Tag Archives: disinformation

what’s goin’ on

what’s goin’ on

We are in the post-constitutional era in the United States, a time when the government does whatever it wants to whomever it wants, and there is not a thing anyone can do about it.

How it is possibe that the president can bomb a foreign country or threaten a full-scale international war without so much as even mentioning the need for Congress to chime in, let alone actually vote on a declaration of war?

The short answer is, disinformation and propaganda, which is the domain of mainstream media. When people are confused, when truth is hidden, when agendas are presented as life or death options, and when the public has no clue about which laws government is bound to, then anything goes.

Regarding disinformation, the following list of 25 rules of disinformation is from Twenty-Five Ways To Suppress Truth: The Rules of Disinformation (Includes The 8 Traits of A Disinformationalist) by H. Michael Sweeney, and offers a comprehensive way of processing information in a time of universal deceit.

READ: 11 Tactics Used by the Mainstream Media to Manufacture Consent for the Oligarchy




forewarded by a correspondent

for your review

Happy reading: caveat lector


Silent Weapons for Quiet Wars

An Introduction Programming Manual

Operations Research Technical Manual

The following document is taken from two sources. The first, was acquired on a website (of which I can’t remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.

If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.

The Lawful Path http://www.lawfulpath.com


This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the “National Security” by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.

Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.

We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that “War” had been declared against them, but would be able to properly identify the true enemy to Humanity.

Delamer Duverus


Conspiracy theories are nothing new to history. Plots to “kill Caesar” and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the “Cold War” which called for control of the masses through manipulation of industry, peoples’ pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public’s attention from what is really going on.

The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.

Table of Contents




•Historical Introduction

•Political Introduction


•Descriptive Introduction of the Silent Weapon

•Theoretical Introduction

•General Energy Concepts

•Mr. Rothschild’s Energy Discovery

•Apparent Capital as “Paper Inductor


•Application in Economics

•The Economic Model

•Industrial Diagrams

•Three Industrial Classes


•The E-model

•Economic Inductance

•Inductive Factors to Consider


•Time Flow Relationships and Self-destructive Oscillations

•Industry Equivalent Circuits

•Stages of Schematic Simplification


•Final Bill of Goods

•The Technical Coefficients

•The Household Industry

•Household Models

•Economic Shock Testing

•Introduction to the Theory of Shock Testing

•Example of Shock Testing

•Introduction to Economic Amplifiers

•Short List of Inputs

•Short List of Outputs

•Table of Strategies

•Diversion, the Primary Strategy

•Diversion Summary

•Consent, the Primary Victory

•Amplification Energy Sources


•The Artificial Womb

•The Political Structure of a Nation – Dependency




•System Analysis

•The Draft


The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.


Silent Weapons for Quiet Wars

Operations Research Technical Manual TM-SW7905.1

Welcome Aboard

This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons.”

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120


It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.

This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest – it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.

Historical Introduction

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).

It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.

Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.

With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a four-year grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American Economy. One year later, in 1949, The United States Air Force joined in.

In 1952 the grant period terminated, and a high-level meeting of the Elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy – copyright 1953 by Wassily Leontief, International Science Press Inc., White Plains, New York).

Engineered in the last half of the decade of the 1940’s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.

With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.

The combination was irresistible.

The Quiet War was quietly declared by the International Elite at a meeting held in 1954.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.

This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.

Political Introduction

In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent-weapon technology were as accessible for a public utopia as they were for providing a private utopia.

The issue of primary concern, that of dominance, revolved around the subject of the energy sciences.


Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems: mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping.

All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue: Who will be the beneficiary?

In 1954 this was the issue of primary concern. Although the so-called “moral issues” were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such people are beasts of burden and steaks on the table by choice and consent.

Consequently, in the interest of future world order, peace, and tranquillity, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.

In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name “silent weapons.”

In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.

In order to achieve a totally predictable economy, the low-class elements of society must be brought under total control, i.e., must be housebroken, trained, and assigned a yoke and long-term social duties from a very early age, before they have an opportunity to question the propriety of the matter. In order to achieve such conformity, the lower-class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government-operated day-care centers for the occupationally orphaned children.

The quality of education given to the lower class must be of the poorest sort, so that the moat of ignorance isolating the inferior class from the superior class is and remains incomprehensible to the inferior class. With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintain some measure of social order, peace, and tranquillity for the ruling upper class.

Descriptive Introduction of the Silent Weapon

Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning.

It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of a marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone’s daily social life.

