn't there.</p>
<p>Moreover, photographic evidence belies Tilson's claim that "everyone was
jumping out of their cars pulling up on the median strip" in the plaza as he
saw the man running down the abutment and jumping into his car.[11] Of the
many photographs taken in DP, none show "everyone... jumping out of their
cars [and] pulling up on the median strip," and none show cars parked on the
median even long after the motorcade had left the plaza, much less when
Tilson claims they were (before the press bus had even reached the
Underpass). Obviously, Tilson has never looked at any pictures of the
assassination and aftermath before.</p>
<p>If that doesn't prove the lie, then consider that the Dallas Police
Department (DPD) recorded and investigated, however cursorily, quite a number
of reports about suspicious cars in the Dallas area that afternoon.[12] Yet,
according to Tilson, his own compatriots decided to ignore his report because
"if you didn't have a big white hat on, they didn't even want you in the
office."[13] Does it make sense that detectives will credit and investigate
reports from ordinary citizens, yet ignore one from "one of their own?"</p>
<p>Also, is it credible that a fleeing assassin would drive a dozen or so blocks
through city streets to get on a highway when there was and is an entrance
ramp onto the same highway, going in the same direction, within 100 yards of
where his car was supposedly parked and immediately to the left of the
Stemmons Freeway entrance taken by the motorcade? I think not.</p>
<p>If Tilson's story is a fabrication, however, that doesn't preclude that a car
was found abandoned in Fort Worth, and in fact, one was. Almost by accident,
I met a retired Fort Worth police officer, WD Roberts, who had called in a
report of an abandoned and presumably stolen car only a few minutes after the
time that Kennedy was being shot thirty miles away.[14]</p>
<p>Officer Roberts, who is now retired from the force, was on patrol in the
Riverside section of east Fort Worth and had come across the vehicle. He
called it in to the dispatcher at about 12:45 to 1:00. (It was later
determined to have been stolen in Houston the previous week.) Roberts is
certain that the car was not black (ergo not related to Tilson's "black
sedan"), but only recalls it as being "a light color, perhaps even
two-toned." Since it had been parked there for a number of days, we can
reasonably conclude that it was not related to the JFK murder, thereby
removing it from consideration in relation to the arrest in question.</p>
<p>If At First You Don't Succeed...
================================</p>
<p>Between the apparent fact that Tom Tilson's black sedan never existed and
that the car found abandoned in Fort Worth wasn't connected to this
pseudo-event, it was quite certain that this avenue of inquiry would not lead
to a conclusion about the photo in FHK. Who, then, was the man in the photo,
and what could be learned about him? After all, he could be just about
anyone: how can an unidentified man be found thirty years later from his
image that is bound to have changed in the interim? There are more than two
million people in the Dallas-Fort Worth metroplex; where and how do you begin?</p>
<p>As anyone can see, there are in fact two men in the photograph: the
"unidentified suspect" and a police officer. Since nobody'd had any luck
finding out about the arrest from official files, I reasoned, the next-best
way would seem to be to find out what the arresting officer could remember.
And if you're trying to find out who a cop is, who're the best people to ask?
Naturally, other cops who may have worked with him. I decided to check with
Fort Worth police.</p>
<p>Identifying the officer in the photo proved not as easy as I'd thought, since
in the course of less than two hours, I'd gotten no less than four "positive
identifications" of the man from nearly a dozen of his fellow officers,
including the Assistant Chief of Police. Only one of them, as it turned out,
was correct. This should be instructive to anyone who attempts to identify a
person based upon the recollection of only one or two of his
contemporaries... even if they're trained observers, as police are frequently
termed.</p>
<p>The officer who found the abandoned car mentioned earlier, WD Roberts, also
turned out to be the arresting officer in the case of Donald Wayne House,
which many readers are familiar with. For the sake of those who aren't and
for putting Roberts' observations and impressions on the record (since
nobody's ever asked him about this before), we'll once again depart our main
focus on the FHK photo to recap the story of this arrest; interestingly, it
will lead us directly back to the photo.</p>
<p>In addition to the brief mention of the "2-city manhunt" in The Dallas
Morning News on the morning after the assassination, there was one (and only
one) other account of someone being arrested in Fort Worth. It appeared in
The Fort Worth Star-Telegram the day after the assassination, and related
that a 22-year-old man had been picked up as a possible suspect in the
assassination of President Kennedy.[15] While it didn't identify the man by
name, it did indicate that he was from Ranger, a small town southwest of Fort
Worth. It also identified the arresting officers (WD Roberts and BG Whistler)
and noted that the man had been arrested in the 3400 block of East Belknap
Street in the city.</p>
<p>Reconstructing this arrest from a variety of sources, it happened something
like this:</p>
<p>On the morning of November 22, Donald Wayne House left his home in Ranger, TX
bound for Mesquite (a Dallas suburb) to visit an old Army buddy, Randall
Hunsaker.[16] He had parked his car in a lot on Commerce Street at about
10:30[17] and called Hunsaker, who was apparently not home. Hearing that JFK
was due to ride through downtown, he decided to get a glimpse of Kennedy,
whom he says he had long admired.[18] After the motorcade had passed, he
headed toward Fort Worth on the DFW Turnpike to visit a cousin.[19]</p>
<p>Along the way, House says he stopped for gas at a station in Grand Prairie,
where two women who had heard about the assassination asked him if he knew
anything more about it. House told them that he'd heard the alleged
assassin's description, which he then related to the women. The description
he gave them of Oswald describes House as well, a resemblance that can be
clearly seen in photos taken of him that day except that House is much
shorter than Oswald.[20] It is also possible that the women had heard the
description themselves and felt that House matched it closely enough to
arouse their suspicions.</p>
<p>One of the two women he spoke with was apparently the "Mrs Cunningham"
identified in Dallas County Deputy Sheriff JC Watson's report who called the
Grand Prairie PD after House had left the filling station. The Grand Prairie
PD then notified the Dallas County sheriffs, who in turn made a general
broadcast including his description and that of his car and its license plate
number at 1:35 pm. A "short while" later Tarrant County officials notified
sheriffs that the car and driver had been taken into custody.[21]</p>
<p>The green and white Ford was heading westbound on the DFW Turnpike toward
Fort Worth.[22] At about the same time or just shortly after the Sheriff's
broadcast had gone out, FWPD officer WD Roberts had pulled into the Shady
Oaks Drive-in on Riverside Drive just after having called in his report of
the abandoned car. While waiting for a cup of coffee, he happened to glance
in his mirror and noticed the car going by. He took off after it, leaving the
carhop standing there with his order in hand.[23]</p>
<p>Roberts called into FWPD dispatch to verify House's license plate number, and
because he was driving an underpowered cruiser, he also requested assistance
in case the driver attempted to evade him.[24] Officer BG Whistler, who was
patrolling an adjoining sector, sped to his assistance and met up with him a
short distance away at the "Five Points" intersection of East Belknap and
Bonnie Brae;[25] officer BL Harbour also fell in behind Whistler.[26] Upon
seeing he had assistance, Roberts notified dispatch that he was going to
"curb" the car.[27]</p>
<p>Roberts pulled around House and forced him to pull over in the 3400 block of
East Belknap Street near Sylvania Park; Whistler came up behind House, got
out of his squad car, and trained his shotgun on House, telling him to get
out of the car and keep his hands where they could be seen. Roberts frisked
him and put him in handcuffs before putting him in the back of Whistler's
car. By this time (shortly before 1:57 pm CST, the time on House's arrest
report[28]), a number of other officers had also arrived, including Lt
Lawrence Wood who immediately took charge as the ranking officer. Harbour
joined Whistler in the latter's car and the two transported the prisoner to
city hall where they were photographed by newsmen.[29] Wood accompanied these
officers to city hall on his motorcycle[30] while Roberts remained behind to
secure the scene and inventory the vehicle.[31]</p>
<p>All of the officers involved described the arrest as "odd" because, during
all of this time, House never said a word. Roberts in particular thought so,
and "couldn't imagine how you could pull a man out of his car, frisk him,
handcuff him and put him in the back of a patrol car in a matter of just
seconds, all the time with a shotgun aimed at him and he never even asked why
he was being arrested!"[32]</p>
<p>Roberts' account was confirmed by Whistler, who added that Lt Wood had
instructed them not to ask House any questions or make any statements to him,
but to "leave that to the Feds," who had apparently been notified to meet the
officers at city hall.[33] House's arrest report also indicated that "the
subject never once appeared nervous and in fact he was unusually calm," and
that he had never asked the officers why he was being arrested or taken into
jail.</p>
<p>Among the police, only Wood's account differed. He told a reporter that House
was "hysterical" and that "the guy stuttered, he was so scared he couldn't
get a single word out, no matter how long he tried,"[34] descriptions the
arresting officers adamantly denied. In Wood's defense, however, that
recollection was nearly twenty years old by the time it was made.</p>
<p>(House's own account of it, published ten months after his arrest, says that
he'd asked why he was being arrested and was told by officers "You're being
arrested for the assassination of President Kennedy,"[35] which also
contradicts the officers' statements. I consider this to be a relatively
minor point since House was "in the spotlight" during the interview and may
have tended to meld details. He was undoubtedly told at some time why he'd
been brought in; whether it was before or after he arrived at city hall seems
more a matter of how he told the story than how it actually happened.)</p>
<p>Another oddity, Roberts recalled, was that House's car was "absolutely
spotless, there wasn't even a slip of paper in the glove box," although he
found an empty dynamite box in the trunk, which House claimed to have been
using as a tool chest[36] (Wood, in his account, said that "we found several
boxes of dynamite in the back seat,"[37] which the arresting officers also
disputed). Roberts was surprised to learn that House supposedly junked the
car a short while later[38], saying that he couldn't imagine why he did since
the car was "immaculate."</p>
<p>House was transported to city hall (which also housed police headquarters at
the time) by Officers Whistler and Harbour, and photographs[39] show the two
taking him inside. House was then put in the "shakedown" room and searched,
where the only belongings that were recorded having been taken from him was a
wallet containing $23 in cash and a knife.[40] According to House, he was
interrogated by federal officers for three hours and remained alone in his
cell for another hour before being cleared and released,[41] although the jail
report indicates the time was slightly shorter.[42]</p>
<p>Another apparent "oddity" came up when Roberts also recalled that, when he
arrived at city hall later in the day, he had gone to the chief's secretary
to dictate his report. About midway into his report, he says, the chief came
in and told him "not to bother" completing his report, that the man had
already been cleared by the Feds.[43] Whistler also did not recall writing a
report, corroborating Roberts' memory.</p>
<p>Again, there is nothing "sinister" about this. The official record of federal
agents interviewing him exists, and was published by the Warren
Commission.[44] I was also able to find an arrest report for House on file
that was compiled from "information from" the two arresting officers and BL
Harbour (who is now deceased). It was typed by a clerk and filed; it was not,
however, signed by the officers which is why I believe they don't remember
having filed it since, in reality, it was typed and filed after they'd
recounted the details of the arrest to the clerk. Considering the commotion
of the afternoon, it is hardly surprising that this occurred.</p>
<p>A Second Arrest in Fort Worth
=============================</p>
<p>While there is a relative wealth of information about Donald Wayne House
available, as we've already learned, nothing was known about the second man
who is pictured in FHK. As I've already noted, in Cover-Up, Shaw and Harris
relate that "a second Fort Worth arrest was made at the same time House was
taken into custody, but other than photographs from The Fort Worth
Star-Telegram, there is no record of the arrest." They continue that
"negatives of these photos [which include the one that appears in FHK and
also in Cover-Up] are now missing from the newspaper's files."[45] Morrow
added his opinion that the man looked like someone associated with the CIA
and/or the Bay of Pigs operation. It all sounds very mysterious, almost
sinister.</p>
<p>None of the newspaper articles around that period provide any indication of
who this man was, and no account of this second arrest appeared in any of the
local papers. None of the photos were published by local newspapers, although
there were at least four other photos taken of him in addition to the one in
FHK. A second picture, which appears in Cover-Up,[46] shows the man being
taken from the FWPD patrol car by Lt Wood, and a third on file at the
Star-Telegram offices depicts him being led by Wood and another officer (the
same one in the FHK photo) into city hall; two others show the back of the
man and the arresting officers as they entered the building.</p>
<p>Neither of the two photos in Cover-Up (one of which is the one in FHK) were
taken by Star-Telegram photographers, which explains why the negatives are
not on file there. Most likely, they were taken by its rival newspaper, The
Fort Worth Press, which ceased printing in May 1976 (although a new weekly
paper has been recently started under the same banner). The Star-Telegram, as
Shaw noted, no longer has all of the negatives of the photos they had taken,
but I was able to find photos on contact sheets (positives made directly from
the film strips) there, and most did indeed have negatives available. The
photo archives of the Press are said to be in private hands, so I have as yet
been unable to view whatever remains of them.</p>
<p>Some people have suggested that the Star-Telegram's negatives may have been
removed by the FBI as part of its official investigation, but there is no
evidence that this is the case. Some Star-Telegram staffers thought this
might be so, but the director of the photo archives told me that it is much
more likely that the photographers did not turn them all in, or removed them
after realizing that they may have some historical value. "We don't polygraph
them to make sure they do," he said. In any case, they were not removed by
any official body as part of either an investigation or a cover-up, nor most
certainly, to protect David Phillips.</p>
<p>While negatives are not available for a number of photos, there is nothing
particularly noteworthy about the ones that are missing versus those that are
not. In my estimation, it doesn't appear there is any cause to claim a
cleanup of "incriminating" photos, and certainly not with regard to this
particular arrest, since, as we shall soon see, the man had nothing to do
with either the assassination or the government. The photos on the contact
sheets can generally be viewed by the public on request, although it isn't
always easy to get copies of them.</p>
<p>The contact sheets turned out to be the solution to the question of who the
officer in the FHK photo actually was since, in one of the photos, I was able
to read the name plate on one of the men in one of the contact sheet photos:
it read "HW Sinclair," one of the four officers named by his associates.
After making a number of phone calls, I was able to locate Sinclair, and
phoned him an arranged to visit with him at his home in rural East Texas. Now
retired and raising cattle, he doesn't seem to have aged much in the past 29
years and looks very much the same as he did the day the photo was taken.
Both he and his wife positively identified him in the FHK photo, and also
identified Lt Lawrence Wood as the man with him in a photocopy I'd been able
to make of a Star-Telegram photo showing both officers.</p>
<p>(Two of the other officers who had been identified later called me and
identified Sinclair as well. It is also worth noting that, in head-on photos
of the man in custody, the similarity between him and "Maurice Bishop" and/or
David Atlee Phillips is no longer evident. One such photo can be seen in Shaw
and Harris' Cover-Up,[47] and another is on file at The Fort Worth
Star-Telegram.)</p>
<p>Sinclair is a private man and wouldn't allow our interview to be taped. He
was, however, very forthcoming in his recollections of that period. In
addition to arresting the man in the picture, Sinclair had also performed
security at Miller's Funeral Home while Lee Oswald was being prepared for
burial, and also at Rose Hill Cemetery when Oswald was buried. He also
pointed out that FWPD kept a guard at the gravesite for many months following
Oswald's burial, citing various threats of people digging up the body and
dragging it through the streets of the city.</p>
<p>It was a quirk of fate that got Sinclair involved in these events. Since he
had joined the force in 1956, he had been assigned as a patrolman in the
detective division, investigating fraud in plain clothes. Sometime in
mid-1963, however, someone decided that all patrolmen were to be assigned to
the Patrol Division, so Sinclair donned his uniform and patrolled the
streets. In January 1964, Sinclair was named the Patrol Division Officer of
the Year for 1963, and promoted to detective. He returned to plain clothes
and was assigned to the Homicide Division for the remainder of his years with
FWPD.</p>
<p>Sinclair remembered the arrest having taken place in the Riverside area on
the east side of Fort Worth, although he couldn't recall the exact location.
He had assisted two officers who he thought were on motorcycles to transport
the prisoner to city hall. "There were a lot of cops there," he said, adding
that he had arrived after the other officers. Lt Wood, whom Sinclair
diplomatically said was "not shy of the media," appeared "out of nowhere"
when he arrived at city hall with the prisoner. (In fact, Wood was already at
city hall, having escorted officers Whistler and Harbour with Donald House
from the arrest scene. In the NBC film footage, Wood can be seen alighting
from his motorcycle in front of the police cruiser) Wood then helped Sinclair
take the man out of the patrol car and escorted him into city hall. Wood is
also pictured taking the man out of the cruiser's front seat in one of the
photos in Cover-Up,[48] and it is his fingers that can be seen at the
prisoner's right elbow in the FHK photo.</p>
<p>Because he had merely assisted in the arrest, Sinclair did not believe that
he had filed an arrest report, that duty falling to the actual arresting
officers, whom Sinclair recalled having stayed behind to secure the arrest
scene and inventory the vehicle the man had apparently been stopped in. He
says he may have filled in a "call sheet," but later investigation found that
these are only kept for six months before being destroyed, so if he had, it
is no longer available. Beyond these facts and his recollection that it was
the only time in his career that he had loosed the shotgun officers carried
in their cruisers, he couldn't remember anything particularly striking about
the arrest and he was unable to remember what the man's name might have been.
He noted that Wood is now deceased, and that he didn't know who the arresting
officers might have been.[49]</p>
<p>The Unidentified Man</p>
<p>While I had successfully identified the officer in the picture, I was still
no closer to learning who the man in custody was or why he been detained.
During my many meetings with current and retired FWPD officers, however, I
had been referred to a number of others who may have had some information
regarding the case. One of these men was assigned as an officer to the
Identification Division in 1963, where he continues to work today as a
civilian employee (his associates consider him to be "the best fingerprint
guy you can find anywhere"). Sinclair thought that this individual may have
been working the afternoon of the arrests, and could provide some useful
information.</p>
<p>As it turned out, he had worked the evening shift on November 22, and thus
had no details of the arrest. However, he thought there might still be a
record of it on file, but shortly found that the department's worksheets of
that period were no longer on file. He felt that I wouldn't be able to find
any information without knowing the man's name, but nevertheless transferred
me to the supervisor of the Records Division. The supervisor suggested that I
come into the police station and look through some of their old microfilm
records. I went to Fort Worth later the same afternoon.</p>
<p>I didn't really know what I was looking for, whether it would be a jail
roster or what, but I thought I might have been able to find a name that was
out of place or couldn't be verified against other records. I was given two
rolls of microfilm covering the period, one of arrest records, and another of
the Disposition Report and Property Records of prisoners. Since I had already
read elsewhere and been told by the officers that no arrest record was made,
I didn't know how much luck I'd have, but I figured it was worth a try.</p>
<p>I began reading the arrest reports. It appeared that November 22, 1963
started out like any other day for FWPD (aside from the President's visit
that morning). Of the thirty or so arrests officers made that day, many were
listed as "juvenile fugitives," and a roughly equal number were for
"investigation of theft under $50 (shoplifting)." There was also a report of
a man who'd been taken into custody because the police had learned he had VD,
and one of a man who had been arrested in the men's room of the local bus
station while injecting nitroglycerine into his arm. Maybe the day wasn't so
"typical" after all....</p>
<p>Midway through the day's reports was the arrest report for Donald Wayne
House, which I decided to make a copy of since, after all, I'd been told it
hadn't been filed. The very next arrest report was for another man named
Kenneth Glenn Wilson, then of 6121 Broadway in Haltom City to the east of
Fort Worth. Interestingly, he had also been arrested at the 3400 block of
East Belknap Street, 23 minutes after House had been. The arresting officers
were listed as Lt LE Wood and HW Sinclair.[50]</p>
<p>This was an odd coincidence: nobody had mentioned two men having been
arrested in that place at that time. Who was this man, and what had he been
arrested for? That the arresting officers were the same two men who had been
photographed bringing the "unidentified suspect" into city hall made this
record all the more intriguing. (It is worth noting that Wood couldn't have
actually been an arresting officer since he'd already left the scene before
the man was taken into custody. He was, however, one of the two officers who
escorted him into city hall and booked him, and so was included in the
report.)</p>
<p>Wilson, an auto parts salesman, was charged as an "investigation witness." If
he was the same man in the photos, this helped to explain why he is shown
unmanacled in the photos taken at city hall: the man wasn't a suspect, but a
witness! A witness of what? The details of the arrest provided that
information:</p>
<p>"The above subject was arrested and charged as above [Inv. Witness] after he
came to the scene of where House was arrested. When he arrived at the scene,
he stated that he recognized the car which House was driving and stated that
he thought that it belonged to his wife's cousin. On the way to the [city]
hall, the subject stated that House was recently been discharged from the
service. He stated that he had not seen House lately and that his home is in
Ranger, Texas" [emphasis added].[51]</p>
<p>As noted earlier, the interview House had with the Fort Worth Press said that
he was traveling to Fort Worth to visit his cousin, in addition to mentioning
his intent to visit his Army buddy in Dallas.[52] This man Wilson--or rather,
his wife--must be who House was going to see.</p>
<p>When I was talking with WD Roberts earlier, neither of us could figure out
why he had gotten off of the highway and driven up Riverside Drive since his
home was a number of miles farther out the same road. I drove to 6121
Broadway, the address given on Wilson's arrest record. While the house no
longer exists, the route that House took would have led him to his cousin's
house about a mile from where he was arrested. This particular segment of the
story no longer held any mystery. The question that nagged at me, though, was
how Wilson knew House had been arrested in the first place, an answer I knew
only Wilson could provide.</p>
<p>I was finally able to locate and contact Wilson (he no longer lives in Fort
Worth), who verified that he was the same Kenneth Glenn Wilson who had lived
at the 6121 Broadway address nearly 30 years ago. I explained the reason I
was calling, to identify a man in a photo which I believed to be him, and
wondered if he would be willing to help me. We discussed the circumstances
which led up to the photo being taken, and as he provided me with various
details without prompting_House's name, the make and color of car he was
driving, that he was from Ranger and that House was, in fact, his wife's
cousin_it quickly became apparent that I had found the man whose arrest
report I held, but was he the same man in the photo?</p>
<p>In the course of our conversation, he mentioned that he had a book about the
assassination with his picture in it; did I perhaps have the same one? It
turned out to be Cover-Up, which of course, I had. I asked him to turn to
page 89 where the photos of House and the "unidentified suspect" were, and
asked him if he recognized any of them. "Sure," he said. "The three across
the top are Don, and the two below that are of me."[53] One of these two
photos is the same as that which appears in FHK, as we've already discussed.</p>
<p>Satisfied that Wilson and the "unidentified suspect" were one and the same, I
arranged to meet with him the following weekend when I could make the time to
travel to where he now lives. We met one Saturday afternoon at a roadside
restaurant near the interstate; he was accompanied by his wife and young
grandson, who was visiting for the weekend. We talked for nearly three hours.</p>
<p>Wilson now wears glasses and is, in his words, "a little fatter and deeper in
debt," but the similarity with the man in the FHK photo was unmistakable. He
parts his hair differently, but facial characteristics like the nose, chin
and forehead don't change, and_despite his denial_he still has the same slim
build he had back then. When he later posed in the same semi-profile as in
the picture, there was no doubt I was looking at the same man. Furthermore,
both he and Mrs Wilson recognized the pencil he'd always hung over his ear,
and the pocket protector he wore in those days.</p>
<p>How did Wilson come to be at that place and time where his cousin-in-law had
been arrested only moments before? Mrs Wilson provided most of the
details:[54]</p>
<p>At some point after the shooting, while House had been enroute to Fort Worth,
Dallas police had contacted his mother_with whom he was living at the time_to
determine his whereabouts. After two or three such calls, Mrs House became
concerned, and called her niece, Mrs Wilson. (Mrs House is now deceased, so I
was unable to determine what DPD had talked with her about during those
calls.) Mrs House called the Wilsons' because, whenever Don came to Fort
Worth, he would spend the night with the Wilsons and she expected he would do
so this night too. After the calls from DPD, she became worried.</p>
<p>Shortly after the call from her aunt, Mrs Wilson heard a radio broadcast of a
suspect, identified as "22-year-old Donald House of Ranger, Texas" having
been arrested at 3408 East Belknap in Fort Worth.[55] At first, she said, she
didn't recognize the name since "nobody called him Donald," but realized
after a moment that it had been her cousin who'd been taken into custody in
connection with the slaying.</p>
<p>She noted that the address was only a couple of blocks from where her husband
worked selling auto parts, and called to ask him to check on Don since it
appeared he was in some sort of trouble. He excused himself from work and
walked the short distance to where House had been arrested. There, he told
officers that he thought the car belonged to his wife's cousin, and was taken
into custody at 2:20 pm.[56] "I was looking out for Don," Ken Wilson told me,
"and they ended up taking me to jail!"</p>
<p>He was not charged with a crime, and as the record of his arrest shows, he
was brought in solely as a witness. He was questioned about his relationship
with Don House and released 90 minutes later, at 3:50.[57] He returned home
with his wife, where House joined them a couple of hours later (House wasn't
released until 5:15[58]).</p>
<p>(Mrs Wilson recalled an amusing anecdote from that day: when Don had finally
come to their house, everyone wanted to know if he'd been nervous. "Nervous?
Of course not, I didn't do anything," he said, sitting down... missing the
chair completely and sprawling on the floor. Nervous? Who me? I guess not.)</p>
<p>Wilson's account also clears up questions about HW Sinclair's recollection of
the event and in reconstructing the "arrest:" House had been curbed by
Roberts and hurried into Whistler's cruiser with Harbour in the back with
House. They in turn sped off to city hall with their prisoner with Lt Wood in
the lead, who may well have given orders to secure the scene before
departing. Other officers began arriving during and after this period, one of
whom was Sinclair. Whether he arrived before or after Wilson is difficult to
determine and not really important. He was nevertheless selected to transport
Wilson to headquarters, which he did. Obviously, Sinclair did not feel
threatened by the mild-mannered Wilson, who rode beside him unmanacled and
volunteering information about his wife's cousin, Don House, during the five-
or ten-minute ride downtown. From all accounts, it was a relatively pleasant
trip, if being under arrest or dealing with suspected Presidential assassins
can ever be called "pleasant!"</p>
<p>On arriving at city hall, the two men were met by Lt Wood, who had escorted
Whistler, Roberts and House to city hall less than a half-hour before.
Undoubtedly, Wood felt a need for additional police presence ushering Wilson
into city hall because a crowd of people had gathered,[59] and under the
circumstances, it wouldn't have been unreasonable to suspect they might have
become unruly at the sight of a "suspect" in the assassination being led
before them. In fact, Ken Wilson recalled the scene as "a little frightening
with all those people standing around yelling."[60]</p>
<p>Photos of both House and Wilson were taken by photographers from both the
Star-Telegram and the Press, although neither paper ever published them. TV
camera crews also captured footage of House being led into city hall and
through the corridors of the police department, but if similar footage of
Wilson exists, I haven't seen it.</p>
<p>Conclusion
==========</p>
<p>Beginning with a photograph of an "unidentified man" said to have been
arrested in Fort Worth and connected with both the Kennedy murder and the
CIA, along with a vague rumor or two of how the "black sedan" described by
Tom Tilson may have been found in Fort Worth, we've come to find that not
only is there no evidence to support such a connection, but also that it is
quite apparent that the black sedan never actually existed and is either a
figment of Tilson's imagination, a mis-recollection, or an attempt to portray
himself as having a role in the events of November 22, 1963_however
peripheral_which he in fact did not have.</p>
<p>While it is a fact that two men were taken into custody in Fort Worth "in
connection with the shooting," there is nothing other than speculation that
can link either of them with the murder. House had been to Dallas to visit a
friend who wasn't home when he got there. Unable to leave town because of the
heavy traffic due to the parade, he waited for the motorcade to pass before
he was able to leave to visit his cousin. A couple of women at a gas station
thought he matched the broadcast description of a suspect, and he was taken
into custody, cleared and released.</p>
<p>The second man, Ken Wilson, was only trying to help House, his wife's cousin.
He was taken into city hall as a witness, and not as a suspect. He wasn't
charged with any crime, and wasn't even handcuffed as he rode to city hall in
the front seat with HW Sinclair. He was questioned about his relationship to
House, released and went home. He's hardly given a second thought to these
events afterward until I spoke with him about them.</p>
<p>That Ken Wilson remained "unidentified" for nearly 30 years is surprising
when you consider that I was able to locate and identify him within two weeks
of the time his photo in FHK was brought to my attention, using records which
"don't exist" long after others had apparently attempted the same. None of
the police officers involved in these arrests_save Lawrence Wood, who was
interviewed by The Fort Worth Star-Telegram 20 years later_had ever been
contacted by anyone, and it's apparent that the search for the men's arrest
records was neither thorough nor tenacious since they were, in fact, quite
readily available.</p>
<p>I must admit I had been somewhat surprised that Ken Wilson had never
attempted to identify himself, especially having seen his photo in Cover-Up
along with what could be considered "mysterious" if not "sinister"
insinuations made about his being taken into custody. Then again, maybe I
shouldn't have been so surprised, since there are many people who are
apprehensive or skeptical, even cautious and suspicious of anything to do
with the JFK murder, and don't want their names associated with it.</p>
<p>On the other hand, we've also got to ask ourselves who would Wilson have gone
to even had he wished to identify himself? It's not an easy task to reach an
author through his publisher after all, and even so, once a book is published
and widely circulated, it is not an easy matter to change bits of material,
especially when it doesn't add to the story. It is unlikely that Cover-Up
will be amended, but will First Hand Knowledge be corrected because we now
know for certain that the "unidentified suspect" is no longer unidentified,
was never in fact a suspect, and was absolutely not either David Phillips or
"Maurice Bishop?" We'll have to wait for the second printing to find out.</p>
<p>While the underlying concern of whether it is "better" from a publishing
standpoint to maintain the intrigue and aura of mystery, or to ascertain that
mundane details_as this has turned out to be_are accurately portrayed remains
an important one, it is in truth of little consequence whether Wilson's
"story" is corrected since, to all those thousands of people who've bought
Cover-Up and FHK and not read this article, Ken Wilson will always be a
"mysterious CIA agent" involved in the assassination whose "arrest" was
"covered up" by sinister forces. Certainly, I'd like to see the record
amended, but I don't expect it will be. I just hope the same mistake won't be
made by future authors.</p>
<p>It is perhaps unfortunate in some respects that I have brought these men and
women to the fore, even despite the fact that it has "cleared" an innocent
man from any involvement with the crime, and set the record straight about
his detention. Wilson, for example, told me how his wife's cousin, Don House,
had been "harassed" over the peripheral role he had played in the events of
November 22, 1963, and no longer wishes to talk to anyone about it; indeed,
Cover-Up states that when the authors attempted to interview House during the
course of their research, they met with "extreme hostility." Others declined
to have their recollections recorded, voicing similar concerns.</p>
<p>For these reasons, I have refrained from noting too many personal details to
preserve their privacy and hopefully to prevent them from becoming part of
"the continuing inquiry," ruing the day they first heard my name: their roles
are long since finished. I enjoyed meeting each of them, and appreciate the
time they took to speak with me, the hospitality they showed me, and the
assistance they provided to close this chapter of history quickly. I hope
they never have cause to regret it.</p>
<p>I hope too that this experience can temper the enthusiasm, even zeal, of many
researchers who feel that the "truth" can be found by citing every lead and
"reasonable conclusion" as absolute fact. If we are ever to be successful in
our efforts to re-open an official investigation of some sort, we must come
armed with evidence, not mere theories and speculations. After all, we're
supposed to be investigating a murder, not writing novels or creating myths,
aren't we?</p>
<p>Copyright c 1993, M. Duke Lane</p>
<p>The author gratefully acknowledges the advice, assistance and encouragement
of Gary Mack, Mary Ferrell, Dave Perry, and other Dallas area researchers in
this investigation.</p>
<p>NOTES
-----</p>
<p>1. Interview with Gary Null, WBAI-FM New York, 99.5 FM, October 1992</p>
<p>2. See Letters to the Editor of The Third Decade, Volume 9, Number 1,
November 1992, pp 36-40; Number 2, January 1993, pp 9-11; and Number 3, March
1993, pp 27-28 (all related).</p>
<p>3. Robert Morrow, First Hand Knowledge, 1992, S.P.I Books/Shapolsky
Publishers, Inc, New York</p>
<p>4. Gary Shaw and Larry Ray Harris, Cover-Up, self-published, Cleburne TX,
1976, page 89</p>
<p>5. Obituary, The Washington Post, July 9, 1988, pG5</p>
<p>6. "Police Launch 2-city Manhunt," The Dallas Morning News, November 23, 1963,
page 2. The full account reads: "During the frantic period at the hospital,
police, Secret Service men and FBI agents had started a 2-city manhunt. They
arrested several persons, among them a Fort Worth man who was said to be
driving a car linked to the slayer." There was no additional coverage of this
event in the paper.</p>
<p>7. Earl Golz, "Ex-officer suspect he chased `2nd gun'," The Dallas Morning
News, August 20, 1978, p 42A.</p>
<p>8. Jim Marrs, Crossfire: The Plot that Killed Kennedy, 1989, Carroll &amp; Graf
Publishers, New York, pp 325-327. This is a nearly verbatim recounting of the
aforementioned Golz article.</p>
<p>9. Golz, "`2nd gun'"</p>
<p>10. "Scenes From an Assassination" (photographic essay), The Dallas
Times-Herald, November 20, 1983</p>
<p>11. Golz, "`2nd gun'"</p>
<p>12. See Decker Exhibit 5323 (affidavits to Dallas County Sheriffs): 19H500,
Malcolm Summers, November 23, 1963; 19H497-98, Jesse James Williams, November
22, 1963; 19H501, William Clifford Anderson, November 25, 1963; 19H522-23,
November 22, 1963; and Cover-Up, p 88 (reference to DPD radio logs for
11/22/63, time not indicated)</p>
<p>13. Golz, "`2nd gun'"</p>
<p>14. Interview with WD Roberts by author, December 22, 1992</p>
<p>15. "Man Arrested Here Released," The Fort Worth Star-Telegram, November 23,
1963, p9</p>
<p>16. Warren Commission Document #301 (CD 301), pp 111-112. See also John
Moulder, "'Suspect' Seized Here Made History," The Fort Worth Press,
September 28, 1964, page 1 and Cover-Up, p 88.</p>
<p>17. Ibid CD 301, and CD 897, p 331</p>
<p>18. "'Suspect' Seized Here Made History"</p>
<p>19. Ibid</p>
<p>20. Cover-Up, p 89</p>
<p>21. 19H522-23, November 22, 1963.</p>
<p>22. Ibid, and arrest report #19560, FWPD, Donald Wayne House. November 22, 1963</p>
<p>23. Roberts interview</p>
<p>24. A six cylinder Plymouth: Roberts interview and House arrest report</p>
<p>25. Interview with BG Whistler, January 5, 1993</p>
<p>26. House arrest report</p>
<p>27. Roberts interview; Whistler interview</p>
<p>28. House arrest report. Note that this may be "official" as opposed to
actual time since an NBC newscast transcript notes the first broadcast that
"a car has been stopped at Fort Worth that may have some connection with the
shooting" at 1:49 pm CST, eight minutes earlier. WBAP radio had also
broadcast a similar statement three minutes earlier at 1:46, indicating that
House had already been pulled over and perhaps already taken to city hall.</p>
<p>29. Cover-up, p 89, upper row of photos</p>
<p>30. Wood is now deceased and surviving officers do not recall who the
motorcycle officers were, but news footage taken by KXAS-TV (then WBAP-TV)
made available to me by Fort Worth researcher Gary Mack shows Wood getting
off of his motorcycle as House is being driven up in the squad car</p>
<p>31. House arrest report; Roberts and Whistler interviews</p>
<p>32. Roberts interview</p>
<p>33. Whistler interview</p>
<p>34. Elston Brooks, "An Arrest He'll Never Forget," The Fort Worth
Star-Telegram, November 20, 1983, p 20F (Sunday special section: "Turning
Point: The Assassination of JFK")</p>
<p>35. "'Suspect' Seized Here Made History"</p>
<p>36. Ibid</p>
<p>37. "An Arrest He'll Never Forget"</p>
<p>38. Cover-Up, p 88</p>
<p>39. Photos can be seen in Cover-Up, top of p 89</p>
<p>40. House Property Record #19560, FWPD</p>
<p>41. "'Suspect' Seized Here Made History"</p>
<p>42. House disposition report #19560, FWPD. The report indicates that charges
were dropped after House was questioned, and he was released at 5:15 pm, 3
hours and 18 minutes after he'd been arrested</p>
<p>43. Roberts interview</p>
<p>44. CD 301</p>
<p>45. Cover-Up, page 89</p>
<p>46. Ibid</p>
<p>47. Ibid</p>
<p>48. Ibid</p>
<p>49. Interview with Mr and Mrs HW Sinclair, December 20, 1992</p>
<p>50. Wilson arrest record #19561, FWPD (shown on back cover), and accompanying
disposition report and property record #19561</p>
<p>51. Ibid</p>
<p>52. "'Suspect' Arrested Here Makes History."</p>
<p>53. Telephone interview with Kenneth Glenn Wilson, January 9, 1993</p>
<p>54. Interview with Mr and Mrs Kenneth Glenn Wilson, January 23, 1993</p>
<p>55. Live WBAP radio broadcast, November 22, 1963 at the time House was
brought into the jail. In addition to the newspaper reporters and
photographers who were at city hall, there were a number of television and
radio personnel. Footage from KXAS-TV and KTVT-TV (op cit) of House being
brought into police headquarters and being marched through the hallways and
offices clearly indicates that coverage of the arrest was immediate.</p>
<p>56. Wilson and House arrest records. Again, this is an official rather than
actual time.</p>
<p>57. At 3:50 pm; Wilson disposition report #19561</p>
<p>58. House disposition report #19560</p>
<p>59. WBAP-TV (NBC) news footage</p>
<p>60. Wilson interview</p>
<p></p></xml>

950
regexConsp/crybaby.xml Normal file
View File

@ -0,0 +1,950 @@
<xml><p>I notice the now-ancient Gauquelin "Mars Effect" affair continues to
crop up, perennially, with considerable time-honoured but still-fuzzy
rhetoric about an alleged CSICOP "cover up", including copious
laudatory mentions of Dennis Rawlins's ALSO-ancient jeremiad
"sTARBABY", which appeared in "Fate" magazine. Essentially all
treatments of the affair since then have been loose (and even MORE
careless) descendants of the Rawlins article, often committing gross
distortions, such as confusing the test of European athletes with the
later one based on U.S. data. </p>
<p>The ONLY proper rejoinder I've ever seen to Rawlins was a reply piece
by CSICOP Fellow P. J. Klass, which "Fate" refused to publish, and
which far too few have seen, over the years since. Robert Sheaffer
and I have now scanned in the text, and are attempting to distribute
it more widely. The full text may be downloaded or File REQuested,
but not FTP'd from my BBS as CRYBABY.ZIP (as Robert mentions in his
comments, which follow), and I'll be mailing it to other skeptics'
groups on diskette, as well as uploading it to CompuServe. </p>
<p>-- Rick Moen
Vice-Chair, Bay Area Skeptics
Sysop, The Skeptic's Board BBS, San Francisco
(also reachable at 76711.243@CompuServe.com) </p>
<p> "CRYBABY" </p>
<p> by Philip J. Klass </p>
<p>Philip J. Klass is a member of the Executive Council, Committee
for the Scientific Investigation of Claims of the Paranormal
(CSICOP). </p>
<p> [Note: This article, written in 1981, was submitted for
publication to FATE Magazine, in reply to Dennis Rawlins'
accusations against CSICOP in his Oct., 1981 FATE article
"sTARBABY". FATE adamantly refused to publish this article.
Meanwhile, Rawlins was given the opportunity to make a
rambling, six-page statement in the SKEPTICAL INQUIRER
(Winter, 1981-82, p.58), which was published exactly as
received, presenting his accusations of a "coverup." This
was in addition to the 5 1/2 page article he earlier had on
the "Mars Effect" in the Winter, 1979-80 issue (p.26). To
this day, supporters of the paranormal still charge CSICOP
with perpetrating a "coverup" on this matter. Only a
relatively few people ever saw Klass's "CRYBABY", the long
and detailed answer to Rawlins' "sTARBABY" charges. Now that
you have the opportunity to read Klass's rebuttal, you can
make up your own mind. </p>
<p> Klass's original text has been reproduced below, exactly as
typed, with the author's permission. Spelling and
punctuation have not been changed. Text that was underlined
in the original appears in capital letters.
- Robert Sheaffer, Bay Area Skeptics, 1991.
This article is brought to you courtesy of the Bay
Area Skeptics' BBS, 415-648-8944, from which it is
available for downloading, although not via FTP.] </p>
<p> "They call themselves the Committee for the Scientific
Investigation of Claims of the Paranormal. In fact, they are a
group of would-be-debunkers who bungled their major
investigation, falsified the results , covered up their errors
and gave the boot to a colleague who threatened to tell the
truth." Thus began a 32-Page article in the October 1981 issue of
FATE magazine, which a a press release headlined: "SCIENTIST
BLOWS THE WHISTLE ON PARANORMAL COVERUP." </p>
<p> Since CSICOP was formed in the spring of 1976, it has been a
thorn in the side of those who promote belief in "psychic
phenomena," in astrology, UFOs, and similar subjects and it has
been criticized sharply by FATE whose articles generally cater to
those who are eager to believe. However, this FATE article was
written by skeptic Dennis Rawlins, who was one of the original
Fellows in CSICOP and for nearly four years had been a member of
its Executive Council. This would seem to give credence to
Rawlins' charges -- except to those of us with first-hand
experience in trying to work with him and who are familiar with
his modus-operandi. </p>
<p> Because Rawlins proposed my election to CSICOP's Executive
Council I cannot be charged with animosity toward him, except
what he later engendered by his actions. And in a recent letter
to me, Rawlins volunteered that I "was less involved than any
other active Councillor" in the alleged misdeeds. </p>
<p> The FATE article, entitled "sTARBABY" prompted my own
investigation into Rawlins' charges. But unlike Rawlins, who
relies heavily on his recollection of conversations several years
earlier, I chose to use hard evidence - published articles,
memoranda and letters, some of which Rawlins cites in his
article. When I requested copies of these letters and memoranda
from the several principals involved, all of them responded
promptly and fully except for one -- Dennis Rawlins, who had
accused the others of "cover-up" and "censorship." RAWLINS
REFUSED MY REPEATED REQUESTS TO SUPPLY HARD DATA THAT MIGHT
CONFIRM HIS CHARGES, AND WHICH ALSO COULD DENY THEM! </p>
<p> The results of my investigation, based on hard data,
prompted me to conclude that the Rawlins article should have been
entitled "CRYBABY," and that an appropriate subtitle would have
been: "A wounded ego is the root of much evil." </p>
<p> If the editors of FATE had spent only a few hours reading
published articles cited in the Rawlins article they could not in
good conscience have accused CSICOP of "cover-up" or of having
"falsified the results." Instead, FATE chose to ignore the
traditional journalistic practice of investigating both sides of
a controversial issue and publishing both sides, as those accused
by Rawlins had done. </p>
<p> Rawlins' charges result from two tests intended to assess
whether the position of the planet Mars at the time of a person's
birth has a significant influence on whether he/she becomes a
"sports champion." This "Mars effect" hypothesis was first
proposed by France's Michel Gauquelin, who directs the laboratory
for the Study of Relations between Cosmic and Psychophysiological
Rhythms, based on a study of European champions. </p>
<p> The first of the two tests was performed by Gauquelin
himself, with results that generally were supportive of the Mars
effect hypothesis by eliminating a possible objection that first
had been raised by others, i,e, not CSICOP. The only way in which
CSICOP, or persons affiliated with it, could be guilty of
Rawlins' charges would be if they had refused to publish
Gauquelin's results or had intentionally altered the data in his
report. NEITHER OCCURRED. Nor did Gauquelin accuse CSICOP or its
members of trying to "cover-up" his results or altering the data
of this first test whose calculations he himself performed,
although there were some differences of interpretation of the
implication of these results. </p>
<p> HOWEVER, GAUQUELIN DID PUBLICLY ACCUSE RAWLINS OF DISTORTION
AND MISREPRESENTATION, with implied criticism of CSICOP because
Rawlins then was a member of its Executive Council. There would
be other occasions when CSICOP would be criticized because of
Rawlins' intemperate statements and actions. </p>
<p> This criticism was published by CSICOP in the Winter l978
issue of its publication, THE SKEPTICAL INQUIRER (p. 80). In it
Gauquelin wrote: "How, in spite of all this data could one
distort and misrepresent the effect in question and sow doubts on
the subject? Dennis Rawlins, a member of CSICP ... has done just
this in a polemic which appeared in the Fall-Winter 1977 issue of
that (CSICOP's) journal." In "sTARBABY," Rawlins tries to shift
the blame for his transgressions to CSICOP. </p>
<p> According to "sTARBABY," CSICOP Chairman Prof. Paul Kurtz
was the principal architect of the alleged cover-up. Yet in
reality it was Kurtz, then editor of THE HUMANIST magazine
(published by the American Humanist Assn.) who printed the
lengthy paper by Gauquelin describing the seemingly favorable-
for-him results of the first test in the Nov/Dec,l977 issue (p.
30). What kind of doubletalk is this when Rawlins and FATE charge
that Kurtz's decision to publish test results favorable to an
"adversary" represents a "cover-up"? Rawlins might better have
waited until "l984" to resort to such "double-speak" accusations. </p>
<p> Because the issues are complex and because two different
publications and organizations were involved, it is useful to
recount briefly the events that led to the first Mars effect
test, which is at the root of the Rawlins/FATE charges, and the
second tests performed using data for outstanding U.S. athletes.
Based on calculations performed by Rawlins himself, the U.S.
champions test showed a very UNFAVORABLE result for the claimed
Mars effect, which Rawlins confirms in "sTARBABY." And these
Rawlins-computed results were published, without change, by
CSICOP. </p>
<p> The Sept/Oct. l975 issue of THE HUMANIST carried an article
by L.E. Jerome that was critical of astrology in general and of
the Mars effect in particular. When Gauquelin sought an
opportunity for rebuttal, Kurtz provided it in the Jan./Feb. 1976
issue of THE HUMANIST, which also carried several other articles
on astrology. Because Gauquelin's article claimed that the
Mars effect had been confirmed by Belgian Committee for the
Scientific Investigation of Alleged Paranormal Phenomena (created
some 25 years earlier), that group also was invited by Kurtz to
submit an article for publication. Belgian Comite Para, as it is
called, confirmed Gauquelin's calculations. But it questioned his
statistical assumption "that the frequency distribution of the
hours of birth during the day (the nych-themeral curve) is a
constant distribution...", i.e. that there is an equal
probability of a person being born during any hour of the day. </p>
<p> This seemed important because the Mars effect hypothesis
holds that persons born during an approximately two-hour period
just after Mars has "risen" or during a comparable period after
Mars is at upper culmination (zenith), are more likely to become
sports champions than persons born during other hours of the day.
If there is an equal probability of a person being born in any
one of the 24 hours, then 4/24, or l6.7%,of the general
population should be born when Mars is in one of these two "key
sectors." (Because of combined orbital motions of Earth and Mars,
the percentage of the day in which Mars is in two key sectors is
approximately l7%. But Gauquelin reported that 22% European
champions in his data base had been born when Mars was in the two
key sectors, significantly higher than the l7% "benchmark." </p>
<p> Because of the issue raised by Comite' Para, Kurtz
consulted statistics professor Marvin Zelen who in turn proposed a
control test that could resolve the statistical issue raised by
Comite' Para. This Zelen proposed test, also published in the
same (Jan./Feb. 1976) issue of THE HUMANIST, suggested that
Gauquelin should gather birth data for "non-champions" who had
been born in the same local areas and within three days of a
RANDOMLY SELECTED sub-sample of Gauquelin's "champions" who
seemed to show the Mars effect. </p>
<p> If only 17% of these NON-champions were born when Mars was
in the two key sectors, this would void the issue raised by
Comite Para. But if roughly 22% of the NON-champions also were
born when Mars was in the two key sectors, this would undercut
the Mars effect hypothesis. Zelen's article concluded that the
proposed test offered "an objective way for unambiguous
corroboration or dis-confirmation." In retrospect it would have
been more precise had he added: "...of the issue raised by
Belgian Comite Para." If Gauquelin's sample of "champions" data
was "biased," as Rawlins first suspected, this could not possibly
be detected by the Zelen-proposed test. </p>
<p> The same issue of The Humanist carried another article, by
astronomy professor George O. Abell, which was very skeptical of
astrology in general. But unlike Rawlins who dismissed the Mars
effect out-of-hand and "didn't believe that it merited serious
investigation yet" (FATE: p. 74), Abell wrote that if Gauquelin's
findings were correct, they were "extremely interesting." </p>
<p> However, Abell included the following note of caution: "If
all of Gauquelin's work is re-checked, and his results hold up,
then it is necessary to repeat the experiment with a new sample,
say in the United States. If that sample should give the same
result, then further verification is in order, until it is
absolutely certain that the effects are real and reproducible.
That is the way science works; reproducibility of results is
necessary before fundamental new laws can be inferred." This sage
advice clearly indicated the limits of what conclusions could be
drawn, and could not be drawn, from the results of the upcoming
Zelen test, and even from a complete re-check of Gauquelin's
original data on European champions, which was not attempted. It
should be stressed that at the time this first (Zelen) test was
proposed, CSICOP did not yet exist. Several months later, when it
was formed (initially under the auspices of the American Humanist
Assn.), Kurtz became its co-chairman and later its chairman.
Zelen and Abell were named Fellows, but not to CSICOP's Executive
Council. In l980, Abell was elected to replace Rawlins on the
Council. </p>
<p> The results of this first (Zelen) test were published in the
Nov./Dec., l977 issue of THE HUMANIST, where the issue first was
raised, although by this time CSICOP had its own publication.
Gauquelin and his wife Francoise were given nearly six large-size
magazine pages to present their findings without censorship.
Gauquelin reported having difficulties in obtaining data for non-
champions born within several days of champions in small towns,
so he said that non-champions birth data had been obtained only
from the large cities in France and Belgium, The Gauquelins
reported that these data showed that only l7% of the non-
champions had been born when Mars was in the two sectors which
seemed to resolve the issue earlier raised by Belgium's Comite
Para in favor of the Mars effect. </p>
<p> The same issue of THE HUMANIST carried an article jointly
authored by Zelen, Kurtz, and Abell, that began: "Is there a
'Mars Effect'? The preceding article by Michel and Francoise
Gauquelin discusses the experiment proposed by Marvin Zelen and
its subsequent outcome. Their conclusions come out in favor of
the existence of a 'Mars effect' related to sports champions. It
is the purpose of this article to discuss the analysis of the
data and to point out the strengths and weaknesses of the
evidence in favor of the 'Mars effect.'" </p>
<p> The Zelen/Kurtz/Abell article raised some questions about
the results. For example, that "the 'Mars effect' only appears in
Paris, not in Belgium or in the rest of France." The article
concluded: "lf one had a high prior 'belief' that there is a Mars
effect, then the Gauquelin data would serve confirm this prior
belief. In the other hand, if the prior belief in the existence
of a Mars effect was low, then this data may raise the posterior
belief, but not enough to accept the existence of the Mars
effect." </p>
<p> Rawlins charges that publication of this article, following
the uncensored Gauquelin paper,"commited CSICOP to a cover-up."
(FATE: p.76) Yet is characteristic of scientific controversy for
one party to question or challenge another's interpretation of
the data. And Gauquelin would do so following the second test
without being accused of a "cover-up" in "sTARBABY." </p>
<p> In the same issue of THE HUMANIST, in a brief introduction
written by Kurtz, the first "linkage" with CSICOP occurred. Kurtz
wrote: "Thus, members of CSICOP involved in this inquiry believe
that the claim that there is a statistical relationship between
the position of Mars at the time of birth of individuals and the
incidence of sports champions among them has not been established
.. to further the cause of scientific inquiry, the committee has
agreed (with Gauquelin) to make an independent test of the
alleged Mars effect by a study of sports champions in the United
States." </p>
<p> In "sTARBABY," Rawlins charges that the U. S, champions test
was a "diversion." Clearly the Gauquelins themselves did not view
it in this light, judging from the concluding statement in their
article which said: "Let us hope that these positive results may
induce other scientists to study whether this effect, discovered
with the European data, appears also with the U.S. data." </p>
<p> On March 28, 1978, SEVERAL MONTHS AFTER THE RESULTS OF THE
FIRST TEST WERE PUBLISHED, Rawlins sent Kurtz a copy of a three-
page memorandum he had prepared a year earlier (March 29, 1977).
It contained a very technical analysis of the issue raised by
Comite Para, which prompted Rawlins to conclude that the 22%
figure reported for European champions was not the result of a
disproportionate share of births of the general population during
the early morning hours when Mars often was in one of the two key
sectors. In this analysis, Rawlins concluded that Gauquelin had
"made fair allowance for the effect." </p>
<p> But Rawlins had not written this three-page memo until
several month AFTER the Zelen test had been proposed in THE
HUMANIST. Shortly after preparing the analysis, Rawlins had sent
a copy to Prof. Marcello Truzzi, then editor of CSICOP's
publication. Truzzi had decided not to publish it but sent a copy
to Gauquelin. IF the Rawlins analysis of 1977 took account of all
possible demographic factors -- and there is some disagreement on
this question -- it was much too technical to be understood by
persons without expertise in statistics and celestial mechanics. </p>
<p> When Rawlins finally got around to sending this analysis to
Kurtz on March 28, 1978, his letter of that date did NOT
criticize Truzzi or CSICOP for not having published it earlier.
Rather, Rawlins admitted, "I should not have kept my (Mar. 19,
1977) memo..private after all." He did suggest that perhaps it
might now be published in THE HUMANIST. But by this time Kurtz no
longer was its editor. More important, the results of the first
(Zelen) test already had been published several months earlier. </p>
<p>If, as Rawlins would later charge in "sTARBABY," the
Zelen/Kurtz/Abell article published several months earlier in THE
HUMANIST amounted to a "cover- up," Rawlins did not make such an
accusation to Kurtz when he wrote him April 6, 1978. Instead,
Rawlins wrote; "I think our best bets now are 1. The main
European investigation might seek to discover how the Eur. samp
(of Gauquelin) was (hypothetically) fudged -- check orig. records
microscopically for some sort of Soal trick. 2. Proceed with the
U.S, test, where we know we have a clean (unbiased) sample." </p>
<p> This April 6, 1978, letter clearly shows that while Rawlins
suspected that Gauquelin had manipulated his European champions
data ("Soal trick") he found no evidence of wrong-doing by
Zelen/Kurtz/Abell. On April 26, 1978, in another letter to Kurtz,
following his visit with Rawlins in San Diego, Rawlins wrote that
he "was certain" that Gauquelin's original data "was biased, but
not sure how." Rawlins concluded this letter on a cordial note:
"Now, wasn't it great visiting sunny, funny, California -- and
getting to see a real live nut religion launch itself in San
Diego? ... hope you'll get back this way soon again." </p>
<p> It was at about this time that CSICOP came under fire for
Rawlins' actions in another matter. In the summer of 1977,
Rawlins and Abell had been invited to be panelists in a symposium
on astrology to be held March 18, 1978 at the University of
Toronto at which Gauquelin, among others, would participate. The
invitation came from Dr. Howard Eisenberg on the stationary of
the University's School of Continuing Studies. Both Rawlins and
Abel had accepted. Then, in late September, 1977, Eisenberg
withdrew the invitations on the grounds that "the response from
potential speakers...has yielded an incredible acceptance rate of
100%. This places us in the embarassing position of not being
able to sponsor all of you," i.e. pay travel expenses and allow
formal presentations. </p>
<p> On Feb. 6, 1978, Rawlins wrote to the president of the
University of Toronto, protesting what he said were "a number of
oddities" associated with the symposium, including an imbalance
between the number of astrology supporters and skeptics. The
Rawlins letter charged that "this conference looks to be a pretty
phoney confrontation, which will therefore give the irrational
pseudo-science of astrology an evidentially-unmerited 'academic'
boost in public credibility..." Rawlins sent a copy of his letter
to another university official. </p>
<p> Rawlins' suspicion of a loaded panel may have been
justified. But the letter of protest was written on CSICOP
stationery and signed "Dennis Rawlins, Executive Council,
CSICOP." Another regretable action was a Rawlins telephone call
late at night to a university astronomy professor, Robert
Garrison, which gave the impression that Rawlins was speaking in
behalf of CSICOP. In fact, Rawlins had taken these actions
without consulting other Council members and without official
approval to use CSICOP's name. In early April 1978, a copy of the
Rawlins letter had reached Truzzi, who also had been invited and
dis-invited to participate in the conference. The Rawlins letter
claimed that Truzzi had co-authored "an astrology-supporting
paper...and so rates as a strange sort of skeptic." Truzzi sent
Kurtz a copy of this Rawlins letter with a note that said: "Since
Dennis' letter is on Committee stationery, would appear he is
writing on behalf of the Committee, I trust that will not happen
again." </p>
<p> Rawlins' actions were reported in the Canadian magazine
SCIENCE FORUM July/August 1978, in an article written by Lydia
Dotto. The article, entitled "Science Confronts 'Pseudo-
Science'", began; "It was after midnight on a Saturday night when
University of Toronto astronomer Bob Garrison was awakened by a
phone call. The caller identified himself as a member of the
Committee for the Scientific Investigation of Claims of the
Paranormal, and according to Garrison, he spent the best part of
the next hour urging the U of T scientist not to participate in
the conference on astrology...Dennis Rawlins, a California
astronomer and science writer and a member of the Committee,
acknowledged in an interview that he made the call, but denied he
was trying to talk Garrison out of attending the
conference...this and other incidents surrounding the conference
have become something of a cause celebre, particularly since the
event was cancelled shortly before it was to have taken place in
mid-March. Predictably, ACCUSATIONS BEGAN TO FLY THAT SCIENTIFIC
OPPONENTS OF ASTROLOGY WERE ENGAGED IN A CAMPAIGN TO SUPPRESS
FREEDOM OF SPEECH." (Emphasis added.) </p>
<p> Indeed they did, much to CSICOP's embarassment. Britain's
New Scientist magazine, in its June 29, 1978, issue, quoted the
Canadian magazine in an article that began: "Earlier this year an
astronomer at the University of Toronto, Dr. Bob Garrison, was
awakened by a phone call from a member of Committee for the
Scientific Investigation of Claims of the Paranormal. The caller
allegedly spent most of the next hour trying to dissuade Garrison
from taking part in a conference on astrology." </p>
<p> This New Scientist account was picked up by FATE magazine,
which in turn attributed the action to CSICOP rather than to one
Council member. FATE commented: "If you have difficulty
understanding their (CSICOP) motives, remember that here is a
dedicated group of witch-hunters seeking to burn nonbelievers at
the stake." (How ironic that FATE now is promoting the views of
the same person whose intemperate earlier actions had provoked
FATE's harsh criticism.) The same criticism of CSICOP, because of
Rawlins' actions surfaced again in a feature article in THE
WASHINGTON POST (Aug. 26, 1979). The article, syndicated and
published elsewhere, was written by Ted Rockwell who was
identified as a member of the Parapsychological Association. </p>
<p> When I learned of the Rawlins incident, I was shocked as
were others on the Council. But all of us hoped that Council
members had learned an important lesson from the incident and
that it would have a maturing effect on Rawlins. Yet before
another year had passed Rawlins would once again demonstrate his
inability to distinguish between official CSICOP actions and
those of its individual members. </p>
<p> Originally it was expected that the required calculations of
Mars' position at the time of birth of U.S. champions (for the
second test) would be performed by Prof. Owen Gingerich of
Harvard University. But during the summer of 1978 the Harvard
astronomer was on an extended leave so Kurtz asked Rawlins to
perform the celestial mechanics computations. Rawlins did so and
found in sharp contrast to Gauquelin's findings that 22% of the
European champions were born when Mars was in the two key
sectors, and compared to the "chance" benchmark figure of 17%,
only 13.5% of the U.S. champions were born when Mars was in the
two key sectors. Thus, Rawlins' calculations showed that if Mars
had any effect on champions, it was a pronounced NEGATIVE effect
for U.S. athletes. </p>
<p> On Sept, 18, 1978, Rawlins prepared a four-page report
describing the procedures he had used in his calculations and a
summary of the results. But Rawlins could not resist including
some denigrating charges against Gauquelin. For example:
"Gauquelin was well known in his teens for his casting of
horoscopes (a practice he has since disowned)..." The comments
were both gratuitous and inappropriate. </p>
<p> Relations between Rawlins and Gauquelin had been strained
since CSICOP published a long, rambling Rawlins attack
(Fall/Winter 1977) in which he accused Gauquelin of "misgraphing
the results of the Belgian Comite Para check on his Mars-athletes
link..." Gauquelin had responded with the charge that Rawlins had
distorted and misrepresented the facts in a letter which then was
scheduled to be published shortly in the Winter 1978 issue of THE
SKEPTICAL INQUIRER. The same issue also would carry a sharp
rejoinder from Rawlins. </p>
<p> Thus it is hardly surprising that Kurtz decided that it
would be best if the upcoming summary report on the results of
the U.S. champions test should be written by Zelen, Abell and
himself -- especially since the three of them had jointly
authored the earlier article and Abell had proposed the U.S.
test. If Kurtz instead had suggested that the U.S. champions test
report be jointly authored with Rawlins instead of Abell,
"sTARBABY" might never have been published. This is evident from
numerous Rawlins complaints in "sTARBABY." For example, Rawlins
complains that the day after Kurtz received his Sept. 18, 1978,
report (with the ad hominem attack on Gauquelin) "Kurtz wrote
Abell to suggest KZA (Kurtz, Zelen and Abell) confer and prepare
the test report for publication (EXCLUDING ME)." (Emphasis
added.) (P.79.) </p>
<p> Rawlins also complains that Kurtz asked Zelen and Abell "to
verify the work," i.e. Rawlins' calculations. (P.80.) Because of
the importance of test, it was good scientific protocol to ask
other specialists to at least spot-check Rawlins' computations.
Then Rawlins reveals he was angered because "Abell asked
countless questions about my academic training." (P. 8O.)
Inasmuch as Rawlins lists his academic training as being in
physics rather than astronomy, Abell's questions seem justified. </p>
<p> Further evidence of Rawlins' wounded ego is his complaint
that "not only was Abell being invited to the press conference
(at the upcoming Council in Washington, D.C.), he was to be the
CSICOP spokesman on astrology in Washington." (P.81) Rawlins said
he "strongly protested the high-handedness of the choice of Abell
as the speaker at the annual meeting...I emphasized that CSICOP
had plenty of astronomers associated with it (Carl Sagan, Bart
Bok, Edwin Krupp and others), all of them nearer Washington than
Abell who lived all the way across the country, in the Los
Angeles area." (In fact, Krupp also lived in Southern California,
Bok lived Arizona, and Sagan then was working in California on
his "Cosmos" television series.) </p>
<p> In "sTARBABY," Rawlins claims that Abell had been invited to
speak because "Kurtz was trying to suppress my dissenting report
(of Sept. 18, 1978) and (by not paying my travel fare) to keep me
from the December Council meeting while inviting to Washington as
a prominent CSICOP authority the very person whose appointed task
I HAD MYSELF PERFORMED" (his italics, p. 81). In reality, there
was no question that Rawlins' Sept, 18, 1978, report, describing
his analytical procedures, needed to be published. The only
question was whether it should include the ad hominem attack on
Gauquelin. </p>
<p> It was not until approximately one year AFTER the results of
the Zelen test were published in THE HUMANIST that Rawlins first
charged the use of "bait-and-switch" tactics--what he calls
"BS"--had been employed. This allegation was contained in his
letter of Nov. 2, 1978, to Zelen, with a copy to Kurtz. BUT
RAWLINS STILL DID NOT CHARGE THAT THIS AMOUNTED TO A "COVER-UP,"
OR THAT CSICOP WAS INVOLVED. Quite the opposite. A few weeks
later when the Winter 1978 issue of THE SKEPTICAL INQUIRER was
published, there was a Rawlins response which said: "It SHOULD BE
CLEARLY UNDERSTOOD THAT CSICOP AS A BODY NEVER HAD ANYTHING TO DO
WITH THE HUMANIST ZELEN TEST 'CHALLENGE'...PUBLISHED BEFORE THE
COMMITTEE WAS FOUNDED"(Emphasis added.) </p>
<p> Like most members of CSICOP's Executive Council who had not
been involved either in the first (Zelen) test or the subsequent
U.S. champions test, and who were not sufficiently expert in
celestial mechanics, statistics or astrology to take a prior
interest, my first exposure to the controversy came during the
Council meeting in Washington in early December, 1978, when
Rawlins unleashed a rambling harrangue. Understandably I was
confused by Rawlins' charge that CSICOP somehow was involved in a
Zelen test-results cover-up that had occurred more than a year
before which contradicted his just-published statement in THE
SKEPTICAL INQUIRER stating that the original Zelen test was NOT a
CSICOP-sponsored effort. </p>
<p> Despite my efforts to understand Rawlins' allegations, it
was not clear to me (and to many other Council members) just what
it was that he now was claiming had been"covered-up." After three
years of working with Rawlins I was well aware of his proclivity
for making harsh, exaggerated charges. Most often these were
directed against supporters of the para-normal, but sometimes
also against Council members who disagreed with his proposals for
intemperate actions against "the believers." For example, Rawlins
had charged that Truzzi was involved with the "Church of Satan." </p>
<p>Beyond having difficulty in understanding the specifics of
Rawlins' charges, I failed to grasp what he thought should be
done to correct the alleged problem. Because the hour was getting
late and Council members had to leave to catch flights back home,
I suggested to Rawlins that he write a memorandum that clearly
and concisely set forth the basic issues and that he recommend
appropriate corrective action. In this way Council members could
better comprehend the matter and consider corrective action if
such were justified. Rawlins cites this in "sTARBABY" and claims
he was the only party who had put the issues in writing. BUT HE
DID NOT SEND COPIES OF SUCH MEMORANDA TO COUNCIL MEMBERS. ONE
LOGICAL EXPLANATION FOR THIS IS THAT PREVIOUSLY HE DID NOT
BELIEVE THE MATTER INVOLVED CSICOP OR REQUIRED COUNCIL MEMBERS'
ATTENTION. </p>
<p> Rawlins was the last one to leave my apartment (where we had
been meeting that night) and he continued his earlier harrangue
but without clarifying the issues. Later, he called me from the
airport to continue the discussion. Again I asked that he clarify
the issues for me and other Council members by preparing a
memorandum. I assured Rawlins that since I had not been involved
in either of the two tests and since he had recommended my
election to Council, he could expect me to be at least neutral if
not sympathetic. </p>
<p> Rawlins never responded to my request. About six weeks later
(Jan. 17, 1979), he did circulate a five-page memo to CSICOP
Fellows and Council members. It was a "baby sTARBABY" which cited
a number of ALLEGED mistakes that had been made by OTHERS
involved in the tests and in CSICOP's operations. I replied on
Jan. 31 saying that his memo was "for me an unintelligible
jumble." I added: "without meaning to give offense to a friend, I
once again urge you -- as I did at our meeting here -- to outline
the problem...then outline your recommendations. And please do
not assume, as you have done, that all of us follow the G-affair
as closely as you have done." My letter concluded: "Skip the
invective...outline the problem clearly, concisely, and offer
your recommendations." </p>
<p> Rawlins never responded to this request. Today, following my
recent investigation, I know why. There was no cover-up, except
in Rawlins' troubled mind, fed by the fires of a wounded ego and,
perhaps, by embarassment over his unauthorized intervention in
the University of Toronto symposium. Rawlins was unable to
recommend specific corrective action because nothing could have
saved his wounded ego unless it were possible to turn back the
clock and to have invited Rawlins to be the CSICOP speaker on
astrology in Washington and to replace Abell in writing the
report on the results of the U.S. champions test. </p>
<p> Readers of "sTARBABY" might easily conclude that Rawlins
believes that Zelen/Kurtz/Abell, in the Nov/Dec. 1977 issue of
THE HUMANIST, should have conceded "Gauquelin has won" and
cancelled plans for the U.S. champions test. Yet had they done
so, Rawlins would have been outraged because such a concession
would imply that the Zelen test had proved the Mars effect beyond
all doubt and this was not true. Had Zelen/Kurtz/Abell even
contemplated such a concession, I am certain that Rawlins would
have urged that they be ousted from CSICOP. </p>
<p> "sTARBABY" reveals that Rawlins imagines many things that
simply are not true, such as his charge that I was involved in a
plot to suppress his discussions of the Gauquelin test at the
1978 Council meeting. His article implies that Council meetings
are characterized by attempts to suppress dissenting views. In
reality one usually hears almost as many different viewpoints as
there are Council members present. And Kurtz is the most
unconstraining group chairman I have ever known in the many
organizations of which I have been a member. </p>
<p> Even on easily ascertainable matters, Rawlins chooses to
rely on his vivid imagination or recollections rather than take
time to check the facts. For example, in "sTARBABY," Rawlins
claims that he was an "associate editor" of THE SKEPTICAL
INQUIRER, as well as being a member of its editorial board --
which he was [not]. Rawlins makes that claim in seven different
places in his article. One would expect that a person who
imagines himself to be an associate editor of a publication over
a period of several years would at least once look at that
publication's masthead, where its editorial staff is listed. Had
Rawlins done so he would not have made this spurious claim. </p>
<p> This is not an error of great consequence. But when I
pointed it out to him, his response was revealing, especially
because he accuses others of being unwilling to admit to error
and of resorting to "cover-up." Rawlins' letter of Sept. 21,
1981, explained that at a Council meeting HELD FOUR YEARS EARLIER
he remembers that "Kurtz called all Ed. Board members 'Associate
Editors'...I adopted to save syllables." Rawlins tries to justify
his misstatement of fact on the grounds that he was able to save
approximately 42 characters in his 75,000-character-long article! </p>
<p> In "sTARBABY," Rawlins claims that the full-day meeting of
the Council in Washington was held at the National Press Club
because this was "the temple of CSICOP's faith." (P. 86.) Had
Rawlins asked me, I would have informed him that I had selected
the National Press Club because it was the lowest-cost facility
in downtown Washington that I could find. But Rawlins decided he
knew the answer without bothering to investigate. This is neither
good science nor good journalism. </p>
<p> In the previously cited Rawlins memorandum of Jan. 17, 1979,
following the Washington meeting, he wrote that he planned to
reduce his involvement with CSICOP. He added that there was no
reason to "hide" CSICOP's problems "from the public. So I may
inform a neutral, responsible, unsensational member of the press
re the foregoing." In reality Rawlins already had taken such
steps at the December Council meeting whose press seminar was
attended by an experienced journalist with a known empathy for
some paranormal claims. During the early afternoon Rawlins and
this journalist left the meeting together and returned together
several hours later. But this journalist never published anything
on the matter, possibly because he has as much difficulty in
understanding Rawlins' charges as did Council members. </p>
<p> According to "sTARBABY," in mid-1979, Rawlins received a
letter from Jerome Clark of FATE magazine, expressing an interest
in learning more about Rawlins' complaints against CSICOP.
Rawlins claims that shortly afterward "I told the Council I'd be
open with FATE." I question the truthfulness of his statement
because Rawlins did not bother to attend the next Council meeting
in December, 1979, nor have I been able to locate any Rawlins
letter or memorandum to substantiate this claim. </p>
<p> "sTARBABY" claims that "as the FATE-story realization set
in, Council reacted like the White House when it learned that
John Dean had sat down with the prosecution (during the Watergate
scandal). (P.91) This claim I know to be false. The prospect of a
Rawlins article in FATE was never discussed at the 1979 or 1980
Council meetings, nor by memorandum during the two intervening
years. Otherwise CSICOP would have prepared a response which it
could have released immediately following publication of
"sTARBABY," preventing Rawlins from boasting that failure of
CSICOP to respond quickly to his many charges indicated an
inability to do so. </p>
<p> Returning, chronologically, to the fall of 1979, CSICOP was
preparing to publish the results of the U.S. champions test in
the Winter 1979-80 issue of THE SKEPTICAL INQUIRER. Rawlins
demanded the right to revise and expand his original Sept, 18,
1978, paper, and was given that opportunity. Furthermore,
according to "sTARBABY," Rawlins informed Ken Frazier, editor of
THE SKEPTICAL INQUIRER, "that if there were any alterations not
cleared with me, I wanted a note printed with the paper stating
that deletions had occurred over the author's protest and that
the missing portions could be obtained directly from me." (P.
92.) </p>
<p> Frazier (who had been recommended for the position by
Rawlins himself), acting on the recommendation of Prof. Ray
Hyman, a Council member who reviewed the Rawlins paper and the
others, and on Frazier's own long editorial experience, decided
to delete the sentence referring to Gauquelin's earlier interest
in traditional astrology. Frazier also opted to delete another
sentence that read: "In this connection I must also say that,
given the self piekill upshot (sic) of their European
(nonchampions) adventure plus their failure to perform
independently the U.S. study's technical foundations (sector
position, expectation curve), I find it amusing that ZKA (Zelen,
Kurtz, Abell) are the main commentators on this test in THE
SKEPTICAL INQUIRER." Once again Rawlins' wounded-ego had
manifested itself. </p>
<p> On Nov, 6, 1979, Rawlins sent a memo to other members of the
Editorial Board complaining that his article "has been neatly
censored here and there, so I have asked to add a statement
saying so and suggesting that readers who wish to consult the
original version may do so by contacting me. This sentence has
itself been bowdlerized (so that it reads as if no tampering
occurred)." Frazier had proposed an alternative sentence, which
was published at the end of the Rawlins paper, that read:
"Further commentary on the issues raised in this paper and in
these notes is available from the author." Rawlins' address also
was published. </p>
<p> This is the basis for Rawlins' harsh charges of "censorship"
against Frazier, the man whom he had so highly recommended for the
position. If Rawlins' complaint were justified, every working
journalist could make the same accusations regularly against
those who edit his/her copy to assure clarity and good taste and
to avoid libel. In response to Rawlins' charges, Frazier wrote to
members of the Editorial Board explaining what had transpired.
Frazier noted, "Dennis seems to believe his position as a member
of the Editorial Board gives his writings special status exempt
from normal editorial judgment. None of the rest of you has ever
suggested this," i.e. demanded privileged treatment. So because
Rawlins was not given privileged treatment, he charges
"censorship." </p>
<p> In the same Nov. 6, 1979, letter charging censorship,
Rawlins complained that he alone among Council members had not
been reimbursed for his travel expenses of $230 to the previous
Council meeting in Washington. Rawlins said that he would need
$400.00 for travel to attend the upcoming Council meeting in New
York and added "I won't do that unless all 63O dollars are here
beforehand." Kurtz promptly sent Rawlins a check for $350 as a
travel advance and assured him he would be reimbursed for
previous travel expense as soon as he submitted an expense
account--which Rawlins had never done (In "sTARBABY," Rawlins
characterizes this as a "ridiculous excuse" for failure to
reimburse him earlier.) Rawlins cashed the $350 check but did not
attend the New York Council meeting, nor did he inform the
Council that he would not attend. Rawlins never refunded the $120
difference between $230 he claimed was due him and the $350 he
received. Yet Rawlins professes to have been shocked and
surprised when the Council voted unanimously not to reelect
Rawlins at its New York meeting. (Since Rawlins seems so easily
shocked and surprised, I suspect he was equally surprised at the
resignation of Richard M. Nixon.) </p>
<p> Two months later, Rawlins wrote to Frazier saying he wished
to resign from the Editorial Board. But he insisted that the
resignation should not take effect until his statement
complaining about not being reelected "in absentia" was
published. This Rawlins statement claimed that he had not been
reelected solely because he had criticized "CSICOP's conduct
during ITS FOUR YEAR INVOLVEMENT in testing Gauquelin's neo-
astrology..." (Emphasis added.) </p>
<p> Had Frazier opted to publish this grossly inaccurate
statement, which he did not, readers might well have wondered if
there were really two different Dennis Rawlins, recalling barely
a year earlier when a Rawlins letter had been published which
said: "It should be clearly understood that CSICOP as a body
never had anything to do with the Humanist Zelen test
'challenge'..." When Frazier accepted Rawlins' resignation, this
prompted Rawlins to complain that he had been removed from the
Editorial Board without "cause or written notice." Later,
following a mail ballot of Council members, CSICOP dropped
Rawlins from its list of Fellows. (The vote against Rawlins was
6:1.) </p>
<p> The foregoing highlights the key issues and actions that
prompted FATE and Rawlins to charge that CSICOP "bungled their
major investigation, falsified the results, covered up their
errors and gave the boot to a colleague who threatened to tell
the truth." (After my investigation, a re-reading of "sTARBABY"
gives me the feeling that I am reading a Pravda account
explaining that the Soviets moved into Afghanistan to help the
Afghans prevent an invasion by the U.S. Central Intelligence
Agency.) </p>
<p> Were it possible to turn back the clock, undoubtedly Kurtz,
Zelen and Abell would try to be more precise in defining test
objectives and protocol and would do so in writing. And more time
would be spent in more carefully phrasing articles dealing with
such tests. But all CSICOP Council members and Fellows have other
full-time professions that seriously constrain time available for
CSICOP efforts. </p>
<p>Were it possible to turn back the clock, the Council should have
insisted in the spring of 1978 that Rawlins issue a public
statement that he had erred in using CSICOP's name in support of
his personal actions connected with the University of Toronto's
planned astrology symposium. Failure to do this has resulted in
an unjustified blot on CSICOP's modus-operandi. Also at that time
the Council should have developed a policy statement, as it
recently did, that more clearly delineates activities that
members perform officially in behalf of CSICOP and those carried
out as private individuals. </p>
<p> When a small group of persons met in Buffalo in May, 1976,
to create CSICOP, their motivation was a concern over the growing
public acceptance of claims of the paranormal. CSICOP was created
to provide a counter-balance to those who espouse a variety of
claims, ranging from UFOs to astrology, from the "Bermuda
Triangle" to psychic phenomena. With the benefit of experience,
it was apparent that there was an extreme spectrum of viewpoints
on the Council. Rawlins was at the "hit-'em-hard" extreme, while
Truzzi was at the opposite pole and resigned after a couple
years, partially as a result of behind-the scenes plotting by
Rawlins which he admits in "sTARBABY." Now Rawlins has departed
and, in my view, CSICOP is much the better for it. </p>
<p> CSICOP never has tried to destroy those organizations that
promote belief in paranormal causes. But individuals in these
organization have tried to discredit CSICOP, even going so far in
one instance as to circulate a forged letter. </p>
<p> FATE magazine made wide distribution of the Rawlins
"sTARBABY" article in reprint form, together with its press
release. Prof. R.A. McConnell, University of Pittsburgh, founding
President of the Parapsychological Association, also distributed
copies to CSICOP Fellows and Council members, among others. In
his accompanying letter, McConnell said he believed the "Rawlins
report is certainly true in broad outline and probably true in
every detail...He has created a document of importance for the
history and philosophy of science." McConnell quoted an "unnamed
scientist" as claiming that "Rawlins has uncovered the biggest
scandal in the history of rationalism." McConnell characterized
CSICOP as "an intellectually dishonest enterprise." </p>
<p> FATE and McConnell have demonstrated the intrinsic flaw in
the basic approach of those who promote claims of the paranormal
-- THEIR EAGERNESS TO ACCEPT CLAIMS OF EXTRAORDINARY EVENTS
WITHOUT RIGOROUS INVESTIGATION. Neither FATE nor McConnell
contacted CSICOP officials to check out Rawlins' charges. This
demonstrates why CSICOP is so sorely needed. </p>
<p> The late President Harry Truman phrased it well: "If you
can't stand the heat, stay out of the kitchen." CSICOP is "in the
kitchen" by choice and intends to remain there despite the heat.
The response of CSICOP's Council and its Fellows to recent events
shows that the Committee is not an easy victim of heat-
prostration. </p>
<p> If the Mars effect, or any other paranormal hypothesis,
should ever be demonstrated using rigorous scientific procedures,
there simply is no way in which the small group of individuals
involved in CSICOP could ever hope to suppress such evidence. Nor
have I found any CSICOP Council member or Fellow who is so
foolish as to try. </p>
<p> (end) </p>
<p> [In the years following "sTARBABY", Rawlins has continued to
receive publicity by making sensational charges of
scientific coverup and fraud. In 1988 he made national
headlines by renewing an earlier charge he had made before
CSICOP's founding, this time supposedly supported by a new-
found document: that Admiral Peary never actually reached
the North Pole during his famous expedition in 1909, but
instead fabricated his navigational records to make it
appear as if he had. A New York Times article of October 13,
1988 carries the headline: "Peary's Notes Said to Imply He
Fell Short of Pole." It begins: "New evidence based on
navigational notes by Robert E. Peary indicates that the
Arctic explorer fell short of his goal and deliberately
faked his claim in 1909 that he was the first person to
reach the North Pole, according to an analysis by a
Baltimore astronomer and historian ... Dennis Rawlins, an
independent scholar who trained as an astronomer and who has
a long-standing interest in Peary's expedition, said
yesterday that his analysis of the navigational notes,
mainly sextant readings of the sun to establish geographic
position, indicated that Peary knew that he had come no
closer than 121 miles from the Pole." Officials of the
National Geographic Society promised to examine Rawlins'
data, but added "We believe Mr. Rawlins has been too quick
to cry fake." </p>
<p> After a three-month investigation of Rawlins' charges, a
press conference was sponsored by The Navigation Foundation
at which they dismissed his "sensational claims". As
reported in a Baltimore Sun story syndicated Feb. 2, 1989,
"Since October [Natl. Geographic] Society President Gilbert
M. Grosvenor and others had quietly endured Rawlins' public
calls for debate and unconditional surrender on the Peary
issue." The Society was willing to take seriously an
analysis by the British explorer Wally Herbert, based on
other evidence, that a navigation error may have caused
Peary to miss the pole by about 45 miles. "Suggesting that
Peary might not have reached the Pole is one thing," said
Grosvenor. "Declaring Peary a fraud is quite another."
Rawlins held his own "informal press conference" afterwards,
reports The Sun, in which Rawlins "admitted he had confused
time readings for chronometer checks with altitudes of the
sun and had mistaken serial numbers on the chronometers for
navigational observations." Rawlins conceded, "My
interpretation has some problems, and I acknowledge that.
It's fair to say that, if I'm saying Peary was a fraud, I
think I have not yet met the burden of proof." </p>
<p> Finally, in December, 1989, a 230-page report commissioned
by the National Geographic Society was released, concluding
that Peary actually did reach the Pole. As reported in a
story on p.1 of the New York Times, Dec. 12, 1989, a new
analysis of Peary's records by professional navigators
concluded that Peary's final camp was not more than five
miles from the Pole. "The report said, there was no evidence
of fraud and deception in the explorer's records. But one
critic, Dennis Rawlins, a Baltimore astronomer and
historian, said he remained convinced, despite the new
study, that Admiral Peary did not reach his goal and had
faked his claim." </p>
<p> Robert Sheaffer, Nov., 1991]
--
Rick Moen - via RBBS-NET node 8:914/201
INTERNET: moen@f207.n914.z8.RBBS-NET.ORG
Robert Sheaffer, Nov., 1991]
--
Rick Moen - via RBBS-</p></xml>

1030
regexConsp/dallas.xml Normal file

File diff suppressed because it is too large Load Diff

147
regexConsp/dark1.xml Normal file
View File

@ -0,0 +1,147 @@
<xml><p>***************************************************************************
***************************************************************************
DARK CONSPIRACY INVOLVING ELECTRICAL POWER COMPANIES SURFACES
Rewritten by the Quantum Mechanic
(Author Unknown)
Updated 8/7/88 W0PN
***************************************************************************
***************************************************************************
For years the electrical utility companies have led the public to believe
they were in business to supply electricity to the consumer, a service for
which they charge a substantial rate. The recent accidental acquisition of
secret records from a well known power company has led to a massive
research campaign which positively explodes several myths and exposes the
massive hoax which has been perpetrated upon the public by the power
companies.
The most common hoax promoted the false concept that light bulbs emitted
light; in actuality, these 'light' bulbs actually absorb DARK which is
then transported back to the power generation stations via wires. A more
descriptive name has now been coined; the new scientific name is for the
device is DARKSUCKER.
This newsletter introduces a brief synopsis of the darksucker theory,
which proves the existence of dark and establishes the fact that dark has
great mass, and further, that dark is the fastest known particle in the
universe. Apparently, even the celebrated Dr. Albert Einstein did not
suspect the truth.. that just as COLD is the absence of HEAT, LIGHT is
actually the ABSENCE of DARK... light does not really exist!
The basis of the darksucker theory is that electric light bulbs suck dark.
Take for example, the darksuckers in the room where you are. There is much
less dark right next to them than there is elsewhere, demonstrating their
limited range. The larger the darksucker, the greater its capacity to suck
dark. Darksuckers in a parking lot or on a football field have a much
greater capacity than the ones in used in the home, for example.
It may come as a surprise to learn that darksuckers also operate on a
celestial scale; witness the Sun. Our Sun makes use of dense dark, sucking
it in from all the planets and intervening dark space. Naturally, the Sun
is better able to suck dark from the planets which are situated closer to
it, thus explaining why those planets appear brighter than do those which
are far distant from the Sun.
Occasionally, the Sun actually oversucks; under those conditions, dark
spots appear on the surface of the Sun. Scientists have long studied these
'sunspots' and are only recently beginning to realize that the dark spots
represent leaks of high pressure dark because the Sun has oversucked dark
to such an extent that some of actually leaks back into space. This
leakage of high pressure dark frequently causes problems with radio
communications here on Earth due to collisions between the dark particles
as they stream out into space via the black 'holes' in the surface of the
Sun.
As with all manmade devices, darksuckers have a finite lifetime. Once they
are full of dark, they can no longer suck. This condition can be observed
by looking for the black spot on a full darksucker when it has reached
maximum capacity... you have surely noticed that dark completely surrounds
a full darksucker because it no longer has the capacity to suck dark at
all.
A candle is a primitive darksucker. A new candle has a white wick. You
will notice that after the first use the wick turns black, representing all
the dark which has been sucked into it. If you hold a pencil next to the
wick of an operating candle, the tip will turn black because it got in the
way of the dark flowing into the candle. Unfortunately, these primitive
darksuckers have a very limited range and are hazardous to operate because
of the intense heat produced.
There are also portable darksuckers called flashlights. The bulbs in these
devices cannot handle all of the dark by themselves, and must be aided by a
dark storage unit called a battery. When the dark storage unit is full, it
must be either emptied (a process called 'recharging') or replaced before
the portable darksucker can continue to operate. If you break open a
battery, you will find dense black dark inside, evidence that it is
actually a compact dark storage unit.
The darksuckers on your automobile are high capacity units with great
range, thus they require much larger dark storage units mounted under the
hood of the vehicle. Since there is far more dark available in the winter
season, automobile dark storage units reach capacity more frequently than
they do in the summer, requiring 'recharging', or in severe cases, total
replacement.
Dark has great mass. When dark is drawn into a darksucker, friction caused
by the speed of the dark particles (called anti-photons) actually generates
substantial heat, thus it is unwise to touch an operating dark sucker.
Candles represent a special problem, as the dark must travel into a solid
wick instead of through clear glass. This generates a great amount of
heat, making it very dangerous to touch an operating candle.
Because dark has such great mass, it is very heavy. If you swim just below
the surface of a lake, you see a lot of 'light' (absence of dark, to be
more precise). As you go deeper and deeper beneath the surface, you notice
it gets darker and darker. When you reach a depth of approximately fifty
feet, you are in total darkness. This is because the heavier dark sinks to
the bottom of the lake, making it appear 'lighter' near the surface.
The power companies have learned to use the dark that has settled to the
bottom of lakes by pushing it through turbines, which generate electricity
to help push the dark into the ocean where it may be safely stored for
their devious purposes.
Prior to the development of turbines, it was much more difficult to get the
dark from the rivers and lakes to the ocean. The Indians recognized this
problem, and developed means to assist the flow of dark on it's long
journey to the ocean. When on a river in a canoe travelling in the same
direction as the flow of dark, they paddled slowly, so as not to impede the
flow of dark; but when they travelled against the flow of dark, they
paddled vigorously to help propel the dark along its way.
Scientists are working feverishly to develop exotic new instrumentation with
which to measure the actual speed and energy level of dark. While such
instrumentation is beyond the capabilities of the average layman, you can
actually perform a simple test to demonstrate the unbelievable speed of
dark, right in your own home.
All that is required for the simple test is a closed desk drawer situated
in a bright room. You know from past experience that the tightly shut
drawer is FULL of dark. Now, place your hand firmly on the drawer's
handle. Quickly yank the drawer open.. the dark immediately disappears,
demonstrating the blinding speed with which the dark travels to the nearest
darksucker!
The secrets of dark are at present known only to the power companies. Dark
must be very valuable, since they go to such lengths to collect it in vast
quantities. By some well hidden method, more modern power 'generation'
facilities have devised methods to hide their collection of dark. The
older facilities, however, usually have gargantuan piles of solidified dark
in huge fenced in areas. Visitors to these facilities are told the huge
black piles of material are supplies of coal, but such is not the case.
The power companies have long used code words to hide their activities;
D.C. is Dark Conspiracy, whole A.C. is Alternate Conspiracy. The intent of
the A.C. is not yet known, but the D.C. is rapidly yielding it's secrets to
the probing eyes and instruments of honest scientists around the world.
New developments are being announced every day and we promise to keep the
public informed of these announcements as they occur via this newsletter.
Les Dark, Editor
</p></xml>

574
regexConsp/deaths.xml Normal file
View File

@ -0,0 +1,574 @@
<xml><p>From "CROSSFIRE" by Jim Marrs
ISBN 0-88184-524-8
Copyright (c) 1989 by Jim Marrs
First published by Carroll &amp; Graf 1989</p>
<p>Reprinted without permission</p>
<p> CONVENIENT DEATHS</p>
<p> In the three-year period which followed the murder of President
Kennedy and Lee Harvey Oswald, 18 material witnesses died - six by
gunfire, three in motor accidents, two by suicide, one from a cut
throat, one from a karate chop to the neck, five from natural causes.
An actuary, engaged by the London Sunday Times, concluded that on
November 22, 1963m the odds against these witnesses being dead by
February 1967, were one hundred thousand trillion to one.</p>
<p> The above comment on the deaths of assassination witnesses was published in
a tabloid companion piece to the movie _Execution Action_, released in 1973.
By that time, part of the mythology of the Kennedy assassination included the
mysterious deaths of people who were connected with it.
By the mid-1960s, people in Dallas already were whispering about the
number of persons who died under strange or questionable circumstances. Well
into the 1980s, witnesses and others were hesitant to come forward with
information because of the stories of strange and sudden death that seemed to
visit some people with information about the assassination.
Finally, in the late 1970s, the House Select Committee on Assassinations
felt compelled to look into the matter.
But aside from discrediting the London Sunday Times actuarial study, the
Committee was unable to come to any conclusions regarding the growing number
of deaths. The Committee said it could not make a valid actuarial study due
to the broad number and types of persons that had to be included in such a
study.
In response to a letter from the Committee, London Sunday Times legal
manager Anthony Whitaker stated:</p>
<p> Our piece about the odds against the deaths of the Kennedy witnesses
was, I regret to say, based on a careless journalistic mistake and
should not have been published. This was realized by The Sunday Times
editorial staff after the first edition - the one which goes to the
United States... - had gone out, and later editions were amended.
There was no question of our actuary having got his answer wrong: it
was simply that we asked him the wrong question. He was asked what
were the odds against 15 named people out of the population of the
United States dying within a short period of time, to which he replied
- correctly - that they were very high. However, if one asks what are
the odds against 15 of those included in the Warren Commission Index
dying within a given period, the answer is, of course, that they are
much lower. Our mistake was to treat the reply to the former question
as if it dealt with the latter - hence the fundamental error in our
first edition report, for which we apologize.</p>
<p> This settled the matter for the House Committee, which apparently made
little or no attempt to seriously study the number of deaths that followed
the JFK assassination.
Jacqueline Hess, the Committee's chief of research for the JFK
investigation, reported:</p>
<p> Our final conclusion on the issue is that the available evidence does
not establish anything about the nature of these deaths which would
indicate that the deaths were in some manner, either direct or
peripheral, caused by the assassination of President Kennedy or by
any aspect of the subsequent investigation.</p>
<p> However, an objective look at both the number and the causes of death
balanced against the importance of the person's connection to the case, still
causes raised eyebrows among those who study such a list.
In this section, people who were connected - no matter how tenuously -
with the assassination and who are now dead are listed according to date of
death.
This is dealing only with deaths, not with the numerous persons - such as
Warren Reynolds, Roger Craig, and Richard Carr - who claim to have been shot
at or attacked.
This chapter has been entitled "Convenient Deaths" because these deaths
certainly would have been convenient for anyone not wishing the truth of the
JFK assassination to become public.
The CIA has gone to some lengths to discredit the idea of mysterious
deaths plaguing assassination witnesses.
A 1967 memo from CIA headquarters to station chiefs advised:</p>
<p> Such vague accusations as that "more than 10 people have died
mysteriously" can always be explained in some rational way: e.g., the
individuals concerned have for the most part died of natural causes;
the [Warren] Commission staff questioned 418 witnesses - the FBI
interviewed far more people, conducting 25,000 interviews and
reinterviews - and in such a large group, a certain number of deaths
are to be expected.</p>
<p> Testifying before the Church Committee in 1975, CIA technicians told of a
variety of TWEP technology - Terminate With Extreme Prejudice - that cannot
be detected in a postmortem examination.
One recently declassified CIA document, a letter from an Agency consultant
to a CIA officer, states:</p>
<p> You will recall that I mentioned that the local circumstances under
which a given means might be used might suggest the technique to be
used in that case. I think the gross divisions in presenting this
subject might be:
(1) bodies left with no hope of the cause of death being determined by
the most complete autopsy and chemical examinations
(2) bodies left in such circumstances as to simulate accidental death
(3) bodies left in such circumstances as to simulate suicidal death
(4) bodies left with residue that simulates those caused by natural
diseases.</p>
<p> The letter goes on to show that undetected murders do not have to be the
result of sophisticated chemicals. It states:</p>
<p> There are two techniques which I believe should be mentioned since
they require no special equipment besides a strong arm and the will to
do such a job. These would be either to smother the victim with a
pillow or to strangle him with a wide piece of cloth such as a bath
towel. In such cases, there are no specific anatomic changes to
indicate the cause of death...</p>
<p> While it is obvious that the CIA - and hence the mob through operatives who
work for both - has the capability of killing, it is less well known that the
Agency has developed drugs to induce cancer.
Recall that Jack Ruby died of sudden lung cancer just as he had been granted
a new trial.
A 1952 CIA memo reported on the cancer-causing effects of beryllium:
"This is certainly the most toxic inorganic element and it produces a
peculiar fibrotic tumor at the site of local application. The amount
necessary to produce these tumors is a few micrograms."
Local law-enforcement officers and coroners are not equipped, either by
training or by inclination, to detect deaths induced by such sophisticated
means. They look for signs of a struggle, evidence of a break-in, bruises,
or marks on the victim.
With no evidence to the contrary, many deaths are ruled suicide or accident.
Others are ruled due to natural causes, such as heart attack.
It is interesting to note how the deaths are grouped. Many of the
earliest deaths came during the time of the Warren Commission investigation
or just afterwards.
More deaths took place in the late 1960s as New Orleans District Attorney
Jim Garrison was launching his investigation. Other suspicious deaths
occurred during the mid-1970s, as the Senate Intelligence Committee was
looking into assassinations by U.S. intelligence agencies. And finally,
another spate of deaths came around 1977, just as the House Select Committee
on Assassinations was gearing up its investigation.
These deaths are listed below in chronological order. An asterisk means
the death is a particularly suspicious one. They are also grouped according
to which investigation was being conducted at the time.
The possibility of convenient deaths leads one into a well of paranoia, yet
this long list cannot be summarily dismissed.
Obviously, many of these deaths - particularly in recent years - can be
ascribed to the passage of time. But others cannot - especially when viewed
in the context of the assassination inquiries taking place at the time.
Read for yourself and consider... When does coincidence end and conspiracy
begin?</p>
<p> List of Deaths</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>11/63 Karyn Kupcinet* TV host's daughter who was Murdered
overheard telling of JFK's
death prior to 11/22/63</p>
<p> The Warren Commission Investigation</p>
<p>12/63 Jack Zangretti* Expressed foreknowledge of Gunshot victim
Ruby shooting Oswald</p>
<p>2/64 Eddy Benavides* Look-alike brother to Tippit Gunshot to head
shooting witness, Domingo
Benavides</p>
<p>3/64 Betty McDonald* Former Ruby employee who Suicide by hanging
alibied Warren Reynolds in Dallas jail
shooting suspect</p>
<p>3/64 Bill Chesher Thought to have information Heart attack
linking Oswald and Ruby</p>
<p>3/64 Hank Killam* Husband of Ruby employee, Throat cut
knew Oswald acquaintance</p>
<p>4/64 Bill Hunter* Reporter who was in Ruby's Accidental shooting
apartment on 11/24/63 by policeman</p>
<p>5/64 Gary Underhill* CIA agent who claimed Gunshot in head,
Agency was involved Ruled suicide</p>
<p>5/64 Hugh Ward* Private investigator working Plane crash in
with Guy Banister and David Mexico
Ferrie</p>
<p>5/64 DeLesseps Morrison* New Orleans mayor Passenger in Ward's
plane</p>
<p>8/64 Teresa Norton* Ruby employee Fatally shot</p>
<p>6/64 Guy Banister* Ex-FBI agent in New Orleans Heart attack
connected to Ferrie, CIA,
Carlos Marcello and Oswald</p>
<p>9/64 Jim Koethe* Reporter who was in Ruby's Blow to neck
apartment on 11/24/63</p>
<p>9/64 C.D. Jackson Life Magazine senior vice Unknown
president who bought Zapruder
film and locked it away</p>
<p>10/64 Mary Pinchot Meyer* JFK mistress whose diary was Murdered
taken by CIA chief James
Angleton after her death</p>
<p>1/65 Paul Mandal Life writer who told of JFK Cancer
turning to rear when shot in
throat</p>
<p>3/65 Tom Howard* Ruby's first lawyer, was in Heart attack
Ruby's apartment on 11/24/63</p>
<p>5/65 Maurice Gatlin* Pilot for Guy Banister Fatal Fall</p>
<p>8/65 Mona B. Saenz* Texas Employment clerk who Hit by Dallas bus
interviewed Oswald</p>
<p>?/65 David Goldstein Dallasite who helped FBI Natural causes
trace Oswald's pistol</p>
<p>9/65 Rose Cheramie* Knew of assassination in Hit/run victim
advance, told of riding to
Dallas with Cubans</p>
<p>11/65 Dorothy Kilgallen* Columnist who had private Drug overdose
interview with Ruby, pledged
to "break" JFK case</p>
<p>11/65 Mrs. Earl Smith* Close friend to Dorothy Unknown
Kilgallen, died two days
after columnist, may have
kept Kilgallen's notes</p>
<p>12/65 William Whaley* Cabdriver who reportedly Motor Collision
drove Oswald to Oak Cliff (the only Dallas
taxi driver to
die on duty)</p>
<p>1966 Judge Joe Brown Presided over Ruby's trial Heart attack</p>
<p>1966 Karen "Little Lynn" Ruby employee who last talked Gunshot victim
Carlin* with Ruby before Oswald shooting</p>
<p>1/66 Earline Roberts Oswald's landlady Heart attack</p>
<p>2/66 Albert Bogard* Car salesman who said Oswald Suicide
test drove new car</p>
<p>6/66 Capt. Frank Martin Dallas police captain who Cancer
witnessed Oswald slaying,
told Warren Commission,
"There's a lot to be said,
but probably be better if I
don't say it."</p>
<p>8/66 Lee Bowers, Jr.* Witnessed men behind picket Motor accident
fence on Grassy Knoll</p>
<p>9/66 Marilyn "Delilah" Ruby dancer Shot by husband
Walle* after one month
of marriage</p>
<p>10/66 William Pitzer* JFK autopsy photographer Gunshot, ruled
who described his duty as suicide
"horrifying experience"</p>
<p>11/66 Jimmy Levens Fort Worth nightclub owner Natural causes
who hired Ruby employee</p>
<p>11/66 James Worrell, Jr.* Saw man flee rear of Texas Motor accident
School Book Depository</p>
<p>1966 Clarence Oliver D.A. investigator who Unknown
worked Ruby case</p>
<p>12/66 Hank Suydam Life magazine official in Heart attack
charge of JFK stories</p>
<p> The Garrison Inquiry</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1967 Leonard Pullin Civilian Navy employee who One-car crash
helped film _Last Two Days_
about assassination</p>
<p>1/67 Jack Ruby Oswald's slayer Lung cancer (He
told family he
was injected with
cancer cells.)</p>
<p>2/67 Harold Russell* Saw escape of Tippit killer Killed by cop in
bar brawl</p>
<p>2/67 David Ferrie* Acquaintance of Oswald, Blow to neck,
Garrison suspect, and ruled accidental
employee of Guy Banister</p>
<p>2/67 Eladio Del Valle* Anti-Castro Cuban associate Gunshot wound,
of David Ferrie being sought ax wound to head
by Garrison</p>
<p>3/67 Dr. Mary Sherman* Ferrie associate working on Died in fire
cancer research (possibly shot)</p>
<p>1/68 A.D. Bowie Assistant Dallas D.A. Cancer
prosecuting Ruby</p>
<p>4/68 Hiram Ingram Dallas deputy sheriff, close Cancer
friend to Roger Craig</p>
<p>5/68 Dr. Nicholas Chetta New Orleans coroner who ruled Heart attack
on death of Ferrie</p>
<p>8/68 Phillip Geraci* Friend of Perry Russo, told of Electrocution
Oswald/Shaw connection</p>
<p>1/69 Henry Delaune* Brother-in-law to coroner Murdered
Chetta</p>
<p>1/69 E.R. Walthers* Dallas deputy sheriff who Shot by felon
was involved in Depository
search, claimed to have found
.45-cal slug</p>
<p>1969 Charles Mentesana Filmed rifle other than Heart attack
Mannlicher-Carcano being taken
from Depository</p>
<p>4/69 Mary Bledsoe Neighbor to Oswald, also Natural causes
knew David Ferrie</p>
<p>4/69 John Crawford* Close friend to both Ruby and Crash of private
Wesley Frazier, who gave ride plane
to Oswald on 11/22/63</p>
<p>7/69 Rev. Clyde Johnson* Scheduled to testify about Fatally shot
Clay Shaw/Oswald connection</p>
<p>1970 George McGann* Underworld figure, connected Murdered
to Ruby friends; wife, Beverly,
took film in Dealey Plaza</p>
<p>1/70 Darrell W. Garner Arrested for shooting Warren Drug overdose
Reynolds, released after
alibi from Betty McDonald</p>
<p>8/70 Bill Decker Dallas sheriff who saw bullet Natural causes
hit street in front of JFK</p>
<p>8/70 Abraham Zapruder Took famous film of JFK Natural causes
assassination</p>
<p>12/70 Salvatore Granello* Mobster linked to Hoffa, Murdered
Trafficante, and Castro
assassination plots</p>
<p>1971 James Plumeri* Mobster tied to mob-CIA Murdered
assassination plots</p>
<p>3/71 Clayton Fowler Ruby's chief defense attorney Unknown</p>
<p>4/71 Gen. Charles Cabell* CIA deputy director connected Collapsed and
to anti-Castro Cubans died after
physical at Ft.
Myers</p>
<p> The Church Committee Investigation</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1972 Hale Boggs* House majority leader, member Disappeared on
of Warren Commission who began Alaskan plane
to publicly express doubts flight
doubts about findings</p>
<p>5/72 J. Edgar Hoover* FBI director who pushed "Lone Heart attack (no
assassin" theory in JFK autopsy)
assassination</p>
<p>9/73 Thomas E. Davis* Gun runner connected to both Electrocuted
Ruby and CIA trying to steal
wire</p>
<p>2/74 J.A. Milteer* Miami right-winger who Heater explosion
predicted JFK's death and
capture of scapegoat</p>
<p>1974 Dave Yaras* Close friend to both Hoffa Murdered
and Jack Ruby</p>
<p>7/74 Earl Warren Chief justice who reluctantly Heart failure
chaired Warren Commission</p>
<p>8/74 Clay Shaw* Prime suspect in Garrison Possible cancer
case, reportedly a CIA
contact with Ferrie and E.
Howard Hunt</p>
<p>1974 Earle Cabell Mayor of Dallas on 11/22/63, Natural causes
whose brother, Gen. Charles
Cabell, was fired from CIA by
JFK</p>
<p>6/75 Sam Giancana* Chicago Mafia boss slated to Murdered
tell about CIA-mob death plots
to Senate Committee</p>
<p>1975 Clyde Tolson J. Edgar Hoover's assistant Natural causes
and roommate</p>
<p>7/75 Allan Sweatt Dallas deputy sheriff involved Natural causes
in investigation</p>
<p>12/75 Gen. Earl Wheeler Contact between JFK and CIA Unknown</p>
<p>1976 Ralph Paul Ruby's business partner Heart attack
connected with crime figures</p>
<p>4/76 James Chaney Dallas motorcycle officer Heart attack
to JFK's right rear who said
JFK "struck in the face" with
bullet</p>
<p>4/76 Dr. Charles Gregory Governor John Connally's Heart attack
physician</p>
<p>6/76 William Harvey* CIA coordinator for CIA-mob Complications of
assassination plans against heart surgery
Castro</p>
<p>7/76 John Roselli* Mobster who testified to Stabbed and
Senate committee, was to stuffed in metal
appear again drum</p>
<p> 1977 - A Terrible Year for Many</p>
<p> The year 1977 produced a bumper crop of candidates for listing under
convenient deaths connected with the JFK assassination - including the deaths
of six top FBI officials all of whom were scheduled to testify before the
House Select Committee on Assassinations.
Topping this list was former number-three man in the FBI, William C.
Sullivan, who had already had a preliminary meeting with the investigators
for the House Committee. Sullivan was shot with a high-powered rifle near
his New Hampshire home by a man who claimed to have mistaken him for a deer.
The man was charged with a misdemeanor - "shooting a human being by
accident" - and released to the custody of his father, a state policeman.
There was no further investigation of Sullivan's death.
Louis Nichols was a special assistant to J. Edgar Hoover as well as
Hoover's liaison with the Warren Commission. Alan H. Belmont also was a
special assistant to Hoover. James Cadigan was a document expert with access
to many classified assassination documents, while J.M. English headed the FBI
laboratory where Oswald's rifle and pistol were tested. Donald Kaylor was
the FBI fingerprint expert who examined prints found at the assassination
scene. None of these six Bureau officials lived to tell what they knew to
the House Committee.
Other key assassination witnesses, such as George DeMohrenschildt and
former Cuban president Carlos Prio Soccaras, died within weeks of each other
in 1977, just as they, too, were being sought by the House Committee.
The ranks of both organized crime and U.S. intelligence agencies were
thinned by deaths beginning in 1975, the time of the Senate Intelligence
Hearings, and 1978, the closing months of the House Committee.
Charles Nicoletti, a mobster connected with the CIA-Mafia assassination
plots, was murdered in Chicago, while William Pawley, a former diplomat
connected with both organized crime and CIA figures, reportedly committed
suicide.
Adding to rumors that "hit teams" may have been at work, a Time magazine
article reported that federal agents had initiated a nationwide investigation
into more than 20 gangland assassinations constituting what agents believed
was an "open underworld challenge to governmental infiltration of Mafia
activities."
One FBI source was quoted as saying: "Our main concern is that we may be
facing a revival of the old `Murder, Inc.' days."
A New York News story concerning this official fear of roving
assassination squads even mentions the death of Sam Giancana, who was killed
one day before he was scheduled to testify about mob-CIA connections and
while under government protection.
Prior to the House Committee investigation into the JFK assassination,
the news media reported the following deaths:</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1/77 William Pawley* Former Brazilian ambassador Gunshot, ruled
connected to anti-Castro suicide
Cubans, crime figures</p>
<p>3/77 George Close friend to both Oswald Gunshot wound,
DeMohrenschildt* and Bouvier family (Jackie ruled suicide
Kennedy's parents), CIA
contract agent</p>
<p>3/77 Carlos Prio Former Cuban president, Gunshot wound,
Soccaras* money man for anti-Castro ruled suicide
Cubans</p>
<p>3/77 Paul Raigorodsky Business friend of George Natural causes
DeMohrenschildt and wealthy
oilmen</p>
<p>5/77 Lou Staples* Dallas radio talk show host Gunshot to head,
who told friends he would ruled suicide
break case</p>
<p>6/77 Louis Nichols Former number-three man in Heart attack
FBI, worked on JFK
investigation</p>
<p>8/77 Alan Belmont FBI official who testified to "Long illness"
Warren Commission</p>
<p>8/77 James Cadigan FBI document expert who Fall in home
testified to Warren Commission</p>
<p>8/77 Joseph C. Ayres* Chief steward on JFK's Shooting accident
Air Force One</p>
<p>8/77 Francis G. Powers* U-2 pilot downed over Russia Helicopter crash
in 1960 (he reportedly
ran out of fuel)</p>
<p>9/77 Kenneth O'Donnell JFK's closest aide Natural causes</p>
<p>10/77 Donald Kaylor FBI fingerprint chemist Heart attack</p>
<p>10/77 J.M. English Former head of FBI Forensic Heart attack
Sciences Laboratory</p>
<p>11/77 William Sullivan* Former number-three man in Hunting accident
FBI, headed Division 5,
counterespionage and
domestic intelligence</p>
<p>1978 C.L. "Lummie" Lewis Dallas deputy sheriff who Natural causes
arrested Mafia man Braden in
Dealey Plaza</p>
<p>9/78 Garland Slack Man who said his target was Unknown
fired at by Oswald at rifle
range</p>
<p>1/79 Billy Lovelady Depository employee said to be Complications
the man in the doorway in AP from heart attack
photograph</p>
<p>6/80 Dr. John Holbrook Psychiatrist who testified Heart attack, but
Ruby was not insane pills, notes found</p>
<p>1/81 Marguerite Oswald Mother of accused assassin Cancer</p>
<p>10/81 Frank Watts Chief felony prosecutor for Natural causes
Dallas D.A.</p>
<p>1/82 Peter Gregory Original translator for Natural causes
Marina Oswald and Secret
Service</p>
<p>5/82 Dr. James Weston Pathologist allowed to see Died while
JFK autopsy material for jogging, ruled
HSCA natural causes</p>
<p>8/82 Will H. Griffin FBI agent who reportedly Cancer
said Oswald was "definitely"
an FBI informant</p>
<p>10/82 W. Marvin Gheesling FBI official who helped Natural causes
supervise JFK investigation</p>
<p>3/84 Roy Kellerman Secret Service agent in charge Unknown
if JFK limousine
--- end
</p></xml>

202
regexConsp/democ-pr.xml Normal file
View File

@ -0,0 +1,202 @@
<xml><p>PRODUCER INTERESTS VS. THE PUBLIC INTEREST: THE ORIGIN OF
DEMOCRATIZED PRIVILEGE</p>
<p>By RICHARD M. EBELING</p>
<p>In The Wealth of Nations, Adam Smith constructed some of the
most devastating arguments against the then-prevailing system
of economic policy--mercantilism. In practically every country
in Europe, governments regulated, controlled and planned the
economic activities of their subjects. In France, the
regulations were so detailed that they specified how many
stitches should be used in attaching a button to a shirt. In
Austria, the state limited the period in which people could be
in mourning so that the dye-makers would not lose the business
of selling colored cloth.</p>
<p>Adam Smith demonstrated that rather than bringing prosperity,
mercantilism had retarded economic progress. Governments, he
argued, had neither the wisdom nor the ability to plan the
economic affairs of a multitude of people. If governments
primarily limited themselves to the protection of life,
liberty and property, Smith said, men could be trusted to
manage their own affairs. And when left to do so in an open,
competitive market, the natural forces of supply and demand
would generate a rising prosperity for all. Free men in free
markets were the ultimate source of the wealth of nations.</p>
<p>But having presented the case for free markets, Adam Smith was
not optimistic about the future. To expect that a regime of
free trade would ever be established was, he said, as likely
as the establishment of a utopia. "Not only the prejudices of
the public," he despaired, "but what is much more
unconquerable, the private interests of many individuals
irresistibly oppose it."</p>
<p>Governments had turned over many industries and trades to
private monopolies, whose interests were clearly opposed to
open competition. Special-interest groups, with their
government-bestowed privileges, were too strong ever to be
defeated.</p>
<p>Within one lifetime, however, Smith was proven to be wrong. By
the middle of the 19th century, England was a free-trade
nation and many other nations were following its path.</p>
<p>But in our century, governments once again use their power to
regulate the marketplace, protect various industries from
foreign and domestic competition, and limit entry into markets
through licensing procedures. Mercantilism has returned; and
it has returned stronger than ever. The older mercantilism was
a system that benefited a few privileged producers at the
expense of most of the society. But in our era of democratic
government, it is the many who lobby and politick in the
political arena. Almost every group in society now does battle
for a piece of the economic pie--not through open competition
for consumer business, but through the political process to
gain a greater share by manipulating the market. Ours is the
era of democratized privilege.</p>
<p>Why have free societies all around the world become
battlegrounds for political privilege and economic plunder?</p>
<p>The answer is to be found in one of Adam Smith's most famous
ideas: the division of labor. "The division of labor," Smith
explained, "so far as it can be introduced, occasions in every
art, a proportionate increase of the productive powers of
labor." By specializing in various lines of production, the
members of society are able to improve and increase their
skills and efficiency to do various things. Out of these
productive specializations comes an increased supply of all
kinds of goods and services. The members of society trade away
the large quantities of each commodity they respectively
produce for all the other goods offered by their fellows in
the market arena.</p>
<p>Society's members give up the independence of economic self-
sufficiency for the interdependence of a social system of
division of labor. But the gain is a much higher standard of
living than any one of them could ever hope to attain just by
using his own capabilities to fulfill all his wants and
desires through his own labor.</p>
<p>Each individual is now dependent upon others in the society
for the vast majority of the goods and services he wishes to
use and consume. But in a competitive market setting, this
works to his advantage. Sellers vie with one another for his
consumer business.</p>
<p>They underbid each other and offer him attractively lower
prices; they devise ways to produce and market new and
improved products. As consumer, the individual is the master
of the market, whom all sellers must serve if they are to
obtain his business.</p>
<p>Viewed from the perspective of the consumer, the competitive
market serves the public interest. The resources of society
are effectively applied and put to work to satisfy the various
wants and desires of the individuals of that society. The
products which are manufactured are determined by the free
choices of all of the demanders in the marketplace.
Production serves consumption.</p>
<p>But the market looks totally different from the perspective of
the individual producers. They, too, are dependent upon the
market: they are dependent upon buyers willing to purchase
what they have for sale. While the market serves every one as
a consumer, no one can be a consumer unless he has been
successful as a producer. And his success as a producer
depends upon his ability to market and sell his products or to
find willing buyers for his particular labor skills and
abilities.</p>
<p>As a consequence, for each producer the price of his own
product or labor service tends to be more important than the
prices of all of the multitude of consumer goods he might
purchase. Because unless he earns the necessary financial
wherewithal in his producer role, he cannot be a consumer.</p>
<p>Being the consumer of many things, but the producer of usually
one thing, each seller tends to view competition as a
financial threat to his position in the market as well as to
his specific share of the market. The incentive for each
producer, therefore, is to want to limit entry into his corner
of the market, or to reduce the amount of competition
currently existing in his industry or profession.</p>
<p>The only avenue for limiting competition, however, is the
government. Only the government has the ultimate authority to
permanently prohibit those who think they could do better in
the market and who desire to try. Producers, therefore, have
incentives to use portions of the resources and wealth at
their disposal in the political arena to gain or protect the
market position that they feel themselves unable to obtain or
maintain in an open field of competition. And as long as the
costs of acquiring political privileges and protections from
the government to secure profits are less than the costs of
earning profits by making better and less expensive products,
producers will resort to lobbying and politicking to achieve
their ends.</p>
<p>The dilemma for the society is that when producers lobby in
the political process for profits via government privilege,
this results in a using-up of resources that otherwise could
have been invested in making products desired by consumers.
Furthermore, existing producers, sitting behind their walls of
political protections and privileges, have fewer incentives
for making product improvements. Therefore, the normal,
competitive forces that over time would result in better
and greater supplies of goods are retarded,</p>
<p>When government is viewed as the means for acquiring income
"entitlements," job "guarantees" and "fair" (rather than open)
markets, producer interests will always win over the public,
i.e., consumer, interest. Because most individual sellers will
view that they have more to lose from competition as producers
than they have to gain from competition as consumers.</p>
<p>Unfortunately, the pursuit of producer-protection policies
through government has a perverse outcome: the society as a
whole is poorer than it otherwise would be. Every privilege
and protection raises the prices, narrows the variety and
lowers the quality of the goods available to all of us as
consumers.</p>
<p>How, then, do we reverse our age of democratized privilege, in
which politics is reduced to a free-for-all for mutual plunder
and economic power? The answer is not an easy one nor one that
offers a "quick fix."</p>
<p>A turn from our era of neo-mercantilism, with its philosophy
of privileges for all who can win on the political battle
field, requires a moral revolution on the part of each of us.
It requires each and every one of us to apply the rules of
personal conduct to the arena of politics.</p>
<p>In our personal conduct, few of us would feel morally right in
forcibly preventing a buyer from leaving our respective
business establishment until he paid the price we wanted him
to pay. Nor would we feel morally correct in taking a sum of
money out of another's pocket without his consent simply
because he considered our price for our products or labor
services too high.</p>
<p>Yet this is done all of the time through the political
process. Not until we come to accept that the rules of
morality that apply in personal conduct must be the same rules
we follow in politics will the age of democratized privilege
and plunder come to an end. And, alas, we seem a long way off
from seeing that day!</p>
<p>Professor Ebeling is the Ludwig von Mises Professor of
Economics at Hillsdale College, Hillsdale, Michigan, and also
serves as vice-president of academic affairs for The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.</p>
<p>------------------------------------------------------------
From the March 1991 issue of FREEDOM DAILY,
Copyright (c) 1991, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.
</p></xml>

67
regexConsp/deskgen.xml Normal file
View File

@ -0,0 +1,67 @@
<xml><p>Desktop genetic engineering.</p>
<p>By Kevin Kelly</p>
<p>I spent a day recently a biotechnology trade show, snooping around the
aisles of plumbing and lob gear to see how close we ore to having gene
equipment that would work in a suburban garage. was looking for
off-the-shelf components that could be assembled by a dedicated individual
into o lob for homebrewed DNA. / was surprised by how close it has come.
While most of the equipment for biotechnology is either delicate but
cumbersome laboratory research instruments, or massive industrial/chemical
plumbing for production purposes, there are o couple of items that hove
miniaturized the research methods into o suggestive desktop space. The
leader in self-contained DNA coding gear is Applied Biosystems. Their star
contraption is a table-top box linked to a Macintosh computer that will
assemble a short string of DNA from the order that you type into the Mac.
The unit generates the DNA sequence from the some four amino acids that
cellular DNA does. in this case the amino acids are provided in small
bottles in the front of the box, along with bottles of solvent to drive the
process. The DNA is outputted" into a tiny capillary tube. While the
machine is 99.8% accurate in what it constructs, the major (and it is major)
drawback is that it con assemble sequences that are no more than 180 units
long, which would make one short gene, at most. (Genes, like words, vary in
length.) Since human genes come in the order of about one billion units,
there is a way to go in improvements. On the other hand, since the
alteration of even one gene con make a big difference in a living organism
(many congenital diseases are due to a single gene), there is still power in
being able to rewrite o couple of hundred units. A complementary box made by
Applied Biosystems works in reverse. Rather than going from code to DNA, it
goes from DNA to code. It takes a bit of existing DNA and reads" its
sequence out as a display on the computer - ATTCGGACA, etc., for instance.
Not only con this verify a sequence one builds, but its main purpose is to
unravel the genetic code encrypted in all living things. It too is severely
limited in the amount of DNA it con handle at one time. But the task of
deciphering chromosomes that are 5 million genes long would be o bummer
without it. The two machines work as a pair. Both together would fit onto a
kitchen countertop. These units by themselves are not enough to do
biotechnology research. Sundry other hi-tech items, as well as low-tech ones
like incubators, cold rooms and basic labware, are essential. But these two
systems ore the heart of the hard work; they automate what was tedious and
unpredictable toil just a few years ago. I'd guess that true basement
biotechnology is still at least a decade away, if only because of the price
$50,000 for each of these machines alone)aond the expertise Ph.0) needed to
get them going. -Kevin Kelly Information from: Applied Biosystems, inc.,
850 Lincoln Center Drive, Foster City, CA 94404.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

184
regexConsp/dictator.xml Normal file
View File

@ -0,0 +1,184 @@
<xml><p>
-------------------------------------------------------------------------------
BLUEPRINT FOR U.S. DICTATORSHIP PLACES INDIVIDUAL RIGHTS AT RISK</p>
<p> By Mike Blair
Exclusive to The SPOTLIGHT</p>
<p>Washington, DC -- During the Persian Gulf war and the military buildup
leading to it, President George Bush began using the term "New World
Order," often suggesting that the commitment of so-called multinational
forces involved in the military effort was the beginning of this alleged
worldwide utopia.</p>
<p> Supposedly using the vehicle of the United Nations, Bush's New World
Order would be the arbitrator of all world problems and the apparatus to
enforce globalist dictates through the use of armed forces combined from
the armies of member nations. The UN law would be, regardless of the
nationalist interests of individual countries, the final word.</p>
<p> Actually, even the mention of a New World Order would normally be
anathema to thinking Americans and, in particular, conservative political
leaders and civil libertarians.</p>
<p> SINISTER TECHNOLOGY</p>
<p> It is also surprising to many critics of the move toward one-world
government that Bush would even dare choose the term "New World Order" to
define his globalist schemes. However, most Americans alive today were
born after World War II, when propaganda of the so-called Allied powers
used the terms of "New Order" or "New World Order" to describe in a
sinister way the military efforts of Japan and, in particular, Germany
under Adolf Hitler.</p>
<p> Few, it seems, have taken the time to analyze just what Bush has in
mind for his New World Order, of which America is to become an integral
part, starting with supplying about 90 percent of the muscle, and young
lives, that tackled and defeated Iraqi strongman Saddam Hussein's Arab
legions.</p>
<p> However, patriotic Constitutional scholars know that Bush's New World
Order is the worst attack ever on America as a sovereign, independent and
free nation.</p>
<p> BEGAN WITH WILSON</p>
<p> Efforts to form a global government are certainly nothing new.
American political leaders, who were concerned with America first, were
able to overcome the internationalist, one-world government machinations of
President Woodrow Wilson following World War I. Wilson was prevented from
realizing his visions of a New World Order, through the League of Nations,
by a powerful Senate opposition, which refused to rubber-stamp for Wilson
U.S. membership in the world body.</p>
<p> A few decades later, however, President Franklin Delano Roosevelt,
near the end of World War II, was able to get his one-world plans under way
by laying the groundwork for today's United Nations, which was completed
under his successor, Harry S. Truman.</p>
<p> A few years later, that membership in an UN-mandated war in Korea cost
America 35,000 young lives.</p>
<p> The problem that one-worlders have always encountered, of course, is
the U.S. Constitution, which has stood as a bulwark against any globalist
schemes.</p>
<p> Nevertheless, American presidents since Roosevelt have insidiously
chipped away at the great powers of the people, written into the
Constitution by America's immortal Founding Fathers, with the use of so-
called executive orders.</p>
<p> CAUSE FOR ALARM</p>
<p> Americans should be deeply alarmed that those presidents have signed a
series of executive orders (EOs) which, under the guise of any national
emergency declared by the president serving at the time, can virtually
suspend the Constitution and convert the nation into a virtual
dictatorship. Dissent, peaceful or otherwise, is eliminated.</p>
<p> Those backing efforts to circumvent the Constitution may have gotten
the idea from President Abraham Lincoln, whose use of various extraordinary
powers of his office -- which many Constitutional scholars still insist was
illegal -- suspended various civil rights to curb such problems as draft
riots during the Civil War.</p>
<p> In 1862, Congress enacted the Enrollment Act to allow the drafting of
young men for the Union Army. The act was rife with inequities, such as
the provision which allowed a man to pay $300 or hire a substitute to take
his place. This hated "Rich Man's Exemption," as it was called, angered
the average American of military age and in particular young Irish
immigrants in New York City.</p>
<p> A riot erupted in New York in 1863, and it resulted in Lincoln using
some extraordinary powers of his office to keep the Union from falling
apart from within.</p>
<p> But over the years, presidents have used these powers for purposes
never intended by the Founding Fathers.</p>
<p> INDIANS VICTIMIZED</p>
<p> President John Tyler used such powers in 1842 to round up Seminole
Indians in Georgia and Florida and force-march them -- men, women and
children -- to Arkansas. This was probably the first use of internment in
America to deal with unpopular minorities. It was not the last.</p>
<p> In 1886, the Geronimo Chiricahua Apache Indians surrendered to U.S.
troops in the West, were rounded up by order of President Grover Cleveland,
and shipped to internment in Florida and Alabama.</p>
<p> Earlier, during the War Between the States, Sioux Indians in
Minnesota, when there was a delay in paying them their yearly allowance,
began attacking nearby white settlements. Lincoln sent in a hastily raised
force of volunteers under Col. H. H. Sibley. Little Crow, leader of the
Kaposia band, was decisively defeated by the Union troops on September 23,
1862, and more than 2,000 Sioux were taken captive, although Little Crow
himself and a few followers escaped.</p>
<p> Through the process of a military tribunal, sanctioned by Lincoln, 36
Sioux leaders were publicly hanged. Whether the Sioux executed were
innocent or guilty was apparently immaterial. The revolt was quelled, and
the Minnesota Sioux were all moved to reservations in Dakota.</p>
<p> These instances of the nation's executive branch taking extraordinary
measures to confine, or intern, American Indians are just a few of many
examples.</p>
<p> More recent examples of interning minorities by executive order
occurred during World War I and World War II.</p>
<p> During World War I, an unknown number of German-Americans were rounded
up by federal authorities and interned until after the war. In addition,
regardless of the First Amendment of the Constitution, which guarantees
freedom of speech and of the press. German-language newspapers, published
within German-American communities in the United States, were banned.</p>
<p> WW II INTERNMENTS</p>
<p> After the Japanese attack on Pearl Harbor on December 7, 1941, within
days the FBI rounded up tens of thousands of Japanese-Americans, guilty
only of being of Japanese ancestry, under the authority of an executive
order issued by President Franklin Delano Roosevelt. The lists of those to
be apprehended had been drawn up months earlier, before the war.</p>
<p> Held in concentration camps, the perimeters guarded by U.S. soldiers
armed with machine guns, the mostly innocent and patriotic Japanese-
Americans were not released until after the war.</p>
<p> Congress has recently passed legislation extending the nation's
apologies to the Japanese-Americans and extending them compensation for
their years of confinement.</p>
<p> However, no apology or compensation has ever been extended to the more
than 8,000 German-Americans who were confined in dozens of jails and camps
across the United States, also by order of Roosevelt.</p>
<p> Many were not released until 1947, a full two years after the end of
the war, in total violation of the Geneva Conventions.</p>
<p> "What happened to me and thousands of others is old history," said
Eberhard Fuhr of Cincinnati, who was interned at 17 years of age, "but the
next time it could be any other group, which is then not politically
correct, or out of favor for any other reason (SPOTLIGHT, May 20, 1991).</p>
<p> Fuhr's warning, of course, had already been proved correct just
several months earlier when, under orders of Bush, the FBI hounded
thousands of innocent Arab-Americans as the U.S. prepared for the Persian
Gulf conflict.</p>
<p> Only the efforts of a handful of irate U.S. Congressmen halted the
harassment but not until after a number of U.S. military bases were
selected as sites of internment camps for Arab-Americans and war
dissenters.</p>
<p>-----------------</p>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003
</p></xml>

100
regexConsp/dicthere.xml Normal file
View File

@ -0,0 +1,100 @@
<xml><p>
-------------------------------------------------------------------------------
DICTATORSHIP POSSIBLE HERE</p>
<p> By Lawrence Wilmot and Martin Mann
Exclusive to The SPOTLIGHT</p>
<p>Washington, DC -- Hidden in the bureaucratic maze Washington politicians
call "our Constitutional system of government," a little-known federal
agency is quietly making plans to turn the United States into a
dictatorship.</p>
<p> There are "stacks of blueprints" in the top-secret safe of the Federal
Emergency Management Agency (FEMA) designed to convert American society
into a "command system," a former deputy administrator of the agency has
told The SPOTLIGHT's investigative team.</p>
<p> In a private interview, allowing him to remain anonymous, this highly
placed source confirmed that the procedures developed by FEMA to "suspend"
the Constitution and to round up thousands of dissenters nationwide can be
activated by a simple phone call from the White House.</p>
<p> "Even people who have become aware of FEMA's existence and know
something about its activities -- not many do -- think the word `Emergency'
in its designation means it will go into action only in case of a natural
disaster or perhaps a surprise nuclear attack," related this expert.</p>
<p> "In reality, however, this outfit can be mobilized whenever the
politicians occupying the White House decide they need special -- and
extra-Constitutional -- powers to impose their will on the nation."</p>
<p> As Liberty Lobby first revealed, FEMA's bureaucrats can then proceed
to:</p>
<p> * Take over all farms, ranches or timberland in order to "utilize them
more effectively" as decreed in Executive Order (EO) 11490, the so-
called omnibus emergency preparedness decree promulgated by President
Richard Nixon on October 28, 1969.</p>
<p> * Seize all sources of public power: electric, nuclear, petroleum, etc.</p>
<p> * Freeze all wages, prices and bank accounts.</p>
<p> * Take over all communications media.</p>
<p> A FORCE OF FACELESS FEDS</p>
<p> Such totalitarian measures can be imposed by bureaucrats under FEMA's
direction, not just in the face of a cataclysmic upheaval, but "[w]henever
necessary for assuring the continuity of the federal government in any
national emergency type situation," decreed a subsequent White House ukase,
EO 11921, issued by President Gerald Ford in April 1976.</p>
<p> Can such a blueprint for tyranny be clamped on the United States by a
force of faceless federal officials? It is the role of FEMA has been
preparing for most intensively, says the former high agency administrator.</p>
<p> "In recent years, despite talk of spending cuts, FEMA's budget has
been steadily increasing," revealed this knowledgeable source. "It now
stands at somewhere around $3 billion annually. I say `somewhere' because
part of this agency's funding is appropriated under so-called black
programs, submitted to Congress with the defense budget without an
explanation of its purpose, aping the secret CIA appropriation."</p>
<p> FEMA can draw on the defense budget and on the protection of the
secrecy reserved for national security projects because it came into being
under President Jimmy Carter in a move that merged the civil defense and
disaster relief responsibilities formerly shared by the Pentagon, the
Commerce Department and the General Services Administration under a single
powerful agency.</p>
<p> WHAT'S FEMA REALLY UP TO?</p>
<p> But FEMA's real focus is not on disaster relief, knowledgeable sources
say. An investigation of this little-known agency, conducted earlier this
year by the General Accounting Office (GAO), the congressional watchdog
unit, has found that less than 10 percent of FEMA's staff -- 230
bureaucrats out of an estimated 2,600 -- are assigned full-time to
preparing for and dealing with major natural disasters such as storms or
earthquakes.</p>
<p> What, then, is FEMA really up to? The SPOTLIGHT's investigative team
has obtained an advance copy of the GAO report on this secretive agency.</p>
<p> The study's surprising findings have been reviewed with the help of
well-placed confidential sources, in order to bring into full view, for the
first time, the federal bureaucracy's secret blueprint for tyranny in
America.</p>
<p>-----------------</p>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003</p>
<p></p></xml>

65
regexConsp/diplomat.xml Normal file
View File

@ -0,0 +1,65 @@
<xml><p></p>
<p> (word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by Vangard Sciences
PO BOX 1031
Mesquite, TX 75150</p>
<p> October 17, 1990</p>
<p> listed on KeelyNet as FOOD1.ZIP
--------------------------------------------------------------------
FBI License Plate Codes</p>
<p> Somewhere in the vicinity of 2500 Soviet and Eastern European
officials live in the United States at any given time. The U.S.
State Department estimates that 30% to 40% of them are spies.</p>
<p> This comes to about 900 working spies in the diplomatic corps.</p>
<p> It is a very difficult job to keep track of the comings and goings
of these "diplomats", so the government has developed coded
diplomatic license plates.</p>
<p> The code applies ONLY to diplomatic plates which are conspicuously
red, white and blue with the word DIPLOMAT printed at the top.</p>
<p> All diplomatic licenses have a D. The other two letters indicate
the nation. SX for example, indicates that the car carries diplomats
from the Soviet Union.</p>
<p> FBI counter-intelligence agents are given wallet-sized cards listing
the codes for eighteen "problem" nations.</p>
<p> These nations are identified by the following codes :</p>
<p> Albania CP Libya FM
Bulgaria OM Nicaragua QU
China CY North Korea GQ
Cuba DC Poland QW
Czechoslavakia PH Romania ND
East Germany TJ South Africa FY
Hungary KH Soviet Union SX
Iran DM Syria AQ
Iraq TS Vietnam LD</p>
<p> The Washington Post published the code against the wishes of the
State Department. They feared RAMBO types might attack diplomatic
vehicles of countries they did not like.
--------------------------------------------------------------------</p>
<p> If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
Sciences address as listed on the first page. Thank you for your
consideration, interest and support.</p>
<p> Jerry W. Decker...Ron Barker.....Chuck Henderson
Vangard Sciences/KeelyNet</p>
<p> --------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
--------------------------------------------------------------------</p>
<p></p></xml>

390
regexConsp/diseas.xml Normal file
View File

@ -0,0 +1,390 @@
<xml><p>Carolee Boyles-SprenkelAbout 2650 words
Route 3, Box 2180Copyright 1989
Quincy, FL 32351Carolee Boyles-Sprenkel
(904) 627-2254Second Serial Rights</p>
<p> WILD DISEASES
By
Carolee Boyles-Sprenkel</p>
<p>A few days after Patsy M. returned home from a trip to
Hawaii, she came down with what she thought was intestinal flu.
After a week of nausea and vile-smelling diarrhea she went to her
doctor. He couldn't find anything wrong with her and put her on
a liquid diet. Two weeks and ten pounds later she was becoming
anemic. </p>
<p>Three stool samples, a sigmoidoscopy and a proctoscopy could
not establish the cause of her illness. Finally she mentioned
her symptoms to a colleague at work who recognized them as
something he'd heard of before. A little research turned up
information on an organism that parasitizes the human digestive
tract, Giardia. After only 24 hours on the antibiotic Flagyl,
Patsy knew she'd solved the problem. She recovered without
further incident.</p>
<p>Patsy was only one of a number of people who bring back more
from their outdoor experiences that they bargain for. Any time
we go into the woods, we run the risk of encountering illnesses
and discomforts our urban neighbors don't ever run into. Few
physicians even think about testing for these "exotic" diseases.
Untreated, some will run their course in a few days or a few
weeks. But not all are so benign. </p>
<p>According to epidemiologist Dr. Lisa Conti, doctors term
these diseases "zoonotic." That means they're caused by
organisms that infect both animals and humans. Though most
affect humans only rarely, a few are relatively common. </p>
<p>This is definitely not a case of "what you don't know won't
hurt you." What you don't know about some of these ailments
will, in some cases, kill you. </p>
<p> Lyme Disease</p>
<p>Lyme Disease may be the most visible of the little shop of
horrors found in the woods. Unlike some other diseases, Lyme
Disease is not rare. Dr. Robert Craven, a Centers for Disease
Control researcher studying Lyme, says doctors reported more than
2400 cases during 1988. He believes it's spreading throughout
the country.</p>
<p>A bacterium carried by deer mice and deer causes Lyme
Disease. Ixodid ticks can pass the organism from infected
animals to people.</p>
<p>The first symptom of the disease is a little red area where
the tick attached itself to you. The spot grows. Then fever,
headache, and muscle aches start. The spot increases in size
until it become a red ring several inches across with a light-
colored center. "It's kind of like a bull's-eye," says Craven. </p>
<p>If you don't get treatment, the effects can be severe. "It
can eventually cause cardiac problems, usually rhythm
disturbances," Craven says. "It can cause arthritis, which can
be fairly severe and debilitating. It can cause a whole host of
neurologic problems - encephalitis, meningitis type problems,
paralyses, that sort of thing."</p>
<p>Lyme Disease is easy to treat with antibiotics. According
to Craven, researchers are trying to produce a vaccine, but none
is available at this time.</p>
<p> Rocky Mountain Spotted Fever</p>
<p>Another bacterium transmitted exclusively by tick bites is
Rocky Mountain Spotted Fever. Infected ticks can pass the
organism from generation to generation without feeding on a sick
animal. </p>
<p>According to Dr. Michael Wilder, a state public health
clinician, the first symptoms are fever, cramping stomach pain
and rash. "Stomach-ache seems to be a common early symptom," he
says. "There may be some vomiting, but no diarrhea." The rash
looks like measles but it appears on the wrists and palms of the
hand, which measles rarely does.</p>
<p>Antibiotics will cure Rocky Mountain Spotted Fever. Of the
patients who are not treated, though, a few die from either shock
or hemorrhaging.
Encephalitis</p>
<p>Several different types of encephalitis cause problems from
time to time. St. Louis Encephalitis follows a 10-year cycle in
the Mississippi Valley, according to Craven. Eastern Equine
Encephalitis and Western Equine Encephalitis appear in small
scattered outbreaks each summer.</p>
<p>Birds carry the viruses that cause encephalitis, which
mosquitoes spread from the birds to humans and other mammals.
Early symptoms include confusion and fever. Some varieties of
the ailment cause nausea and vomiting. Then, Craven says,
convulsions, coma, and other neurologic involvement may occur.</p>
<p>"Eastern Equine is a particularly virulent form of
encephalitis in humans," he says. "It frequently kills, and the
people who do survive are usually brain damaged to a greater or
lesser degree for life."</p>
<p>Antibiotics are useless against encephalitis, he says.
Researchers have developed a vaccine against both Eastern and
Western Equine, but officials recommend using it only during
epidemic conditions.
Tularemia</p>
<p>According to Dr. Thomas Quan with the CDC's Fort Collins,
Colorado unit, most people acquire tularemia infections from
rabbits and hares, and the ticks associated with them. He says
people can pick up the versatile organism in a number of ways.</p>
<p>"Most human cases occur through the bite of a tick or
through direct contact with rabbits that are infected," he says.
"There are other modes of infection, such as deer fly bites and
mosquito bites." Sheep-shearers have acquired it from working
with infected sheep in Colorado. Some people have become ill
from drinking contaminated water. Farm workers can inhale the
organism from hay dust.</p>
<p>Early symptoms are fairly vague. You'll develop a bit of a
fever, and generally not feel too good. If you've inhaled the
organism, you'll have respiratory symptoms; if you've swallowed
it, you'll think you'll have intestinal flu. Swelling of the
armpits - called buboes - and other plague-like symptoms will
follow a tick bite or infection through a cut. For untreated
cases, the fatality rate is about 5 to 7 per cent. With
antibiotic treatment, patients can expect complete recovery.
"The people who get sick with it wish they'd die, but they
usually don't," Quan says. "But eventually they overcome it."
Giardia</p>
<p>CDC worker Dr. David Addiss says the biggest source of
Giardia is contaminated water. Biologists have found the
organism from many streams and rivers. "It's found fairly
commonly throughout the United States in untreated surface
water," he says. "You don't find it very much in wells or big
lakes, but you do see it in streams."</p>
<p>A number of different animals, especially beavers, may carry
the protozoan that causes the illness. Symptoms include loose
stools or full-blown diarrhea, cramping, gas and burping, and
rarely nausea and vomiting. The disease may be more chronic than
acute. Giardia attaches itself to the wall of the small
intestine, where it lives and reproduces. Untreated, the ailment
may go away on its own. In many people, through, the infection
persists until it's treated with a course of antibiotic. </p>
<p>Don't rely on iodine or chlorine tablets to treat stream
water. They may work if the water is warm and only contains a
few Giardia cysts. But in cold or heavily infested water,
they're not particularly effective.</p>
<p> Relapsing Fever</p>
<p>Craven also works with relapsing fever another tick-borne
disease related to Lyme Disease. He says it's fairly rare in the
United States. </p>
<p>The last big epidemic of Relapsing Fever occurred in the
Grand Canyon in the 1970s, and was related to squirrels nesting
in cabins where Canyon staff people were living. Generally,
though, the cases are fairly scattered.</p>
<p>The disease produces flu-like symptoms, including fever and
muscle aches. If it's not treated, the symptoms subside, and
patients think they're well. Then it comes back. This cycle
continues until the disease is treated. Fortunately, it doesn't
seem to produce any serious long-term effects like Lyme Disease
does.</p>
<p> Brucellosis</p>
<p>Unless you hunt wild hogs in the southeastern United States,
brucellosis is one problem you probably don't need to worry
about. This is not to say the disease isn't found in other
species; biologists have reported it in desert rats and other
rodents, hares, foxes, goats, sheep, deer, elk and bison, and
even dogs and cats. But Dr. Arnold Kaufmann, a physician with
the CDC in Atlanta, says he's never heard of hunters contracting
brucellosis from any animal except hogs. </p>
<p>The organisms which cause brucellosis are a group of
bacteria that live in the blood, bone marrow and lymphatic
system, including the liver and spleen. You can become infected
in a couple of ways. If you clean a hog without wearing gloves,
bacteria can enter through small cuts and scratches on your
hands. As you cut into the carcass of the animal a number of the
organisms are released into the air, where you can inhale them.</p>
<p>Heat kills the bacteria, so you're not at risk if you eat
well-cooked meat from a sick animal. In fact, when domestic
animals such as cattle are found to have brucellosis, one cure is
to send the animals to the slaughterhouse.</p>
<p>In humans, brucellosis is a vague sort of illness, according
to Kaufmann. It causes headache, fever, and exhaustion. You may
have achy joints and in general feel like you have a severe case
of the flu.</p>
<p>"It goes on and on and doesn't go away," says Kaufmann.
"It's a very complex disease. It can involved a variety of
organs." Untreated, most patients eventually recover; for a few,
though, it continues as a chronic illness. Treatment is simply a
course of antibiotics.</p>
<p> Q Fever</p>
<p>Q or Query Fever may be under reported, according to CDC
microbiologist Russell Regnery. As a result, the CDC doesn't
have any good data on how many cases occur in this country each
year.</p>
<p>"I think it's an important disease, but one for which very
little data can be found," says Regnery. In his opinion,
hunters and fishermen in sheep country need to be aware of the
disease as a potential long-shot ailment. "If, for example, you
were to shoot a sheep that had Q Fever and you butchered it out,
especially if that animal is a pregnant female, you would really
be asking for the possibility of exposure," Regnery says. The
organism reaches its highest concentration in amniotic fluid and
fetal tissues.</p>
<p>The agent is a specialized bacterium. It can infect humans
through cuts on the hand, but it's very infectious if inhaled.
As a result, clothes and other items can become contaminated by
the organism. </p>
<p>Symptoms include headache and fever, plus muscle pain.
Pregnant women may suffer complications. Untreated, the disease
usually resolves itself after a few days or a few weeks. A few
people, though, develop Q Fever endocarditis, or inflammation of
the heart. This can be a chronic problem, hard to treat, and
sometimes leading to death. Q-fever has been associated with
rabbit hunting in Canada.
Rabies</p>
<p>Despite modern vaccinations, rabies is still a potential
threat. Unlike most of the other diseases you can acquire in the
woods, rabies has no treatment - if you get it, you die. It's
that simple.</p>
<p>"Any warm-blooded animal can get rabies," says Wilder. "But
certain animals seem to play a more important role as a
reservoir. The main ones throughout most of the country are
insectivorous bats, skunks, foxes, and of course raccoons." Even
deer and antelope can become infected if a rabid animal bites
them.</p>
<p>You're only at a slight risk to pick up rabies if you dress
an infected deer or other ungulate without gloves on.
Theoretically, though, it's possible for you to get it,
especially if you skin out the head and get saliva on your hands.</p>
<p>Direct contact is not the only way you can acquire rabies.
In rare cases, spelunkers have become infected from inhaling the
virus in bat caves. </p>
<p>If you're bitten by a rabid animal, the first symptom of the
disease is what Wilder terms "an unusual sensation" at the site
of the bite. "It's an increased sensitivity, a feeling of
prickliness, just an odd sensation arising from the healing
wound." A fever and stiffening of the neck follow. Then you'll
have convulsions. You'll salivate because you're unable to
swallow. Death will follow in of days or weeks.</p>
<p>A post-exposure vaccine for people has been available for
many years. Recently, scientists have developed a pre-exposure
vaccine. Wilder says whether or not you need to get vaccinated
depends on what you're hunting. Most people don't need to worry
about it. But if you're a woodchuck or raccoon hunter, he
recommends it. At a cost of about $100, it's cheap insurance.</p>
<p>Wilder also stresses that hunters need to have their dogs
vaccinated against the disease. Some raccoon hunters in
particular fear the inoculation will affect the dogs' ability to
hunt, and so don't have them vaccinated. </p>
<p>Don't do the vaccination yourself. In Florida and perhaps a
few other state, rabies vaccine is available over the counter at
feed stores. "We've been most fortunate that no identified cases
of rabies have occurred from this practice," Wilder says.</p>
<p> Plague
Remember the bubonic plague, the disease that decimated
Europe in the Middle Ages? It's still with us in the western US. </p>
<p>Any rodent in the west can harbor the plague organism.
"Most people in the United States who acquire plague are getting
it from ground squirrels," Quan says. "On the west coast, it's
the California Ground Squirrel. In the Rocky Mountains it's the
Rock Squirrel. Then you have other smaller squirrels and
chipmunks." Even if you don't have direct contact with rodents,
you're still not immune. Your dog and cat may catch a squirrel,
pick up the fleas carrying the organism, and bring it home to
you.</p>
<p>Plague is transmitted to humans through flea bites. Early
symptoms are similar to those of tularemia: high fever, muscle
aches, fatigue. You'll have pain, sometimes quite severe, in the
area where the buboes, or swollen lymph glands, are going to
develop. </p>
<p>Untreated, plague kills. The organism produces toxins that
cause problems with blood clotting, and eventually gangrene.
Fifty-five to sixty per cent of patients die. Even treated,
plaque kills 15 to 20 per cent of patients. </p>
<p>As dreadful as plague is, it's easily treated. A variety of
antibiotics, including Tetracycline and sulfa drugs, will knock
it out. </p>
<p>"People who see a physician early on after symptoms, and who
have the savvy to know they were possibly exposed tend to
survive," Quan says. "A large percentage of those who die have
septicemic plague, which does not have a bubo." These cases look
like a lot of other diseases, are hard to diagnose, and as a
result often don't get treated early enough.</p>
<p>Fortunately, plague is rare. Quan says in 1983 doctors
reported a high of 40 cases, but in general the number is 10 to
20. This compares to 200-plus for tularemia each year.</p>
<p> Prevention</p>
<p>Most members of this hall of villains are easy to prevent
with little effort. First, don't drink untreated water. Carry
water or soft drinks with you. </p>
<p>Second, any time you dress game, don't do it bare-handed;
wear gloves. "If you don't wear gloves, you're really taking
your chances," Quan says. </p>
<p>Third, avoid contact with mosquitoes, ticks and fleas.
"Most of these things can be prevented with repellents," Craven
says. He notes especially Permanone, a permethrin compound that
is both an insecticide and a repellent useful for ticks. </p>
<p>If, after being in the woods, you begin to show symptoms
like any of the ones described here, go straight to the doctor.
Don't wait to see if you get better on your own. And be sure you
tell him or her what you suspect.</p>
<p>"Be sure you tell the physician you had the contact," Quan
says. "It's one way we have of making an early, proper
diagnosis. Tell the doctor you had contact with such-and-such an
animal. Then the physician is at least alerted that tularemia is
as possibility, or in the western states, plague." </p>
<p>These are only some of the weird and exotic diseases you may
encounter on a hunting or fishing trip. Others include
Leptospirosis, Anthrax, and a variety of fungal organisms. But
by following some common-sense preventive techniques, you can
avoid bringing home these unwanted freeloaders from the woods.</p>
<p> -End-
</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

215
regexConsp/dpalma4.xml Normal file
View File

@ -0,0 +1,215 @@
<xml><p>
VIOLATION OF LAW OF CONSERVATION OF CHARGE
IN SPACE POWER GENERATION PHENOMENON</p>
<p> By</p>
<p> PARAMAHAMSA TEWARI
Chief Project Engineer
Kaiga Project
NUCLEAR POWER CORPORATION
Karwar
INDIA</p>
<p> INTRODUCTION:</p>
<p> It has been hitherto believed in physics that the total electric
charge in the Universe is a constant quantity, and if additional
charge appears in some region, it is only at the expense of the
charge deficit in some other regions.</p>
<p> It is a basic law that electric charge is conserved and cannot be
destroyed or created. Precise experiments on a Space Power
Generator (SPG) which has been now further developed to demonstrate
the commercial viability of the newly discovered phenomenon of space
power generation however, totally violate the existing law of
conservation of charge, by generating output electrical power much
in excess of the input electrical power.</p>
<p> Since electric charge is a form of basic energy, the law of
conservation of energy will need to be enlarged to incorporate in it
the dynamics of absolute vacuum [1] which in a state of rotation
generates fundamental field to produce electrical charge and energy.</p>
<p> DESCRIPTION OF THE SPG:</p>
<p> The SPG shown in Fig. 1 is a further developed form of the machines
described [2,3] in earlier issues of this magazine.</p>
<p> A non-magnetic shaft interconnects two mild steel rotors on which
two electromagnets are mounted. Electric power at 1.5 volt d-c and
high ampheres is drawn from each unit, with the help of copper-
graphite brushes when the machine runs at 2860 rpm directly coupled
and driven by an induction motor.</p>
<p> The power is drawn between the inner rotor's cylindrical surface and
the shaft through d-c shunts that enable measurements of high d-c
current.</p>
<p> The SPG weighs about 150 Kg. and is fabricated out of 120 mm thick
mild steel plate. The two units enable generation of power at more
than 3 volt d-c by appropriate series connections between the two
coils. The electromagnet's coils are 16 swg super enamelled wire
with 216 turns in each coil.</p>
<p> The feature that brings improvements [4] in this machine is the
larger diameter of the rotors that produces higher d-c voltage at
comparatively lower speed, not exceeding 3000 rpm. Also the twin
units with single coil in each unit double the amount of power.</p>
<p> TEST RESULTS:</p>
<p> The drive motor (DM) takes no-load current of 2.6 amperes (1300
watts) to rotate itself and the SPG to overcome windage and friction
at 2870 rpm. The no-load voltage internally generated in each unit
of the SPG is adjusted to 1.5 volts d-c between the shaft and the
inner rotor by the control of the d-c excitation current in the two
electromagnet's coils connected in series.</p>
<p> The excitation current is 31 amperes, the total d-c resistance of
the two coils being 2.5 ohms. The power given to the electromagnets
is 31 x 31 x 2.5, that is, 2400 watts. The two shunts with
calibration of 2000 amperes for 75 mv are now connected across the
two output circuits.</p>
<p> The d-c currents measured in each circuit are almost equal to 2613
amperes corresponding to 98 mv reading of the shunt.</p>
<p> The output electrical power of each unit is 2613 x 1.5 watts, that
is, 3919 watts. Total electrical power from the two units is 7839
watts.</p>
<p> As the SPG is electrically loaded, the current of DM rises to 10
amperes, showing a rise of 7.4 amperes over the no-load current, and
corresponding to a rise in input electrical power of 3700 watts.</p>
<p> The load current of the DM of 10 amperes amounts to the total
electrical input to the DM of 5000 watts, out of which 1300 watts is
utilised to overcome the no-load losses.</p>
<p> The remaining electrical input of 3700 watts generates 7839 watts of
electrical output power, giving the efficiency of space power
generation in this particular as 211.8%.</p>
<p> Assuming electromagnetic efficiency of the DM as 80%, the efficiency
of the electrical energy generation of the SPG will rise to 264.75%.</p>
<p> If the excitation power of 2400 watts given to the SPG is deducted
from the total electrical output from the SPG of 7839 watts, the
balance electrical output of 5439 watts still exceeds the total
electrical input of 5000 watts by 439 watts, giving the total system
efficiency of 105.9% while, in addition the DM-SPG set runs as a
perpetual system drawing 1300 watts of power from space.</p>
<p> QUANTUM OF SPACE POWER:</p>
<p> The quantum of electrical charge produced due to the rotation of
space in a rotating electromagnet and the electrical power produced
when the power is withdrawn through an electric circuit, as
discussed in earlier article [2], is given by,</p>
<p> P = (1.8) LN(r^2)(10^-5)kW
(1)</p>
<p> where, P is power in kW, L is axial length of the SPG in centimeter,
N is revolution per second, and 'r' is the radius in centimeter of
the SPG on the inner rotor surface.</p>
<p> The derivation of the above relation was based on the assumption
that the radius of the spherical void at the centre of electron as
discussed in space vortex theory [1,2] is 1.5 x (10^-11) cm.</p>
<p> More precise measurements in space power generation experiments,
however show that the coefficient 1.8 in equation (1) should be 2.5,
and the void radius at electron's centre should be taken as 10^-11
cm. With these corrections the space power equation (1) now
becomes:</p>
<p> P = (2.5) LN(r^2)(10^-5)kW
(2)</p>
<p> substituting the values, L=12, N=47.6, and r=11.43 in (2),</p>
<p> P = 5.85 kW</p>
<p> Since there are two units of the SPG on the shaft, total power from
the two units will be 11.7 kW, which is 1.5 times the output power
drawn from the machine in the above test.</p>
<p> With additional brushes and reduced contacts at about 3000 rpm, the
above machine will have capacity to produce about 12 kW of power.</p>
<p> If the SPG is driven at 6000 rpm both the voltages and currents will
be doubled, producing 4 times output of 48 kW. Since the excitation
power remains constant, much higher total system efficiency is
expected though the efficiency of the SPG as computed above will
remain constant at 211.8%.</p>
<p> CONCLUSION:</p>
<p> Mass-energy equation of Einstein brought forth an universal law that
an electron like all matter contains in its structure energy. A
further enlargement of this law is that electron is itself energy,
where "energy" in physical terms is a state of vacuum in rotation.</p>
<p> Even at ordinary speed of rotation of an electromagnet, the inter-
atomic space of the iron core develops velocity fields of vacuum
that qualitatively act like additional charge within the rotating
system and liberate orbital electrons of the iron atoms.</p>
<p> With the interaction of the magnetic field the free electrons form
polarites [2,3].</p>
<p> It is possible to commercially develop a machine that can not only
rotate itself perpetually but also generate additional electrical
charge in kilowatts and higher range.</p>
<p> The law of conservation of charge and the law of conservation of
energy are applicable within the systems confined to material
interactions alone and not to the medium of space which is a dynamic
entity that can rotate and create charge at ordinary speeds, and can
rotate and create electrons at speed of light.</p>
<p> REFERENCES:</p>
<p> 1. Paramahamsa Tewari - "Beyond Matter", Printwell Publications,
Aligarh, India (1984).</p>
<p> 2. Paramahamsa Tewari - "Generation of Electrical Power from
Absolute Vacuum by High Speed Rotation of conducting Magnetic
Cylinder",
Magnets in Your Future, Vol. 1 No. 8, August 1986, P.O. Box 580,
Temecula, CA 92390, USA.</p>
<p> 3. Paramahamsa Tewari - "Interaction of Electron and Magnetic Field
in Space Power Generation Phenomenon", Magnets in Your Future,
Vol. 2 No. 12, December 1987, P.O. Box 580, Temecula, Ca. 92390,
USA.</p>
<p> 4. Report on the Initial Testing Phase of DePalma Energy
Corporation, N1 Electrical Power Generator, 6-1-1988 -
Bruce DePalma, DePalma Energy Corporation, 1060 Channel Drive,
Santa Barbara, California
93108, (805) 969-6442.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

857
regexConsp/dpalma5.xml Normal file
View File

@ -0,0 +1,857 @@
<xml><p>
HOMOPOLAR "FREE-ENERGY" GENERATOR TEST</p>
<p> Robert Kincheloe
Professor of Electrical Engineering (Emeritus)
Stanford University</p>
<p> Paper presented at the 1986 meeting
of the
Society for Scientific Exploration
San Francisco</p>
<p> June 21, 1986
Revised February 1, 1987</p>
<p> --------------------------------------------------------------------</p>
<p> HOMOPOLAR "FREE-ENERGY" GENERATOR TEST
Robert Kincheloe</p>
<p> ABSTRACT</p>
<p> Known for over 150 years, the Faraday homopolar generator has
been claimed to provide a basis for so-called "free-energy"
generation, in that under certain conditions the extraction of
electrical output energy is not reflected as a corresponding
mechanical load to the driving source.</p>
<p> During 1985 I was invited to test such a machine. While it did
not perform as claimed, repeatable data showed anomalous
results that did not seem to conform to traditional theory.</p>
<p> In particular, under certain assumptions about internally
generated output voltage, the increase in input power when power
was extracted from the generator over that measured due to
frictional losses with the generator unexcited seemed to be
either about 13% or 20% of the maximum computed generated power,
depending on interpretation.</p>
<p> The paper briefly reviews the homopolar generator, describes the
tests on this particular machine, summarizes and presents
tentative conclusions from the resulting data.</p>
<p> THE SUNBURST HOMOPOLAR GENERATOR</p>
<p> In July, 1985, I became aware of and was invited to examine and
test a so-called free-energy generator known as the Sunburst N
Machine.</p>
<p> This device, shown in Figs 1a and 1b, was proposed by Bruce
DePalma and constructed by Charya Bernard of the Sunburst
Community in Santa Barbara, CA, about 1979.</p>
<p> The term "free-energy" refers to the claim by DePalma [1]
(and others [2]) that it was capable of producing electrical
output power that was not reflected as a mechanical load to the
driving mechanism but derived from presumed latent spatial
energy.</p>
<p> Apart from mechanical frictional and electrical losses inherent
in the particular construction, the technique employed was
claimed to provide a basis for constructing a generator which
could supply the energy to provide not only its own motive power
but also additional energy for external use. From August 1985
to April 1986 I made a series of measurements on this particular
machine to test these claims.</p>
<p> GENERATOR DESCRIPTION</p>
<p> Details of the generator construction are shown in Figs. 2 and 3.</p>
<p> It consists essentially of an electromagnet formed by a coil of
3605 turns of #10 copper wire around a soft iron core which
can be rotated with the magnetic field parallel to and
symmetrical around the axis of rotation.</p>
<p> At each end of the magnet are conducting bronze cylindrical
plates, on one of which are arranged (as shown in Fig. 3)
one set of graphite brushes for extracting output current
between the shaft and the outer circumference and a second
set of metering brushes for independently measuring the induced
voltage between these locations.</p>
<p> A third pair of brushes and slip rings supply the current for
the electromagnet. A thick sheath of epoxy-impregnated
fiberglass windings allow the magnet to be rotated at high speed.</p>
<p> The generator may be recognized as a so-called homopolar, or
acyclic machine, a device first investigated and described
by Michael Faraday [3] in 1831 (Figs. 4,5) and shown
schematically in Fig. 6.</p>
<p> It consists of a cylindrical conducting disk immersed in an
axial magnetic field, and can be operated as a generator with
sliding brushes extracting current from the voltage induced
between the inner and outer regions of the disk when the
rotational energy is supplied by an external driving source.</p>
<p> The magnitude of the incremental radial generated voltage
is proportional to both the strength of the magnetic field
and the tangential velocity, so that in a uniform magnetic
field the total voltage is proportional to the product of speed
times the difference between the squares of the inner and outer
brush radii.</p>
<p> The device may also be used as a motor when an external
voltage produces an radial current between the sliding brushes.</p>
<p> There have been a number of commercial applications of
homopolar motors and generators, particularly early in this
century [4], and their operating principles are described in a
number of texts [5].</p>
<p> The usual technique is to use a stationary magnet to produce
the magnetic field in which the conducting disk (or
cylinder) is rotated.</p>
<p> Faraday found, however, (Fig 7) that it does not matter whether
the magnet itself is stationary or rotating with the disk as long
as the conductor is moving in the field, but that rotating the
magnet with the conducting disk stationary did not produce an
induced voltage.</p>
<p> He concluded that a magnetic field is a property of space
itself, not attached to the magnet which serves to induce the
field [6].</p>
<p> DePalma stated [7] that when the conducting disk is attached
to a rotating magnet, the interaction of the primary magnetic
field with that produced by the radial output current results in
torque between the disk and the magnet structure which is not
reflected back to the mechanical driving source.</p>
<p> Lenz's law therefore does not apply, and the extraction of
output energy does not require additional driving power.
This is the claimed basis for extracting "free" energy.</p>
<p> Discussions of the torque experienced by a rotating magnet are also
discussed in the literature [8].</p>
<p> Because the simple form shown in Fig. 6 has essentially
one conducting path, such a homopolar device is characterized
by low voltage and high current requiring a large magnetic field
for useful operation.</p>
<p> Various homopolar devices have been used for specialized
applications [9] (such as generators for developing large
currents for welding, ship degaussing, liquid metal
magnetohydrodynamic pumps for nuclear reactor cooling,
torquemotors for propulsion, etc.), some involving quite high
power.</p>
<p> These have been extensively discussed in the literature,
dealing with such problems as developing the high magnetic
fields required (sometimes using superconducting magnets in
air to avoid iron saturation effects), the development of
brushes that can handle the very high currents and have low
voltage drop because of the low output voltage generated,
and with counteracting armature reaction which otherwise would
reduce the output voltage because of the magnetic field
distortion resulting from the high currents.</p>
<p> From the standpoint of prior art, the design of the
Sunburst generator is inefficient and not suitable for power
generation:</p>
<p> 1. The magnetic field is concentrated near the axis where
the tangential velocity is low, reducing the generated
voltage.</p>
<p> 2. Approximately 4 kilowatts of power are required to
energize the magnet, developing enough heat so that the
device can only be operated for limited periods of time.</p>
<p> 3. The graphite brushes used have a voltage drop almost
equal to the total induced voltage, so that almost all of
the generated power is consumed in heating the brushes.</p>
<p> 4. The large contacting area (over 30 square inches) of
the brushes needed for the high output current creates
considerable friction loss.</p>
<p> Since this machine was not intended as a practical generator but
as a means for testing the free energy principle, however,
from this point of view efficiency in producing external
power was not required or relevant.</p>
<p> DEPALMA'S RESULTS WITH THE SUNBURST HOMOPOLAR GENERATOR</p>
<p> In 1980 DePalma conducted tests with the Sunburst
generator, describing his measurement technique and results in an
unpublished report [10].</p>
<p> The generator was driven by a 3 phase a-c 40 horsepower motor
by a belt coupling sufficiently long that magnetic fields of
the motor and generator would not interact. A table from this
report giving his data and results is shown in Fig. 8.</p>
<p> For a rotational speed of 6000 rpm an output power of 7560 watts
was claimed to require an increase of 268 watts of drive power
over that required to supply losses due to friction, windage,
etc. as measured with the output switch open.</p>
<p> If valid, this would mean that the output power was 28.2 times
the incremental input power needed to produce it. Several
assumptions were made in this analysis:</p>
<p> 1. The drive motor input power was assumed to be the product
of the line voltage and current times the appropriate factor
for a three-phase machine and an assumed constant 70% power
factor.
There was apparently no consideration of phase angle
change as the motor load increased. This gives optimistic
results, since consideration of phase angle is necessary
for calculating power in an a-c circuit, particularly with
induction motors.
It might also be noted that the measured incremental line
current increase of 0.5 ampere (3.3%) as obtained with the
analog clamp-on a-c ammeter that was used was of limited
accuracy.</p>
<p> 2. The output power of the generator was taken to be the
product of the measured output current and the internally
generated voltage in the disk less the voltage drop due only
to internal disk resistance. Armature reaction was thus
neglected or assumed not to be significant.</p>
<p> 3. The generated voltage which produced the current in the main
output brushes was assumed to be the same as that measured
at the metering brushes, and the decrease in metered voltage
from 1.5 to 1.05 volts when the output switch is closed was
assumed to be due to the internal voltage drop resulting
from the output current flowing through the internal disk
resistance that is common to both sets of brushes and
calculated to 62.5 microohms.</p>
<p> Of these, the first assumption seems the most serious, and it is my
opinion that the results of this particular test were inaccurate.</p>
<p> Tim Wilhelm of Stelle, Illinois, who witnessed tests of the Sunburst
generator in 1981, had a similar opinion [11].</p>
<p> RECENT TESTS OF THE SUNBURST GENERATOR</p>
<p> Being intrigued by DePalma's hypothesis, I accepted the offer by
Mr. Norman Paulsen, founder of the Sunburst Community, to
conduct tests on the generator which apparently had not been
used since the tests by DePalma and Bernard in 1979.</p>
<p> Experimental Setup</p>
<p> A schematic diagram of the test arrangement is shown in Fig. 9,
with the physical equipment shown in Fig. 10. The generator
is shown coupled by a long belt to the drive motor behind it,
together with the power supplies and metering both contained
within and external to the Sunburst power and metering cabinet.</p>
<p> Figure 10b shows the panel of the test cabinet which provided
power for the generator magnet and motor field. The 4-1/2 digit
meters on the panel were not functional and were not used;
external meters were supplied.</p>
<p> I decided to use an avaiable shunt-field d-c drive motor
to facilitate load tests at different speeds and to simplify
accurate motor input power measurements.</p>
<p> Page 5</p>
<p> Referring to Figure 9, variacs and full-wave bridge
rectifiers provided variable d-c supplies for the motor armature
and field and the homopolar generator magnet.</p>
<p> Voltages and currents were measured with Micronta model 11-191
3-1/2 digit meters calibrated to better than 0.1% against a
Hewlett Packard 740B Voltage Standard that by itself was
accurate to better than .005%.</p>
<p> Standard meter shunts together with the digital voltmeters were
used to measure the various currents. With this
arrangement the generator speed could be varied smoothly from 0
to over 7000 rpm, with accurate measurement of motor input
power, metered generator output voltage Vg and generator output
current Ig.</p>
<p> Speed was measured with a General Radio model 1531 Strobotac
which had a calibration accuracy of better than 2% (as verified
with a frequency counter) and which allowed determination of
relative speed changes of a few rpm of less.</p>
<p> Small changes in either load or input power were clearly
evident because of the sensitivity of the Strobotac speed
measurement, allowing the motor input power to be adjusted
with the armature voltage variac to obtain the desired
constant speed with no acceleration or deceleration before
taking readings from the various meters.</p>
<p> Generator Tests</p>
<p> Various tests were conducted with the output switch open to
confirm that generated voltage at both the output brushes (Vbr)
and metering brushes (Vg) were proportional to speed and magnetic
field, with the polarity reversing when magnetic field or
direction of rotation were reversed.</p>
<p> Tracking of Vbr and Vg with variation of magnetic field is shown
in Fig. 11, in which it is seen that the output voltages are not
quite linearly related to magnet current, probably due to core
saturation.</p>
<p> The more rapid departure of Vg from linearity may be due to
the different brush locations as seen on Fig 3, differences
in the magnetic field at the different brush locations, or other
causes not evident. An expanded plot of this voltage
difference is shown in Fig. 12, and is seen to considerably
exceed meter error tolerances.</p>
<p> Figure 11 also shows an approximate 300 watt increase in drive
motor armature power as the magnet field was increased from
0 to 19 amperes.</p>
<p> (The scatter of input power measurements shown in the upper curve
of Fig. 11 resulted from the great sensitivity of the motor
armature current to small fluctuations in power line voltage,
since the large rotary inertia of the 400 pound generator did
not allow speed to rapidly follow line voltage changes).</p>
<p> At first it was thought that this power loss might be due to
the fact that the outer output brushes were arranged in a
rectangular array as shown in Fig. 3.</p>
<p> Since they were connected in parallel but not equidistant from
the axis the different generated voltages would presumably
result in circulating currents and additional power dissipation.</p>
<p> Measurement of the generated voltage as a function of
radial distance from the axis as shown in Fig. 13, however,
showed that almost all of the voltage differential occurred
between 5 and 12 cm, presumably because this was the region of
greatest magnetic field due to the centralized iron core.</p>
<p> The voltage in the region of the outer brushes was almost
constant, with a measured variation of only 3.7% between the
extremes, so that this did not seem to explain the increase in
input power. The other likely explanation seems to be that there
are internal losses in the core and other parts of the metal
structure due to eddy currents, since these are also moving
conductors in the field.</p>
<p> In any event, the increase in drive power was only about 10% for
the maximum magnet current of 19 amperes.</p>
<p> Figure 14 typifies a number of measurements of input power
and generator performance as a function of speed and various
generator conditions.</p>
<p> Since the generator output knife switch procedure was very stiff
and difficult to operate the procedure used was to make a
complete speed run from zero to the maximum speed and descending
again to zero with the switch open, taking readings at each
speed increment with the magnet power both off and on.</p>
<p> The procedure was then repeated with the switch closed. (It
was noted that during the descending speed run the input power
was a few percent lower than for the same speed during the
earlier ascending speed run; this was presumably due to
reduced friction as the brushes and/or bearings became
heated. In plotting the data the losses for both runs were
averaged which gave a conservative result since the losses
shown in the figures exceed the minimum values measured).</p>
<p> The upper curve (a) shows the motor armature input power
with a constant motor field current of 6 amperes as the speed
is varied with no generator magnet excitation and is seen to
reach a maximum of 4782 watts as the speed is increased to 6500
rpm.</p>
<p> This presumably represents the power required to overcome
friction and windage losses in the motor, generator, and drive
belt, and are assumed to remain essentially constant whether
the generator is producing power or not [12].</p>
<p> Curve 14b shows the increase of motor armature power over that
of curve (a) that results from energizing the generator magnet
with a current of 16 amperes but with the generator output
switch open so that there is no output current (and hence
no output power dissippation).</p>
<p> This component of power (which is related to the increase of
drive motor power with increased magnet current as shown in Fig.
11 as discussed above) might also be present whether or not the
generator is producing output current and power, although this is
not so evident since the output current may affect the
magnetic field distribution.</p>
<p> Curve 14c shows the further increase of motor armature input
power over that of curves (a) plus (b) that results when the
output switch is closed, the generator magnet is energized and
output current is produced.</p>
<p> It is certainly not zero or negligible but rises to a maximum of
802 watts at 6500 rpm. The total motor armature input power
under these conditions is thus the sum of (a), (b), and
(c) and reaches a maximum of 6028 watts at 6500 rpm.</p>
<p> The big question has to do with the generated output power.
The measured output current at 6500 rpm was 4776 amperes; the
voltage at the metering brushes was 1.07 volts.</p>
<p> Using a correction factor derived from Fig. 12 and assuming a
common internal voltage drop due to a calculated disk
resistance of 38 microohms, a computed internal generated
potential of 1.28 volts is obtained which if multiplied by
the measured output current indicates a generated power of
6113 watts.</p>
<p> All of this power is presumably dissipated in the internal
and external circuit resistances, the brush loss due both to
the brush resistance and the voltage drops at the contact
surfaces between the brushes and the disk (essentially an arc
discharge), and the power dissipated in the 31.25 microohm meter
shunt.</p>
<p> It still represents power generated by the machine, however,
and exceeds the 802 watts of increased motor drive power due
solely to closing the generator output switch and causing
output current to flow by a factor of 7.6 to 1.</p>
<p> If the 444 watts of increased input power that resulted
from energizing the magnet with the output switch open is assumed
to have been converted to generated output power and hence
should be included as part of the total increased drive motor
power required to produce generated output, the computed 6113
watts of generated power still exceeds the total input power of
444 watts plus 802 watts by a factor of 4.9 to 1.</p>
<p> The computed output power even slightly exceeds the total
motor armature input power including all frictional and windage
losses of 6028 watts under these conditions (although the
total system effeciency is still less than 100% because of the
generator magnet power of approximately 2300 watts and motor
field power of about 144 watts which must be added to the
motor armature power to obtain total system input power).</p>
<p> It would thus seem that if the above assumptions are valid
that DePalma correctly predicted that much of the generated
power with this kind of machine is not reflected back to the
motive source. Figure 15 summarizes the data discussed above.</p>
<p> To further examine the question of the equivalence between
the internally generated voltage at the main output brushes and
that measured at the metering brushes, a test was made of the
metered voltage as a function of speed with the generator magnet
energized with a current of 20 amperes both with the output
switch open and closed. The resulting data is shown in Fig. 16.</p>
<p> The voltage rises to about 1.32 volts at 6000 rpm with the
switch open (which is close to that obtained by DePalma) and
drops 0.14 volts when the switch is closed and the measured
output current is 3755 amperes, corresponding to an effective
internal resistance of 37 microohms.</p>
<p> Even if this were due to other causes, such as armature reaction,
it does not seem likely that there would be a large potential
drop between the output and metering brushes because of
the small distance, low magnetic field (and radial differential
voltage), and large mass of conducting disk material.</p>
<p> Internal currents many times the measured output current of
almost 4000 amperes would be required for the voltage
difference between the outer metering and output brushes to
be significant and invalidate the conclusions reached above.</p>
<p> A further method of testing the validity of the assumed
generated output potential involved an examination of the
voltage drop across the graphite brushes themselves.</p>
<p> Many texts on electrical machinery discuss the brush drop
in machines with commutators or slip rings.</p>
<p> All of those examined agree that graphite brushes typically have
a voltage drop that is essentially constant at approximately one
volt per brush contact when the current density rises above 10-15
amperes per square centimeter.</p>
<p> To compare this with the Sunburst machine the total brush
voltage was calculated by subtracting the IR drop due to the
output current in the known (meter shunt) and calculated (disk,
shaft, and brush lead) resistances from the assumed
internally generated output voltage. The result in Fig. 17
shows that the brush drop obtained in this way is even less than
that usually assumed, as typified by the superimposed curve
taken from one text.</p>
<p> It thus seems probable that the generated voltage is
not significantly less than that obtained from the metering
brushes, and hence the appropriateness of the computed output
power is supported.</p>
<p> CONCLUSIONS</p>
<p> We are therefore faced with the apparent result that the
output power obtained when the generator magnet is
energized greatly exceeds the increase in drive power over
that needed to supply losses with the magnet not energized.
This is certainly anomalous in terms of convential theory.
Possible explanations?</p>
<p> 1. There could be a large error in the measurements resulting
from some factor such as noise which caused the digital
meters to read incorrectly or grossly inaccurate current
shunt resistances.</p>
<p> If the measured results had shown that the computed generated
output power exceeded the input drive power by only a few percent
this explanation would be reasonable and would suggest that more
careful calibration and measurements might show that the results
described above were due to measurement error.</p>
<p> With the data showing such a large ratio of generated power to
input power increase, however, in my opinion this
explanation of the results seems unlikely.</p>
<p> (A later test showed that the digital meters are insensitive
to a large a-c ripple superimposed on the measured d-c, but
within their rated accuracy of 0.1% give a true average value).</p>
<p> 2. There could be a large difference between the measured
voltage at the metering brushes and the actual generated
voltage in the output brush circuit due to armature
reaction, differences in the external metering and output
circuit geometry, or other unexplained causes.</p>
<p> As discussed above the various data do not seem to support this
possibility.</p>
<p> 3. DePalma may have been right in that there is indeed a
situation here whereby energy is being obtained from a
previously unknown and unexplained source.</p>
<p> This is a conclusion that most scientists and engineers would
reject out of hand as being a violation of accepted laws of
physics, and if true has incredible implications.</p>
<p> 4. Perhaps other possibilities will occur to the reader.</p>
<p> The data obtained so far seems to have shown that while DePalma's
numbers were high, his basic premise has not been disproved.
While the Sunburst generator does not produce useful output power
because of the internal losses inherent in the design, a
number of techniques could be used to reduce the friction
losses, increase the total generated voltage and the
fraction of generated power delivered to an external load.</p>
<p> DePalma's claim of free energy generation could perhaps then
be examined.</p>
<p> I should mention, however, that the obvious application of using
the output of a "free-energy" generator to provide its own motive
power, and thus truly produce a source of free energy, has
occured to a number of people and several such machines have
been built.</p>
<p> At least one of these known to me [13], using what seemed to
be a good design techniques, was unsuccessful.</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> FOOTNOTES</p>
<p> 1. DePalma, 1979a,b,c, 1981, 1983, 1984, etc.
2. For example, Satelite News, 1981, Marinov, 1984, etc.
3. Martin, 1932, vol. 1, p.381.
4. Das Gupta, 1961, 1962; Lamme, 1912, etc.
5. See, for example, Bumby, 1983; Bewley, 1952; Kosow, 1964; Nasar,
1970.
6. There has been much discussion on this point in the
literature, and about interpretation of flux lines. Bewley,
1949; Cohn, 1949a,b; Crooks, 1978; Cullwick, 1957; Savage,
1949.
7. DePalma, op. cit.
. Kimball, 1926; Zeleny, 1924.
9. Bumby, Das Gupta, op. cit.
10. DePalma, 1980.
11. Wilhelm, 1980, and personal communication.
12. The increase in motor losses with increased load are
neglected in this discussion because of a lack of accurate
values for armature and brush resistances, magnetic field
distortion resulting from armature reaction, etc. Such
losses, while small, would be appreciable, however; their
inclusion would further increase the ratio of generated to
drive power so that the results described are conservative.
13. Wilhelm, 1981, and personal communication.</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> REFERENCES</p>
<p> [Bewley, 1949] - L. V. Bewley, letter re [Cohn, 1949a]; ELECTRICAL
ENGINEERING, Dec. 1949, p.1113-4. (Claims error in Cohn's paper)</p>
<p> [Bewley, 1952] - L. V. Bewley, FLUX LINKAGES &amp; ELECTROMAGNETIC
INDUCTION, Macmillan, NY, 1952. (Explanation of induction
phenomena and the Faraday generator)</p>
<p> [Bumby, 1983] - J. R. Bumby, SUPERCONDUCTING ROTATING ELECTRICAL
MACHINES, Claredon Press, 1983. (Homopolar designs, high current
brushes including liquid metal)</p>
<p> [Cohn, 1949a] - George I. Cohn, "Electromagnetic Induction",
ELECTRICAL ENGINEERING, May 1949, p441-7. (Unipolar generator as
paradox)</p>
<p> [Cohn, 1949b] - George Cohn, letter re [Savage, 1949]; ELECTRICAL
ENGINEERING, Nov 1949, p1018. (Responds to criticism by Savage)</p>
<p> [Crooks, 1978] - M. J. Crooks et al, "One-piece Faraday generator:
A paradoxical experiment from 1851", Am. J. Phys. 46(7), July
1978, p729-31. (Derives Faraday generator performance using
Maxwell's equations)</p>
<p> [Cullwick, 1957] - E. G. Cullwick, ELECTROMAGNETISM AND RELATIVITY,
Longmans &amp; Green, London, 1957. (Chapter 10, "A Rotating
Conducting Magnet", pp.141-60, discusses question of flux rotation
with magnet)</p>
<p> [Das Gupta, 1961] - A. K. Das Gupta, "Design of self-compensated
high current comparatively higher voltage homopolar generators",
AIEE Trans. Oct 1961, p567-73. (Discusses very high current
homopolar generator design)</p>
<p> [Das Gupta, 1962] - A. K. Das Gupta, "Commutatorless D-C generators
capable to supply currents more than one million amperes, etc"
AIEE Trans. Oct 1962, p399-402. (Discusses very high current low
voltage Faraday generators)</p>
<p> [DePalma, 1979a] - Bruce DePalma, EXTRACTION OF ELECTRICAL ENERGY
DIRECTLY FROM SPACE: THE N-NACHINE, Simularity Institute, Santa
Barbara CA, 6 Mar 1979. (Discusses homopolar generator or N-
Machine as free-energy source)</p>
<p> [DePalma, 1979b] - Bruce DePalma, "The N-Machine", Paper given at
the World Symposium on Humanity, Pasadena, CA, 12 April 1979.
(Describes background, development of "free-energy" theories)</p>
<p> [DePalma, 1979c] - Bruce DePalma, ROTATION OF A MAGNETIZED
GYROSCOPE, Simularity Institute Report #33, 16 July 1979.
(Describes design of Sunburst homopolar generator)</p>
<p> [DePalma, 1980] - Bruce DePalma, "Performance of the Sunburst N
Machine", Simularity Institute, Santa Barbara, CA, 17 December
1980. (Description of tests and results)</p>
<p> [DePalma, 1981] - Bruce DePalma, "Studies on rotation leading to the
N-Machine", DePalma Institute, 1981 (transcript of talk?)
(Discusses experiments with gravity that led to development of
idea of free-energy machine)</p>
<p> [DePalma, 1983] - Bruce DePalma, THE ROTATION OF THE UNIVERSE,
DePalma Institute Report #83, Santa Barbara, CA, 25 July 1983.
(Uses Faraday disc to discuss universal principles).</p>
<p> [DePalma, 1984] - Bruce DePalma, THE SECRET OF THE FARADAY DISC,
DePalma Institute, Santa Barbara, CA, 2 Feb 1984. (Claims
explanation of Faraday disc as a free-energy device)</p>
<p> [Kimball, 1926] - A. L. Kimball, Jr., "Torque on revolving
cylindrical magnet", PHYS. REV. v.28, Dec 1928, p.1302-8.
(Alternative analysis of torque in a homopolar device to that of
Zeleny and Page, 1924)</p>
<p> [Kosow, 1964] - Irving L. Kosow, ELECTRICAL MACHINERY &amp; CONTROL,
Prentice-Hall, 1964. (Discusses high current homopolar (acyclic)
generators)</p>
<p> [Lamme, 1912] - B. G. Lamme, "Development of a successful direct-
current 2000-kW unipolar generator", AIEE Trans. 28 June 1912,
p1811-40. (Early discussion of design of high power homopolar
generator)</p>
<p> [Marinov, 1984]- Stefan Marinov, THE THORNY WAY OF TRUTH, Part II;
Graz, Austria, 1984 (Advertisement in NATURE). (Claims free-
energy generator proved by DePalma, Newman)</p>
<p> [Martin, 1932] - Thomas Martin (ed), FARADAY'S DIARY, Bell, 1932,
in 5 vols. (Transcription and publication of Faraday's original
diaries)</p>
<p> [Nasar, 1970] - S. Nasar, ELECTROMAGNETIC ENERGY CONVERSION DEVICES
&amp; SYSTEMS, Prentice-Hall, 1970. (Discusses principles and
applications of acyclic (homopolar) machines)</p>
<p> [Satellite News, 1981] - "Researchers see long-life satellite power
systems in 19th century experiment", Research news, SATELLITE
NEWS, 15 June 1981. (Reports DePalma's claim for free-energy
generator)</p>
<p> [Savage, 1949] - Norton Savage, letter re [Cohn, 1949a]; ELECTRICAL
ENGINEERING, July 1949, p645. (Claims error in Cohn's paper)</p>
<p> [Wilhelm, 1980] - Timothy J. Wilhelm, INVESTIGATIONS OF THE N-EFFECT
ONE-PIECE HOMOPOLAR DYNAMOS, ETC. (Phase I), Stelle, IL, 12 Sept
1980. (Discusses tests on DePalma's N-Machine)</p>
<p> [Wilhelm, 1981] - Timothy J. Wilhelm, INVESTIGATIONS OF THE N-EFFECT
ONE-PIECE HOMOPOLAR DYNAMOS, ETC. (Phase II), Stelle, IL, 10 June
1981. (Design and tests of improved homopolar generator/motor)</p>
<p> [Zeleny, 1924] - John Zeleny &amp; Leigh Page, "Torque on a cylindrical
magnet through which a current is passing", PHYS. REV. v.24, 14
July 1924, p.544-59. (Theory and experiment on torque in a
homopolar device)</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> (Sysop note: The following figure also had an accompanying drawing)</p>
<p> Figure 5 - Transcription of the first experiment showing generation
of electrical power in a moving conductor by Michael
Faraday</p>
<p> 99*. Made many expts. with a copper revolving plate, about 12 inches
in diameter and about 1/5 of inch thick, mounted on a brass
axle.</p>
<p> To concentrate the polar action two small magnets 6 or 7 inches
long, about 1 inch wide and half an inch thick were put against
the front of the large poles, transverse to them and with their
flat sides against them, and the ends pushed forward until
sufficiently near; the bars were prevented from slipping down
by jars and shakes by means of string tied round them.</p>
<p> 100. The edge of the plate was inserted more of less between the two
concentrated poles thus formed. It was also well amalgamated,
and then contact was made with this edge in different places by
conductors formed from equally thick copper plate and with the
extreme end edges grooved and amalgamated so as to fit on to
and have contact with the edges of the plate. Two of these
were attached to a piece of card board by thread at such</p>
<p> *[99]
(Sysop note: a sketch appeared in this area)</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> (Sysop note: The following figure also had an accompanying drawing)</p>
<p> Figure 7 - Test of a rotating magnet by Michael Faraday, December
26, 1831.</p>
<p> 255. A copper disc was cemented on the top of a cylinder magnet,
paper intervening, the top being the marked pole; the magnet
supported so as to rotate by means of string, and the wires of
the galvanometer connected with the edge and the axis of the
copper plate. When the magnet and disc together rotated
unscrew the marked end of the needle went west. When the
magnet and disc rotated screw the marked end of the needle
went east.</p>
<p> 256. This direction is the same as that which would have resulted
if the copper had moved and the magnet been still. Hence
moving the magnet causes no difference provided the copper
moves. A rotating and a stationary magnet cause the same
effect.</p>
<p> 257. The disc was then loosed from the magnet and held still
whilst the magnet itself was revolved; but now no effect upon
the galvanometer. Hence it appears that, of the metal circuit
in which the current is to be formed, different parts must
move with different angular velocities. If with the same, no
current is produced, i.e. when both parts are external to the
magnet.</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> (Sysop note: The following figure also had an accompanying drawing)</p>
<p> Figure 8 - Test data from report by Bruce DePalma</p>
<p> PERFORMANCE OF THE SUNBURST HOMOPOLAR GENERATOR</p>
<p> machine speed: 6000 r.p.m.
drive motor current no load 15 amperes
drive motor current increase
when N machine is loaded 1/2 ampere max.</p>
<p> Voltage output of N generator no load 1.5 volts d.c.
Voltage output of N generator loaded 1.05 v.d.c.
Current output of N generator 7200 amperes
(225 m.v. across shunt @ 50 m.v./1600 amp.)</p>
<p> Power output of N machine 7560 watts = 10.03 H.p.</p>
<p> Incremental power ratio = 7560/268 28.2 watts out/watts in</p>
<p> Internal resistance of generator 62.5 micro-phms</p>
<p> Reduction of the above data gives as the equivalent circuit for the
machine:</p>
<p> (Sysop note: a drawing R(internal) = 62.5 micro-ohms
appeared in this area) R(brush) = 114.25 " "
R(shunt) = 31.25 " "</p>
<p> BRUCE DEPALMA
17 DECEMBER 1980</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p> Page 14</p>
<p> Figure 15 - Summary of test results at 6500 rpm</p>
<p> I II III</p>
<p> MAGNET POWER OFF ON ON
OUTPUT SWITCH OPEN OPEN CLOSED
SPEED 6500 6500 6500 RPM
MAGNET CURRENT 0 16 16
AMPERES
MOTOR ARMATURE POWER 4782 5226 6028
WATTS
INCREMENT 444 802
WATTS
METER BRUSH VOLTAGE .005 1.231 1.070
VOLTS
OUTPUT CURRENT 0 0 4776
AMPERES
GENERATED VOLTAGE 1.280 (1.280)
VOLTS
GENERATED POWER 0 0 (6113)
WATTS</p>
<p> HOMOPOLAR GENERATOR TEST - BIG SPRINGS RANCH APRIL 26, 1986</p>
<p> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

129
regexConsp/dpalma6.xml Normal file
View File

@ -0,0 +1,129 @@
<xml><p>
ENERGY FROM SPACE
An Engineer's Invention Excites Interest</p>
<p> In a tiny room in a Bombay suburb, an electrical engineer works
on a machine that seems to have been conceived in a Sci-Fi book - a
generator which can ostensibly produce electricity from nothing.</p>
<p> But the machine's creator, Paramahamsa Tewari, 51, is not an
eccentric inventor from one of Sukumar Ray's fantastic tales. He is
a senior engineer with the Department of Atomic Energy's Nuclear
Power Corporation (NPC).</p>
<p> Tewari created a minor sensation 10 years ago when he produced the
theory that space is filled with a dynamic medium whose swirling
motion is the source of all matter and energy.</p>
<p> He called it the Space Vortex Theory (SVT) which postulated that at
the heart of the electron was a void whose high speed rotation
within a vacuum could produce energy from space.</p>
<p> Interestingly, it was the Theosophical Society which had first
published Tewari's theory by arranging a special lecture in 1977 at
Adyar in Madras.</p>
<p> The theosophists were excited by Tewari's ideas since they were
remarkably close to observations about the electron put forward by
Annie Besant's associate, the clairvoyant Charles W. Leadbeater, in
the book "Occult Chemistry."</p>
<p> However, the first indication that Tewari's ideas about the
structure of space were more than just a mystic vision came earlier
this year at a conference in Hanover organised by the German
Association of Gravity Field Energy.</p>
<p> The Space Power Generator (SPG) invented by Tewari won the first
prize of Rs 25,000 from among 25 similar machines presented at the
conference by scientists from all over.</p>
<p> Tewari's generator is actually a simple machine, consisting
basically of a magnetised cylinder rotating at high speed with the
help of a motor.</p>
<p> Power from this device is extracted by connecting a wire between the
surface of the cylinder and its axis. According to the engineer-
inventor, the SPG produces two-and-a-half to three-and- a-half times
more power than it consumes, defying the basic physical law of
conservation of energy which says that the output of energy cannot
be more than the input.</p>
<p> Tewari says the excess power comes from the inter-atomic space of
the rotating cylinder - it is the movement of the "voids" in the
spinning cylinder which creates additional energy out of the space
between the machine's axis and the magnet.</p>
<p> Tewari admits that his theory sounds incredible taking into account
the existing laws and that he would never have developed it had he
been trained as a physicist and not an engineer, since it is so
divergent from conventional physics.</p>
<p> But, he says, it would have been difficult for him to go on with
work on the SVT and the generator were it not for encouragement from
two US physicists, John A. Wheeler, director of the Centre for
Theoretical Physics at the University of Texas, Austin, and Bruce
DePalma, formerly a lecturer in physics at the Massachusetts
Institute of Technology.</p>
<p> "But for DePalma, I wouldn't have been able to tie up my theory,"
says Tewari. "He was working on similar ideas and kept sending his
results to me."</p>
<p> Though Tewari, who is slated for transfer to the NPC's Kaiga Project
in Karnataka as chief project engineer, has pursued his interest in
physics in his spare time, he has received infrastructural support
from the NPC for putting together his extraordinary new machine.</p>
<p> The SPG was built under Tewari's supervision at the Tarapur Atomic
Plant. "Tewari's prototype SPG can be considered a major
breakthrough," says S. L. Kati, managing director of NPC.</p>
<p> Before leaving for Hanover, Tewari addressed a meeting of scientists
and engineers at the Bhaba Atomic Research Centre on his theory.</p>
<p> But most physicists remained sceptical about his findings.</p>
<p> Undaunted, he is experimenting with a new model of the SPG since his
return, which he feels will be an improvement. He eventually hopes
to create a prototype for a generator which could deliver 50 kw to
100 kw of electricity.</p>
<p> "The encouragement I received abroad has been a great help, and
hopefully within a year, I will be able to build an experimental
model which could ultimately prove commercially viable," he says.</p>
<p> Tewari, of course, is not the only engineer hoping to build the
ultimate power generation machine - one which will run perpetually
since it will extract energy from space - as the Hanover conference
demonstrated.</p>
<p> In fact, DePalma, the first inventor to create such a machine, is
presently conducting experiments in California in anticipation of a
breakthrough which could lead to commercial production.</p>
<p> Their work promises to create ultimately a machine which appears to
come straight out of a futuristic fantasy.</p>
<p> - M. Rahman</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

464
regexConsp/drug-cia.xml Normal file
View File

@ -0,0 +1,464 @@
<xml><p>
WBAI Pacifica Radio New York
Interview with Mark Swaney
By: Paul DeRienzo.</p>
<p>--------------------------------</p>
<p>WBAI radio interview with Mark Swaney from "Faithful Arkansas"
a citizens group, speaking of Bill Clinton's and George Bush's
connection with the CIA covert drug smuggling operation in
Mena Arkansas in support of the Contras.
MARK SWANEY:
. . . . [they] set up a front company in Guadalahara Mexico.
The purpose of which, he was told, was to smuggle weapons to
the Contra's in Central America. And he was to be the front man
-- he was to provide the front cover for this company, but he
was given to know that behind the scenes they [the CIA] would
be using this company to smuggle weapons. So he was ok with
that and he went down to Guadalahara and was down there until
the summer of '87 --actually the plane was shot down in '86
so this operation in Mexico continued for a year after the
Iran-Contra story was breaking and that's something that a
lot of people don't know --they think that Iran-Contra/Contra
Resupply stopped when the revelations were made in '86, but
they actually continued.
Anyway in the summer of '87, even as the hearings were going
on in Congress, Terry Reed began to suspect they were using
his front company for something other than smuggling weapons.
And one day he was looking for a lathe in one of his warehouses
by the airport there in Guadalahara and he went in and opened
up an air freight shipping container (which are very large,
they're about 28 feet long, 7 feet high, 8 feet wide), and he
found it packed full of Cocaine when he opened it up. He immediately
realized he was in a very precarious situation because he was
the only one on paper who had anything to do with that company,
and if they had ever gotten caught -- there was nobody to stand
up and say well this guy didn't know anything -- he was going
to be a patsy if anything went wrong. So he decided he wasn't
going to play the part of the patsy. The man who was his contact
man for the CIA in Mexico was Felix Rodrigez. So he confronted
Felix Rodrigez and said well listen I didn't bargain on getting
into Narcotics smuggling and I'm outa this all together guys
-- I'm leaving now -- I refuse to have anything further to do
with this. And Felix Rodrigez said ok fine if you want to be
out your out. Now before he was able to return even to Little
Rock Arkansas where his home was at the time, Governor Clinton's
Chief of Security, a man named Raymond Buddy Young, and
another man Tommy Baker, Private Investigator and I'm told
former member of the Arkansas State Police, were framing
Terry Reid for mail fraud. What this involved was the so
called project donation that Oliver North had set up. Terry
Reid's plane had been stolen a number of years earlier
-- and used in drug missions and such without his knowledge
-- and he claimed the insurance money for his plane being stolen
-- and so to set him up what they did was took the airplane
and put it back in his hangar before he got back to Arkansas.
Governor Clinton's Chief of Security just supposedly happened
--and this is what he tells the press -- he say's "one day I
just happened to be walking by this hangar, and the wind just
happened to blow the door open and I just happened to look in
and see this airplane that was stolen four years earlier in
another state and I realized -that was the plane." And so this
is how the case got started.
PAUL DeRIENZO:
How would he have known that was the plane?
MARK SWANEY: </p>
<p>Oh that's never been explained. Along with a number of aspects
in this famous story. We're in contact with Terry Reid's defense
attorney in Witchita and she's promised to send us all of the
documents --we have some of the documents already that indicate
--he was found not guilty --well he never went to trial.
PAUL DeRIENZO:</p>
<p>Is that the same Buddy Young by the way who's head of Governor
Clinton's security detail.
MARK SWANEY:</p>
<p>Yes he is.
PAUL DeRIENZO:
Buddy Young, let's keep his name in mind because I want to come
back to him. Let's jump now to the sight in Arkansas that was
used as the landing sight, the airport in Arkansas in the town
of Mena Arkansas --that was determinates of a lot of these
Iran-Contra resupply flights.
MARK SWANEY:</p>
<p>Yes, in fact Terry Reid has stated in that same article that
you have that it was the *hub* of the Contra resupply effort.
Many people are not aware that Arkansas was very heavily and
very deeply involved in the Iran-Contra affair all during the
time that Governor Clinton ???? Governor of the state.
And there were numerous stories written about it in the press.
Well the story about Mena is that Mena is a very small town
in the middle of the the Washitah (sp) mountains in Southwestern
Arkansas and not coincidentally it happens to be in Congressman
John Paul Hammerschmidt's district, the Third Congressional
district. John Paul Hammerschmidt just happens to be one
of George Bush's very closest friend's. He was George Bush's
Presidential Campaign Manager for Bush's campaign in '76 and
again in 1980. The two people are very close. Anyway Mena
has an airport and it looks from the outside like an ordinary,
normal airport. The thing that separates Mena's airport from
any other is the fact that there are row upon row of hangars
--buildings which house aircraft refitting facilities. Now
aircraft refitting is an industry that is in demand by two
principal paying customers. One of them is the CIA, and the
other one are drug smugglers. And the reason is, is because if
you're a CIA guy and you're going to do covert actions overseas
-- they're almost entirely relying on air transport of some kind.
Particularly if you're going to covertly resupply an army that's
over a thousand miles away.
PAUL DeRIENZO:
Hassenfusse's plane was based there.
MARK SWANEY: </p>
<p>Pardon me.
PAUL DeRIENZO:
Hassenfusse's plane, the plane that was shot down, was based
in Mena Arkansas.
MARK SWANEY:</p>
<p>That plane was based there formally before Barry Seal was
murdered just a few months before it was shot down. That
was Barry Seal's own personal airplane. But anyway what
you need to do, if you're a CIA or a drug smuggler is you
need an airplane that can do things that normally airplanes
of the civilian variety are not allowed to do. Things like
have cargo doors that open to the inside of the airplane so
that you can make in-flight drops - so that you can drop
things out of the airplane while it's flying -- which is
illegal on a commercial or civilian type of aircraft. You
need to do things like install advanced navigational equipment
sometimes even ??? You need things like roller matts to put
down on the floor so that you can roll the crates forward
in the fuselage of the airplane to kick them out. You need
to be able to modify a civilian aircraft that is not legally
allowed to have such capability so that it does have those
capabilities.
PAUL DeRIENZO:
And this was done in Mena -- a smalltown airport.
MARK SWANEY:
Right. Now Mena has the second or third largest --I don't
know which, but one of the largest aircraft refitting
facilities in the United States. And as such it was --long
before the Nicaruguan episode happened, it was a base of CIA
covert operation and remains to this very minute a base of
CIA covert operation.
PAUL DeRIENZO:
Let's jump to another name that comes up in this -- a fella
by the name of Larry Nichols, former employee of the state
of Arkansas. He was a employee of the Arkansas Development
and Finance Authority now I have an Associated Press article
that came out just a couple of days ago that Larry Nichols
has dropped a lawsuit that he had instituted in 1990 against
Governor Clinton that came after his 1988 dismissal from that
state job for miss-use of agency telephones.</p>
<p>Can you tell us who Larry Nichols was.
MARK SWANEY:
Yeah this is probably the most interesting part of the story
-- you see Larry Nichols is the source of all these rumors
and the Jennifer Flowers thing and the Governor's sex life.
The story that the press has yet not picked up on is the
fact that Larry Nichols was a big time Contra supporter.
He has close connections to Mario Collero, Adolpho Collero
and Jack Singlove. In fact he served with General Singlove
in Vietnam. He spent the first half of the decade working
for the Contras in a connection with an organization that
General Singlove had. He spent time with the Contra's on the
ground in Honduras. His job was to collect military information.
Now I've met with Larry Nichols -- this information that I'm
about to give you he has told me directly. And we have checked
out a great deal of what he's told us and everything that he
has told us has checked out totally accurate.
PAUL DeRIENZO:
So what we're seeing here is a connection between the mistress
sex scandal and the Iran-Contra and the Governor of Arkansas.
There's a connection.
MARK SWANEY:
Well what you find out here in a minute is that the sex
scandals really have nothing to do with it. I saw his lawsuit
several months ago when I was in Little Rock and it was of
no interest to me I didn't even bother to make a copy of it.
But Larry Nichols, the man, and his relationship to the
Governor is extremely interesting. You see what it is --is
that his job was to make military analysis of the situation
in Honduras with the Contras. And to take that information
back to the United States and package it and present it to
Congressmen who are in favor of Contra Aid with a view toward
convincing them that the Contra's were an effective military
fighting force --that they could win militarily against the
Sandanistas. At some point around '85 I believe this job for
Larry ran out, and he didn't have any money and he approached
Governor Clinton. Now according to Larry, he and Governor Clinton
are close friends, have known each other for a long time. In
fact before the Governor was the Governor. He asked Governor
Clinton --hey I'm broke I need a job. Well it's not too usual
that somebody could just call up the Governor and say I want
a job and the Governor says sure we'll make you Marketing
Director for ADFA. That's the Arkansas Development Finance
Authority --which figures centrally in Bill Clinton's
relationship to the Contra Resupply network that the state
of Arkansas was so heavily involved in. In any case he was
there working at ADFA and someone at ADFA a fellow employee
had found out about this guy that was working with them who
was this romantic jungle fighter type of character. And
eventually she began to talk to some friends about it and
word reached the ears of a reporter and a reporter began
to investigate Larry Nichols --wondering what this big Contra
supporter was doing working for ADFA. Everyone who holds a
top position at ADFA is directly appointed by Bill Clinton --in
fact ADFA is a total invention of Bill Clinton's --he created
the agency out of thin air and appoints all of the top
directors. In any case a reporter approached Bill Clinton
in Japan and started to question him about Larry Nichols
--wanted to know what this guy was doing on state payroll
--if he was lobbying for the Contra's or just what the story
was. Mr. Clinton, rather precipitously fired Larry Nichols
directly after that. And the story that was put out was that
he was fired for misusing state telephones that he'd supposedly
made hundreds of calls to the Contras and ran up thousands of
dollars worth of bills to the Contras -- uhmm that is an
unsubstantiated allegation --in fact on Larry Nichols suggestion
the organization I work with received his entire phone records
from ADFA through freedom of information act and went over
those phone records with him call by call and we did not find
any records of calls by him outside the United States on
those phone records so it was a phony charge and Larry Nichols
was in fact wrongfully fired and they made up this story that
he was calling the Contras in order to get rid of him.
PAUL DeRIENZO:
Why do you think that was?
MARK SWANEY:
Well I don't know the exact reason but I can tell you this
that Larry Nichols and Buddy Young the man I mentioned earlier,
are very close friends.
PAUL DeRIENZO:
Well that's a point that you just mentioned that Buddy Young was
the State Security man who discovered the airplane -- the allegedly
stolen airplane belonging to Terry Reid was in fact in a certain
airport hangar.
MARK SWANEY:
Everything to do with that in fact the federal judge is on record
for calling Buddy Young a liar in Terry Reid's trial. But see Larry
Nichols and Buddy Young knew each other and are close friends
according to the newspaper accounts that were in the newspaper
down here in Arkansas yesterday -- they're old buddies.
PAUL DeRIENZO:
Yes, well that's what the Associated Press report that I'm looking
at right now says that Nichols dropped his lawsuit after consulting
with Buddy Young.
MARK SWANEY:
Yes, Now I'm going to say something right now which is rather
shocking -- this is the first time this has been made public
to my knowledge. A member of my organization who is going to
be at a press conference that we're having tomorrow --spoke
with Larry Nichols --we've been in contact with him for several
months off and on on the telephone, and he's had a conversation
with him sometime around the first week of January -- during
which Larry Nichols tolde this member of my organization -- that
Buddy Young had called him and told him that he in fact was a
dead man -- that was under threat of death.
PAUL DeRIENZO:
Buddy Young was?
MARK SWANEY:
No. Larry Nichols. And at that time Buddy Young was frightened
-- he was not threatening Larry Nichols personally he was saying
that we're all in trouble with this because there's a move in
the Governor's office to get rid of me. So Buddy Young was
afraid that Governor Clinton was about to axe him in the same
way that he axed Larry Nichols. And so serious did he take
this possibility that he informed Larry Nichols directly that
he was a dead man.
PAUL DeRIENZO:
So Larry Nichols is now saying that Buddy Young the Chief of
Governor Clinton's gubernatorial campaign has told him that
he's a dead man.
MARK SWANEY:
Yes, that is the information that Larry Nichols gave to us
-- now as I say that has not been reported anywhere else and
I would not bet a lot right now on Mr. Nichols backing that
statement up, but I back it up.
PAUL DeRIENZO:
And this is prior to him dropping this lawsuit against Governor
Clinton.
MARK SWANEY:
Yes, the timing of his dropping the lawsuit is interesting to
us too, because we just recently were in contact with the Nation
Magazine, and it was approximately two days after the Nation
Magazine actually decided to take the information that we had
collected on this case very seriously and in fact are now
pursuing their own investigative journalism on this, it was
about two days after that that Larry Nichols declared that he
was going to drop his lawsuit. Uh, so there's some very strange
things that are going on. There's a great deal of other
information --uh, connecting Governor Clinton to the operation
in Mena. We don't have what you'd call a smoking gun on this
-- I have in front of me a piece of paper that I've written
17 questions for the Governor on that the media has totally
overlooked in their haste to salivate over all these sexual
stories --they've totally missed what's available. For example,
the organization that I work for has been --I don't say I work for,
nobody pays us we're getting broke doing this, but in any case
we've collected just about everything that's publicly available
about Mena and all of its ramifications and its a tremendous
story, and I'd like to emphasize right now that Governor
Clinton's part in this is very minor -- the real big fish in this
story is George Bush. The damage that could come from this
information coming out is in fact far more damaging to George
Bush than anyone else, because he's directly responsible for this
-- this operation was run out of the then Vice President George
Bush's office. And I'd also like to add that the Arkansas chapter
of the Iran-Contra story was the one that was most heavily
covered up at the time -- it was part of the story they had
that they took the most care to see to it that nothing ever
came out about it. And that was for two reasons: 1) because
it involves massive cocaine smuggling -- we had one pilot that
came to the University and spoke directly to us and said
"I personally flew for the CIA, guns, Panamanian Defense
forces and approximately one ton of cocaine per flight.
I flew seven of these flights into Mena Arkansas." So they
wanted to cover it up because it was the one thing that would
have exposed the drug connection within the United States
most heavily. 2) And the other reason that they were very
anxious to coverup Mena's involvement was because the base
of operations that the CIA was using was in fact still active
at the time the hearings were going on. And that base of
operations supports covert operations all around the world
not just in Central America. For example, there's a current
covert operation that was going on there at least as late as
May of last year that killed a man from Arkansas and Angola --
so the entire time that Barry Seal was operating out of that
airport the CIA was supporting there covert war with Jonason(sp)
and Manunita(sp) in Angola. And we have sources within the
United States government that there is covert activity going on
in it this very day.
PAUL DeRIENZO:
Thank you very much Mark Swaney --this is an amazing story and
the amazing thing about it is that this is the *real* story about
Governor Bill Clinton and that what we're getting served to us from
all the media from start to finish from morning to night headlines
in all the New York papers, is this thing about Governor Clinton
and this woman Jennifer Flowers and her association with the
Governor who is married for 14 years, and the real story which
you get on WBAI underneath it all from our contacts in Arkansas
is that in fact the Governor of Arkansas is covering up an illegal
operation that began in the Vice President's office who is now
President of the United States -- George Bush. Which makes me
wonder why should I even bother voting -- who's there to vote for.
I mean both sides the Democrats and the Republicans are involved.
MARK SWANEY: </p>
<p>That's another part of the story --you know the best way to buy
off an election is to pay off both candidates. There's significant
Republican interest in seeing Bill Clinton get the nomination
from the standpoint that they will be assured then that none
of the issues of the Iran-Contra affair are likely to be talked
about. Certainly Clinton doesn't want to talk about them.</p>
<p>We tried before we knew that Mr. Clinton was involved in this --
we only came across this information 5 or 6 months ago and
for two years now we've been doing demonstrations, writing
letters collecting petitions holding informational gatherings
to try to get this story to the people, and we have on several
occasions sent Bill Clinton signatures, petitions of Arkansan's
asking for a state investigation and he refused to do anything
about them he would do nothing more than have an aide send us a
two sentence letter saying we have received your petition and
then this last September just one week before he decided to
run for the Presidency we contacted his office and said listen
we'd be willing to talk to you or any one of your aides so that
we could talk to you about this major crime problem in our state
that we're concerned about that we'd like to get to the bottom
of -- and he refused that. During the 4 or 5 years now that
the press has covered this story about Mena and Barry Seal --
you know this is a story about people who have been murdered --
this is a very, very serious affair and during all of this time
talk of massive Cocaine smuggling, corruption of local officials
corruption of Federal and State judicial system on and on and on
there was total silence from the Governor, not a word. And it
was not until our organization had a large demonstration
-- it wasn't really a large demonstration but it was very well
covered in the Arkansas press --that reporters approached
Mr. Clinton about Mena. He talked about it for the first time
in 4 or 5 years and what he had to say at that time was that
he had in fact authorized some money for lonely little Polk County,
which is a poor county in Southwestern Arkansas to run an
investigation and so we asked him for back up from the
Governor's office we said -freedom of information act
-- we'd like to know if you have any documentation whatsoever
to back up your statement that you are willing to help the
Polk County investigators do their own state investigation
in this affair. And he could not produce a single thing.</p>
<p>---------------------------</p>
<p>"Why of course the people don't want war... It is the leaders...who
determine the policy and it is always a simple matter to drag the
people along...all you have to do is tell them they are being attacked
and denounce the pacifists for lack of patriotism and exposing the
country to danger. It works the same in any country.</p>
<p>Hermann Goering, 1936
</p></xml>

210
regexConsp/drugrunr.xml Normal file
View File

@ -0,0 +1,210 @@
<xml><p>
CONTRAS USED COCAINE TO BUY ARMS
BY VINCE BIELSKI and DENNIS BERNSTEIN</p>
<p> WASHINGTON--Senator John Kerry (D-Mass) and his staff said recently
they are "confident" that money from the sale of narcotics helped finance
the contras and that the arms network set up by Lt. Col. Oliver North could
be involved.</p>
<p> North was fired from the staff of the National Security Council by
President Reagan this week after the Administration discovered that North
arranged for the transfer $30 million from the sale of arms to Iran to
Swiss bank accounts controlled by the contras.</p>
<p> "I'm confident that the contras have received drug money. They have
received illegal shipments of weapons and that U.S. officials knew of it,"
Kerry said, in calling for a special prosecutor to look into these other
allegations.</p>
<p> John Weiner, a Kerry aide, said while congressional investigators do
not know if North was directly involved, they do have evidence linking the
"North network" to the cocaine-arms operation. According to a report
produced by Kerry's staff, North established a network, involving retired
Army Gen. John Singlaub, U.S. mercenaries and Cuban-Americans, to provide
arms to the contras during the two-year congressional ban on U.S. support.
After the downing of the C-123 cargo plane over Nicaragua, Administration
officials also acknowledged that North set up the private arms operation to
the contras.</p>
<p> Weiner and several other sources charge that individuals involved in
the network traffic in cocaine to help buy weapons for the contras.</p>
<p> "We have received a variety of allegations about drug connections to
the contras and to parts of the North network. As to whether Oliver North
was directly involved in that I can't say. But parts of the North network
allegedly were. And that needs to be looked at very seriously," he said.</p>
<p> The Senate Foreign Relations committee is expected to investigate
these charges when Congress reconvenes in January.</p>
<p> The role that cocaine played in funding the network has been part of a
two-year investigation carried out by the Christic Institute, a Washington-
based law firm. Dan Sheehan, the attorney directing the investigation, said
the proceeds from the sale of cocaine has been "one significant source of
funding for the contras. He said he has subsantial evidence to prove that
the contras and their Cuban-American supporters are smuggling one ton of
cocaine into the United States each week.</p>
<p> The Drug Enforcement Administration estimates that one ton of cocaine
has a street value of between $26 and $50 million. Sheehan said a portion
the profits are used to purchase weapons.</p>
<p> The cocaine ring, involving mostly major Columbian cocaine trafficker,
or "cocaine lords," and Cuban-Americans from Miami had been operating for
years before the North network began in 1984. John Mattes, an attorney for
one of the Cuban-Americans involved in the North network, said that the
cocaine traffickers and the arms network "got together as a marriage of
convenience."</p>
<p> "The Columbians saw that the contra base in Costa Rica was an ideal
transhipment point. Their planes would land there and refuel. They also
benefit from the pilots, planes and intelligence information which the arms
suppliers had and which they make extensive use of," Mattes said. In
return, Mattes said the Columbians paid the contras $10,000 to $25,000 for
each plane carry cocaine which landed in Costa Rica for refueling. The
Christic Institute's allegations are all contained in a civil suit filed in
May 1986 in U.S. District Court in the Southern District of Florida.</p>
<p> The suit is brought by two U.S. journalists, Martha Honey and Tony
Avirgan, who charge that the cocaine/arms conspiracy was responsible for
the May 1984 assassination attempt on contra leader Eden Pastora in La
Penca, Nicaragua. The journalists are sueing for personal injuries they
suffered resulting from a bomb explosion at a press conference which killed
8 people and injured Pastora. "As amazing as it sounds," Sheehan said, "the
conspiracy is continuing to bring about one ton or 1,000 kilos of cocaine
into the United States each week." Jesus Garcia, a former corrections
officer in Dade County, Florida, said he was actively involved in the
cocaine-arms operation.</p>
<p> He is one of Sheehan and Kerry's main sources of information. In a
telephone interview from prison, where Garcia is no serving a three-year
term for possession of a firearm, he said "it is common knowledge here in
Miami that that this whole contra operation in Costa Rica was paid for with
cocaine. Everyone involved knows it. I actually saw the cocaine and the
weapons together under one roof, weapons that I helped ship to Costa Rica."
In May of 1983, according to the suit, two Cuban-Americans, Rene Corbo and
Felipe Vidal joined forces with John Hull, a U.S. citizen who owns 1,750
acres of land in northern Costa Rica, "to recruit, train, finance (and)
arm" a Cuban-American mercenary force to attack Nicaragua.</p>
<p> To finance the mercenary force, the Cuban-Americans, Hull and others
made arrangements with two known Columbian cocaine trafficers, Pablo
Escobar and Jorge Ochoa, "to provide hundreds of pounds of cocaine on a
regular basis," according to the suit. Garcia said that individuals
involved in the arms supply operation told him that Ochoa was supplying
cocaine to the contras.</p>
<p> The cocaine was flown from Columbia to Hull's ranch, Sheehan said,
where the planes would refuel. Sheehan said he has obtained records of
Corbo buying huge gasoline tanks in Costa Rica which are used for refueling
the planes. The Christic Institute learned about the cocaine shipments from
members of Costa Rican Rural Guard, workers on Hull's land who unloaded the
illegal substance from the small planes, and the pilots who transported the
cocaine.</p>
<p> Corbo and Vidal belong to the Brigade 2506, an anti-Castro group in
Miami whose members were recruited and hired by the CIA to fight in the Bay
of Pigs invasion agaisnt Cuba. Kerry's staff report charges that "Hull...
has been identified by a wide range of sources, including Eden Pastora,
mercenaries, Costa Rican officials, and contra supporters as "deeply
involved with military support for the contras...and has been identified by
a wide-range of sources...as a CIA or NSC liaison to the contras."</p>
<p> According to Steven Carr and Peter Glibbery, two mercenaries based on
land operated by Hull who were captured by the Costa Rican Rural Guard in
1985, Hull introduced himself to them as "the chief liaison for the FDN
(National Democratic Force) and the CIA." Hull received $10,000 a month
from the NSC, according to the report. The NSC denies having made payments
to Hull.</p>
<p> Hull has denied that he is assisting the contras and that he is
working for the U.S. government.</p>
<p> Sheehan said that the cocaine is flown from the land operated by Hull
to Memphis and then to Denver. The drug is also packed into container ships
at the Costa Rican port of Limon and transported to Miami, New Orleans and
San Francisco.</p>
<p> Francisco Chanes, a Cuban-American, is the major importer and
distributor of the cocaine coming in from Costa Rica, according to the
suit. Sheehan said he learned of Chanes' role from Drug Enforcement
Administration agents who investigated Chanes, Corbo and Vidal.</p>
<p> During a January 1986 interview with FBI agents, Garcia said he told
the agents that Chanes and Corbo were also involved in the contra supply
operation.</p>
<p> Garcia said the agents responded by saying that Chanes and Corbo were
already the subjects of a FBI narcotics trafficing investigation. Mattes,
Garcia's attorney who was present at the interview, said he also heard the
agents say that the FBI was investigating Chanes and Corbo.</p>
<p> Sheehan said money from the sale of cocaine is deposited in one bank
in Miami and two in Central America and then withdrawn to purchase weapons
and explosives.</p>
<p> Garcia said he was personally involved in a March 1985 shipment of 6
tons of arms to Costa Rica from Miami. In July 1986, an official from the
U.S. Attorney's office in Miami confirmed to the Miami Herald that "we now
believe there were some weapons" illegally shipped to the contras by their
U.S. supporters from the Fort Lauderdale International airport in 1985.</p>
<p> Garcia said he saw both these weapons and three kilograms of cocaine
stored at the home of Chanes in Miami in the company of Chanes and Carr.</p>
<p> "They cocaine was kept in a dresser, about ten feet away from the
weapons. Carr told me that the three keys (kilograms) was what was left
from a larger shipment," Garcia said.[EP</p>
<p> He said he had no direct evidence that the weapons in Chanes' home
were purchased with the proceeds from the sale of cocaine. He said that
Carr told him that the three kilograms were part of a larger shipment of
cocaine brought to the United States from Costa Rica in container ships
belonging Ocean Hunter, a seafood importing company owned by Chanes.</p>
<p> Garcia said he helped load the weapons into a van which were then
taken to the aiport in Miami. Glibbery said he witnessed the arrival of
these weapons on airstrips located on land operated by Hull in Costa Rica,
according to the Kerry report.</p>
<p> The suit also names Theodore Shackley, former CIA associate deputy
director for world wide covert operations, and retired Army Gen. John
Singlaub as the main weapons suppliers.</p>
<p> According to the suit, Shackley "knowingly accept(ed) the proceeds
from illegal sales of narcotics in payment for illegal arms shipments."
Singlaub has made "admissions to various reporters that he has sent guns
and bullets to the contras," according to the report.</p>
<p>********************
Reasearch and Editorial Assistance: Connie Blitt</p>
<p> Articles by Vince Bielski (San Fransisco-based) and Dennis Bernstein
(new York) have appeared in Newsday, Philadelphia Inquirer, Plain Dealer,
Denver Post, Dallas Times Herald, Dallas Morning News, Baltimore Sun, San
Fransisco Examiner, Oakland Tribune, San Jose Mercury, Arizona Daily Star,
Seattle Times, Minnieapolis Star and Tribune, and others.
--------------------------------------------------------------------------</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

81
regexConsp/embalm.xml Normal file
View File

@ -0,0 +1,81 @@
<xml><p> </p>
<p> A QUICK LESSON IN DO-IT-YOURSELF EMBALMING</p>
<p>FROM 'THE BATHROOM ALMANAC' BY GUS MCLEAVY (FREDERICK FELL PUBLISHERS, INC.)</p>
<p>TYPED IN 80 COLUMNS BY BIG BAD BARBARIAN (PARDON MY BAD TASTE.)</p>
<p> TO BEGIN, YOU'LL NEED THREE TO SIX GALLONS OF EMBALMING FLUID. IF YOU
CAN'T FIND A BRAND NAME FLUID YOU CAN MIX YOUR OWN, USING DYED AND PERFUMED
FORMALDEHYDES, GLYCERINE, BORAX, PHENOL, ALCOHOL, AND WATER. THE PROPORTIONS
AREN'T TOO IMPORTANT TO THE FINISHED PRODUCT, AS DR. JESSE CARR WILL EXPLAIN
LATER.</p>
<p> FIRST OF ALL, THE MOUTH MUST BE SEWN TOGETHER AT THE INSIDE OF THE LIPS.
(THE NEEDLE IS BROUGHT OUT THROUGH THE NOSTRIL, USUALLY THE LEFT ONE.) THEN
YOU TAKE A TROCAR, A LONG HOLLOW NEEDLE ATTACHED TO A TUBE. DRAIN THE CONTENTS
OF THE ABDOMINAL AND CHEST CAVITIES, AND REPLACE THE REMOVED MATTER WITH CAVITY
FLUID. PUMP OUT THE CIRCULATORY SYSTEM, REPLACE THE BLOOD AND PLASMA WITH THE
ENBALMING SOLUTION, AND THAT'S ABOUT IT. IN EIGHT TO TEN HOURS THE TISSUES WILL
BE FIRM AND DRY, AND READY FOR 'COSMETIC RESTORATION.'</p>
<p> CAREFUL, THOUGH! REGULAR ENBALMING FLUID WORKS DIFFERENTLY ON VARIOUS
BODIES ACCORDING TO THE CAUSE OF DEATH. WHILE IT WILL GIVE A PLEASANT PINK GLOW
TO THE FLESH OF A VICTIM OF CARBON MONOXIDE POISONING, WHEN IT IS USED ON
SOMEONE WHO DIED OF JAUNDICE IT IMPARTS A GREEN TINGE THAT REQUIRES A LOT OF
MAKE-UP TO CONCEAL.</p>
<p> ALTHOUGH IT IS WIDELY BELIEVED TO PRESERVE A BURIED BODY, EMBALMING IN
FACT DOES NO SUCH THING. IF IT HAS ANY WORTHWHILE PURPOSE AT ALL, IT IS TO MAKE
THE OPEN CASKET FUNERAL MORE PALATABLE. DR. JESSE CARR IS NO FRIEND OF THE
MORTUARY INDUSTRY, BUT HE IS A FORMER CHIEF OF PATHOLOGY AT SAN FRANCISCO
GENERAL HOSPITAL AND PROFESSOR OF PATHOLOGY AT THE UNIVERSITY OF CALIFORNIA
MEDICAL SCHOOL, AND HERE'S WHAT HE HAS TO SAY ABOUT IT:</p>
<p> AN EXHUMED BODY IS A REPUGNANT, MOLDY, FOUL-LOOKING OBJECT. IT'S NOT
THE IMAGE OF ONE WHO HAS BEEN LOVED . . . THE BODY ITSELF MAY BE
INTACT, AS FAR AS CONTOURS AND SO ON; BUT THE SILK LINING OF THE
CASKET IS ALL STAINED WITH BODY FLUIDS, THE WOOD IS ROTTING, AND THE
BODY IS COVERED WITH MOLD . . . IF YOU SEAL UP A CASKET SO IT IS
MORE OR LESS AIRTIGHT, YOU SEAL IN THE ANAEROBIC BACTERIA - THE KIND
THAT THRIVE IN AN AIRLESS ATMOSPHERE, YOU SEE. THESE ARE THE
PUTREFACTIVE BACTERIA, AND THE RESULTS OF THEIR GROWTH ARE PRETTY
HORRIBLE . . . YOU'RE BETTER OFF WITH A SHROUD, AND NO CASKET AT
ALL.</p>
<p> ///////////////////////////////////////////////////////
// The PIRATES' HOLLOW //
// 415-236-2371 //
// over 12 Megs of Elite Text Files //
// ROR-ALUCARD //
// Sysop: Doctor Murdock //
// C0-Sysops: That One, Sir Death, Sid Gnarly &amp; Finn //
// //
// "The Gates of Hell are open night and day; //
// Smooth is the Descent, and Easy is the way.." //
///////////////////////////////////////////////////////</p>
<p> </p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

503
regexConsp/evol-110.xml Normal file
View File

@ -0,0 +1,503 @@
<xml><p></p>
<p> ."". "NO STONE UNTURNED"
." ". R A R A T REPORT
~~ ~~
-----------------------------------------------------------------------
BILL CROUSE, EDITOR FEB/MARCH 87 (c) 1987 NUMBER 2
-----------------------------------------------------------------------</p>
<p> POST WWII SIGHTINGS </p>
<p> The cold war began shortly after WWII. Turkey became one of the stages
where this drama of confrontation between superpowers was played. Along with
Jupiter missiles, the Americans set up elaborate listening devices in Turkey
to monitor Soviet activity. Cat and mouse games to gauge Soviet readiness
were played out almost on a daily basis. The Americans sent fighter planes to
the proximity of the Soviet border while the men on the ground checked the
responses of the Soviet defenses. Captain Gregor Schwinghammer, now a Pan Am
instructor and pilot, was one of the players in this game. Since Ararat is
near the Soviet border, there were many fly-bys around the mountain. During
one such excursion, a Turkish pilot participating in the maneuvers volunteered
to show some of the American pilots Noah's Ark. Schwinghammer took all this in
a light vein but went along. </p>
<p> The editor of AR discussed this incident with Schwinghammer about two years
ago. The only thing really clear in his memory was that it definitely looked
like a structure of some kind. He likened it to the long rectangular chicken
houses he had seen in the midwest. It didn't really hit him that this could
be Noah's Ark until he saw the movie In Search of Noah's Ark on TV.
Schwinghammer still is not sure what it was but he maintains it definitely was
a structure. </p>
<p> An interesting thing to note here about Schwinghammer is that he later flew
many bombing missions in Vietnam with the particular responsibility of
spotting the targets on the ground. We mention this to point out that the man
was trained to spot objects from a plane.
To read more on the Schwinghammer experience, see Berlitz' first book
Doomsday 1999 A.D. and the update in his latest book mentioned in this issue.
Schwinghammer now claims that the object he saw looked like the Hagopian
description as drawn by Elfred Lee. </p>
<p> Schwinghammer had a recollection of the U-2 pilots also seeing something in
photos. They flew out of the same base in Adana. As you will recall from the
Gary Powers' incident the Americans were flying reconnoissance missions deep
into the heart of the Soviet Union. On many occasions this took them right
over Ararat. </p>
<p> In the spring of 1985, one Sunday morning, we received a phone call at 7:00
a.m. with the caller excitedly telling us that he knew someone who had seen
photographs of the Ark while in the Air Force. After garnering some of the
facts, we made an appointment to see this man to check out his story.
After his basic training, this man spent most of his four years in the Air
Force in top security work at a large base in the midwest. His job was to
process film as it was brought into the lab from around the world.
Apparently, our U-2's were surreptitiously filming the whole world, even
friendly countries, in order to pin-point possible bomb targets when and if
this action ever became necessary. Our man remembers film coming in from
eastern Turkey. After he and others processed the film it was turned over to
another crew who were responsible for the analysis. What he remembers is the
perplexity these men had over a certain object high in the snows of Ararat. </p>
<p> It seems they could not figure out what the Turks could have built of that
size at that extreme altitude. What could it be? Finally, he recalled
hearing one of them jokingly exclaim: "It must be Noah's Ark!" Being a
Christian at the time, our friend pricked up his ears and went over for a
closer look. Basically, what he remembers is a barge-like object sticking out
of the ice with most of it still buried. Since he was in top security he told
no one of the incident. Being a distant event he apparently felt it was O.K.
to now share the experience with the hope that it might yield some clue to the
Ark's whereabouts. </p>
<p> Upon discharge from the Air Force this gentleman enrolled in a Baptist
college near this Air Force base to prepare for the ministry. While at this
college, he recalls another incident while strolling around the student lounge
one day. To his surprise he noticed on the bulletin board a photo cut out of
a newspaper with the caption "Could this be Noah's Ark?" He did a double take
when he realized it was from the roll he had processed only a few years
previously in the lab. He wondered who dared disclose the photograph because
he remembered how his superiors drilled into them the subject of secrecy and
the penalty involved. </p>
<p> To this day he does not know if it was Noah's Ark but he wonders what else
it could have been. This man (who wishes to remain anonymous) was once a
pastor of a large Baptist church in Kansas City. Today he is a marriage and
family counselor in a large clinic in Dallas. We know this man personally and
can attest that his reputation is impeccable.
To add further authenticity to this story, in the summer of '85, Col. Jim
Irwin met an American two-star General in Turkey who also claimed to have seen
a file labeled Noah's Ark and a slide purporting to be the Ark while stationed
at an Air Force base in the midwest (not the same base). We are not privy to
all the details of the General's testimony, but as far as we know, nothing new
has turned up despite the General's promise to try and locate the photographs. </p>
<p> In 1953 an American employed by an American oil company not only claimed to
have seen the Ark while flying by in a helicopter, he also took a number of
photographs. Upon returning to the states this man, George J. Greene, was
unsuccessful in trying to raise support for a ground expedition. Some time
later he died, or was murdered in South America. Many people however, saw his
photographs, too many in fact for this to have been a fictitious story. A
more complete account of Greene's discovery can be found in Noah's Ark: Fact
or Fable by Violet Cummings (213ff). </p>
<p> For two very good reasons we are now 99% convinced that what George Greene
saw was a large rock formation that is known to most Ark researchers. The
particular formation we refer to came to light in the mid-seventies as a
result of an expedition led by Tom Crotser of the Holy Ground Mission. The
movie, In Search of Noah's Ark, which we refer to elsewhere in this issue,
zooms in on the Crotser photograph and shows an object with planking clearly
visible. Ark researchers have looked this photo over carefully and have
questioned its authenticity. It appeared to have been retouched. We now know
for a fact that it was indeed retouched, but not with any fraudulent intent,
so says Mr. David Fry, of Cleburne, TX a former acquaintance of Crotser's. </p>
<p> Fry met Crotser in a photo print shop in Dallas where he noticed Crotser's
scenic mountain photos. When he was informed that the mountain scenery was
Ararat, the two learned they had a mutual interest in Biblical history. Fry
agreed to assist Crotser in the analysis of the photo containing an
interesting ship-shaped object. Since they had shots of the object from
different angles Fry studied it stereo-scopically. While doing so, he noticed
lines that seemed to run parallel length-wise on the object when viewed
through a magnifying lense. Fry simply enhanced these lines and presented the
photo to Crotser who then proceded to publicly proclaim the lines as planking
on a structure. He also began announcing to the press that the structure was
Noah's Ark. </p>
<p> The object in question is positively located on the eastern rim of the
Ahora Gorge at approximately 12,000 feet. It was photographed by Bob Stuplich
from the air in 1983 and by expeditions on the ground. </p>
<p> There are two reasons to link the Greene and Crotser sightings. Our first
reason for concluding that Greene's and Crotser's objects are one and the same
is their similarity to the sketch made by Fred Drake who claimed to have
viewed Greene's photographs. </p>
<p> Mr. Fry was kind enough to lend us a photograph of the object which he
said was made from one of the Crotser's slides. The object was shot at eye
level from the western rim of the gorge much the same as Greene would have
done from the helicopter, only from further away. </p>
<p> To us the similarity is striking! The object lies almost due north and
south exactly as Greene described it. The object is on a kind of rock shelf
over-looking a shear drop-off. When viewing Stuplich's aerial photos it
appears that a side shot would also look just as Drake sketched it. Cummings
also reports that Greene was flying over the northeastern side of the mountain
(p.219). </p>
<p> The fact that the object is at about 12,000 feet also supports our
contention. This is about the ceiling for a helicopter in the early '50s. We
did some checking on this awhile back and found that there was a high
performance French helicopter that could have flown to the summit of the
mountain, but it is doubtful that Greene would have had one of these at his
disposal. </p>
<p> This of course does not seal the case in concrete. We will never know for
certain until we actually see Greene's photos. However, we said that there
were two reasons why we are convinced that Greene saw the same rock formation
that Crotser photographed in 1974. </p>
<p> Rod Younquist, engineer and veteran of several trips to Ararat, related to
AR that he once met members of Crotser's expedition who informed him that they
had shown their photographs to people who had also viewed Greene's missing
photographs. Upon viewing the Holy Ground Mission photographs their response
was: "Oh, where did you get George Greene's photographs?" Hence our second
reason is the fact that Greene's friends mistakenly identified the Crotser
photographs as Greene's. </p>
<p> When Fry saw some of our slides of this object from different vantage
points he too became doubtful. However, he said it really looks convincing
when viewed stereo-scopically. He would like to see more photographs to have
added confirmation. We agree. Perhaps one of our readers may have a close up
of this formation. </p>
<p>(In subsequent issues we will continue our investigation of post WWII
sightings.) </p>
<p>EVOLUTION CONTRA CHRISTIANITY </p>
<p> Why are evolutionists so opposed to the subject of special creation? Is
it due to the overwhelming superiority of the evidence? We think not. The
real reason these two positions are so at loggerheads is much deeper than
evidence. The conflict begins back at the presuppositional level.
Presuppositions are those beliefs that are foundational; they are taken in
faith and they dictate how one interprets the data of experience. All world
views rest on these presuppositions or assumptions. What we have between
Evolution and Christianity is a collision of world views. We thought it would
be helpful to our readers to pinpoint what some of these conflicting
assumptions are. First, we will list these side by side: </p>
<p> Christian Evolutionary </p>
<p> 1. Man fell from a 1. Living things
higher estate. are evolving
(devolution) to higher forms.
2. There is a qual- 2. Only a quant-
itative difference itative differ-
between man and the ence.
animals. </p>
<p> 3. God's providence 3. Chance.
in nature. </p>
<p> 4. True moral values. 4. Only mores.
5. Open universe. 5. Closed universe.
6. Man needs re- 6. Man needs more
demption. time. </p>
<p> 7. There is purpose 7. No purpose.
in the universe. </p>
<p> In future issues it is our plan to expound on these assumptions point by
point so our readers will know from whence the Creation-Evolution controversy
arises. </p>
<p>ARK MOVIES </p>
<p> We've had several responses to our inquiry in the January issue concerning
the Bart LaRue movie, The Ark of Noah. We now have our own copy and have
viewed it several times with great interest. Our tape library now contains
quite a few hours of various Ark films and we thought it might be a service to
our readers to review what we've learned about other Ark films and where our
readers might have access to them. </p>
<p> What intrigues us is that more than four films about the search for Noah's
Ark appeared in one year, 1976! Incidentally, we know of at least eight or
nine books on the subject of the Ark and the Flood that appeared between '72
and '76. Certainly this must have inspired film-makers to take advantage of
the interest generated by the books. </p>
<p> We don't know who qualifies as being first, but two of the films produced
that year are feature-length and were shown in theaters. A videotape of the
aforementioned Bart LaRue film can still be ordered from: United
Entertainment, Inc., 6535 E. Skelley Dr., Tulsa, OK 74145. The cost is
$39.95. Their phone number is 918-622-6460. </p>
<p> This movie is of interest to Ark researchers because of its historic
footage from Navarra, Search Foundation, and the Archaeological Research
Foundation. The movie itself plods along, contains many historical
inaccuracies, and is anti-Turkish in tone. LaRue himself is persona non-grata
in Turkey due to his illegal climb of the mountain while filming for the
movie. Viewers will also have difficulty discerning the real thing from what
is re-enactment. </p>
<p> Another major feature length movie, In Search of Noah's Ark, was made in
1976 by Sunn Classic Pictures. A major book of the same title was released
the same year. The authors of the book are Dave Balsiger and Charles E.
Sellier, Jr. Balsiger was the ghost-writer for the English version of
Navarra's book: Noah's Ark: I Touched It. Sellier is also the producer of the
family-oriented TV show "The Life and Times of Grizzly Adams." In Search of
Noah's Ark has been seen by millions and is frequently shown on late night TV.
A video of this movie can probably be ordered from your local video store.
This is a better film, but it leaves you with the impression that the Ark has
been found and that the evidence is more credible than we would allow. </p>
<p> Ken Anderson Films of Winona Lake, IN produced the film Noah's Ark and the
Genesis Flood. Jack Dabner, now with Seven Star Productions, in Long Beach,
CA headed up the research effort and narrated this film. It appeared first in
1976. It is approximately an hour in length and rents for $52.
Unfortunately, it is not available on videotape. The film can be rented
through local rental agencies who handle Ken Anderson films. </p>
<p> Films for Christ, distributes a film mainly dealing with the Genesis
Flood. It has been translated into many languages and is still used
frequently in churches and by missionaries. The emphasis is apologetic and
evangelistic. Its title is The World that Perished. It contains an excellent
presentation of the many flood stories found in cultures on all the continents
of the world. On the whole, it is a very instructional film. It is about 35
minutues in length. A video of this film can be rented for $27 from Films for
Christ, 2628 W. Birchwood Cir., Mesa, AZ 85202. We were told that this film
is based on a book of the same name authored by Dr. John Whitcomb of Grace
Theological Seminary. We are acquainted with this book, and can attest that
it is a work of high quality. We highly recommend it to our readers. </p>
<p> Last summer, a Dutch film crew joined the Irwin team for the purpose of
making a documentary for Dutch television. A video (VHS) of this is available
from High Flight Foundation, Box 1387, Colorado Springs, CO 80901. Purchase
price is $20, or $10 to rent. The title of this video is: Waar is De Ark Van
Noach? Some of the dialogue is in Dutch but the majority is English. It
contains footage from a rare flight over the mountain, has a sense of drama,
and contains clear gospel testimonies by Col. Irwin and his team members. </p>
<p> We are also aware of another film released in '86 produced by Montana
Film, a German Company. This film is 43 minutes in length and has been shown
on German television. This company films mountain-climbing events all over
the world and the fact that they included footage about the search for the Ark
was incidental to their purpose. Dr. John Baumgardner and Ron Wyatt are
interviewed on the film. It also apparently contains some spectacular footage
shot on the summit of Ararat and the Parrot glacier area. It leaves you with
the impression that the ship-shaped formation southeast of Ararat is likely
the Ark of Noah. An English-version video cassette is available, but we are
not aware of any U.S. distributors at this time. Inquiries can be sent to
their German address: Montana Film, Am Fort Elisabeth 15, D-6500 Mainz, W.
Germany. </p>
<p> We have knowledge that a Canadian film crew was present at Ararat in '85
with the intent of making a documentary for Canadian Broadcasting, however, we
have no details at this time as to whether or not one was made or shown in
Canada. </p>
<p> To our knowledge, these are all the "Ark Movies" formally "published." If
any of our readers are aware of others please let us know as we would like to
share that information. </p>
<p>GOPHER WOOD---A PROCESS? </p>
<p>submitted by
Dr. Don Shockey
Albuquerque, NM </p>
<p> When asked what the Ark of Noah was constructed from we all immediately
know the answer. We can respond without hesitation by replying--"gopher
wood." That is correct, and is exactly what the KJV of the Bible states.
Genesis 6:14: "make thee an ark of gopher wood." The New International
Version says it a little differently: "So make yourself an ark of cypress
wood." The footnote tells the reader that cypress would be more likely the
wood of choice since the Hebrew meaning of go'phir is uncertain. Still no
problem since we know without reservation that whatever God told Noah would be
the absolute best to sustain the craft during the deluge to follow. One of
the primary objectives of the re-discovery of the Ark will be to
scientifically examine the wood and attempt to resolve once and for all what
type of wood was used in its construction. All seem to agree that it would be
some type of hard wood. Guesses have included white oak, cypress, etc. even a
type of tree no longer on earth has been suggested. </p>
<p> The following is offered to our AR readers and Ark researchers as a
possible interpretation of the term "gopher wood." </p>
<p> Recently, during a professional seminar in Texas a doctor approached me,
and a conversation began when I learned he was born in Israel and has a mother
who is 94 still living in Jerusalem. I asked him what gopher wood, as stated
in Genesis, really meant? The following is his reply: </p>
<p> "From a certain kind of resinous tree, when one makes an incision into the
bark and collects the resin or sap, he can use it as glue by applying it at
the joint between two pieces of wood. After letting it dry over-night, he
will not be able to break the joint. The wood will break before the joined
seam. This has been used in our area of the world for centuries, although it
is not used very often in modern times since this sap will discolor any wood
it happens to come into contact with. This is what Noah used to construct the
Ark. `Gopher wood' or `gophering' is a process not a particular tree."
(Emphasis mine). </p>
<p> He further suggested that Noah used the "gophering process" to fashion the
large timbers from many different pieces of hardwood that could have been some
type of hard oak tree. What, specifically, we can only guess. This
information turned on a light within my thinking. What he described would be
like our process of making plywood. If this is a valid assumption, then Noah
could have constructed large timbers needed of any size, thickness, or length,
without being dependent upon single, mammoth trees to accomplish God's
command. The original meaning should be traced back to determine if a gopher
wood process has any validity. As of this writing, a minister from
Albuquerque is to visit the Holy Land and will attempt to secure information
about this resin which we will test. I will update AR on this project. </p>
<p>BOOKS </p>
<p> In the November issue we noted that Charles Berlitz, author of the Bermuda
Triangle would be authoring a book on Noah's Ark and the Flood. We are
pleased to announce that this book is now available in major bookstore chains.
The book is titled The Lost Ship of Noah. It is published by G.P. Putnam's
Sons, and sells for $17.95 (hardback), 187 pp. </p>
<p> Berlitz is an author of the Erich von Daniken mold. He is particularly
interested in the myths and symbols of ancient cultures. It is his thesis
that behind them are actual historical events from which they arose. </p>
<p> This new book by Berlitz is an elaboration of a former book--Doomsday 1999
A.D. published in 1981. He believes there was not only a great world-wide
catastrophe in the past, i.e. a world-wide flood, but that there will likely
be another. He bases this prediction on two things: the course of modern
events whereby man seems to be destroying his environment, and the numerous
prophecies from a variety of cultures and religions. He sees the majority of
these prophecies as being authentic revelations that are this very moment
moving toward fulfillment. </p>
<p> In The Lost Ship of Noah Berlitz seeks to bring his readers up-to-date on
the search for Noah's Ark on Mt. Ararat, and sets forth the cases for a
previous world-wide deluge, and the probability of future global destruction.
Since most of the previous books on the Ark were written in the 70s Berlitz
does those who are interested in the search a service. He is not writing from
a scholarly perspective. However, he is a reporter who digs into his subject
and writes well. In addition we must point out that Berlitz is not necessarily
writing from a Christian perspective. He believes that there were probably
many arks that saved representatives of their respective cultures from the
catastrophic flood-waters. In fact, he cites evidence of other ships being
found in mountains and anticipates that more will undoubtedly be uncovered
(see p. 166ff). </p>
<p> All Ark enthusiasts will appreciate the many photos by Ahmet Arslan and Jay
Bitzer, who was this editor's photographer in a 1985 expedition. While most
Christians will not accept his multiple ark theory we commend him for making a
clear case for a universal flood. SUMMER OF '87 </p>
<p> About this time of the year, the Ark Grapevine is humming with news about
expedition plans, new objects spotted in old photos, and new theories about
location, etc. </p>
<p> Permits are generally applied for in January. Plans are being made to
raise funds. Intense research is being carried out. Regular calls are made
to the Turkish embassy, and there is an "air" of secrecy. </p>
<p> AR is not a "tell all" sheet. If someone informs us about their plans or
research in confidence, we don't print it. Right now we are aware of some
pretty exciting research going on and some interesting developments that we
hope to report to you at the right time. </p>
<p> Currently we are aware of about 7 or 8 groups that are applying for
research permits for Mt. Ararat. Foreign groups are also getting involved.
We are aware of French, Norwegian and Japanese groups who are interested in
the search for the Ark. There is the possibility that a helicopter will be
used this summer for the first time. They will need adequate financing and
much prayer to pull this off. </p>
<p> It is also our hope that the ship-shaped formation southeast of Ararat will
be properly excavated this summer. We will also endeavor to keep you up-to-
date on this strange shape which the Turkish government is claiming to be the
Ark of Noah.
</p>
<p>POLITICAL AND WEATHER WATCH </p>
<p> We are still getting unconfirmed reports of a horrendous winter in Eastern
Turkey. We have news reports stating that areas in Turkey and Greece have
received snow where it has never snowed before! </p>
<p> On the political side we are happy to report that the U.S. has signed a new
five year treaty with Turkey. Our government will be paying $1 billion for
the privilege of maintaining our military bases. </p>
<p> The following article appeared in Insight, Mar. 30, 1987: </p>
<p> "A report from Ankara's Security Department has accused Libya and Syria of
supplying arms and logistic support to Kurdish separatist terrorists in Turkey
and Iraq. The allegation was made during the trial of five persons accused of
smuggling arms into Turkey from Syria for the Kurds. Most of the insurgents
are members of the Kurdish Labor Party, a Marxist-Leninist organization with
headquarters in Syria. </p>
<p> The groups said to be receiving the supplies are the Kurdish Democratic
Party, Kurdish Workers Party and Patriotic Union of Kurdistan. </p>
<p> According to Western analysts, following the Turkish bombing of Kurdish
camps in Iraq last August, the flow of arms (some believed to be a gift of
Libya's Col. Muammar Quaddafi) across the Syrian border is beginning to
increase in numbers and sophistication." </p>
<p> This one appeared in the Rocky Mountain News, 3/9/87: </p>
<p> "Assailants believed to be Kurdish guerrillas raided a Turkish village near
the Syrian border, killing six children and two adults, the Anatolia news
agency said yesterday. </p>
<p> The assailants fired automatic weapons and hurled hand grenades at two
homes in the village of Acikyol on Saturday night, the news agency said. </p>
<p> Most of the guerrillas operating in the region are linked to the Kurdish
Labor Party, which wants to set up an independent Kurdish state in eastern and
southeastern Turkey." </p>
<p> A note of interest with regard to the previous news article: The incident
referred to took place very close to one of the traditional resting places of
Noah's Ark--Nisibis. We will be doing a major article on the other
traditional resting places of Noah's Ark in a future issue. </p>
<p>BITS AND PIECES </p>
<p> In the November issue, we mentioned another forthcoming book by Rene
Noorbergen which would defend the thesis that the ship-shaped object south of
Ararat is the Ark. We have been informed that this book will not be out until
June. </p>
<p>* Back issues of ARARAT REPORT are available on the same donation basis. </p>
<p>* A continuously updated outline and bibliography is available on the search
for Noah's Ark. Please send $2.00 for postage and copying. </p>
<p>* A comprehensive bibliography on the subject of "Kibowtology" (Ark research)
is under preparation. Target date: early summer. </p>
<p>* Christian Information Ministries, International, which publishes the ARARAT
REPORT, is a faith ministry. That is, we depend on the gifts of God's people
to sustain us. The ARARAT REPORT is sent as a free gift to those who enable
this ministry to continue through their giving. If you own a personal
computer equipped with a modem and are interested in knowing more about THE
INFORMED CHRISTIAN NETWORK, write or call to receive a password. All back
issues of ARARAT REPORT are downloadable from our database. THE INFORMED
CHRISTIAN NETWORK is a growing library of Christian Information that we are
seeking to make available to the Body of Christ. </p>
<p>* We would like to make our readers aware of Origins Research &amp; Information
Service, 137 Oak Crest Dr., Lafayette, LA 70503. For $1.00 they will send an
introductory packet of Creationist material. </p>
<p>* We invite letters to the editor. We will print those that will make a
contribution to the overall discussion.
</p></xml>

1617
regexConsp/exec_ord.xml Normal file

File diff suppressed because it is too large Load Diff

1529
regexConsp/executiv.xml Normal file

File diff suppressed because it is too large Load Diff

241
regexConsp/fakeaids.xml Normal file
View File

@ -0,0 +1,241 @@
<xml><p>
DESIGNER DISEASES</p>
<p> AIDS As Biological &amp; Psychological Warfare</p>
<p> by Waves Forrest</p>
<p>Despite repeated denials from Defense Department officials,
allegations persist that AIDS is a genetically altered virus,
which has been deliberately released to wipe out homosexuals
and/or non-whites in the U.S. and reduce populations in third
world countries.</p>
<p>At first glance it seems like the epitome of paranoia to accuse
the military of conspiring to exterminate citizens of their own
country, and even some of their own troops. However, the vast
majority of military personnel could be completely unaware of
such a plot in their midst, while a relative handful of traitors
in key positions could conduct it under cover of classified
operations. And the circumstantial evidence is actually quite
compelling, that the AIDS virus was artificially engineered, and
planted in several different locations at about the same time
through vaccination programs, and possibly blood bank
contamination.</p>
<p>At a House Appropriations hearing in 1969, the Defense
Department's Biological Warfare (BW) division requested funds to
develop through gene-splicing a new disease that would both
resist and break down a victim's immune system. "Within the next
5 to 10 years it would probably be possible to make a new
infective micro-organism which could differ in certain important
respects from any known disease-causing organisms. Most
important of these is that it might be refractory to the
immunological and therapeutic processes upon which we depend to
maintain our relative freedom from infectious diseases." (See -
A Higher Form of Killing: The Secret Story of Chemical and
Biological Warfare by R. Harris and J. Paxman, p 266, Hill and
Wang, pubs.) The funds were approved.</p>
<p>AIDS appeared within the requested time frame, and has the exact
characteristics specified.</p>
<p>In 1972, the World Health Organization published a similar
proposal: "An attempt should be made to ascertain whether viruses
can in fact exert selective effects on immune function, e.g.,
by ...affecting T cell function as opposed to B cell function.
The possibility should also be looked into that the immune
response to the virus itself may be impaired if the infecting
virus damages more or less selectively the cells responding to
the viral antigens." (Bulletin of the W.H.O., vol. 47, p 257-
274.) This is a clinical description of the function of the AIDS
virus.</p>
<p>The incidence of AIDS infections in Africa coincides exactly with
the locations of the W.H.O. smallpox vaccination program in the
mid-1970's (London Times, May 11, 1987). Some 14,000 Haitians
then on UN secondment to Central Africa were also vaccinated in
this campaign. Personnel actually conducting the vaccinations
may have been completely unaware that the vaccine was anything
other than what they were told.</p>
<p>A striking feature of AIDS is that it's ethno-selective. The
rate of infection is twice as high among Blacks, Latinos and
Native Americans as among whites, with death coming two to three
times as swiftly. And over 80% of the children with AIDS and 90%
of infants born with it are among these minorities. "Ethnic
weapons" that would strike certain racial groups more heavily
than others have been a long-standing U.S. Army BW objective.
(Harris and Paxman, p 265)</p>
<p>Under the current U.S. administration biological warfare research
spending has increased 500 percent, primarily in the area of
genetic engineering of new disease organisms.</p>
<p>The "discovery" of the AIDS virus (HTLV3) was announced by Dr.
Robert Gallo at the National Cancer Institute, which is on the
grounds of Fort Detrick, Maryland, a primary U.S. Army biological
warfare research facility. Actually, the AIDS virus looks and
acts much more like a cross between a bovine leukemial virus and
a sheep visna (brain-rot) virus, cultured in a human cell culture, than any virus of the HTLV group.</p>
<p>The closest thing in this case to a "smoking test tube" so far is
the AIDS virus itself. If it was possible for such a monstrosity
to occur naturally it would have done so ages ago and decimated
mankind at that time. Some other life form would presently be in
control of this planet (assuming that is not already the case).</p>
<p>The Hepatitis B vaccine study in 1978 appears to have been the
initial means of planting the infection in New York City. The
test protocol specified non-monogamous males only, and
homosexuals received a different vaccine from heterosexuals. At
least 25-50% of the first reported New York AIDS cases in 1981
had received the Hepatitis B test vaccine in 1978. By 1984, 64%
of the vaccine recipients had AIDS, and the figures on the
current infection rate for the participants of that study are
held by the U.S. Department of Justice, and "unavailable."</p>
<p>The AIDS epidemic emerged full-blown in the three U.S. cities
with "organized gay communities" before being reported elsewhere,
including Haiti or Africa, so it is epidemiologically impossible
for either of those countries to be the origin point for the U.S.
infections.</p>
<p>Another indication AIDS had multiple origin points is that the
14-month doubling time of the disease cannot nearly account for
the current number of cases if we assume only a small number of
initial infections starting in the late 1970s.</p>
<p>Before dismissing the possibility that a U.S. Army BW facility
would participate in genocide, bear in mind that hundreds of top
Nazis were imported into key positions in the U.S. military-
intelligence establishment following WW II. U.S. military
priorities were then re-oriented from defeating Nazis to
"defeating" communism at any cost, and strengthening military
control of economic and foreign policy decisions (See - Project
Paperclip by Clarence Lasby, Atheneum 214, NY, and Gehlen: Spy of
the Century by E.H. Cookridge, Random House.) There's no proof
those Nazis ever gave up their long-term goals of conquest and
genocide, just because they changed countries. Fascism was and
is an international phenomenon.</p>
<p>It's not as if this was total reversal of previous U.S. military
policy, however. Hitler claimed to have gotten his inspiration
for the "final solution" from the extermination of Native
Americans in the U.S. For that matter the first example of germ
warfare in the U.S. was in 1763 when some of the European
colonists gave friendly Indians a number of blankets that had
been infected with smallpox, causing many deaths.</p>
<p>One indication of the actual U.S. military priorities regarding
BW was the importation of the entire Japanese germ warfare unit
(#731) following WW II. These people killed over 3000 POWs,
including many Americans, in a variety of grisly experiments, yet
they were granted complete amnesty and given American military
positions in exchange for sharing their research findings with
their U.S. Army counterparts.</p>
<p>Consider also the callous attitude displayed by top military
officials toward veterans suffering from the after-effects of
exposure to Agent Orange and radiation from nuclear weapons
tests.</p>
<p>In fact, since the end of WW II over 200 experimental BW tests
have been conducted on civilians and military personnel in the
U.S. One example was the test spraying from Sept. 20-26, 1950 of
bacillus globigi and syraceus maracezens over 117 square miles of
the San Francisco area, causing pneumonia-like infections in many
of the residents. The family of one elderly man who died in the
test sued the government, but lost. To this day, syraceus is a
leading cause of death among the elderly in the San Francisco
area. Another case was the joint Army-CIA BW test in 1955, still
classified, in which an undisclosed bacteria was released in the
Tampa Bay region of Florida, causing a dramatic increase in
whooping cough infections, including twelve deaths. A third
example was the July 7-10, 1966 release of bacteria throughout
the New York subway system, conducted by the U.S. Army's Special
Operations Division. Due to the vast number of people exposed it
would virtually impossible to identify, let alone prove, and
specific health problems resulting directly from this test.</p>
<p>Despite the loyalty of the vast majority of U.S. military
personnel toward their country, there are clearly some military
officials who have very different intentions, and they occupy
high enough positions to impose their priorities on military
programs and get away with it, so far.</p>
<p>The first detailed charges regarding AIDS as a BW weapon were
published in the Patriot newspaper in New Delhi, India, on July
4, 1984. It is hard to say where the investigations of this
story in the Indian press might have led, if they had not been
sidetracked by two major domestic disasters shortly thereafter:
the assassination of Indira Gandhi on Oct. 31 and the Bhopal
Union Carbide plant "accident" that killed several thousand and
injured over 200,000 on Dec. 3.</p>
<p>The Soviet press picked up the story on October 1985, making it
easy for U.S. Defense Department spokesmen to dismiss the charges
as "Soviet propaganda," even though many other countries carried
it. The Soviets recently retracted the charges, in the new
spirit of US-USSR cooperation.</p>
<p>A variation on the AIDS-BW theory that is popular in far-right
publications is that AIDS was developed in Soviet laboratories
for use against the U.S. An obvious problem with this idea is
that the victims of choice of a Soviet BW attack would be anti-
communists, not minorities or homosexuals, who are generally more
left-wing. The people at greatest risk from AIDS in the U.S. are
in fact the very elements most disliked by arch-conservatives.
In any case, it is simplistic to assume that one country, U.S. or
USSR, is conducting this campaign against one another. Although
concealed in apparent conflicts between nations, the real
culprits are multi-national fascists on both "sides" still bent
on massive population reductions and global domination.</p>
<p>Other motives include the old "divide and conquer" principle;
AIDS is inspiring fear and mistrust between people, and scaring
them away from relating to each other at the basic level of
sexuality. It is acting as a barrier to the attempted cultural
resurgence toward peace, love and cooperation. Of high school
students surveyed last year as to which decade they'd most like
to have grown up in, 90% chose the 60's. The last thing pro-war
fascists want is another "love generation," especially if it is
more politically sophisticated than the last one.</p>
<p>Apparently, homosexuals were an initial target in the U.S.
because their sexual practices would help in the rapid spread of
the disease, and because it was correctly assumed that very few
non-homosexual citizens would pay much attention during the early
years of the epidemic. Also, the stigma of a "homosexual
disease" would interfere with rational analysis and discussion of
AIDS. Bear in mind that homosexuals were among the first to be
exterminated in Nazi Germany, before Jews or other minorities, so
fewer citizens would object.</p>
<p>The details of precisely how the AIDS virus was synthesized, mass
cultured, and spread by incorporating into vaccination programs
are available but fairly intricate. It is beyond the scope of
this report to present a crash course in virology, epidemiology,
genetic engineering, and the military strategies of international
fascism. Readers are encouraged to obtain and study the
references cited here, and demand a full inquiry. Those
officials who are actually involved in the coverup will reveal it
by their inaction when pressed to investigate.</p>
<p>Evil is hard to confront, especially on the preposterous scale we
have here. If you acknowledge the presence of those who think
their only hope for survival is to kill off two thirds of all the
other kinds, and their ability to manage it, you then pretty much
have to do something about it.</p>
<p>Three good sources, each which lists many other key references,
are: Covert Action Information Bulletin #28 ($5), Box 50272,
Washington, D.C. 20004; Bio-Attack Alert ($20), Dr. Robert
Strecker, 1501 Colorado Blvd., Los Angeles, CA 90041; Radio Free
America #16 by Dave Emery and Nip Tuck (3 tapes, $10), Davkore
Co., 1300-D Space Park Way, Mountain View, CA 94043.</p>
<p>This report was originally printed in - Critique - Exposing
Consensus Reality, P.O. Box 11368, Santa Rosa, CA 95406. $15.00
for three issues (one year).
</p></xml>

251
regexConsp/fbi-fone.xml Normal file
View File

@ -0,0 +1,251 @@
<xml><p></p>
<p> 102nd Congress
2nd Session</p>
<p> Amendment No.
Offered by M.</p>
<p>1. SEC. 1. FINDINGS AND PURPOSES
2. (a) The Congress finds:
3. (1) that telecommunications systems and networks are often
4 used in the furtherance of criminal activities including
5 organized crime, racketeering, extortion, kidnapping, espionage,
6 terrorism, and trafficking in illegal drugs; and
7 (2 ) that recent and continuing advances in
8 telecommunications technology, and the introduction of new
9 technologies and transmission modes by the telecommunications
10 industry, have made it increasingly difficult for government
11 agencies to implement lawful orders or authorizations to
12 intercept communications and thus threaten the ability of such
13 agencies effectively to enfore the laws and protect the national
14 security; and
15 (3) without the assistance and cooperation of providers of
16 electronic communication services and private branch exchange
17 operators, the introduction of new technologies and transmission
18 modes into telecommunications systems witout consideration and
19 accomodation of the need of government agencies lawfully to
20 intercept communications, would impede the ability of such
21 agencies effectively to carry out their responsibilities.
22</p>
<p>1 The purpose of this Act are:
2 (1) to clarify the duty of providers of electronic
3 communication services and private branch exchange operators to
4 provide such assistance as necessary to ensure the ability of
5 government agencies to implement lawful orders or authorizations
6 to intercept communications; and
7 (2) to ensure that the Federal Communications Commission,
8 in the setting of standards affecting providers of electronic
9 communication services or private branch exchange operators, will
10 accomodate the need of government agencies lawfully to intercept
11 communications.</p>
<p>12 SEC. 2. Title II of the Communictions Act of 1934 is amended
13 by adding at the end thereof the following new sections:
14 "Sec__. GOVERNMENT REQUIREMENTS
15 "(a) The Federal Communications Commission shall,
16 within 120 days after enactment of this Act, issue such
17 regulations as are necessary to ensure that the government
18 can intercept communications when such interception is
19 otherwise lawfully authorized
20 "(b) The regulations issued by the commission shall:
21 "(1) establish standards and specifications for
22 telecommunications equipment and technology employed by
23 providers of electronic communication services or
24 private branch exchange operators as may be necessary
25 to maintain the ability of the government to lawfully
26 intercept communication</p>
<p>1 "(2) require that any telecommunications
2 equipment or technology which impedes the ability of
3 the government to lawfully intercept communications and
4 and which has been introduced into a telecommunications
5 system by providers of electronic communication
6 services or private branch exchange operators shall not
7 expanded so as to further impede such utility until
8 that telecommunications equpment or technology is
9 brought into compliance with the requirements set forth
10 in regulations issued by the Commission;
11 "(3) require that modifications which are
12 necessary to be made to existing telecommunications
13 equipment or technology to eliminate impediments to the
14 ability of the government to lawfully intercept
15 communications shall be implemented by such providers
16 of electronic communication services and private branch
17 exchange operators within 180 days of issuance of such
18 regulations; and
19 "(4) prohibit the use by electronic communication
20 service providers and private branch exchange operators
21 of any telecommunications equipment or technoloqy which
22 does not comply with the regulations issued under this
23 section after the 180th day following the issuance of
24 such regulations.
25 "(c) For the purposes of administering and enforcing
26 the provisions of this section and the regulations</p>
<p>1 prescribed hereunder, the Commission shall have the same
2 authority, power, and functions with respect to providers of
3 electronic communication services or private branch exchange
4 operators as the Commission has in administering and
5 enforcing the provisions of this title with respect to any
6 common carrier otherwise subject to Commission jurisdiction.
7 Any violation of this section by any provider of electronic
8 communication service or any private branch exchange
9 operator shall be subject to the same remedies, penalties,
10 and procedures as are applicable to a violation of this
11 chapter by a common carrier otherwise subject to Commission
12 jurisdiction, except as otherwise specified in subsection
13 (d).
14 "(d) In addition to any enforcement authorities vested
15 in the Commission under this title, the Attorney General may
16 apply to the appropriate United States District Court for a
17 restraining order or injunction against any provider of
18 electronic communication service or private branch exchange
19 operator based upon a failure to comply with the provisions
20 of this section or regulations prescribed hereunder.
21 "(e) Any person who willfully violates any provision
22 of the regulations issued by the Commission pursuant to
23 subjection (a) of this section shall be subject to a civil
24 penalty of $10,000 per day for each day in violation.
25 "(f) To the extent consistent with the setting or
26 implementation of just and reasonable rates, charges and
</p>
<p>1 classifications, the Commission shall authorize the
2 compensation of any electronic communication service
3 providers or other entities whose rates or charges are
4 subject to its jurisdiction for the reasonable costs
5 associated with such modifications of existing
6 telecommunications equipment or technology, or with the
7 development or procurement, and the installation of such
8 telecommunications equipment or technology as is necessary
9 to carry out the purposes of this Act, through appropriate
10 adjustments to such rates and charges.
11 "(g) The Attorney General shall advise the Commission
12 within 30 days after the date of enactment of this Act, and
13 periodically thereafter, as necessary, of the specific needs
14 and performance requirements to ensure the continued ability
15 of the government to lawfully intercept communications
16 transmitted by or through the electronic communication
17 services and private branch exchanges introduced, operated,
18 sold or leased in the United States.
l9 "(h) Notwithstanding section 552b of Title 5, United
20 States Code or any other provision of law, the Attorney
21 General or his designee may direct that any Commission
22 proceeding concerning regulations, standards or
23 registrations issued or to be issued under the authority of
24 this section shall be closed to the public.
25 "(i) Definitions -- As used in this section --</p>
<p>1 "(l) 'provider of electronic communication
2 service' or 'private branch exchange operator' means
3 any service which profices to users thereof the ability
4 to send or receive wire, oral or electronic
5 communications, as those terms are defined in
6 subsections 2510(1) and 2510(12) of Title 18, United
7 States Code;
8 "(2) 'communication' means any wire or electronic
9 communication, as defined in subsection 2510(1) and
10 2510 (12), of Title 18, United States Code;
11 "(3) 'impede' means to prevent, hinder or impair
12 the government's ability to intercept a communication
13 in the same form as transmitted;
14 "(4) 'intercept' shall have the same meaning
l5 set forth in section 2510 (4) of Title 18, United States
16 Code;
17 "(5) 'government' means the Government of the
18 United States and any agency or instrumentality
19 thereof, any state or political subdivision thereof,
20 and the District of Columbia, and Commonwealth of Puerto
21 Rico; and
22 "(6) 'telecommunications equipment or technology'
23 means any equipment or technology, used or to be used
24 by any providers of electronic communication services
25 or private branch exchange operators, which is for the</p>
<p>1 transmission or recept of wire, oral or electronic
2 communications."</p>
<p>3 SEC 3. Section 510, Title V, P.L. 97-259 is amended deleting the
4 phrase "section 301 or 302a" and substituting the phrase "section
5 301, 302a, or ____.</p>
<p> DIGITAL TELEPHONY AMENDMENT
(report language)</p>
<p>Significant changes are being made in the systems by which
communications services are provided. Digital technologies,
fiber optics, and other telecommunications transmission
technologies are coming into widespread use. These changes
in communications systems and technologies make it increasingly
difficult for government agencies to implement lawful orders or
authorizations to intercept communications in order to enfore
the laws and protect the national security.</p>
<p>With the assistance of providers of electronic communication
services, these technological advances need not impede
the ability of government agencies to carry out their
responsibilities. This bill would direct the Federal
Communications Commission (FCC) to issue standards ensuring
that communications systems and service providers continue
to accomodate lawful government communications intercepts.
The regulations are not intended to cover federal government
communications systems. Procedure already exist by which
the Federal Bureau of Investigation amy obtain federal agency
cooperation in implementing lawful orders or authorizations
applicable to such systems. Further, there would be no
obligation on the part of the service providers or any other party
to ensure access to the plain text of encrypted or other encoded
material, but rather only to the communication in whatever form
it is transmitted. It is thus the intent and purpose of the
bill only to maintain the government's current communications
interception capability where properly ordered or authorized.
No expansion of that authority is sought.</p>
<p> ANALYSIS</p>
<p>
Subsection 2(a) and (b) would require the Federal Communications
Commission (FCC) to issue any regulations deemed necessary to
ensure that telecommunications equipment and technology used
by providers of electronic communications services or private branch
exchange operators will permit the government to intercept
communications when such interception is lawfully authorized.
The regulations would also require that equipment or technologies
currently used by such providers or operators that impede this
ability until brought into compliance with the regulations.
Compliance with FCC regulations issued under this section would
be required within 180 days of their issuance.</p>
<p>Subsection 2(c) provides that the Commission's authority to
implement and enforce the provisions of this section are the same
as those it has with respect to common carriers subject to its
jurisdiction.</p>
<p>Subsection 2(d) would give the Attorney General the authority to
request injunctive relief against non-complying service providers
or private branch exchange operators.</p>
<p>Subsection 2(e) provides civil penalty authority for willful
violations of the regulations of up to $10,000 per day for each
violation.</p>
<p>Subsection 2(f) would permit the FCC to provide rate relief to
service providers subject to its rate-setting jurisdiciton for
the costs associated with modifying equipment or technologies to
carry out the purposes of the bill.</p>
<p>Subsections 2(g), (h), and (i) require the Attorney General
to advise the Commission regarding the specific needs and
performance criteria required to maintain government intercept
capabilities, require the FCC to ensure that the standards and
specifications it promulgates may be implemented on a royalty-
free basis, and authorize the Attorney General to require that
particular Commission rulemaking proceedings to implement the Act
be closed to the public.</p>
<p>Subsection 2(j) provides definitions for key terms used in this
section.
</p></xml>

421
regexConsp/fema-1.xml Normal file
View File

@ -0,0 +1,421 @@
<xml><p>
SUBJECT: FEMA GULAG
SECRET CONCENTRATION CAMPS
The September issue of THE OSTRICH reprinted a story from the
CBA BULLETIN which listed the following principal civilian concentra-
tion camps established in GULAG USA under the =Rex '84= program:
Ft. Chaffee, Arkansas; Ft. Drum, New York; Ft. Indian Gap, Penn-
sylvania; Camp A. P. Hill, Virginia; Oakdale, California; Eglin
Air Force Base, Florida; Vendenberg AFB, California; Ft. Mc Coy,
Wisconsin; Ft. Benning, Georgia; Ft. Huachuca, Arizona; Camp
Krome, Florida. The February OSTRICH printed a map of the expanding
Gulag. Alhough this listing and map stirred considerable interest,
the report was not new. For at least 20 years, knowledgeable Patriots
have been warning of these sinister plots to incarcerate dissidents
opposing plans of the =Elitist Syndicate= for a totalitarian
=New World Order=. Indeed, the plot was recognized with the insidious
encroachment of "regionalism" back in the 1960's. As early as 1968,
the "greatest land steal in history" leading to global corporate
socialism, was in a ="Master Land Plan"= for the United States
by =Executive Orders= involving water resource regions,
population movement and control, pollution control, zoning
and land use, navigation and environmental bills, etc. Indeed,
the real undercover aim of the so-called "Environmental Rennaissance"
has been the abolition of private property.
All prelude to the total grab of the =World Conservation Bank=,
as THE OSTRICH has been reporting. The map on this page and
the list of executive orders available for imposition of an "emergency"
are from 1970s files of the late Gen. =P. A. Del Valle's= ALERT,
sent us by =Merritt Newby=, editor of the now defunct AMERICAN
CHALLENGE.
=Wake up Americans!= The Bushoviks have approved =Gorbachev's=
imposition of "Emergency" to suppress unrest. =Henry Kissinger=
and his clients hardly missed a day's profits in their deals with
the butchers of Tiananmen Sqaure. Are you next?
*************************************************************************
SUBJECT: Executive Orders
APPLICABLE EXECUTIVE ORDERS
The following =Executive Orders=, now recorded in the Federal
Register, and therefore accepted by Congress as the law of the
land, can be put into effect at any time an emergency is declared:
10995--All communications media seized by the Federal Government.
10997--Seizure of all electrical power, fuels, including
gasoline and minerals.
10998--Seizure of all food resources, farms and farm equipment.
10999--Seizure of all kinds of transportation, including your
personal car, and control of all highways and seaports.
11000--Seizure of all civilians for work under Federal supervision.
11001--Federal takeover of all health, education and welfare.
11002--Postmaster General empowered to register every man, woman
and child in the U.S.A.
11003--Seizure of all aircraft and airports by the Federal
Government.
11004--Housing and Finance authority may shift population from
one locality to another. Complete integration.
11005--Seizure of railroads, inland waterways, and storage facilities.
11051--The Director of the Office of Emergency Planning authorized
to put Executive Orders into effect in "times of increased
international tension or financial crisis". He is also to
perform such additional functions as the President
may direct.
--------------------------------------------------------------------------
A Dangerous Fact Not Generally Known
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THESE EXECUTIVE ORDERS GROSSLY AND FLAGRANTLY VIOLATE ARTICLE
4 SECTION 4 OF THE CONSTITUTION OF THE UNITED STATES. "THE
UNITED STATES SHALL GUARANTEE TO EVERY STATE IN THIS UNION A
REPUBLICAN FORM OF GOVERNMENT, AND SHALL PROTECT EACH OF THEM
AGAINST INVASION; AND ON APPLICATION OF THE LEGISLATURE, OR OF THE
EXECUTIVE (WHEN THE LEGISLATURE CANNOT BE CONVENED) AGAINST
DOMESTIC VIOLENCE." "REGIONAL GOVERNMENT IS NOT A REPRESENTATIVE
REPUBLICAN FORM OF GOVERNMENT!"
When Government gets out of hand and can no longer be controlled
by the people, short of violent overthrow as in 1776, there are
two sources of power which are used by the dictatorial government
to keep the people in line: the Police Power and the Power of the
Purse (through which the necessities of life can be withheld).
And both of these powers are no longer balanced between the three
Federal Branches, and between the Federal and the State and
local Governments. These powers have been taken over, with the
permission of the Federal Legislature and the State Governments,
by the Executive Branch of the Federal Government and all attempts
to reclaim that lost power have been defeated.
Stated simply: the dictatorial power of the Executive rests primarily
on three basis: Executive Order 11490, Executive Order 11647, and
the Planning, Programming, Budgeting System which is operated
through the new and all-powerful Office of Management and
Budget.
E. O. 11490 is a compilation of some 23 previous Executive Orders,
signed by Nixon on Oct. 28, 1969, and outlining emergency functions
which are to be performed by some 28 Executive Departments and
Agencies whenever the President of the United States declares
a national emergency (as in defiance of an impeachment edict,
for example). Under the terms of E. O. 11490, the President
can declare that a national emergency exists and the Executive
Branch can:
* Take over all communications media
* Seize all sources of power
* Take charge of all food resources
* Control all highways and seaports
* Seize all railroads, inland waterways, airports, storage facilities
* Commandeer all civilians to work under federal supervision
* Control all activities relating to health, education, and welfare
* Shift any segment of the population from one locality to another
* Take over farms, ranches, timberized properties
* Regulate the amount of your own money you may withdraw from
your bank, or savings and loan institution
All of these and many more items are listed in 32 pages incorporating
nearly 200,000 words, providing and absolute bureaucratic
dictatorship whenever the President gives the word.
--&gt; Executive Order 11647 provides the regional and local mechanisms
--&gt; and manpower for carrying out the provisions of E. O. 11490.
--&gt; Signed by Richard Nixon on Feb. 10, 1972, this Order sets up Ten
--&gt; Federal Regional Councils to govern Ten Federal Regions made up
--&gt; of the fifty still existing States of the Union.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Don sez:
*Check out this book for the inside scoop on the "secret" Constitution.*
SUBJECT: - "The Proposed Constitutional Model" Pages 595-621
Book Title - The Emerging Constitution
Author - Rexford G. Tugwell
Publisher - Harpers Magazine Press,Harper and Row
Dewey Decimal - 342.73 T915E
ISBN - 0-06-128225-10
Note Chapter 14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
The 10 Federal Regions
~~~~~~~~~~~~~~~~~~~~~~
REGION I: Connecticut, Massachusetts, New Hampshire, Rhode
Island, Vermont.
Regional Capitol: Boston
REGION II: New York, New Jersey, Puerto Rico, Virgin Island.
Regional Capitol: New York City
REGION III: Delaware, Maryland, Pennsylvania, Virginia, West
Virginia, District of Columbia.
Regional Capitol: Philadelphia
REGION IV: Alabama, Florida, Georgia, Kentucky, Mississippi,
North Carolina, Tennessee.
Regional Capitol: Atlanta
REGION V: Illinois, Indiana, Michigan, Minnesota, Ohio, Wisconsin.
Regional Capitol: Chicago
REGION VI: Arkansas, Louisiana, New Mexico, Oklahoma, Texas.
Regional Capitol: Dallas-Fort Worth
REGION VII: Iowa, Kansas, Missouri, Nebraska.
Regional Capitol: Kansas City
REGION VIII: Colorado, Montana, North Dakota, South Dakota,
Utah, Wyoming.
Regional Capitol: Denver
REGION IX: Arizona, California, Hawaii, Nevada.
Regional Capitol: San Fransisco
REGION X: Alaska, Oregon, Washington, Idaho.
Regional Capitol: Seattle
Supplementing these Then Regions, each of the States is, or is to
be, divided into subregions, so that Federal Executive control
is provided over every community.
Then, controlling the bedgeting and the programming at every
level is that politico-economic system known as PPBS.
The President need not wait for some emergency such as an impeachment
ouster. He can declare a National Emergency at any time, and freeze
everything, just as he has already frozen wages and prices. And
the Congress, and the States, are powerless to prevent such an
Executive Dictatorship, unless Congress moves to revoke these
extraordinary powers before the Chief Executive moves to invoke
them.
THESE EXECUTIVE ORDERS GROSSLY AND FLAGRANTLY VIOLATE THE INTENT AND
PURPOSE OF ARTICLE 4 SECTION 3. THERE IS NO PROVISION IN THIS
SECTION OR THE CONSTITUTION OF THE UNITED STATES FOR FORMING A
REGIONAL STATE OUT OF A GROUP OF STATES! FURTHER, THESE EXECUTIVE
ORDERS GROSSLY AND FLAGRANTLY VIOLATE THE 9TH AND 10TH
AMENDMENTS TO THE CONSTITUTION!
By Proclaiming and Putting Into Effect Executive Order No. 11490,
the President would put the United States under TOTAL MARTIAL LAW
AND MILITARY DICTATORSHIP! The Guns Of The American People Would
Be Forcibly Taken!
--------------------------------END:REF1------------------------------------------MORE--(40%)
################################################################################
--------------------------------REF2:FEMA---------------------------------------
Bushie-Tail used the Gulf War Show to greatly expand the powers of the
presidency. During this shell game event, the Executive Orders signed
into "law" continued Bushie's methodical and detailed program to bury
any residual traces of the constitutional rights and protections of U.S.
citizens. The Bill of Rights--[almost too late to] use 'em or lose 'em:
|| The record of Bush's fast and loose approach to ||
|| constitutionally guaranteed civil rights is a history of ||
|| the erosion of liberty and the consolidation of an imperial ||
|| executive. ||
-----------------------------------------------------------------------------
From "Covert Action Information Bulletin," Number 37, Summer, 1991 (see
bottom 2 pages for subscription &amp; back issues info on this quarterly):
Domestic Consequences of the Gulf War
Diana Reynolds
Reprinted with permission of CAIB. Copyright 1991
Diana Reynolds is a Research Associate at the Edward R. Murrow Center,
Fletcher School for Public Policy, Tufts University. She is also an
Assistant Professor of Politics at Broadford College and a Lecturer at
Merrimack College.
A war, even the most victorious, is a national misfortune.
--Helmuth Von Moltke, Prussian field marshall
George Bush put the United States on the road to its second war in
two years by declaring a national emergency on August 2,1990. In
response to Iraq's invasion of Kuwait, Bush issued two Executive
Orders (12722 and 12723) which restricted trade and travel with Iraq
and froze Iraqi and Kuwaiti assets within the U.S. and those in the
possession of U.S. persons abroad. At least 15 other executive orders
followed these initial restrictions and enabled the President to
mobilize the country's human and productive resources for war. Under
the national emergency, Bush was able unilaterally to break his 1991
budget agreement with Congress which had frozen defense spending, to
entrench further the U.S. economy in the mire of the military-
industrial complex, to override environmental protection regulations,
and to make free enterprise and civil liberties conditional upon an
executive determination of national security interests.
The State of Emergency
In time of war a president's power derives from both constitutional
and statutory sources. Under Article II, Section 2 of the
Constitution, he is Commander-in-Chief of the armed forces. Although
Congress alone retains the right to declare war, this power has become
increasingly meaningless in the face of a succession of unilateral
decisions by the executive to mount invasions.
The president's statutory authority, granted by Congress and
expanded by it under the 1988 National Emergencies Act (50 USC sec.
1601), confers special powers in time of war or national emergency.
He can invoke those special powers simply by declaring a national
emergency. First, however, he must specify the legal provisions under
which he proposes that he, or other officers, will act. Congress may
end a national emergency by enacting a joint resolution. Once invoked
by the president, emergency powers are directed by the National
Security Council and administered, where appropriate, under the
general umbrella of the Federal Emergency Management Agency (FEMA).[1]
There is no requirement that Congress be consulted before an emergency
is declared or findings signed. The only restriction on Bush is that
he must inform Congress in a "timely" fashion--he being the sole
arbiter of timeliness.
Ultimately, the president's perception of the severity of a
particular threat to national security and the integrity of his
appointed officers determine the nature of any state of emergency.
For this reason, those who were aware of the modern development of
presidential emergency powers were apprehensive about the domestic
ramifications of any national emergency declared by George Bush. In
light of Bush's record (see "Bush Chips Away at Constitution" Box
below) and present performance, their fears appear well-founded.
The War at Home
It is too early to know all of the emergency powers, executive
orders and findings issued under classified National Security
Directives[2] implemented by Bush in the name of the Gulf War. In
addition to the emergency powers necessary to the direct mobilization
of active and reserve armed forces of the United States, there are
some 120 additional emergency powers that can be used in a national
emergency or state of war (declared or undeclared by Congress). The
"Federal Register" records some 15 Executive Orders (EO) signed by
Bush from August 2,1990 to February 14,1991. (See "Bush's Executive
Orders" box, below)
It may take many years before most of the executive findings and
use of powers come to light, if indeed they ever do. But evidence is
emerging that at least some of Bush's emergency powers were activated
in secret. Although only five of the 15 EOs that were published were
directed at non-military personnel, the costs directly attributable to
the exercise of the authorities conferred by the declaration of
national emergency from August 2, 1990 to February 1, 1991 for non-
military activities are estimated at approximately $1.3 billion.
According to a February 11, 1991 letter from Bush to congressional
leaders reporting on the "National Emergency With Respect to Iraq,"
these costs represent wage and salary costs for the Departments of
Treasury, State, Agriculture, and Transportation, U.S. Customs,
Federal Reserve Board, and the National Security Council.[3]
The fact that $1.3 billion was spent in non-military salaries alone
in this six month period suggests an unusual amount of government
resources utilized to direct the national emergency state. In
contrast, government salaries for one year of the state of emergency
with Iran[4] cost only $430,000.
____________________________________________________________________
| |
| Bush Chips Away at Constitution |
| |
| George Bush, perhaps more than any other individual in |
| U.S. history, has expanded the emergency powers of |
| presidency. In 1976, as Director of Central Intelligence, |
| he convened Team B, a group of rabidly anti-communist |
| intellectuals and former government officials to reevaluate |
| CIA inhouse intelligence estimates on Soviet military |
| strength. The resulting report recommended draconian civil |
| defense measures which led to President Ford's Executive |
| Order 11921 authorizing plans to establish government |
| control of the means of production, distribution, energy |
| sources, wages and salaries, credit and the flow of money |
| in U.S. financial institutions in a national emergency.[1] |
| As Vice President, Bush headed the Task Force on |
| Combatting Terrorism, that recommended: extended and |
| flexible emergency presidential powers to combat terrorism; |
| restrictions on congressional oversight in counter- |
| terrorist planning; and curbing press coverage of |
| terrorist incidents.[2] The report gave rise to the Anti- |
| Terrorism Act of 1986, that granted the President clear-cut |
| authority to respond to terrorism with all appropriate |
| means including deadly force. It authorized the |
| Immigration and Naturalization Service to control and |
| remove not only alien terrorists but potential terrorist |
| aliens and those "who are likely to be supportive of |
| terrorist activity within the U.S."[3] The bill superceded |
| the War Powers Act by imposing no time limit on the |
| President's use of force in a terrorist situation, and |
| lifted the requirement that the President consult Congress |
| before sanctioning deadly force. |
| From 1982 to 1988, Bush led the Defense Mobilization |
| Planning Systems Agency (DMPSA), a secret government |
| organization, and spent more than $3 billion upgrading |
| command, control, and communications in FEMA's continuity |
| of government infrastructures. Continuity of Government |
| (COG) was ostensibly created to assure government |
| functioning during war, especially nuclear war. The Agency |
| was so secret that even many members of the Pentagon were |
| unaware of its existence and most of its work was done |
| without congressional oversight. |
| Project 908, as the DMPSA was sometimes called, was |
| similar to its parent agency FEMA in that it came under |
| investigation for mismanagement and contract |
| irregularities.[4] During this same period, FEMA had been |
| fraught with scandals including emergency planning with a |
| distinctly anti-constitutional flavor. The agency would |
| have sidestepped Congress and other federal agencies and |
| put the President and FEMA directly in charge of the U.S. |
| planning for martial rule. Under this state, the executive |
| would take upon itself powers far beyond those necessary to |
| address national emergency contingencies.[5] |
| Bush's "anything goes" anti-drug strategy, announced |
| on September 6, 1989, suggested that executive emergency |
| powers be used: to oust those suspected of associating |
| with drug users or sellers from public and private housing; |
| to mobilize the National Guard and U.S. military to fight |
| drugs in the continental U.S.; to confiscate private |
| property belonging to drug users, and to incarcerate first |
| time offenders in work camps.[6] |
| The record of Bush's fast and loose approach to |
| constitutionally guaranteed civil rights is a history of |
| the erosion of liberty and the consolidation of an imperial |
| executive. |
| |
| 1. Executive Order 11921, "Emergency preparedness Functions, |
| June 11, 1976. Federal Register, vol. 41, no. 116. The |
| report was attacked by such notables as Ray Cline, the |
| CIA's former Deputy Director, retired CIA intelligence |
| analyst Arthur Macy Cox, and the former head of the U.S. |
| Arms Control and Disarmament Agency, Paul Warnke for |
| blatantly manipulating CIA intelligence to achieve the |
| political ends of Team B's rightwing members. See Cline, |
| quoted in "Carter to Inherit Intense Dispute on Soviet |
| Intentions," Mary Marder, "Washington Post," January 2, |
| 1977; Arthur Macy Cox, "Why the U.S. Since 1977 Has |
| Been Mis-perceiving Soviet Military Strength," "New York |
| Times," October 20, 1980; Paul Warnke, "George Bush and |
| Team B," "New York Times," September 24, 1988. |
| |
| 2. George Bush, "Public Report of the Vice President's Task |
| Force On Combatting Terrorism" (Washington, D.C.: U.S. |
| Government Printing Office), February 1986. |
| |
| 3. Robert J. Walsh, Assistant Commissioner, Investigations |
| Division, Immigration and Naturalization Service, "Alien |
| Border Control Committee" (Washington, DC), October 1, |
| 1988. |
| |
| 4. Steven Emerson, "America's Doomsday Project," "U.S. News |
| &amp; World Report," August 7, 1989. |
| |
| 5. See: Diana Reynolds, "FEMA and the NSC: The Rise of the |
| National Security State," "CAIB," Number 33 (Winter 1990); |
| Keenan Peck, "The Take-Charge Gang," "The Progressive," |
| May 1985; Jack Anderson, "FEMA Wants to Lead Economic |
| War," "Washington Post," January 10, 1985. |
| |
| 6. These Presidential powers were authorized by the Anti- |
| Drug Abuse Act of 1988, Public Law 100-690: 100th |
| Congress. See also: Diana Reynolds, "The Golden Lie," |
| "The Humanist," September/October 1990; Michael Isikoff, |
| "Is This Determination or Using a Howitzer to Kill a |
| Fly?" "Washington Post National Weekly," August 27-, |
| September 2, 1990; Bernard Weintraub, "Bush Considers |
| Calling Guard To Fight Drug Violence in Capital," "New |
| York Times," March 21, 1989. |
| |
--------------------------------------------------------------------
</p></xml>

464
regexConsp/fema-2.xml Normal file
View File

@ -0,0 +1,464 @@
<xml><p> ----FEMA pt 2 continued ----------------------------------------------
Even those Executive Orders which have been made public tend to
raise as many questions as they answer about what actions were
considered and actually implemented. On January 8, 1991, Bush signed
Executive Order 12742, National Security Industrial Responsiveness,
which ordered the rapid mobilization of resources such as food,
energy, construction materials and civil transportation to meet
national security requirements. There was, however, no mention in
this or any other EO of the National Defense Executive Reserve (NDER)
plan administered under FEMA. This plan, which had been activated
during World War II and the Korean War, permits the federal government
during a state of emergency to bring into government certain
unidentified individuals. On January 7, 1991 the "Wall Street Journal
Europe" reported that industry and government officials were studying
a plan which would permit the federal government to "borrow" as many
as 50 oil company executives and put them to work streamlining the
flow of energy in case of a prolonged engagement or disruption of
supply. Antitrust waivers were also being pursued and oil companies
were engaged in emergency preparedness exercises with the Department
of Energy.[5]
Wasting the Environment
In one case the use of secret powers was discovered by a watchdog
group and revealed in the press. In August 1990, correspondence
passed between Colin McMillan, Assistant Secretary of Defense for
Production and Logistics and Michael Deland, Chair of the White House
Council on Environmental Quality. The letters responded to
presidential and National Security Council directives to deal with
increased industrial production and logistics arising from the
situation in the Middle East. The communications revealed that the
Pentagon had found it necessary to request emergency waivers to U.S.
environmental restrictions.[6]
The agreement to waive the National Environmental Policy Act (1970)
came in August. Because of it, the Pentagon was allowed to test new
weapons in the western U.S., increase production of materiel and
launch new activities at military bases without the complex public
review normally required. The information on the waiver was
eventually released by the Boston-based National Toxic Campaign Fund
(NTCF), an environmental group which investigates pollution on the
nation's military bases. It was not until January 30, 1991, five
months after it went into effect, that the "New York Times," acting
on the NTCF information, reported that the White House had bypassed
the usual legal requirement for environmental impact statements on
Pentagon projects.[7] So far, no specific executive order or
presidential finding authorizing this waiver has been discovered.
Other environmental waivers could also have been enacted without
the public being informed. Under a state of national emergency, U.S.
warships can be exempted from international conventions on
pollution[8] and public vessels can be allowed to dispose of
potentially infectious medical wastes into the oceans.[9] The
President can also suspend any of the statutory provisions regarding
the production, testing, transportation, deployment, and disposal of
chemical and biological warfare agents (50 USC sec. 1515). He could
also defer destruction of up to 10 percent of lethal chemical agents
and munitions that existed on November 8, 1985.[10]
One Executive Order which was made public dealt with "Chemical and
Biological Weapons Proliferation." Signed by Bush on November 16,
1990, EO 12735 leaves the impression that Bush is ordering an
increased effort to end the proliferation of chemical and biological
weapons. The order states that these weapons "constitute a threat to
national security and foreign policy" and declares a national
emergency to deal with the threat. To confront this threat, Bush
ordered international negotiations, the imposition of controls,
licenses, and sanctions against foreign persons and countries for
proliferation. Conveniently, the order grants the Secretaries of
State and the Treasury the power to exempt the U.S. military.
In February of 1991, the Omnibus Export Amendments Act was passed
by Congress compatible with EO 12735. It imposed sanctions on
countries and companies developing or using chemical or biological
weapons. Bush signed the law, although he had rejected the identical
measure the year before because it did not give him the executive
power to waive all sanctions if he thought the national interest
required it.[11] The new bill, however, met Bush's requirements.
____________________________________________________________________
| |
| BUSH'S EXECUTIVE ORDERS |
| |
| * EO 12722 "Blocking Iraqi Government Property and |
| Prohibiting Transactions With Iraq," Aug. 2, 1990. |
| |
| * EO 12723 "Blocking Kuwaiti Government Property," Aug. 2, |
| 1990. |
| |
| * EO 12724 "Blocking Iraqi Government Property and |
| Prohibiting Transactions With Iraq," Aug. 9, 1990. |
| |
| * EO 12725 "Blocking Kuwaiti Government Property and |
| Prohibiting Transactions With Kuwait," Aug. 9, 1990. |
| |
| * EO 12727 "Ordering the Selected Reserve of the Armed |
| Forces to Active Duty," Aug. 22, 1990. |
| |
| * EO 12728 "Delegating the President's Authority To |
| Suspend Any Provision of Law Relating to the Promotion, |
| Retirement, or Separation of Members of the Armed Forces," |
| Aug. 22, 1990. |
| |
| * EO 12733 "Authorizing the Extension of the Period of |
| Active Duty of Personnel of the Selected Reserve of the |
| Armed Forces," Nov. 13, 1990. |
| |
| * EO 12734 "National Emergency Construction Authority," Nov. |
| 14, 1990. |
| |
| * EO 12735 "Chemical and Biological Weapons Proliferation," |
| Nov. 16, 1990. |
| |
| * EO 12738 "Administration of Foreign Assistance and Related |
| Functions and Arms Export Control," Dec. 14, 1990. |
| |
| * EO 12742 "National Security Industrial Responsiveness," |
| Jan. 8, 1991. |
| |
| * EO 12743 "Ordering the Ready Reserve of the Armed Forces |
| to Active Duty," Jan. 18, 1991. |
| |
| * EO 12744 "Designation of Arabian Peninsula Areas, Airspace |
| and Adjacent Waters as a Combat Zone," Jan. 21, 1991. |
| |
| * EO 12750 "Designation of Arabian Peninsula Areas, Airspace |
| and Adjacent Waters as the Persian Gulf Desert Shield |
| Area," Feb. 14, 1991. |
| |
| * EO 12751 "Health Care Services for Operation Desert |
| Storm," Feb. 14, 1991. |
| |
--------------------------------------------------------------------
Going Off Budget
Although some of the powers which Bush assumed in order to conduct
the Gulf War were taken openly, they received little public discussion
or reporting by the media.
In October, when the winds of the Gulf War were merely a breeze,
Bush used his executive emergency powers to extend his budget
authority. This action made the 1991 fiscal budget agreement between
Congress and the President one of the first U.S. casualties of the
war. While on one hand the deal froze arms spending through 1996, it
also allowed Bush to put the cost of the Gulf War "off budget." Thus,
using its emergency powers, the Bush administration could:
* incur a deficit which exceeds congressional budget authority;
* prevent Congress from raising a point of order over the
excessive spending;[12]
* waive the requirement that the Secretary of Defense submit
estimates to Congress prior to deployment of a major defense
acquisition system;
* and exempt the Pentagon from congressional restrictions on
hiring private contractors.[13]
While there is no published evidence on which powers Bush actually
invoked, the administration was able to push through the 1990 Omnibus
Reconciliation Act. This legislation put a cap on domestic spending,
created a record $300 billion deficit, and undermined the Gramm-
Rudman-Hollings Act intended to reduce the federal deficit. Although
Congress agreed to pay for the war through supplemental appropriations
and approved a $42.2 billion supplemental bill and a $4.8 billion
companion "dire emergency supplemental appropriation,"[14] it
specified that the supplemental budget should not be used to finance
costs the Pentagon would normally experience.[15]
Lawrence Korb, a Pentagon official in the Reagan administration,
believes that the Pentagon has already violated the spirit of the 1990
Omnibus Reconciliation Act. It switched funding for the Patriot,
Tomahawk, Hellfire and HARM missiles from its regular budget to the
supplemental budget; added normal wear and tear of equipment to
supplemental appropriations; and made supplemental requests which
ignore a planned 25% reduction in the armed forces by 1995.[16]
The Cost In Liberty Lost
Under emergency circumstances, using 50 USC sec. 1811, the
President could direct the Attorney General to authorize electronic
surveillance of aliens and American citizens in order to obtain
foreign intelligence information without a court order.[17] No
Executive Order has been published which activates emergency powers to
wiretap or to engage in counter-terrorist activity. Nonetheless,
there is substantial evidence that such activities have taken place.
According to the New York-based Center for Constitutional Rights, the
FBI launched an anti-terrorist campaign which included a broad sweep
of Arab-Americans. Starting in August, the FBI questioned, detained,
and harassed Arab-Americans in California, New York, Ohio,
Pennsylvania, Virginia, Maryland, and Colorado.[18]
A CIA agent asked the University of Connecticut for a list of all
foreign students at the institution, along with their country of
origin, major field of study, and the names of their academic
advisers. He was particularly interested in students from the Middle
East and explained that the Agency intended to open a file on each of
the students. Anti-war groups have also reported several break-ins of
their offices and many suspected electronic surveillance of their
telephones.[19]
Pool of Disinformation
Emergency powers to control the means of communications in the U.S.
in the name of national security were never formally declared. There
was no need for Bush to do so since most of the media voluntarily and
even eagerly cooperated in their own censorship. Reporters covering
the Coalition forces in the Gulf region operated under restrictions
imposed by the U.S. military. They were, among other things, barred
from traveling without a military escort, limited in their forays into
the field to small escorted groups called "pools," and required to
submit all reports and film to military censors for clearance. Some
reporters complained that the rules limited their ability to gather
information independently, thereby obstructing informed and objective
reporting.[20]
Three Pentagon press officials in the Gulf region admitted to James
LeMoyne of the "New York Times" that they spent significant time
analyzing reporters' stories in order to shape the coverage in the
Pentagon's favor. In the early days of the deployment, Pentagon press
officers warned reporters who asked hard questions that they were seen
as "anti-military" and that their requests for interviews with senior
commanders and visits to the field were in jeopardy. The military
often staged events solely for the cameras and would stop televised
interviews in progress when it did not like what was being portrayed.
Although filed soon after the beginning of the war, a lawsuit
challenging the constitutionality of press restrictions was not heard
until after the war ended. It was then dismissed when the judge ruled
that since the war had ended, the issues raised had become moot. The
legal status of the restrictions--initially tested during the U.S.
invasions of Grenada and Panama--remains unsettled.
A National Misfortune
It will be years before researchers and journalists are able to
ferret through the maze of government documents and give a full
appraisal of the impact of the President's emergency powers on
domestic affairs. It is likely, however, that with a post-war
presidential approval rating exceeding 75 percent, the domestic
casualties will continue to mount with few objections. Paradoxically,
even though the U.S. public put pressure on Bush to send relief for
the 500,000 Iraqi Kurdish refugees, it is unlikely the same outcry
will be heard for the 37 million Americans without health insurance,
the 32 million living in poverty, or the country's five million hungry
children. The U.S. may even help rebuild Kuwaiti and Iraqi civilian
infrastructures it destroyed during the war while leaving its own
education system in decay, domestic transportation infrastructures
crumbling, and inner city war zones uninhabitable. And, while the
U.S. assists Kuwait in cleaning up its environmental disaster, it will
increase pollution at home. Indeed, as the long-dead Prussian field
marshal prophesied, "a war, even the most victorious, is a national
misfortune."
FOOTNOTES:
1. The administrative guideline was established under Reagan in Executive
Order 12656, November 18,1988, "Federal Register," vol. 23, no. 266.
2. For instance, National Security Council policy papers or National
Security Directives (NSD) or National Security Decision Directives
(NSDD) have today evolved into a network of shadowy, wide-ranging and
potent executive powers. These are secret instruments, maintained in
a top security classified state and are not shared with Congress. For
an excellent discussion see: Harold C. Relyea, The Coming of Secret
Law, "Government Information Quarterly," Vol. 5, November 1988; see
also: Eve Pell, "The Backbone of Hidden Government," "The Nation,"
June 19,1990.
3. "Letter to Congressional Leaders Reporting on the National Emergency
With Respect to Iraq," February, 11, 1991, "Weekly Compilation of
Presidential Documents: Administration of George Bush," (Washington,
DC: U.S. Government Printing Office), pp. 158-61.
4. The U.S. now has states of emergency with Iran, Iraq and Syria.
5. Allanna Sullivan, "U.S. Oil Concerns Confident Of Riding Out Short Gulf
War," "Wall Street Journal Europe," January 7, 1991.
6. Colin McMillan, Letter to Michael Deland, Chairman, Council on
Environmental Quality (Washington, DC: Executive Office of the
President), August 24, 1990; Michael R. Deland, Letter to Colin
McMillan, Assistant Secretary of Defense for Production and Logistics
(Washington, DC: Department of Defense), August 29,1990.
7. Keith Schneider, "Pentagon Wins Waiver Of Environmental Rule," "New York
Times," January 30, 1991.
8. 33 U.S. Code (USC) sec. 1902 9(b).
9. 33 USC sec. 2503 l(b).
10. 50 USC sec. 1521(b) (3)(A).
ll. Adam Clymer, "New Bill Mandates Sanctions On Makers of Chemical Arms,"
"New York Times," February 22, 1991.
12. 31 USC O10005 (f); 2 USC O632 (i), 6419 (d), 907a (b); and Public
Law 101-508, Title X999, sec. 13101.
13. 10 USC sec. 2434/2461 9F.
14. When the Pentagon expected the war to last months and oil prices to
skyrocket, it projected the incremental cost of deploying and
redeploying the forces and waging war at about $70 billion. The
administration sought and received $56 billion in pledges from allies
such as Germany, Japan and Saudi Arabia. Although the military's
estimates of casualties and the war's duration were highly inflated,
today their budget estimates remain at around $70 billion even though
the Congressional Budget office estimates that cost at only $40
billion, $16 billion less than allied pledges.
15. Michael Kamish, "After The War: At Home, An Unconquered Recession,"
"Boston Globe," March 6, 1991; Peter Passell, "The Big Spoils From a
Bargain War," "New York Times," March 3, 1991; and Alan Abelson, "A
War Dividend For The Defense Industry?" "Barron's," March 18, 1991.
16. Lawrence Korb, "The Pentagon's Creative Budgetry Is Out of Line,"
"International Herald Tribune," April 5, 199l.
17. Many of the powers against aliens are automatically invoked during a
national emergency or state of war. Under the Alien Enemies Act (50
USC sec. 21), the President can issue an order to apprehend, restrain,
secure and remove all subjects of a hostile nation over 13 years old.
Other statutes conferring special powers on the President with regard
to aliens that may be exercised in times of war or emergencies but are
not confined to such circumstances, are: exclusion of all or certain
classes of aliens from entry into the U.S. when their entry may be
"detrimental to the interests of the United States" (8 USC sec. 1182(f));
imposition of travel restrictions on aliens within the U.S. (8 USC sec.
1185); and requiring aliens to be fingerprinted (8 USC sec. 1302).
18. Ann Talamas, "FBI Targets Arab-Americans," "CAIB," Spring 1991, p. 4.
19. "Anti-Repression Project Bulletin" (New York: Center for
Constitutional Rights), January 23, 1991.
20. James DeParle, "Long Series of Military Decisions Led to Gulf War News
Censorship," "New York Times," May 5, 1991.
21. James LeMoyne, "A Correspondent's Tale: Pentagon's Strategy for the
Press: Good News or No News," "New York Times," February 17, 1991.
______________________________________________________________________________
Covert Action INFORMATION BULLETIN
Back Issues
No. 1 (July 1978): Agee on CIA; Cuban exile trial; consumer research-Jamaica.*
No. 2 (Oct. 1978): How CIA recruits diplomats; researching undercover
officers; double agent in CIA.*
No. 3 (Jan. 1979): CIA attacks CAIB; secret supp. to Army field manual;
spying on host countries.*
No. 4 (Apr.-May 1979): U.S. spies in Italian services; CIA in Spain; CIA
recruiting for Africa; subversive academics; Angola.*
No. 5 (July-Aug. 1979): U.S. intelligence in Southeast Asia; CIA in
Denmark, Sweden, Grenada.*
No. 6 (Oct. 1979): U.S. in Caribbean; Cuban exile terrorists; CIA plans
for Nicaragua; CIA's secret "Perspectives for Intelligence."*
No. 7 (Dec. 1979-Jan. 1980): Media destabilization in Jamaica; Robert
Moss; CIA budget; media operations; UNITA; Iran.*
No. 8 (Mar.-Apr. 1980): Attacks on Agee; U.S. intelligence legislation;
CAIB statement to Congress; Zimbabwe; Northern Ireland.
No. 9 (June 1980): NSA in Norway; Glomar Explorer; mind control; NSA.
No. 10 (Aug.-Sept. 1980): Caribbean; destabilization in Jamaica; Guyana;
Grenada bombing; "The Spike"; deep cover manual.
No. 11 (Dec. 1980): Rightwing terrorism; South Korea; KCIA; Portugal;
Guyana; Caribbean; AFIO; NSA interview.
No. 12 (Apr. 1981): U.S. in Salvador and Guatemala; New Right; William
Casey; CIA in Mozambique; mail surveillance.*
No. 13 (July-Aug. 1981): South Africa documents; Namibia; mercenaries;
the Klan; Globe Aero; Angola; Mozambique; BOSS; Central America;
Max Hugel; mail surveillance.
No. 14-15 (Oct. 1981): Complete index to nos. 1-12; review of intelligence
legislation; CAIB plans; extended Naming Names.
No. 16 (Mar. 1982): Green Beret torture in Salvador; Argentine death squads;
CIA media ops; Seychelles; Angola; Mozambique; the Klan; Nugan Hand.*
No. 17 (Summer 1982): CBW History; Cuban dengue epidemic; Scott Barnes
and yellow rain lies; mystery death in Bangkok.*
No. 18 (Winter 1983): CIA &amp; religion; "secret" war in Nicaragua; Opus Dei;
Miskitos; evangelicals-Guatemala; Summer Inst. of Linguistics; World
Medical Relief; CIA &amp; BOSS; torture S. Africa; Vietnam defoliation.*
No. 19 (Spring-Summer 1983): CIA &amp; media; history of disinformation;
"plot" against Pope; Grenada airport; Georgie Anne Geyer.
No. 20 (Winter 1984): Invasion of Grenada; war in Nicaragua; Ft. Huachuca;
Israel and South Korea in Central America; KAL flight 007.
No. 21 (Spring 1984): N.Y. Times and the Salvador election; Time and
Newsweek in distortions; Accuracy in Media; Nicaragua.
No. 22 (Fall 1984): Mercenaries &amp; terrorism; Soldier of Fortune; "privatizing"
the war in Nicaragua; U.S.-South African terrorism; Italian fascists.
No. 23 (Spring 1985): Special issue on "plot" to kill the Pope and the
"Bulgarian Connection"; CIA ties to Turkish and Italian neofascists.
No. 24 (Summer 1985): State repression, infiltrators, provocateurs;
sanctuary movement; American Indian Movement; Leonard Peltier;
NASSCO strike; Arnaud de Borchgrave, Moon, and Moss; Tetra Tech.
No. 25 (Winter 1986): U.S., Nazis, and the Vatican; Knights of Malta;
Greek civil war and Eleni; WACL and Nicaragua; torture.
No. 26 (Summer 1986): U.S. state terrorism; Vernon Walters; Libya bombing;
contra agents; Israel and South Africa; Duarte; media in Costa
Rica; democracy in Nicaragua; plus complete index to nos. 13-25.*
No. 27 (Spring 1987): Special: Religious Right; New York Times and Pope
Plot; Carlucci; Southern Air Transport; Michael Ledeen.*
No. 28 (Summer 1987): Special: CIA and drugs: S.E. Asia, Afghanistan,
Central America; Nugan Hand; MKULTRA in Canada; Delta Force;
special section on AIDS theories and CBW.*
No. 29 (Winter 1988): Special issue on Pacific: Philippines, Fiji, New
Zealand, Belau, Kanaky, Vanuatu; atom testing; media on Nicaragua;
Reader's Digest; CIA in Cuba, Tibet; Agee on "Veil;" more on AIDS.*
No. 30 (Summer 1989): Special: Middle East: The intifada, Israeli arms
sales; Israel in Africa; disinformation and Libya; CIA's William
Buckley; the Afghan arms pipeline and contra lobby.
No. 31 (Winter 1989): Special issue on domestic surveillance. The FBI; CIA
on campus; Office of Public Diplomacy; Lexington Prison; Puerto Rico.
No. 32 (Summer 1989): Tenth Year Anniversary Issue: The Best of CAIB.
Includes articles from our earliest issues, Naming Names, CIA at home,
abroad, and in the media. Ten-year perspective by Philip Agee.
No. 33 (Winter 1990): The Bush Issue: CIA agents for Bush; Terrorism Task
Force; El Salvador and Nicaragua intervention; Republicans and Nazis.
No. 34 (Summer 1990): Assassination of Martin Luther King Jr; Nicaraguan
elections; South African death squads; U.S. and Pol Pot; Pan Am
Flight 103; Noriega and the CIA; Council for National Policy.
No. 35 (Fall 1990): Special: Eastern Europe; Analysis-Persian Gulf and
Cuba; massacres in Indonesia; CIA and Banks; Iran-contra
No. 36 (Spring 1991): Racism &amp; Nat. Security: FBI v. Arab-Americans &amp; Black
Officials; Special: Destabilizing Africa: Chad, Uganda, S. Africa,
Angola, Mozambique, Zaire; Haiti; Panama; Gulf War; COINTELPRO "art."
No. 37 (Summer 1990): Special: Gulf War: Media; U.N.; Libya; Iran;
Domestic costs; North Korea Next? Illegal Arms Deals.
* Available in Photocopy only
Subscriptions (4 issues/year) (check one)
___$17 one year ___$32 two years U.S.
___$22 one year ___$42 two years Canada/Mexico
___$27 one year ___$52 two years Latin America/Europe
___$29 one year ___$56 two years Other
$5 per year addition charge for institutions
Books, etc.
$25 "Dirty Work II: The CIA in Africa," Ray, et al.
$10 "Deadly Deceits: 25 Years in CIA," McGehee
$8 "Secret Contenders: CIA and Cold War," Beck
$6.50 "White Paper/Whitewash," Agee/Poelchau
$10 "On The Run," Agee
$1 "No CIA" buttons (additionals $.50)
BACK ISSUES: Circle above, or list below. $6 per copy in U.S.
Airmail: Canada/Mexico add $2; other countries add $4.
CAIB, P.O. Box 34583, Washington, DC 20043
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
</p></xml>

691
regexConsp/fema-3.xml Normal file
View File

@ -0,0 +1,691 @@
<xml><p>
[PeaceNet forward from AML (ACTIV-L) -- see bottom for more info]
------------------------------------------------------------------
/** mideast.forum: 216.5 **/
** Written 8:11 pm Jan 17, 1991 by nlgclc in cdp:mideast.forum **
An excellent book which deals with the REX 84 detention plan is:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
``Guts and Glory: The Rise and Fall of Oliver North,'' by Ben
Bradlee Jr. (Donald I. Fine, $21.95. 573 pp.)
------------------------------------------------------------------
Reviewed by Dennis M. Culnan Copyright 1990, Gannett News Service All
Rights Reserved Short excerpt posted here under applicable copyright
laws
[Oliver] North managed to network himself into the highest levels of
the CIA and power centers around the world. There he lied and
boastfully ignored the constitutional process, Bradlee writes.
Yet more terrifying is the plan hatched by North and other Reagan
people in the Federal Emergency Manpower Agency (FEMA): A blueprint
for the military takeover of the United States. The plan called for
FEMA to become ``emergency czar'' in the event of a national emergency
such as nuclear war or an American invasion of a foreign nation. FEMA
would also be a buffer between the president and his cabinet and other
civilian agencies, and would have broad powers to appoint military
commanders and run state and local governments. Finally, it would
have the authority to order suspect aliens into concentration camps
and seize their property.
When then-Attorney General William French Smith got wind of the plan,
he killed it. After Smith left the administration, North and his FEMA
cronies came up with the Defense Resource Act, designed to suspendend
the First Amendment by imposing censorship and banning strikes.
Where was it all heading? The book's answer: ``REX-84 Bravo, a
National Security Decision Directive 52 that would become operative
with the president's declaration of a state of national emergency
concurrent with a mythical U.S. military invasion of an unspecified
Central American country, presumably Nicaragua.''
Bradlee writes that the Rex exercise was designed to test FEMA's
readiness to assume authority over the Department of Defense, the
National Guard in all 50 states, and ``a number of state defense
forces to be established by state legislatures.'' The military would
then be ``deputized,'' thus making an end run around federal law
forbidding military involvement in domestic law enforcement.
Rex, which ran concurrently with the first annual U.S. show of force
in Honduras in April 1984, was also designed to test FEMA's ability to
round up 400,000 undocumented Central American aliens in the United
States and its ability to distribute hundreds of tons of small arms to
``state defense forces.''
Incredibly, REX 84 was similar to a plan secretly adopted by Reagan
while governor of California. His two top henchmen then were Edwin
Meese, who recently resigned as U.S. attorney general, and Louis
Guiffrida, the FEMA director in 1984.
If the review makes you nervous, you should read the book!
--Chip Berlet ** End of text from cdp:mideast.forum **
--------------------------------END:REF3-----------------------------------
###########################################################################
--------------------------------REF4:FEMA----------------------------------
[PeaceNet forward from AML (ACTIV-L) -- see bottom for more info]
------------------------------------------------------------------
This is the front-page article of the Jan. 16 issue of "The
Guardian," which describes some of the U.S. government's planning
for martial law in the event of the Gulf war. This is truly a
scary scenario that should concern all civil libertarians and
patriots.
------------------------------------------------------------------
WILL GULF WAR LEAD TO REPRESSION AT HOME?
by Paul DeRienzo and Bill Weinberg
On August 2, 1990, as Saddam Hussein's army was consolidating control
over Kuwait, President George Bush responded by signing two executive
orders that were the first step toward martial law in the United
States and suspending the Constitution.
On the surface, Executive Orders 12722 and 12723, declaring a
"national emergency," merely invoked laws that allowed Bush to freeze
Iraqi assets in the United States.
The International Emergency Executive Powers Act permits the president
to freeze foreign assets after declaring a "national emergency," a
move that has been made three times before -- against Panama in 1987,
Nicaragua in 1985 and Iran in 1979.
According to Professor Diana Reynolds, of the Fletcher School of
Diplomacy at Boston's Tufts University, when Bush declared a national
emergency he "activated one part of a contingency national security
emergency plan." That plan is made up of a series of laws passed since
the presidency of Richard Nixon, which Reynolds says give the
president "boundless" powers.
According to Reynolds, such laws as the Defense Industrial
Revitalization and Disaster Relief Acts of 1983 "would permit the
president to do anything from seizing the means of production, to
conscripting a labor force, to relocating groups of citizens."
Reynolds says the net effect of invoking these laws would be the
suspension of the Constitution.
She adds that national emergency powers "permit the stationing of the
military in cities and towns, closing off the U.S. borders, freezing
all imports and exports, allocating all resources on a national
security priority, monitoring and censoring the press, and warrantless
searches and seizures."
The measures would allow military authorities to proclaim martial law
in the United States, asserts Reynolds. She defines martial law as the
"federal authority taking over for local authority when they are
unable to maintain law and order or to assure a republican form of
government."
A report called "Post Attack Recovery Strategies," about rebuilding
the country after a nuclear war, prepared by the right-wing Hudson
Institute in 1980, defines martial law as dealing "with the control of
civilians by their own military forces in time of emergency."
The federal agency with the authority to organize and command the
government's response to a national emergency is the Federal Emergency
Management Agency (FEMA). This super-secret and elite agency was
formed in 1979 under congressional measures that merged all federal
powers dealing with civilian and military emergencies under one
agency.
FEMA has its roots in the World War I partnership between government
and corporate leaders who helped mobilize the nation's industries to
support the war effort. The idea of a central national response to
large-scale emergencies was reintroduced in the early 1970s by Louis
Giuffrida, a close associate of then-California Gov. Ronald Reagan and
his chief aide Edwin Meese.
Reagan appointed Giuffrida head of the California National Guard in
1969. With Meese, Giuffrida organized "war-games" to prepare for
"statewide martial law" in the event that Black nationalists and
anti-war protesters "challenged the authority of the state." In 1981,
Reagan as president moved Giuffrida up to the big leagues, appointing
him director of FEMA.
According to Reynolds, however, it was the actions of George Bush in
1976, while he was the director of the Central Intelligence Agency
(CIA), that provided the stimulus for centralization of vast powers in
FEMA.
Bush assembled a group of hawkish outsiders, called Team B, that
released a report claiming the CIA ("Team A") had underestimated the
dangers of Soviet nuclear attack. The report advised the development
of elaborate plans for "civil defense" and post-nuclear government.
Three years later, in 1979, FEMA was given ultimate responsibility for
developing these plans.
Aware of the bad publicity FEMA was getting because of its role in
organizing for a post-nuclear world, Reagan's FEMA chief Giuffrida
publicly argued that the 1865 Posse Comitatus Act prohibited the
military from arresting civilians.
However, Reynolds says that Congress eroded the act by giving the
military reserves an exemption from Posse Comitatus and allowing them
to arrest civilians. The National Guard, under the control of state
governors in peace time, is also exempt from the act and can arrest
civilians.
FEMA Inspector General John Brinkerhoff has written a memo contending
that the government doesn't need to suspend the Constitution to use
the full range of powers Congress has given the agency. FEMA has
prepared legislation to be introduced in Congress in the event of a
national emergency that would give the agency sweeping powers. The
right to "deputize" National Guard and police forces is included in
the package. But Reynolds believes that actual martial law need not be
declared publicly.
Giuffrida has written that "Martial Rule comes into existence upon a
determination (not a declaration) by the senior military commander
that the civil government must be replaced because it is no longer
functioning anyway." He adds that "Martial Rule is limited only by the
principle of necessary force."
According to Reynolds, it is possible for the president to make
declarations concerning a national emergency secretly in the form of a
Natioanl Security Decision Directive. Most such directives are
classified as so secret that Reynolds says "researchers don't even
know how many are enacted."
DOMESTIC SPYING
Throughout the 1980s, FEMA was prohibited from engaging in
intelligence gathering. But on July 6, 1989, Bush signed Executive
Order 12681, pronouncing that FEMA's National Preparedness Directorate
would "have as a primary function intelligence, counterintelligence,
investigative, or national security work." Recent events indicate that
domestic spying in response to the looming Middle East war is now
under way.
Reynolds reports that "the CIA is going to various campuses asking for
information on Middle Eastern students. I'm sure that there are
intelligence organizations monitoring peace demonstrations."
According to the University of Connecticut student paper, the Daily
Campus, CIA officials have recently met there to discuss talking with
Middle Eastern students.
The New York Times reports that the FBI has ordered its agents around
the country to question Arab-American leaders and business people in
search of information on potential Iraqi "terrorist" attacks in
response to a Gulf war.
A 1986 Immigration and Naturalization Service (INS) document entitled
"Alien Terrorists and Other Undesirables: A Contingency Plan" outlines
the potential round-up and incarceration in mass detainment camps of
U.S. residents who are citizens of "terrorist" countries, chiefly in
the Middle East. This plan echoed a 1984 FEMA nationwide "readiness
exercise code-named REX-84 ALPHA, which included the rehearsal of
joint operations with the INS to round up 40,000 Central American
refugees in the event of a U.S. invasion of the region. One of the 10
military bases established as detainment camps by REX-84 ALPHA, Camp
Krome, Fla., was designated a joint FEMA-Immigration service
interrogation center.
Recently, FEMA has been criticized in the media for inadequate
response to the October, 1989 San Francisco earthquake. What the
mainstream press has failed to cover is the agency's planned role in
repressing domestic dissent in the event of an invasion abroad.
Source: The Guardian, Jan 16 1991
The Guardian is an independent radical news weekly. Subscriptions are
available at $33.50 per year from The Guardian, 33 West 17th St., New
York, NY 10011
----------------------------END:REF4------------------------------------
########################################################################
----------------------------REF5:NSDD 145-------------------------------
DATE OF UPLOAD: November 17, 1989
ORIGIN OF UPLOAD: Omni Magazine
CONTRIBUTED BY: Donald Goldberg
========================================================
PARANET INFORMATION SERVICE BBS
========================================================
Although this article does not deal directly with UFOs,
ParaNet felt it important as an offering to our readers who
depend so much upon communications as a way to stay informed.
This article raises some interesting implications for the future
of communications.
THE NATIONAL GUARDS
(C) 1987 OMNI MAGAZINE MAY 1987
(Reprinted with permission and license to ParaNet Information
Service and its affiliates.)
By Donald Goldberg
The mountains bend as the fjord and the sea beyond stretch
out before the viewer's eyes. First over the water, then a sharp
left turn, then a bank to the right between the peaks, and the
secret naval base unfolds upon the screen.
The scene is of a Soviet military installation on the Kola
Peninsula in the icy Barents Sea, a place usually off-limits to
the gaze of the Western world. It was captured by a small French
satellite called SPOT Image, orbiting at an altitude of 517 miles
above the hidden Russian outpost. On each of several passes --
made over a two-week period last fall -- the satellite's high-
resolution lens took its pictures at a different angle; the
images were then blended into a three-dimensional, computer-
generated video. Buildings, docks, vessels, and details of the
Artic landscape are all clearly visible.
Half a world away and thousands of feet under the sea,
sparkling-clear images are being made of the ocean floor. Using
the latest bathymetric technology and state-of-the-art systems
known as Seam Beam and Hydrochart, researchers are for the first
time assembling detailed underwater maps of the continental
shelves and the depths of the world's oceans. These scenes of
the sea are as sophisticated as the photographs taken from the
satellite.
From the three-dimensional images taken far above the earth
to the charts of the bottom of the oceans, these photographic
systems have three things in common: They both rely on the
latest technology to create accurate pictures never dreamed of
even 25 years ago; they are being made widely available by
commerical, nongovernmental enterprises; and the Pentagon is
trying desperately to keep them from the general public.
In 1985 the Navy classified the underwater charts, making
them available only to approved researchers whose needs are
evaluated on a case-by-case basis. Under a 1984 law the military
has been given a say in what cameras can be licensed to be used
on American satellites; and officials have already announced they
plan to limit the quality and resolution of photos made
available. The National Security Agency (NSA) -- the secret arm
of the Pentagon in charge of gathering electronic intelligence as
well as protecting sensitive U.S. communications -- has defeated
a move to keep it away from civilian and commercial computers and
databases.
That attitude has outraged those concerned with the
military's increasing efforts to keep information not only from
the public but from industry experts, scientists, and even other
government officials as well. "That's like classifying a road
map for fear of invasion," says Paul Wolff, assistant
administrator for the National Oceanic and Atmospheric
Administration, of the attempted restrictions.
These attempts to keep unclassified data out of the hands of
scientists, researchers, the news media, and the public at large
are a part of an alarming trend that has seen the military take
an ever-increasing role in controlling the flow of information
and communications through American society, a role traditionally
-- and almost exclusively -- left to civilians. Under the
approving gaze of the Reagan administration, Department of
Defense (DoD) officials have quietly implemented a number of
policies, decisions, and orders that give the military
unprecedented control over both the content and public use of
data and communications. For example:
**The Pentagon has created a new category of "sensitive" but
unclassified information that allows it to keep from public
access huge quantities of data that were once widely accessible.
**Defense Department officials have attempted to rewrite key laws
that spell out when the president can and cannot appropriate
private communications facilities.
**The Pentagon has installed a system that enables it to seize
control of the nation's entire communications network -- the
phone system, data transmissions, and satellite transmissions of
all kinds -- in the event of what it deems a "national
emergency." As yet there is no single, universally agreed-upon
definition of what constitutes such a state. Usually such an
emergency is restricted to times of natural disaster, war, or
when national security is specifically threatened. Now the
military has attempted to redefine emergency.
The point man in the Pentagon's onslaught on communications
is Assistant Defense Secretary Donald C. Latham, a former NSA
deputy chief. Latham now heads up an interagency committee in
charge of writing and implementing many of the policies that have
put the military in charge of the flow of civilian information
and communication. He is also the architect of National Security
Decision Directive 145 (NSDD 145), signed by Defense Secretary
Caspar Weinberger in 1984, which sets out the national policy on
telecommunications and computer-systems security.
First NSDD 145 set up a steering group of top-level
administration officials. Their job is to recommend ways to
protect information that is unclassified but has been designated
sensitive. Such information is held not only by government
agencies but by private companies as well. And last October the
steering group issued a memorandum that defined sensitive
information and gave federal agencies broad new powers to keep it
from the public.
According to Latham, this new category includes such data as
all medical records on government databases -- from the files of
the National Cancer Institute to information on every veteran who
has ever applied for medical aid from the Veterans Administration
-- and all the information on corporate and personal taxpayers in
the Internal Revenue Service's computers. Even agricultural
statistics, he argues, can be used by a foreign power against the
United States.
In his oversize yet Spartan Pentagon office, Latham cuts
anything but an intimidating figure. Articulate and friendly, he
could pass for a network anchorman or a television game show
host. When asked how the government's new definition of
sensitive information will be used, he defends the necessity for
it and tries to put to rest concerns about a new restrictiveness.
"The debate that somehow the DoD and NSA are going to
monitor or get into private databases isn't the case at all,"
Latham insists. "The definition is just a guideline, just an
advisory. It does not give the DoD the right to go into private
records."
Yet the Defense Department invoked the NSDD 145 guidelines
when it told the information industry it intends to restrict the
sale of data that are now unclassified and publicly available
from privately owned computer systems. The excuse if offered was
that these data often include technical information that might be
valuable to a foreign adversary like the Soviet Union.
Mead Data Central -- which runs some of the nation's largest
computer databases, such as Lexis and Nexis, and has nearly
200,000 users -- says it has already been approached by a team of
agents from the Air Force and officials from the CIA and the FBI
who asked for the names of subscribers and inquired what Mead
officials might do if information restrictions were imposed. In
response to government pressure, Mead Data Central in effect
censured itself. It purged all unclassified government-supplied
technical data from its system and completely dropped the
National Technical Information System from its database rather
than risk a confrontation.
Representative Jack Brooks, a Texas Democrat who chairs the
House Government Operations Committee, is an outspoken critic of
the NSA's role in restricting civilian information. He notes
that in 1985 the NSA -- under the authority granted by NSDD 145
-- investigated a computer program that was widely used in both
local and federal elections in 1984. The computer system was
used to count more than one third of all votes cast in the United
States. While probing the system's vulnerability to outside
manipulation, the NSA obtained a detailed knowledge of that
computer program. "In my view," Brooks says, "this is an
unprecedented and ill-advised expansion of the military's
influence in our society."
There are other NSA critics. "The computer systems used by
counties to collect and process votes have nothing to do with
national security, and I'm really concerned about the NSA's
involvement," says Democratic congressman Dan Glickman of Kansas,
chairman of the House science and technology subcommittee
concerned with computer security.
Also, under NSDD 145 the Pentagon has issued an order,
virtually unknown to all but a few industry executives, that
affects commercial communications satellites. The policy was
made official by Defense Secretary Weinberger in June of 1985 and
requires that all commercial satellite operators that carry such
unclassified government data traffic as routine Pentagon supply
information and payroll data (and that compete for lucrative
government contracts) install costly protective systems on all
satellites launched after 1990. The policy does not directly
affect the data over satellite channels, but it does make the NSA
privy to vital information about the essential signals needed to
operate a satellite. With this information it could take control
of any satellite it chooses.
Latham insists this, too, is a voluntary policy and that
only companies that wish to install protection will have their
systems evaluated by the NSA. He also says industry officials
are wholly behind the move, and argues that the protective
systems are necessary. With just a few thousand dollars' worth
of equipment, a disgruntled employee could interfere with a
satellite's control signals and disable or even wipe out a
hundred-million-dollar satellite carrying government information.
At best, his comments are misleading. First, the policy is
not voluntary. The NSA can cut off lucrative government
contracts to companies that do not comply with the plan. The
Pentagon alone spent more than a billion dollars leasing
commercial satellite channels last year; that's a powerful
incentive for business to cooperate.
Second, the industry's support is anything but total.
According to the minutes of one closed-door meeting between NSA
officials -- along with representatives of other federal agencies
-- and executives from AT&amp;T, Comsat, GTE Sprint, and MCI, the
executives neither supported the move nor believed it was
necessary. The NSA defended the policy by arguing that a
satellite could be held for ransom if the command and control
links weren't protected. But experts at the meeting were
skeptical.
"Why is the threat limited to accessing the satellite rather
than destroying it with lasers or high-powered signals?" one
industry executive wanted to know.
Most of the officials present objected to the high cost of
protecting the satellites. According to a 1983 study made at the
request of the Pentagon, the protection demanded by the NSA could
add as much as $3 million to the price of a satellite and $1
million more to annual operating costs. Costs like these, they
argue, could cripple a company competing against less expensive
communications networks.
Americans get much of their information through forms of
electronic communications, from the telephone, television and
radio, and information printed in many newspapers. Banks send
important financial data, businesses their spreadsheets, and
stockbrokers their investment portfolios, all over the same
channels, from satellite signals to computer hookups carried on
long distance telephone lines. To make sure that the federal
government helped to promote and protect the efficient use of
this advancing technology, Congress passed the massive
Communications Act of of 1934. It outlined the role and laws of
the communications structure in the United States.
The powers of the president are set out in Section 606 of
that law; basically it states that he has the authority to take
control of any communications facilities that he believes
"essential to the national defense." In the language of the
trade this is known as a 606 emergency.
There have been a number of attempts in recent years by
Defense Department officials to redefine what qualifies as a 606
emergency and make it easier for the military to take over
national communications.
In 1981 the Senate considered amendments to the 1934 act
that would allow the president, on Defense Department
recommendation, to require any communications company to provide
services, facilities, or equipment "to promote the national
defense and security or the emergency preparedness of the
nation," even in peacetime and without a declared state of
emergency. The general language had been drafted by Defense
Department officials. (The bill failed to pass the House for
unrelated reasons.)
"I think it is quite clear that they have snuck in there
some powers that are dangerous for us as a company and for the
public at large," said MCI vice president Kenneth Cox before the
Senate vote.
Since President Reagan took office, the Pentagon has stepped
up its efforts to rewrite the definition of national emergency
and give the military expanded powers in the United States. "The
declaration of 'emergency' has always been vague," says one
former administration official who left the government in 1982
after ten years in top policy posts. "Different presidents have
invoked it differently. This administration would declare a
convenient 'emergency.'" In other words, what is a nuisance to
one administration might qualify as a burgeoning crisis to
another. For example, the Reagan administration might decide
that a series of protests on or near military bases constituted a
national emergency.
Should the Pentagon ever be given the green light, its base
for taking over the nation's communications system would be a
nondescript yellow brick building within the maze of high rises,
government buildings, and apartment complexes that make up the
Washington suburb of Arlington, Virginia. Headquartered in a
dusty and aging structure surrounded by a barbed-wire fence is an
obscure branch of the military known as the Defense
Communications Agency (DCA). It does not have the spit and
polish of the National Security Agency or the dozens of other
government facilities that make up the nation's capital. But its
lack of shine belies its critical mission: to make sure all of
America's far-flung military units can communicate with one
another. It is in certain ways the nerve center of our nation's
defense system.
On the second floor of the DCA's four-story headquarters is
a new addition called the National Coordinating Center (NCC).
Operated by the Pentagon, it is virtually unknown outside of a
handful of industry and government officials. The NCC is staffed
around the clock by representatives of a dozen of the nation's
largest commercial communications companies -- the so-called
"common carriers" -- including AT&amp;T, MCI, GTE, Comsat, and ITT.
Also on hand are officials from the State Department, the CIA,
the Federal Aviation Administration, and a number of other
federal agencies. During a 606 emergency the Pentagon can order
the companies that make up the National Coordinating Center to
turn over their satellite, fiberoptic, and land-line facilities
to the government.
On a long corridor in the front of the building is a series
of offices, each outfitted with a private phone, a telex machine,
and a combination safe. It's known as "logo row" because each
office is occupied by an employee from one of the companies that
staff the NCC and because their corporate logos hand on the wall
outside. Each employee is on permanent standby, ready to
activate his company's system should the Pentagon require it.
The National Coordinating Center's mission is as grand as
its title is obscure: to make available to the Defense
Department all the facilities of the civilian communications
network in this country -- the phone lines, the long-distance
satellite hookups, the data transmission lines -- in times of
national emergency. If war breaks out and communications to a
key military base are cut, the Pentagon wants to make sure that
an alternate link can be set up as fast as possible. Company
employees assigned to the center are on call 24 hours a day; they
wear beepers outside the office, and when on vacation they must
be replaced by qualified colleagues.
The center formally opened on New Year's Day, 1984, the same
day Ma Bell's monopoly over the telephone network of the entire
United States was finally broken. The timing was no coincidence.
Pentagon officials had argued for years along with AT&amp;T against
the divestiture of Ma Bell, on grounds of national security.
Defense Secretary Weinberger personally urged the attorney
general to block the lawsuit that resulted in the breakup, as had
his predecessor, Harold Brown. The reason was that rather than
construct its own communications network, the Pentagon had come
to rely extensively on the phone company. After the breakup the
dependence continued. The Pentagon still used commercial
companies to carry more than 90 percent of its communications
within the continental United States.
The 1984 divestiture put an end to AT&amp;T's monopoly over the
nation's telephone service and increased the Pentagon's obsession
with having its own nerve center. Now the brass had to contend
with several competing companies to acquire phone lines, and
communications was more than a matter of running a line from one
telephone to another. Satellites, microwave towers, fiberoptics,
and other technological breakthroughs never dreamed of by
Alexander Graham Bell were in extensive use, and not just for
phone conversations. Digital data streams for computers flowed
on the same networks.
These facts were not lost on the Defense Department or the
White House. According to documents obtained by Omni, beginning
on December 14, 1982, a number of secret meetings were held
between high-level administration officials and executives of the
commercial communications companies whose employees would later
staff the National Coordinating Center. The meetings, which
continued over the next three years, were held at the White
House, the State Department, the Strategic Air Command (SAC)
headquarters at Offutt Air Force Base in Nebraska, and at the
North American Aerospace Defense Command (NORAD) in Colorado
Springs.
The industry officials attending constituted the National
Security Telecommunications Advisory Committee -- called NSTAC
(pronounced N-stack) -- set up by President Reagan to address
those same problems that worried the Pentagon. It was at these
secret meetings, according to the minutes, that the idea of a
communications watch center for national emergencies -- the NCC
-- was born. Along with it came a whole set of plans that would
allow the military to take over commercial communications
"assets" -- everything from ground stations and satellite dishes
to fiberoptic cables -- across the country.
At a 1983 Federal Communications Commission meeting, a
ranking Defense Department official offered the following
explanation for the founding of the National Coordinating Center:
"We are looking at trying to make communications endurable for a
protracted conflict." The phrase protracted conflict is a
military euphemism for nuclear war.
But could the NCC survive even the first volley in such a
conflict?
Not likely. It's located within a mile of the Pentagon,
itself an obvious early target of a Soviet nuclear barrage (or a
conventional strike, for that matter). And the Kremlin
undoubtedly knows its location and importance, and presumably has
included it on its priority target list. In sum, according to
one Pentagon official, "The NCC itself is not viewed as a
survivable facility."
Furthermore, the NCC's "Implementation Plan," obtained by
Omni, lists four phases of emergencies and how the center should
respond to each. The first, Phase 0, is Peacetime, for which
there would be little to do outside of a handful of routine tasks
and exercises. Phase 1 is Pre Attack, in which alternate NCC
sites are alerted. Phase 2 is Post Attack, in which other NCC
locations are instructed to take over the center's functions.
Phase 3 is known as Last Ditch, and in this phase whatever
facility survives becomes the de facto NCC.
So far there is no alternate National Coordinating Center to
which NCC officials could retreat to survive an attack.
According to NCC deputy director William Belford, no physical
sites have yet been chosen for a substitute NCC, and even whether
the NCC itself will survive a nuclear attack is still under
study.
Of what use is a communications center that is not expected
to outlast even the first shots of a war and has no backup?
The answer appears to be that because of the Pentagon's
concerns about the AT&amp;T divestiture and the disruptive effects it
might have on national security, the NCC was to serve as the
military's peacetime communications center.
The center is a powerful and unprecedented tool to assume
control over the nation's vast communications and information
network. For years the Pentagon has been studying how to take
over the common carriers' facilities. That research was prepared
by NSTAC at the DoD's request and is contained in a series of
internal Pentagon documents obtained by Omni. Collectively this
series is known as the Satellite Survivability Report. Completed
in 1984, it is the only detailed analysis to date of the
vulnerabilities of the commercial satellite network. It was
begun as a way of examining how to protect the network of
communications facilities from attack and how to keep it intact
for the DoD.
A major part of the report also contains an analysis of how
to make commercial satellites "interoperable" with Defense
Department systems. While the report notes that current
technical differences such as varying frequencies make it
difficult for the Pentagon to use commercial satellites, it
recommends ways to resolve those problems. Much of the report is
a veritable blueprint for the government on how to take over
satellites in orbit above the United States. This information,
plus NSDD 145's demand that satellite operators tell the NSA how
their satellites are controlled, guarantees the military ample
knowledge about operating commercial satellites.
The Pentagon now has an unprecedented access to the civilian
communications network: commercial databases, computer networks,
electronic links, telephone lines. All it needs is the legal
authority to use them. Then it could totally dominate the flow
of all information in the United States. As one high-ranking
White House communications official put it: "Whoever controls
communications, controls the country." His remark was made after
our State Department could not communicate directly with our
embassy in Manila during the anti-Marcos revolution last year.
To get through, the State Department had to relay all its
messages through the Philippine government.
Government officials have offered all kinds of scenarios to
justify the National Coordinating Center, the Satellite
Survivability Report, new domains of authority for the Pentagon
and the NSA, and the creation of top-level government steering
groups to think of even more policies for the military. Most can
be reduced to the rationale that inspired NSDD 145: that our
enemies (presumably the Soviets) have to be prevented from
getting too much information from unclassified sources. And the
only way to do that is to step in and take control of those
sources.
Remarkably, the communications industry as a whole has not
been concerned about the overall scope of the Pentagon's threat
to its freedom of operation. Most protests have been to
individual government actions. For example, a media coalition
that includes the Radio-Television Society of Newspaper Editors,
and the Turner Broadcasting System has been lobbying that before
the government can restrict the use of satellites, it must
demonstrate why such restrictions protect against a "threat to
distinct and compelling national security and foreign policy
interests." But the whole policy of restrictiveness has not been
examined. That may change sometime this year, when the Office of
Technology Assessment issues a report on how the Pentagon's
policy will affect communications in the United States. In the
meantime the military keeps trying to encroach on national
communications.
While it may seem unlikely that the Pentagon will ever get
total control of our information and communications systems, the
truth is that it can happen all too easily. The official
mechanisms are already in place; and few barriers remain to
guarantee that what we hear, see, and read will come to us
courtesy of our being members of a free and open society and not
courtesy of the Pentagon.
=================================================================
Psi-Tech and alien brain-wave research -- Whats going on at Los Alamos?
</p></xml>

95
regexConsp/femabust.xml Normal file
View File

@ -0,0 +1,95 @@
<xml><p>
-------------------------------------------------------------------------------</p>
<p> HELP BUNGLED AND DISORGANIZED</p>
<p> By Martin Mann and George Nicholas
Exclusive to The SPOTLIGHT</p>
<p>Washington, DC -- One after another, two violent, cataclysmic disasters
struck the United States in the fall of 1989. Hurricane Hugo roared
through the Virgin Islands, Puerto Rico and the Carolinas in September.
Within weeks, northern California was shaken by the Loma Prieta earthquake
that left hundreds of thousands of victims and billions of dollars in
damage in its wake.</p>
<p> Having spent "over $25 billion on setting up FEMA," American taxpayers
were entitled to expect "quick and efficient help" from it in the face of
such shattering calamities. But the response by the Federal Emergency
Management Agency (FEMA) to these upheavals was "bungled" and
"disorganized," says Ray Groover, who reported on the hurricane for a San
Juan, Puerto Rico, newspaper and is now studying for a graduate degree in
journalism at Columbia University in New York.</p>
<p> Since the Disaster Relief Act of 1988, FEMA has been responsible for
coordinating the "[disaster] preparedness, response and recovery actions of
state and local governments." Unable to live up to these responsibilities
during the 1989 crisis, the agency drew sharp criticism from the press and
from Congress, whose leaders assigned the General Accounting Office (GAO)
to conduct the first-ever detailed investigation of FEMA.</p>
<p> For a year, GAO field examiners interviewed hundreds of disaster
victims, state and local relief workers, journalists and other witnesses.
The agency has assembled a 71-page report on U.S. relief operations.</p>
<p> WATCHDOG AGENCY RATES FEMA</p>
<p> Having obtained an advance copy of that survey, a team of SPOTLIGHT
reporters found that the congressional watchdog agency rated FEMA's ability
to deal with natural disasters as being "inefficient," "weak" and
"dilatory."</p>
<p> Noting that "emergency management includes three phases:
preparedness, response and recovery," GAO probers warned that FEMA failed
to operate "as efficiently as possible" in all these areas.</p>
<p> There was evidence of "inadequate planning ... inadequate or no
standard operating procedures ... [and a] lack of coordination" wherever
FEMA's bureaucrats intervened, the GAO report concluded. Among the results
of these botched relief attempts were "delays in providing disaster
assistance and duplicate payments for some [of FEMA's] activities," the
congressional overseers discovered.</p>
<p> One example of FEMA's failure cited by the GAO survey team involved
4,000 low-income units wholly destroyed in California's devastating October
1989 earthquake. "Thirteen months later, only 114 units had been processed
and approved for [rehabilitation] funding," the report reveals. Similarly,
10 months after Hurricane Hugo, most of the families left homeless "had not
yet been provided with housing assistance from FEMA."</p>
<p> DIRECTORS SHELL GAME</p>
<p> Warned that the GAO report will expose FEMA as incompetent and
wasteful, President George Bush fired agency Director Julius Becton, an
elderly three-star general, whose principal qualifications for flag rank
was Henry Kissinger's wish to promote "minority" officers, Defense
Department sources say.</p>
<p> Becton was replace by Wallace Stickney, a former New Hampshire state
official whose colorless and low-profile reputation is expected to dampen
the fireworks the GAO report might otherwise touch off about the inadequacy
of federal relief operations.</p>
<p> But simply shifting directors "does not answer the real question: If
[FEMA officials] seem uninterested and negligent when it comes to disaster
response, what are FEMA's thousands of bureaucrats working on?" asked
Groover.</p>
<p> The answer, a SPOTLIGHT investigation has found, is that FEMA's
leadership is developing programs that will not merely "[ensure] the
continuity of the federal government in any national emergency-type
situation," as decreed by President Gerald Ford in Executive Order 11921,
but REPLACE the nation's Constitutional statecraft with a centralized
"command system."</p>
<p>-----------------</p>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
Washington, DC 20003</p>
<p></p></xml>

68
regexConsp/feverf.xml Normal file
View File

@ -0,0 +1,68 @@
<xml><p>FEVERFEW: A HERBAL REMEDY FOR MIGRAINE?
"Some of the world's most effective medicines began their
careers as herbal remedies: digitalis came from foxglove, aspirin
from willow bark, and morphine from poppy blossoms. Potentially
the newest plant to cross over from folklore to mainstream
treatment is a member of the chyrsanthemum family known as common
feverfew or, botanically, Tanacetum parthenium.
"The name 'feverfew' indicates the belief, dating from the
middle ages, that the herb was a good treatment for fever and
certain other ailments, including arthritis, psoriasis, and
headaches. In modern England, eating feverfew leaves has become
a familiar method for prevention migraine attacks, and there is
now some reason to think that the folklore about feverfew has a
grain or two of truth to it. Some people for whom the usual
migraine treatments have not been very effective have turned to
feverfew. The typical users eats 1-4 fresh leaves a day. Food
is usually taken at the same time to mask the leaves' bitter
taste. Tablets and capsules containing dried feverfew have also
begun to appear in...health food store shelves.
"To evaluate the remedy, a group of British researchers
designed a controlled study. However, they did not feel free to
give feverfew to people who had never taken it, because the agent
has not gone through animal studies, as is appropriate before a
drug is tested in people. But they hit on a human test of
feverfew that was both rigorous and ethical. Many of the
patients seen in the City of London Migraine Clinic had already
been dosing themselves with feverfew for long periods of time as
a way to reduce migraine attacks. So, instead of setting up a
test in which the drug was GIVEN to subjects, investigators from
the clinic set up a test in which feverfew was TAKEN AWAY.
"The doctors identified patients who were dosing themselves
with feverfew and asked them to participate in a study. During
the research period, the subjects would take their medication
either as freeze-dried herb or as a placebo (presented in
identical-looking capsules). After a period on one preparation,
they would switch to the other, and then repeat the two stages
again. In this type of "double-blind crossover" test, neither
researcher nor subject is told which treatment is being given.
However, patients easily guessed when they were receiving placebo
because the frequency of headache and nausea virtually tripled,
and severity also increased markedly. These results support the
claim that a daily dose of something contained in feverfew may be
effective in preventing migraine attacks.
"The people studied had no serious ill effects while taking
feverfew, but that was to be expected, as they had been taking
the herb for some time. People who had tried the plaint and then
quit because they couldn't tolerate would have been excluded from
this study. Feverfew is capable of producing rather marked
allergic reactions; some people who try it develop sores in the
mouth or, less commonly, a generalized inflammation of the mouth
and tongue.
This first test of the effectiveness of feverfew must be
regarded as preliminary. It will no doubt lead to more thorough
testing, as it should. Even if feverfew pans out as preventive
medicine for migraine, it probably will not prove to be the
'answer.' But it may join the growing list of effective
treatments for a very unpleasant disorder."
Quoted from the April 1986 edition of the Harvard Medical
School Health Letter, reporting on research appearing in the
British Medical Journal, August 31, 1985.
</p></xml>

201
regexConsp/fgn-plcy.xml Normal file
View File

@ -0,0 +1,201 @@
<xml><p>FOREIGN POLICY AND FOREIGN WARS</p>
<p>By RICHARD M. EBELING</p>
<p>When the Founding Fathers wrote and then defended the case for
passage of the Constitution in 1787-1788, they did so with a
strong belief in the natural rights of man, rights that Thomas
Jefferson had so eloquently expressed in the Declaration of
Independence in 1776. But their idealism was tempered with
stark realism, based on historical knowledge and personal
experience, about both human nature and the nature of
governments.</p>
<p>The separation of legislative, executive and judicial powers
was considered essential if the human inclination toward
political abuse of power was to be prevented. "No political
truth is certainly of greater intrinsic value, or is stamped
with the authority of more enlightened patrons of liberty,"
stated James Madison in The Federalist Papers, "than that
. . . [t]he accumulation of all power, legislative, executive
and judiciary, in the same hands, whether of one, a few, or
many, and whether hereditary, self-appointed, or elective, may
justly be pronounced the very definition of tyranny."</p>
<p>Division of power and responsibilities, therefore, was seen as
an essential--though neither a perfect nor guaranteed--tool to
assure that the freedom and property of individuals would not
become political plunder to be devoured by either majorities
or minorities.</p>
<p>Issues concerning war and peace and individual liberty were of
deep concern to the Founding Fathers for the same reason. When
the matter came up at the convention as to which branch of
government would have the authority to "make war,"
disagreement arose. Pierce Butler of South Carolina wanted
that power to reside in the President who, he said, "will have
all the requisite qualities." James Madison and Elbridge Gerry
of Massachusetts were for "leaving to the Executive the power
to repel sudden attacks" but proposed changing the wording to
"declare" rather than "make war," and then only with the
approval of both Houses of Congress. Oliver Ellsworth of
Connecticut agreed, saying that "It should be more easy to get
out of war than into it." And George Mason of Virginia also
was "against giving the power of war to the Executive, because
[he was] not safely to be trusted with it." Mason "was for
clogging rather than facilitating war."</p>
<p>Thus, in the final, ratified Constitution, the Congress, in
Article I, Section 8, was given the sole authority, "To
Declare War," while the President, in Article II, Section 2,
was made "Commander in Chief of the Army and Navy of the
United States, and the Militia of the several States, when
called into the actual service of the United States." Civilian
authority over the military was established, with
Constitutionally divided power over its application in war:
Congress declared war, and the President oversaw its
execution.</p>
<p>The Founding Fathers possessed no misconceptions about the
potentially aggressive nature of governments toward their
neighbors. John Jay, in The Federalist Papers, insightfully
enumerated the various motives, rationales and passions that
had led nations down the road to war through the ages.</p>
<p>But neither did they have any illusions that Americans could
be any less susceptible to similar motives and passions. The
Constitution, through a division of powers, was meant to put
procedural hurdles and delays in the way before the passions
of the moment could result in declarations of war and the
initiation of hostilities against other nations.</p>
<p>Yet, in spite of these Constitutional restraints, the United
States has participated in four foreign wars in the 20th
century--two World Wars, the Korean "police action" and the
Vietnam conflict--and in three of these, the United States was
neither directly attacked nor threatened by a foreign enemy.
Why, then, did we intervene?</p>
<p>The answer lies in the ideology of the welfare state. First in
the years preceding World War I, and then again in the 1930s,
American intellectuals and politicians undertook grand
experiments in social engineering. The Progressive Era of
Theodore Roosevelt and Woodrow Wilson, and the New Deal days
of Franklin D. Roosevelt, were the crucial decades for the
implementation of the politics of government intervention and
economic regulation. It was the duty and responsibility of the
state to manage, oversee and control the social and economic
affairs of the citizenry.</p>
<p>The social engineers believed that people left alone to manage
their own affairs invariably went astray, with the result
being poverty, economic exploitation and social decay.
Enlightened leadership, under wise government, would provide
the population with the economic prosperity and social harmony
that the governmental policy-makers knew, in their hearts,
that they had the knowledge and expertise to provide. The
good wanted state power so they could benefit their fellow
men.</p>
<p>And what was good for Americans at home, surely would be no
less beneficial for the masses of people across the oceans.
Was not Europe a caldron of political intrigue and corruption?
Were not the people of Asia, Africa and Latin America
suffering in squalor and ignorance, the victims of tribal
despots and imperialist exploitors--easy prey to that even
greater threat of communist propaganda and revolution?</p>
<p>America's first crusade was in 1917, when Woodrow Wilson,
insisting that the United States had the moral duty to take
the lead and "make the world safe for democracy," had asked
for, and got, a declaration of war from Congress. Americans,
however, were repulsed in the years following World War I,
when instead of democracy, they saw that all that came out of
our participation in that noble crusade had been communism in
Russia, fascism in Italy, Nazism in Germany and imperialist
spoils for the victorious European allies.</p>
<p>But World War II seemed to offer the opportunity for a second
chance. The American "arsenal of democracy" would free the
world of Hitler and Imperial Japan and then pursue an
international course of permanent foreign intervention to
create "a better world." What the world got was the Cold War,
with the Soviet Union gaining an Eastern European empire, and
with China being lost behind what became known as the
communist "Bamboo Curtain."</p>
<p>America's rewards were global commitments that required
hundreds of thousands of American soldiers permanently
stationed in Europe; two bloody wars in Asia that cost the
lives of over a hundred thousand Americans; a huge defense
budget that siphoned off hundreds of billions of dollars from
the private sector for four decades; and even more tens of
billions of dollars in military and foreign aid to any
government, in any part of the world, no matter how corrupt,
just as long as it declared itself "anti-communist." And as
one of the founders of Human Events, Felix Morley, pointed out
in his book, Freedom and Federalism, in the heyday of
Keynesian economics in the 1950s and 1960s, defense spending
became a tool for "priming the pump" and guaranteeing "full
employment" through government expenditures.</p>
<p>But communism is now dying under the weight of its own
political corruption and economic failures. And the European
and Asian countries that benefited from decades of being on
the American defense and foreign aid dole have decided they
want to grow up and manage their own affairs.</p>
<p>But rather than be delighted that the Cold War Welfare State
can finally be ended, American political and foreign policy
makers are petrified. The global social engineers in
Washington are suddenly faced with a world that doesn't want
to be under the tutelage of American paternalism and
dominance. They are busy scrambling for some way to "keep
America in Europe," maintain Washington's political control
and influence over international affairs and guarantee that
America will remain "in harm's way," potentially drawn into
numerous controversies and conflicts around the world.</p>
<p>If it is undesirable for the United States government to
intervene in the economic and social affairs of its citizenry
--as the advocate of individual freedom steadfastly believes
--then it is equally undesirable for the United States
government to intervene in the internal affairs of other
nations, or the conflicts that sometimes arise among nations.</p>
<p>The first duty of the American government is to protect the
life, liberty and property of the citizens of the United
States from foreign aggressors. Once a government sets itself
the task of trying to rectify the errors and choices of its
own citizens, it soon begins sliding down a slippery slope in
which the end result is state supervision and regulation of
all of its citizens' activities, and all in the name of a
higher "social good."</p>
<p>Just as our neighbors often do things of which we do not
approve, or which we do not consider good or wise, so do other
nations. But to follow the path of attempting to set the world
straight can lead to nothing but perpetual intervention and
war in the name of world peace and global welfare. And these
have been precisely the results of America's global crusade to
save the world since 1945.</p>
<p>The end of communism, and the economic growth of Europe and
Asia, give us a new opportunity to foreswear the global
welfare state, free ourselves from foreign political and
military entanglements, and follow George Washington's wise
advice of free commercial relationships with all, but foreign
alliances and intrigues with none.</p>
<p>Professor Ebeling is the Ludwig von Mises Professor of
Economics at Hillsdale College, Hillsdale, Michigan, and also
serves as vice-president of academic affairs of The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the November 1990 issue of FREEDOM DAILY,
Copyright (c) 1990, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.
</p></xml>

595
regexConsp/foia.xml Normal file
View File

@ -0,0 +1,595 @@
<xml><p>FOIA FILES KIT - INSTRUCTIONS</p>
<p>USING THE FREEDOM OF INFORMATION ACT
REVISED EDITION
Fund for Open Information and Accountability, Inc.
339 Lafayette Street, New York, NY 10012
(212) 477-3188</p>
<p>INSTRUCTIONS</p>
<p> The Freedom of Information Act entitles you to request any
record maintained by a federal Executive branch agency. The
agency must release the requested matieral unless it falls into
one of nine exempt categores, such as "national security,"
"privacy," "confidential source" and the like, in which case the
agency may but is not compelled to refuse to disclose the
records.
This kit contains all the material needed to make FOIA
requests for records on an individual, an orgnaization or on a
particular subject matter or event.</p>
<p>HOW TO MAKE A COMPLETE REQUEST</p>
<p> Step 1: Select the appropriate smaple letter. Fill in the
blanks in the body of the letter. Read the directions printed to
the right of each letter in conjunction with the following
instructions:
For organizational files: In the first blank space insert
the full and formal name of the organization whose files you are
requesting. In the second blank space insert any other names,
acronyms or shortened forms by which the organization is or has
ever been known or referred to by itself or others. If some of
the organization's work is conducted by sub-groups such as clubs,
committees, special programs or through coalitions known by other
names, these should be listed.
For individual files: Insert the person's full name in the
first blank space and any vaiations in spelling, nicknames, stage
names, marriage names, titles and the like in the second blank
space. Unlike other requests, the signatures of an individual
requesting her/his own file must be notarized.
For subject matter or event files: In the first blank space
state the formal title of the subject matter or event including
relevant dates and locations. In the second blank space provide
the names of individuals or group sponsors or participants and/or
any other information that would assist the agency in locating
the material you are requesting.
Step 2: The completed sample letter may be removed,
photocopies and mailed as is or retyped on your own stationary.
Be sure to keep a copy of each letter.
Step 3: Addressing the letters: Consult list of agency
addresses.
FBI: A complete request requires a minimum of two letters.
Sen done letter to FBI Headquarters and separate letter to each
FBI field office nearest the location of the individual, the
organization or the subject matter/event. Consdier the location
of residences, schools, work and other activities.
INS: Send a request letter to each district office nearest
the location of the individual, the organization or the subject
matter/event.
Address each letter to the FOIA/PA office of the appropraite
agency. Be sure to make clearly on the envelope: ATTENTION--FOIA
REQUEST.</p>
<p>FEE WAIVER</p>
<p> You will notice that the sample letters include a request
for fee waiver. Many agencies automatically waive fees if a
request results in the release of only a small number of
documents, e.g. 250 pages or less. Under the Act, you are
entitled to a waiver of all search and copy fees associated with
your request if the release of the information would primarily
benefit the general public. However, in January 1983, the Justice
Department issued a memo to all federal agencies listing five
criteria which requesters must meet before they are deemed
entitled to a fee waiver. Under these criteria, a requester must
show that the material sought to be released is already the
subject of "genuine public interest" and "meaningfully
contributes to the public development or understanding of the
subject"; and that she/he has the qualifications to understand
and evaluate the materials and the ability to interpret and
disseminate the information to th epublic and is not motivated by
any "personal interest." Finally, if the requested information is
already "in the public domain," such as in the agency's reading
room, no fee waiver will be granted.
You should always request a waiver of fees if you believe
the information you are seeking will benefit the public. If your
request for a waiver is denied, you should appeal that denial,
citing the ways in which your request meets the standards set out
above.</p>
<p>MONITORING THE PROGRESS OF YOUR REQUEST</p>
<p> Customarily, you will receive a letter from each agency
within 10 days stating that your request has been received and is
being processed. You may be asked to be patient and told that
requests are handled cafeteria style. You have no alternative but
to be somewhat patient. but there is no reason to be complacent
and simply sit and wait.
A good strategy is to telephone the FOIA office in each
agency after about a month if nothing of substance has been
received. Ask for a progress report. The name of the person you
talk with and the gist of the converstaion should be recorded.
try to take notes during the conversation focusing especially on
what is said by the agency official. Write down all the details
you can recall after the call is completed. Continue to call
every 4 to 6 weeks.
Good recordkeeping helps avoid time-consuming and
frustrating confusion. A looseleaf notebook with a section
devoted to each request simplifies this task. Intervening
correspondence to and from the agency can be inserted bewteen the
notes on phone calls so that all relevant material will be at
hand for the various tasks: phone consultations, writing the
newsletter, correspondence, articles, preparation for media
appearances, congressional testimony or litigation, if that
course is adopted.</p>
<p>HOW TO MAKE SURE YOU GET EVERYTHING YOU ARE ENTITLED TO ...
AND WHAT TO DO IF YOU DO NOT</p>
<p> After each agency has searched and processed your request,
you will receive a letter that announces the outcome, encloses
the released documents, if any, and explains where to direct an
appeal if any material has been withheld. There are four possible
outcomes:
1. Request granted in full: This response indicates that
the agency has released all records pertinent to your request,
with no exclusions or withholdings. The documents may be enclosed
or, if bulky, may be mailed under separate cover. This is a very
rare outcome.
Next Step: Check documents for completeness (see
instructions below).
2. Requested granted in part and denied in part: This
response indicates that the agency is releasing some material but
has withheld some documents entirely or excized some passages
from the documents released. The released documents may be
enclosed or, if bulky, mailed under separate cover.
Next step: Check documents released for completeness (see
instructions below) and make an administrative appeal of denials
or incompleteness (see instructions below).
3. Request denied in full: This response indicates that
the agency is asserting that all material in its files pertaining
to your request falls under one or the nine FOIA exemptions.
These are categories of information that the agency may, at its
discretion, refuse to release.
Next step: Make an administrative appeal (see instructions
below). Since FOIA exemptions are not mandatory, even a complete
denial of your request can and should be appeals.
4. No records: This response will state that a search of
the agency's files indicates that it has no records corresponding
to those you requested.
Next step: Check your original request to be sure you have
not overlooked anything. If you receive documents from other
agencies, review them for indications that there is matieral in
teh files of the agency claiming it has none. For example, look
for correspondence, or references to correspondence, to or from
that agency. If you determine that there are reasonable grounds,
file an administrative appeal (see instructions below).</p>
<p>HOW TO CHECK FOR COMPLETENESS</p>
<p> Step 1: Before reading the documents, turn them over and
number the back of each page sequentilaly. The packet may contain
documents from the agency's headquarters as well as several field
office files. Separate the documents into their reqpective office
packets. Each of these offices will have assigned the
investigation a separate file number. Try to find the numbering
system. Usually the lower righthand corner of the first page
carries a hand-written file and document number. For instance, an
FBI document might be marked "100-7142-22". This would indicate
that it is the 22nd document in the 7142nd file in the 100
classification. As you inspect the documents, make a list of
these file numbers and which office they represent. In this way
you will be able to determine which office created and which
office received the document you have in your hand. Often there
is a block stamp affixed with the name of the office from whose
files this copy was retrieved. the "To/From" heading on a
document may also give you corresponding file numbers and will
help you puzzle out the origin of the document.
When you have finally identified eahc document's file and
serial number and separated the documents into their proper
office batches, make a list of all the serial numbers in each
batch to see if there any any missing numbers. If there are
missing serial numbers and some documents have been withheld, try
to determine if teh missing numbers might reasonably correspond
to the withheld documents. If not, the realease may be incomplete
and an administrative appeal should be made.
Step 2: Read all the document released to you. Keep a list
of all document referred to the text--letters, memos, teletypes,
reports, etc. Each of these "referred to" documents should turn
up in the packet released to you. If any are not in the packet,
it is possible they may be among those document withheld; a
direct inquiry should be made. In an administrative appeal, ask
that each of these "referred to" documents be produced or that
the agency state plainly that they are among those withheld. Of
course, the totals of unproduced vs. withheld must be within
reasons; that is, if the total number of unproduced documents you
find referred to the text of the documents produced exceeds the
total number of documents withheld, the agency cannot claim that
all the referred to documents are accounted for by the withheld
categoty. You will soon get the hand of making logical
conclusions from discrepancies in the totals and missing document
numbers.
Another thing to look for when reading the released
documents if the names of persons or agencies to whom the
document has been disseminated. the lower left-hadn corncer is a
common location for the typed list of agencies or offices to whom
the document has been directed. In addition, there may be
additional distribution recorded by hand, there or elsewhere on
the cover page. There are published glossaries for some agencies
that will help in deciphering these notaitons when they are not
clear. Contact FOIA, Inc., if you need assistance in deciphering
the text.
Finally, any other file numbers that appear on the document
should be noted, particularaly in the subject of the file is of
interest and is one you have not requested. You may want to make
an additional request for some of these files.</p>
<p>HOW TO MAKE AN ADMINISTRATIVE APPEAL</p>
<p> Under the FOIA, a dissatified requester has the right of
administrative appeal. the name and address of the proper appeal
office will be given to you by each agency in its final response
letter.
This kit contains a sample appeal letter with suggesting for
adapting it to various circumstances. However, you need not make
such an elaborate appeal; in fact, you need not offer any reasons
at all but rather simply write a letter to the appeals unit
stating that "this letter constitutes an appeal of the agency's
decision." Of course, if you have identified some real
discrepanices, you will want to set them for fully, but even if
you have not found any, you may simply ask that the release be
reviewed.
If you are still dissatisfied after the administrative
appeal process, the FOIA gives you the right to bring a lawsuit
in federal district court on an expedited basis.</p>
<p>SAMPLE FBI REQUEST LETTER</p>
<p>Date:</p>
<p>To: FOIA/PA Unit
Federal Bureau of Investigation</p>
<p> This is a request under the Freedom of Information Act.</p>
<p> I request a complete and thorough search of all filing
systems and locations for all records maintained by your agency
pertaining to and/or captioned: ______
_____________________________________________________
[describe records desired and/or insert full and
_____________________________________________________
formal name]
_____________________________________________________</p>
<p>_____________________________________________________</p>
<p>including, without limitations, files and documents captioned, or
whose captions include</p>
<p>_____________________________________________________
[insert changes in name, commonly used names,
_____________________________________________________
acronyms, sub-groups, and the like]
_____________________________________________________</p>
<p>_____________________________________________________</p>
<p> This request specifically includes "main" files and "see
references," including, but not limited to numbered and lettered
sub files, "DO NOT FILE" files, and control files. I also request
a search of the ELSUR Index,a nd the COINTELPRO Index. I request
that all records be produced with the administrative pges.
I wish to be sent copies of "see reference" cards,
abstracts, serach slips, including search slips used to process
this request, file covers, multiple copies of the same documents
if they appear in a file, and tapes of any electronic
surveillances.
I wish to make it clear that I want all records in you
roffice "identifiable with my request," even though reports on
those records have been sent to Headquarters and even though
there may be duplication between the two sets of fils. I do not
want just "interim" documents. I want all documents as they
appear in the "main" files and "see references" of all units of
your agency.
If documents are denied in whole or in part, please specify
which exemption(s) is(are) claimed for each passage or whole
document denied. Please provide a complete itemized inventory and
a detailed factual justification of total or partial denial of
documents. Give the number of pages in each document and the
total number of pages pertaining to this request. For
"classified" material denied pleae include the following
information: the classification (confidential, secret or top
secret); identity of the classifer; date or event for automatic
declassification, classification review, or down-grading; if
applicable, identity of official authorizing extension of
automatic declassification or review; and if applicable, the
reason for extended classification.
I request that excized material be "blacked out" rather
thatn "whited out" or cut out and that the remaining non-exempt
portions of documents will be released as provided under the
Freedom of Information Act.
Please send a memo (copy to me) to the appropriate units in
your office to assure that no records related to this request are
destroyed. Please advise of any destruction of records and
include the date of and authority for such destruction.
As I expect to appeal any denials, please specify the office
and address to which an appeal should be directed.
I believe my request qualifies for a waiver of fees since
the release of the requested information would primarily benefit
the general public and be "in the public interest."
I can be reached at the phone listed below. Please call
rather than write if there are any questions or if you need
additional information from me.
I expect a response to this request within ten (10) working
days, as provided for in the Freedom of Information Act.</p>
<p>Sincerely,</p>
<p>name: _______________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>telephone: __________________________________________</p>
<p>signature: __________________________________________</p>
<p>SAMPLE AGENCY REQUEST LETTER</p>
<p>DATE:
TO: FOIA/PA Unit</p>
<p> This is a request under the Freedom of Information Act.
I request a complete and thorough search of all filing
systems and locations for all records maintained by your agency
pertaining to and/or captioned
______________________________________________________
[describe records desired and/or insert full and
______________________________________________________
formal name]
______________________________________________________</p>
<p>______________________________________________________</p>
<p>including, without limitation, files and documents captioned, or
whose captions include:</p>
<p>______________________________________________________
[insert changes in name, commonly used names,
______________________________________________________
acronyms, sub-groups and the like]
______________________________________________________</p>
<p>______________________________________________________</p>
<p> I also request all "see references" to these names, a search
of the ELSUR Index or any similar technique for locating records
of electronic surveillance.
This request is also a request for any corresponding files
in INS Headquarters or regional offices.
Please place any "missing" files pertaining to this request
on "special locate" and advise that you have done this.
If documents are denied in part or whole, please specify
which exemption(s) is(are) claimed for each passage or whole
document denied. Please provide a complete itemized inventory and
detialed factual justification of total or partial denial of
documents. Specify the number of pates in each document and th
ttoal number of pages pertaining to this request. For classified
material denied, please include the following information: the
classification rating (confidential, secret, or top secret);
identify the classifier; date or event for automatic
declassification, classification review or downgrading; if
applicable, identify the official authorizing extension of
automatic declassification or reviw; and, if applicable, give the
reason for extended classification.
I request that excised material be "blacked out" rather than
"whited out" or cut out. I expect, as provided by the Freedom of
Information Act, that the remaining non-exempt portions of
documents will be released.
Please send a memo (copy to me) to the appropriate units in
your office or agency to assure that no records related to this
request are destroyed. Please advise of any destruction of
records and include the date of and authority for such
destruction.
As I expect to appeal any denials, please specify the office
and address to which an appeal should be directed.
I believe my request qualifies for a waiver of fees since
the release of the requested information would primarily benefit
the general public and be "in the public interest."
I can be reached at the phone listed below. Please call
rather than write if there are any questions or if you need
additional information from me.
I expect a response to this request within ten (10) working
days, as provided for in the Freedom of Information Act.</p>
<p>Sincerely,</p>
<p>name: _______________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>telephone: (___)_______________________________________</p>
<p>signature: __________________________________________</p>
<p>SAMPLE ADMINISTRATIVE APPEAL LETTER</p>
<p>Date:
To: FOIA/PA Appeals Office
RE: Request numer [Add this if the agency has given your request
a number]
This is an appeal pursuant to subsection (a)(6) of the
Freedom of Information Act as amended (5U.S.C. 552).
On [date], I received a letter from [name of official] of
your agency denying my request for [describe briefly the
information you are after]. This reply indicated that an appeal
letter could be sent to you. I am enclosing a copy of my exchange
of correspondence with your agency so that you can see exactly
what files I have requested and the insubstantial grounds on
which my request has been denied.
[Optional paragraph, to be used if the agency has withheld
all or nearly all the material which has been requested]:
You will note that your agency has withheld the entire (or
nearly the entire) document (or file, or report, or whatever)
that I requested. Since the FOIA provides that "any reasonably
secregable portion of a record shall be provided to any eprson
requesting such record after deletion of the portions which are
exempt," I believe that your agency has not complied with the
FOIA. I believe that there must be (additional) segregble
portions which do not fall wihtin FOIA exemptions and which must
be released.
[Optional paragraph, to be used in the agency has used the
(b)(1) exemption for national security, to withhold information]
Your agency has used the (b)(1) exemption to withhold
information [I question whether files relating to events that
took place over twenty years ago could realistically harm the
national security.] [Because I am familiar with my own activities
during the period in question, and know that none of these
activities in any way posed a significant threat to the national
security, I question the designation of my files or portions of
my file as classified and exempt from disclosure beca8use of
national security considerations.]
[Sample optional argument to be used if the exemption which
is claimed does not seem to make sense; you should cite as many
specific instances as you care to of items withheld from the
documents that you ahve received. We provide two examples which
you might want to adampt to your own case.]
"On the memo dated _____________ the second paragraph
withheld under the (b)(1) exemption appears to be describing a
conversation at an open meeting. If this is the case, it is
impossible that the substance of this converation could be
properly classified." Or, "The memo dated _____ refers to a
meeting which I attended, but a substantial portion is deleted
because of the (b)(6) and (b)(7)(c) exemptions for unwarranted
invasions of personal privacy. Since I already know who attended
this meeting, no privacy interest is served by the withholding."
I trust that upon examination of my request, you will
conclude that the records I requested are not properly covered by
exemption(s) [here repeat the exemptions which the agency's
denial letter claimed applied to your request] of the amended
FOIA, and that you will overrule the decision to withhold the
information.
[Use if an itemized inventory is not supplied originally]
If you choose instead to continue to withhold some or all of
the material which was denied in my initial request to your
agency, I ask that you give me an index of such matieral,
together with the justification for the denial of each item which
is still withheld.
As provided in the Act, I will expect to receive a reply to
this administrative appeal letter within twenty working days.
If you deny this appeal and do not adequately explain why
the material withheld is properly exempt, I intend to initial a
lawsuit to compel its disclosure. [You can say that you intend to
sue, if that is your present inclination; you may still decide
ultimately not to file suit.]</p>
<p>Sincerely yours,</p>
<p>name: ____________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>signature: ___________________________________________</p>
<p>[Mark clearly on envelope: Attention: Freedom of Information
Appeals]</p>
<p>FBI ADDRESSES AND PHONE NUMBERS</p>
<p>FBI Headquarters, J. Edgar Hoover Bldg, Washington, D.C., 20535,
202-324-5520 (FOI/PA Unit)</p>
<p>Field Offices
Albany, NY 12207, U.S. Post Office and Courthouse, 518-465-7551
Albuquerque, NM 87101, Federal Office Bldg., 505-247-1555
Alexandria, VA 22314, 300 N. Lee St., 703-683-2681
Anchorage, AK 99510, Federal bldg., 907-272-6414
Atlanta, GA 30303, 275 Peachtree St. NE, 404-521-3900
Baltimore, MD 21207, 7142 Ambassador Rd., 301-265-8080
Birminghan, AL 35203, Room 1400, 2121 Bldg. 205-252-7705
Boston, MA 02203, J.F. Kennedy Federal Office Bldg., 617-742-5533
Buffalo, NY 14202, 111 W. Huron St., 716-856-7800
Butte, MT 59701, U.S. Courthouse and Federal Bldg., 406-792-2304
Charlotte, NC 28202, Jefferson Standard Life Bldg., 704-372-5485
Chicago, IL 60604, Everett McKinley Dirksen Bldg., 312-431-1333
Cincinnati, OH 45202, 400 U.S. Post Office &amp; Crthse Bldg., 513-421-4310
Cleveland, OH 44199, Federal Office Bldg., 216-522-1401
Columbia, SC 29201, 1529 Hampton St., 803-254-3011
Dallas TX 75201, 1810 Commrce St., 214-741-1851
Denver, CO 80202, Federal Office Bldg., 303-629-7171
Detroit, MI 48226, 477 Michigan Ave., 313-965-2323
El Paso, TX 79901, 202 U.S. Courthosue Bldg., 915-533-7451
Honolulu, HI 96850, 300 Ala Moana Blvd., 808-521-1411
Houston, TX 77002, 6015 Fed. Bldg and U.S.Courthouse, 713-224-1511
Indianapolis, IN 46202, 575 N. Pennsylvania St., 317-639-3301
Jackson, MS 39205, Unifirst Federal and Loan Bldg., 601-948-5000
Jacksonville, FL 32211, 7820 Arlington Expressway, 904-721-1211
Kansas City, MO 64106, 300 U.S. Courthouse Bldg., 816-221-6100
Knoxville, TN 37919, 1111 Northshore Dr., 615-588-8571
Las Vegas, NV 89101, Federal Office Bldg., 702-385-1281
Little Rock, AR 72201, 215 U.S Post Office Bldg., 501-372-7211
Los Angeles, CA 90024, 11000 Wilshire Blvd, 213-272-6161
Louisville, KY 40202, Federal Bldg., 502-583-3941
Memphis, TN 38103, Clifford Davis Federal bldg., 901-525-7373
Miami, FL 33137, 3801 Biscayne Blvd., 305-573-3333
Milwaukee, WI 53202, Federal Bldg and U.S. Courthouse, 414-276-4681
Minneapolis, MN 55401, 392 Federal Bldg., 612-339-7846
Mobile, AL 36602, Federal Bldg., 205-438-3675
Newark, NJ 07101, Gateway I, Market St., 201-622-5613
New Haven, CT 06510, 170 Orange St., 203-777-6311
New Orleans, LA 70113, 701 Loyola Ave., 504-522-4671
New York, NY 10007, 26 Federal Plaza, 212-553-2700
Norfolk, VA, 23502, 870 N. Military Hwy., 804-461-2121
Oklahoma City, OK 73118, 50 Penn Pl. NW, 405-842-7471
Omaha, NB 68102, 215 N. 17th St., 402-348-1210
Philadelpha, PA 19106, Federal Office Bldg., 215-629-0800
Phoenix, AZ 85004, 2721 N. central Ave., 602-279-5511
Pittsburgh, PA 15222, Federal Office Bldg., 412-471-2000
Portland, OR 97201, Crown Plaza Bldg., 503-224-4181
Richmond, VA 23220, 200 W. Grace St., 804-644-2531
Sacramento, CA 95825, Federal Bldg., 916-481-9110
St. Louis, MO 63103, 2704 Federal Bldg., 314-241-5357
Salt Lake City, UT 84138, Federal Bldg., 801-355-7521
San Diego, CA 92188, Federal Office Bldg., 619-231-1122
San Francisco, CA 94102, 450 Golden Gate Ave., 415-552-2155
San Juan, PR 00918 U.S. Courthouse and Fed. Bldg., 809-754-6000
Savannah, GA 31405, 5401 Paulson St., 912-354-9911
Seattle, WA 98174, 915 2nd Ave., 206-622-0460
Springfield, IL 62702, 535 W. Jefferson St., 217-522-9675
Tampa, FL 33602, Federal Office Bldg., 813-228-7661
Washington, DC 20535, 9th and Pennsylvania Ave. NW, 202-324-3000</p>
<p>FEDERAL AGENCIES (SELECTED ADDRESSES)</p>
<p>Central Intelligence Agency
Information and Privacy Coordinator
Central Intelligence Agency
Washington, D.C. 20505
202-351-5659</p>
<p>Civil Service Commission
Appropriate Bureau (Bureau of Personnel Investigation,
Bureau of Personnel Information Systems, etc.)
Civil Service Commission
1900 E Street, N.W.
Washington, D.C. 20415
202-632-4431</p>
<p>Commission on Civil Rights
General Counsel, U.S. Commission on Civil Rights
1121 Vermont Ae., N.W. Room 600
Washington, D.C. 20415
202-254-6610</p>
<p>Consumer Product Safety Commission
Office of the Secretary
Consumer Product Safety Commission
1111 18th St., N.W.
Washington, D.C. 20207
202-624-7700</p>
<p>Department of Defense/Dept. of Air Force
Freedom of Information Manager
Headquarters, USAF/DADF
Washington, D.C. 20330-5025
202-697-3467
</p></xml>

1522
regexConsp/forg0int.xml Normal file

File diff suppressed because it is too large Load Diff

2041
regexConsp/forg1.xml Normal file

File diff suppressed because it is too large Load Diff

2104
regexConsp/forg2.xml Normal file

File diff suppressed because it is too large Load Diff

1474
regexConsp/forg3.xml Normal file

File diff suppressed because it is too large Load Diff

2292
regexConsp/forg4.xml Normal file

File diff suppressed because it is too large Load Diff

3048
regexConsp/forg5.xml Normal file

File diff suppressed because it is too large Load Diff

2652
regexConsp/forg6.xml Normal file

File diff suppressed because it is too large Load Diff

5430
regexConsp/forg7.xml Normal file

File diff suppressed because it is too large Load Diff

531
regexConsp/forward.xml Normal file
View File

@ -0,0 +1,531 @@
<xml><p> *********************** EXPLORING **********************</p>
<p> HHH HHH HHH HHH HHHHHHH HHHHHHHHHH HHHHHHH.
HHH HHH HHH HHH HHHHHHHHH. HHHHHHHHHH HHHHHHHHH
HHHHHHHHHH HHH HHH HHH HHH HHH______ HHH HHH
HHHHHHHHHH 'HHH' HHHHHHHHH HHHHHHHHH HHHHHHHHH
HHH HHH HHH HHHHHHH' HHH HHHHHHH'
HHH HHH HHH HHH HHHHHHHHHH HHH HHH
HHH HHH HHH HHH HHHHHHHHHH HHH HHH.</p>
<p> .HHHHHHHH HHHHHHH. HHH .HHHHHHH HHHHHHHHH
HHHHHHHHHH HHHHHHHHH. HHHHH HHHHHHHHH HHHHHHHHH
HHH_____ HHH HHH HHH HHH HHH' HHH_____
HHHHHHHH HHHHHHHHH HHH___HHH (HH( HHHHHHHH
HHH HHHHHHH' HHHHHHHHHHH HHH. HHH
HHHHHHHHH HHH HHH HHH HHHHHHHHH HHHHHHHHH
HHHHHHHH' HHH .HHH HHH. 'HHHHHHH HHHHHHHHH</p>
<p> in
********************* EVERYDAY LIFE ********************</p>
<p> by
T.B. PAWLICKI
______________________________
I I
I (C) COPYRIGHT 1988 I
I by I
I T.B. Pawlicki I
I 843 FORT STREET I
I VICTORIA, BRITISH COLUMBIA I
I V8W 1H6 I
I CANADA I
I______________________________I </p>
<p>********************** FORWARD **********************</p>
<p> Thank you for participating in a pioneering publishing </p>
<p>venture. </p>
<p> Mass communication has progressed through four major </p>
<p>transformations. The first revolution separated the author from </p>
<p>his audience by means of writing; the LITERATI became a secret </p>
<p>society of COGNOSCENTI that used its exclusive knowledge to </p>
<p>dominate the ignorant masses. Modern democracy began when movable </p>
<p>type made it possible for a message to be received by everyone </p>
<p>who could read. Recently, radio broadcasting countered the first </p>
<p>and second revolutions by delivering messages to everyone who </p>
<p>can't read; television is likely to be the MATADOR of democracy. </p>
<p>The capital cost of printing plants and broadcasting studios </p>
<p>limits the messengers to parties of power and wealth, whose </p>
<p>messages are determined to maintain the STATUS QUO --- natcherly </p>
<p>--- especially their own status plus all the more quid they can </p>
<p>quo. The tragic consequence of mass communications has been the </p>
<p>dissemination of tendencious knowledge to enslave the minds of </p>
<p>mankind, rather than free us to experience our own ignorance </p>
<p>until we learn better. A truly free press for truly free minds </p>
<p>could not exist until the personal home photocopier brought </p>
<p>publishing within the economic capacity of every person with a </p>
<p>message and postage. As well as reducing the cost of copying to a </p>
<p>few pennies per kilowatt hour, the computer completes the </p>
<p>revolution of mass communications by restoring audience feedback. </p>
<p>As camels and soups show, quality goes down as participation </p>
<p>increases, but participation is better for the participators; </p>
<p>eventually, participators support higher standards.</p>
<p> Since authors began to write, instead of speaking directly </p>
<p>to their audience, ideas have flowed in one direction, only. It </p>
<p>is, however, as impossible to teach without learning as it is to </p>
<p>learn without teaching, which is why so little is learned from </p>
<p>reading books. For the first time since the advent of writing, </p>
<p>the computer makes it possible for readers to contribute to the </p>
<p>discourse and transform a lecture into a dialogue, a </p>
<p>conversation, a seminar, a workshop, a global town meeting.</p>
<p> Finding a publisher for my first book, How To Build A
--------------
Flying Saucer, took nearly ten years; nearly ten more years
-------------
passed while my market grew to critical mass by word of mouth. </p>
<p>Now people are reading my first book as if the ideas were as hot </p>
<p>as tomorrow's news, but a whole generation has grown up to </p>
<p>drinking age --- and another generation has died of cirrhotic </p>
<p>livers --- since I was working out those early insights. My </p>
<p>ideas develop so rapidly that I had to rewrite the manuscript </p>
<p>every year until it was published. Once printed, however, the </p>
<p>printing plates are as immutable as graven stone. As soon as I </p>
<p>began to write my personal correspondence on computer, I </p>
<p>realized that this electronic medium keeps discoveries alive and </p>
<p>growing through pooling contributions in ways not feasible by </p>
<p>any other means of communication. The entire industry is built</p>
<p>by fielding half-baked ideas and then improving them with </p>
<p>consumer feedback, as it goes along; no other industry advances </p>
<p>so fast, and in no other industry do the suppliers lag behind </p>
<p>the advances made by their own demanders. And thus it came to </p>
<p>pass as I was speaking to the Global Sciences Congress, held at </p>
<p>Denver in August, l987, that the idea came to me to offer my </p>
<p>audience my current manuscripts explaining HYPERSPACE to
----------
everyone who would participate by also sharing their ideas on </p>
<p>computer discs.</p>
<p> Ideally, a book of this nature should be transmitted over </p>
<p>wires to be downloaded by Special Interest Groups on </p>
<p>international networks. In the present state of the art, </p>
<p>however, computers still cannot replace paper. This </p>
<p>unrealistically jealous industry has not yet made files </p>
<p>universally readable, like sound and film tapes, and it is still </p>
<p>impractical to transmit text formats and illustrations through </p>
<p>wires. Even after the computer industry gets its parameters </p>
<p>together, all of us early worms will remain stuck with our </p>
<p>capital investments. Therefore, I have decided to print my </p>
<p>manuscripts onto discs for postal distribution to the computers </p>
<p>being used now.
---</p>
<p> This enterprise will succeed only if each reader will make </p>
<p>at least two copies and pass them on. Some readers may not know </p>
<p>three other people with compatible computers, so it is hoped </p>
<p>that readers with the most popular computer models will pass on </p>
<p>to their computing friends as many copies as they feel this </p>
<p>publication is worth. If anyone can make conversions to </p>
<p>unpopular computers, a copy returned to me will be passed on to </p>
<p>other readers out in left field.</p>
<p> This brings us to the matter of copyrights. Most people
----------
believe that anyone may freely copy published material in any </p>
<p>numbers for any purpose as long as the copies are not sold for a </p>
<p>profit (*1). If legal process were not so expensive, a lot of </p>
<p>copycats would learn how very mistaken they are. Copyright </p>
<p>entitles the author to assign legal permission to make copies and </p>
<p>set the conditions of contract. Although I am assigning all my </p>
<p>readers the right to make copies and distribute this literature </p>
<p>freely, the formal copyright remains mine. Any party enterprising </p>
<p>enough to reproduce these discs by the hundred for sale at a </p>
<p>profit will very likely interest my attorney to offer a royalty </p>
<p>contract as a more attractive alternative to a court ordered </p>
<p>remedy. Any party that fails to include my byline and copyright </p>
<p>notice will be taken to task for the more serious offense of</p>
<p>plagiarism.
----------</p>
<p> Heckling is a part of all public speaking, and most of the </p>
<p>fun. If hecklers had a fair chance to give their opinions, many </p>
<p>of them would have more to say than the speakers, and some may </p>
<p>have better ideas. The only way a reader can add his two bits </p>
<p>worth to a discourse is by scribbling in the margins of public </p>
<p>library books. Anything that can be done will be done, so </p>
<p>hecklers will always be with us, and so will graffiti, along </p>
<p>with carefully considered letters to editors. Since it is so </p>
<p>easy to add and subtract opinions to a magnetic publication, a </p>
<p>lot of opinionated readers are going to do it. The main purpose </p>
<p>of this venture is to turn audience feedback into an advantage </p>
<p>--- for everyone --- by encouraging constructive criticism </p>
<p>guided by rules for fair comment within the laws governing </p>
<p>copyright and public utterance.</p>
<p> By the nature of this medium, this publication is going to </p>
<p>be shared by an unknown number of readers. Those who want to </p>
<p>give us the benefit of their superior information are asked to </p>
<p>follow these rules. On those matters that readers can wait for, </p>
<p>please append your comments to the end of the file. If you feel </p>
<p>that your information needs to be interjected, then mark the </p>
<p>beginning and end of your contribution with lines or stars.</p>
<p>Please include your name and the date so that we know whom to </p>
<p>credit. If you find mistakes of fact, your immediate correction </p>
<p>is eagerly asked for. Critics looking for an argument improve </p>
<p>their chances by including their addresses. If you are so </p>
<p>offended by some statements that you are compelled to make </p>
<p>deletions, please mark your censorship with a notice of the </p>
<p>amount of text you deleted, in numbers of lines or bytes, and </p>
<p>include your name and date to prove the courage of your </p>
<p>convictions. Anyone who wants to retain his copyright on </p>
<p>contributions is advised to include notice of their legal claim </p>
<p>so that no one will assume that all commentaries and </p>
<p>contributions are in the public domain. Expect disputes; </p>
<p>democracy is not for weak stomachs and faint hearts.</p>
<p> Depending on the number of readers who distribute more </p>
<p>copies, and the number of contributions added --- not to mention </p>
<p>subtracted --- my original text will be unrecognizable by the </p>
<p>time this print passes through a dozen recopies. There is no way </p>
<p>to know whether all contributors have marked the changes they </p>
<p>make. Neither is there any way to know whether they have their </p>
<p>facts correct, unless they cite their sources for reference. </p>
<p>Furthermore, these discs are communicated person-to-person </p>
<p>through private, first-class mail, making the message into a </p>
<p>conversation between acquaintances rather than a publication to </p>
<p>strangers; it is permissible to say things in private and </p>
<p>personal mail that is regarded as unethical, if not illegal, in </p>
<p>public utterance. Therefore, all readers must always remember </p>
<p>and bear in mind that the copy they are reading is a </p>
<p>BOUILLABAISSE stirred by many cooks, not a FILET MIGNON SAUTEED </p>
<p>by a chef. Unless you receive a copy that you can certify as </p>
<p>unaltered from the original, do not believe anything that </p>
<p>offends your common sense and don't hold the original author or </p>
<p>signed contributors responsible for statements and/or context </p>
<p>that may have been altered by hecklers who prefer to remain </p>
<p>anonymous (*2). My own editors have altered my manuscripts until </p>
<p>I could hardly recognize my publications as my own compositions </p>
<p>--- usually for the better. If some party suffers personal </p>
<p>injury from this special interest group disc, everyone who </p>
<p>receives it becomes suspect. This is an utterly novel kind of </p>
<p>case for the courts to rule on, not quite so much privileged </p>
<p>privacy as a closed computer conference but still a one-on-one </p>
<p>private correspondence. I dare say that honest mistakes will be </p>
<p>excused with a pointed finger, but deliberate malice producing </p>
<p>suffering to an identifiable person, when proven unjustified in </p>
<p>these litiginous times, will be liable to legal penalties. We may </p>
<p>protect ourselves from slanderous or obscene remarks by scanning </p>
<p>each disc immediately before mailing, to check that no one else </p>
<p>has run the copy and added comments disgraceful to polite </p>
<p>company.</p>
<p> I have enough discoveries in my head to keep me writing </p>
<p>full time for ten years --- I should live so long. In the </p>
<p>likelihood that my insurance is vastly underrated, I am </p>
<p>curtailing my research and graphic design in order to put as </p>
<p>much of my time as I can into getting my ideas written. </p>
<p>Unfortunately, the charter members of this publishing revolution </p>
<p>will receive bare bones of text, a dearth shared by everyone who </p>
<p>buys Version 1.0 of any program. The economy of electronic </p>
<p>publication, however, enables me to update my text whenever I </p>
<p>get a break, add animated illustrations in colour, and enliven </p>
<p>the text with creative layouts in future editions. Most </p>
<p>important of all, as copies eventually find their way back to me </p>
<p>with accumulated reader input, new editions can be issued with </p>
<p>the latest and most extensive information --- better than </p>
<p>anything I can do. This publication can be considered as a book </p>
<p>written by its best qualified readers. In order to receive </p>
<p>updates and new books, all readers will have to send me their </p>
<p>names and addresses, regardless whence they received their </p>
<p>copies. Please bear in mind that my resources are exceedingly </p>
<p>limited, and expect to wait like a Christian for me to follow up </p>
<p>in my spare time. I expect this enterprise to be taken over by </p>
<p>more resourceful enthusiasts.</p>
<p> The definitive version of this disc book will be written on </p>
<p>an APPLE IIc, in ASCII files; the animated illustrations will be </p>
<p>rendered with DAZZLE DRAW and FANTAVISION --- if I can't find </p>
<p>more practical graphics programs. I invested in the APPLE system </p>
<p>because I believed all the press reports that the computer field </p>
<p>has more APPLE trees planted than anything else. I am deceived; </p>
<p>MS-DOS is the most widely used operating system on this scene. </p>
<p>This original version, however, is written on a KAYPRO II </p>
<p>operated by CP/M 2.2 in WORDSTAR 3.3. files. It will take me </p>
<p>time to convert WORDSTAR files to ASCII, and then convert both </p>
<p>to MS-DOS. The few graphics included on this disc are drawn with </p>
<p>keyboard characters. Since the ASCII code is standardized only </p>
<p>for alphanumeric characters, computers using different keyboard </p>
<p>codes will produce surprising characters --- the trouble is not </p>
<p>in the disk or your computer.</p>
<p> As long as computers remain inconvenient to read in bed or </p>
<p>on public transportation, I shall concurrently try to find </p>
<p>publishers for paper versions of my disc books. These discs hold </p>
<p>the beginning of a 75,000 word paper book, heavily illustrated </p>
<p>with animated illustrations included on disc, under the title </p>
<p>TIME TRAVEL --- The Secret Science of The UFOs. Availing myself
----------- ------------------------------
of the impermanent and quasiconversational nature of magnetic </p>
<p>correspondence, I have included many speculations and tangents </p>
<p>on these disks to stimulate response; these unessential essays </p>
<p>will be deleted from the paper version. The heaviest reading is </p>
<p>the Second Chapter; once you establish the theoretical </p>
<p>foundation laid in my repetitive manner of logic, the rest of </p>
<p>the book is freeway, much like the First Chapter. For the first </p>
<p>time, the theory and engineering of time travel are explained in </p>
<p>sufficient practical detail for young physicists to begin </p>
<p>constructing their own Philadelphia Experiments in their home </p>
<p>workshops; at least one researcher I know is doing it already, </p>
<p>in California. Let me know whether you are willing to buy </p>
<p>TIME TRAVEL --- The Secret Science of The UFOs at a prepublication
----------- ------------------------------
price of $10 or a postpublication price of $16. Send no money. I </p>
<p>only want to know whether there is a market for a paper book </p>
<p>before I invest more than I can afford to print it. I apologize </p>
<p>for my inability to acknowlege subscribers to this paper book by </p>
<p>individual letters, as they are received; at a dollar a letter, </p>
<p>the cost of mailing is prohibitive. Subscribers will be notified </p>
<p>individually to write their cheques when the response is </p>
<p>sufficient to underwrite publication. In the meantime, enquiries </p>
<p>from royalty publishers are welcome. Zees is a bootstrap </p>
<p>production, Dollink --- my apologies to Zsa Zsa. </p>
<p> END OF FORWARD </p>
<p>*1 This is the belief taken by the Government of the United
States, especially its Public Broadcasting System. Assuredly,
what the lord hath given us starving authors with one hand, he
taketh away by truckloads driven by the other. With legal
protection like we got, we are better off with our pirates.
Unless you are a government authorized freebooter, however, the
first hand lays down the law.</p>
<p> Readers who copy programs published in magazines are
subject to the same legal strictures. The magazine publishers do
not assign its readers the right to make copies of their text to
give to their friends, much less sell.</p>
<p>---------------------------------------------------------------</p>
<p>*2 The most heavily edited and censored book in the world is
the Holy Bible, yet its readers are convinced every copy is the
original and every last Word of God. Evidently, God has
afterthoughts --- The New Testament. The Holy Koran is an even
later Word of the very same God compiled from the very same
orginal Scriptures. And don't forget the equally Holy Book of
Mormon. I can relate to Him; I am also compelled to rewrite my
original words innumerable times as I get my act together. </p>
<p> I believe the Bible; it is the publishers I question. I
have no doubt that God inspires all His chosen publishers, but I
wonder whether He chose every publisher; after all, the Bible is
in public domain. If God inspired the American Constitution, in
which I believe more than the Bible, He is the Source of the
First Amendment --- entitling Larry Flint to turn a dollar in
the pre-eminently profitable religious market. It isn't belief
in the Bible that fomented the most vicious wars, but belief in
the infallible veracity of the publishers.</p>
<p> </p></xml>

194
regexConsp/free-trd.xml Normal file
View File

@ -0,0 +1,194 @@
<xml><p>FREE TRADE VERSUS PROTECTIONISM</p>
<p>By RICHARD M. EBELING</p>
<p>A specter is haunting the economies of the world. It is the
specter of protectionism. In one country after the other,
cries are heard that international trade, rather than bringing
mutual prosperity, imposes economic hardship on some nations
so that others may gain. Trading practices among nations are
declared to be "unfair." Jobs are supposedly lost through
"cheap" imports flooding domestic markets. Balance of trade
deficits threaten the financial stability of not only third-
world countries, but the United States as well.</p>
<p>And the solutions proposed are the same everywhere: demands
are made for the imposition or stiffening of trade
restrictions--the raising of barriers in the path of trade
among nations. It is claimed that limitations on amounts of
foreign supplies entering the domestic market, through either
tariffs that make foreign goods more costly or quotas that
prohibit the quantities which may be imported, will increase
the market share of domestic companies as well as enhance
employment opportunities at home.</p>
<p>The reasoning seems straightforward and sensible. However, it
suffers from one handicap: It is dead wrong! When implemented,
protectionist policies bring economic harm, as well as lower
standards of living, for the people of every nation choosing
to follow this path.</p>
<p>If the protectionist argument is correct, that buying Japanese
goods, for example, is harmful to American industry and jobs
as a whole, then the same logic would have to imply that
importing New Mexico goods is harmful to Texas industry and
jobs; and that buying Fort Worth goods is harmful to Dallas
industry and jobs. Why does the Japanese-U.S. argument seem
plausible, while the Fort Worth-Dallas argument appears
suspect? Because people still suffer from the tribal notion
that suggests that the accident of a political boundary across
the face of a map must imply antagonism between the human
beings who live on different sides of that boundary.</p>
<p>International trade is nothing more than an extension of the
social division of labor across national borders. And the same
advantages that arise from a division of labor between members
of the same nation apply among members of different nations.
It enables a specialization of skills and abilities, with each
member of the world economic community tending to specialize
in that line of production in which he has a comparative
advantage (a relative superiority) in relation to his trading
neighbors.</p>
<p>Through such a division of tasks and activities, the wealth
and prosperity of every nation is increased, as compared to a
situation in which individuals or nations are required to
obtain what they desire through their own efforts, in economic
isolation from their fellow men.</p>
<p>But what of the particular charges presently leveled against
our foreign trading partners? What about the detrimental
effects which supposedly result from the trading policies of
other nations? Let us examine some of these charges:</p>
<p>1. Unfair Trading Practices. A number of nations have been
accused of unfairly subsidizing the export of goods to
America, i.e., at prices which are below their "actual" cost
of production.</p>
<p>The world is going through a dramatic technological and
economic revolution, with many underdeveloped nations finally
entering the industrialized era. Their lower prices often
merely reflect their lower costs of production, as they shift
into positions in the international division of labor which
reflect those areas where their relative economic efficiencies
are greatest. As these nations sell more in the United States,
they earn the purchasing power to buy more from America.
American exports, therefore, increase because the only way for
foreigners to buy more from Americans is for Americans to sell
more to foreigners.</p>
<p>To the extent that foreign governments do subsidize some
products sold in the U.S., this means that Americans are able
to buy them below what would have otherwise been the market
price. In other words, we are given a bargain, a bargain that
saves us resources that would have been devoted to the making
of more products to pay for what otherwise would have been
higher-priced imports. And these resources are now available
to make other things that we would not have been able to
produce without this bargain. It is the citizens of those
other nations who should be outraged since they, not us, have
to foot the tax bill to pay for the subsidies.</p>
<p>2. Foreign Products Cause Loss of Jobs. The charge is made
that the sale of foreign goods in America "steals" markets
away from American companies, with a resulting loss of jobs in
America.</p>
<p>This argument ignores the fact that these foreign goods must
be paid for. It is true that jobs in those sectors of the
economy which directly compete against certain foreign
products may be lost. But other jobs are created in those
industries which manufacture goods which foreigners are
interested in purchasing from Americans. The sale of foreign
goods in America may change the locale and types of
employments in the U.S., but it need not result, over time, in
any net loss of jobs.</p>
<p>Furthermore, with free trade, Americans end up spending less
of their income on certain products because they are bought
more cheaply from foreign suppliers. This leaves them with
extra dollars by which they are able to increase their demand
for other goods on the market. The net effect, therefore, is
to stimulate even more employment opportunities than
previously existed.</p>
<p>3. The Balance of Trade Deficit and Foreign Investment. The
leading issue during the last several years has been the
charge that America buys more abroad than it sells, resulting
in a trade deficit that threatens the economic stability of
the United States.</p>
<p>It is true that in terms of tangible or visible goods, the
U.S. has been buying more than it has sold. But this overlooks
the overall trade "balance sheet." Instead of buying American
commodities with the dollars they have earned, foreign earners
of dollars have returned some of them to America in the form
of savings in the credit markets, or as direct investment in
U.S. industry. The overall balance of payments between the
United States and the rest of the world has balanced.</p>
<p>When this is pointed out, the concern expressed is that
foreigners are "buying up America." "They" will control "us."
Actually, however, when the foreign investment is "indirect,"
i.e., loaned to Americans through the banking system, this
merely increases the pool of savings in the United States; and
this pool of savings is available to domestic businessmen who
desire to expand or improve their plant and equipment. If
wisely used, the money borrowed will be paid back, with
interest. And, in a few years, the productive capital in
America will be greater and more efficient. Industry will
still be in "our" hands.</p>
<p>But what if the investment is direct? Won't foreigners
"control" America by buying out existing companies or starting
up new businesses which successfully compete against American-
owned firms? Again, this reflects the collectivist notions of
past ages, notions which think of those who belong to other
nations--"tribes"--as inherently dangerous enemies.</p>
<p>But those of other nations who invest in America are actually
"our" captives--if one wishes to use this form of reasoning.
They have invested their savings in America because it has
offered the most attractive economic and political
environment. Their own fortunes and futures are linked to
continuing American prosperity; and they must manage their
investments in judicious, market-oriented directions if they
are to generate the profits for which they hope.</p>
<p>But what if "they" pulled out? Would that not hurt "us" by
disrupting "our" economy? In such a case, the physical plant
and equipment remain in America. To "pull out," they would
have to find willing buyers. And to do that, they would have
to offer attractive prices to prospective buyers. And they
would only want to sell out if either the political or
economic climate in the U.S. became less attractive as
compared to other countries. But are these not the same
incentives and motives which guide Americans who invest and
save in New York rather than California, or in the U.S. rather
than some other country?</p>
<p>While there will always be necessary adjustments to new and
changing circumstances, free trade between nations ultimately
benefits all who participate. Protectionism can only lead us
down a road of impoverishment and international commercial
tensions. To paraphrase the great 18th century, free-market
thinker, David Hume, when he criticized the protectionists of
his time: Not only as a man, but as an American, I pray for
the flourishing commerce of Germany, France, England and even
Japan. Why? Because America's prosperity and economic future
are dependent upon the economic prosperity of all of those
with whom it trades in the international division of labor.</p>
<p>Professor Ebeling is the Ludwig von Mises Professor of
Economics at Hillsdale College, Hillsdale, Michigan, and also
serves as vice-president of academic affairs for The Future of
Freedom Foundation, P.O. Box 9752, Denver, CO 80209.
------------------------------------------------------------
From the January 1991 issue of FREEDOM DAILY,
Copyright (c) 1991, The Future of Freedom Foundation,
PO Box 9752, Denver, Colorado 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the Foundation.
</p></xml>

67
regexConsp/freeasoc.xml Normal file
View File

@ -0,0 +1,67 @@
<xml><p>Subject: Leaflet: Freemasonry and Society</p>
<p>This is the text of a leaflet published by by the Board of
General Purposes of the United Grand Lodge of England in 1987.</p>
<p> Freemasonry and Society</p>
<p>Introduction:
This leaflet is intended to expand a topic mentioned in the
leaflet "What is Freemasonry". It explains the United Grand Lodge of
England's view on Freemasonry and Society.</p>
<p>Respect for the law:
Freemasonry demands from its members a respect for the law of any
country in which a man may work and live.</p>
<p>Principles:
The principles of Freemasonry do not in any way conflict with its
members' duties as citizens, whether at work or at home or in public
life, but on the contrary should strengthen them in fulfulling their
private and public responsibilities.
Use of Membership:
A Freemason must not use his membership to promote his own or
anyone else's business, professional or personal interests. This is
made clear directly or by inference several times during a Freemason's
early career so that no Freemason can pretend to be ignorant of it. A
Freemason who transgresses this rule may be suspended from Masonic
activities or even expelled.</p>
<p>Family:
Freemasonry should not be allowed to harm a man's family or
other connections by taking too much of his time or his money or
causing him to act in any other way against their interests.</p>
<p>Duty as a citizen:
A Freemason's duty as a citizen must always prevail over any
obligation to other Freemasons, and any attempt to shield a Freemason
who has acted dishonourably or unlawfully or to confer an unfair
advantage on another Freemason is contrary to this prime duty.</p>
<p>Personal or business difficulties:
If it could be proved by evidence that any personal failure or
business difficulty was attributable to 'Masonic influence', Masonic
authority would take a serious view of the fact, as it would be
contrary to the principles of Freemasonry.</p>
<p>Secrecy:</p>
<p>* Freemasonry is not a secret society.</p>
<p>* Like many other societies, it regards some of its internal affairs
as private matters for its members.</p>
<p>* There is no secret about its aims and principles. Copies of the
constitutions and rules can be obtained from Freemasons' Hall by
interested members of the public.</p>
<p>* The secrets of Freemasonry are concerned with its traditional modes
of recognition. Its ceremonies are private.</p>
<p>* In ordinary conversation there is very little about Freemasonry
which may not be discussed.
* On inquiry for acceptable reasons, Freemsons are free and will be
proud to acknowledge their own membership.
</p></xml>

Some files were not shown because too many files have changed in this diff Show More