Yet it makes an unmistakable “noise,” causes unmistakable physical and mental damage, and unmistakably interferes with the daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.

The public might instinctively feel that something is wrong, but that is because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.

Theoretical Introduction

Give me control over a nation’s currency, and I care not who makes its laws.

— Mayer Amschel Rothschild, 1743 – 1812)

Today’s silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayer Amschel Rothschild. Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th-century terms, and, to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.

General Energy Concepts

In the study of energy systems, there always appears three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts called passive components.

1In the science of physical mechanics, the phenomenon of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring. In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.

2In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass, and can be represented by a mass or a flywheel in motion. In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.

3In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts energy into heat. In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term “resistor” being the one generally used to describe a more ideal device (e.g., wire) employed to convey electronic energy efficiently from one location to another. The property of a resistance or conductor is measured as either resistance or conductance reciprocals.

In economics these three energy concepts are associated with:

1Economic Capacitance – Capital (money, stock/inventory, investments in buildings and durables, etc.)

2Economic Conductance – Goods (production flow coefficients)

3Economic Inductance – Services (the influence of the population of industry on output)

All of the mathematical theory developed in the study of one energy system (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).

Mr. Rothchild’s Energy Discovery

What Mr. Rothschild had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you.”

Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes. Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone’s stock of gold as a persuader to show his customers.

Mr. Rothschild loaned his promissory notes to individual and to governments. These would create overconfidence. Then he would make money scarce, tighten control of the system, and collect the collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support.

Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology mad Mr. Rothschild all the more able to expand his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services.

Apparent Capital as “Paper” Inductor

In this structure, credit, presented as a pure element called “currency,” has the appearance of capital, but is in effect negative capital. Hence, it has the appearance of service, but is in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced by the negation of population (war, genocide). The total goods and services represent real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness.

War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and regeneration of those resources.

Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and high-speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits – paper inductance/inflation.


The aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders.

By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the engine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a resonant self-destruction of the airframe in flight as an aircraft. From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.

Application in Economics

To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psycho-economic structure of the economy is thus discovered. It is by this process that partial differential and difference matrices are discovered that define the family household and make possible its evaluation as an economic industry (dissipative consumer structure).

Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well-regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.

Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code, UPC; zebra-striped pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later a permanent “tattooed” body number invisible under normal ambient illumination).


Economics is only a social extension of a natural energy system. It, also, has its three passive components. Because of the distribution of wealth and the lack of communication and lack of data, this field has been the last energy field for which a knowledge of these three passive components has been developed.

Since energy is the key to all activity on the face of the earth, it follows that in order to attain a monopoly of energy, raw materials, goods, and services and to establixh a world system of slave labor, it is necessary to have a first strike capability in the field of economics. In order to maintain our position, it is necessary that we have absolute first knowledge of the science of control over all economic factors and the first experience at engineering the world economy.

In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses.

It is only a matter of time before the new breed of private programmer/economists will catch on to the far reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.

The Economic Model

Economics, as a social energy science has as a first objective the description of the complex way in which any given unit of resources is used to satisfy some economic want. (Leontief Matrix). This first objective, when it is extended to get the most product from the least or limited resources, comprises that objective of general military and industrial logistics known as Operations Research. (See simplex method of linear programming.)

The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well-organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.

To make a short story of it all, it was discovered that an economy obeyed the same laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor is mathematically analogous to the initiation of war.

The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.

This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry

Finally, because problems in theoretical electronics can be translated very easily into problems of theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. This makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.

[snip:  Here I have snipped out a major portion of the web page which can be read at the link below.]

The Draft (As military service)

Few efforts of human behavior modification are more remarkable or more effective than that of the socio-military institution known as the draft. A primary purpose of a draft or other such institution is to instill, by intimidation, in the young males of a society the uncritical conviction that the government is omnipotent. He is soon taught that a prayer is slow to reverse what a bullet can do in an instant. Thus, a man trained in a religious environment for eighteen years of his life can, by this instrument of the government, be broken down, be purged of his fantasies and delusions in a matter of mere months. Once that conviction is instilled, all else becomes easy to instill.

Even more interesting is the process by which a young man’s parents, who purportedly love him, can be induced to send him off to war to his death. Although the scope of this work will not allow this matter to be expanded in full detail, nevertheless, a coarse overview will be possible and can serve to reveal those factors which must be included in some numerical form in a computer analysis of social and war systems.

We begin with a tentative definition of the draft.

The draft (selective service, etc.) is an institution of compulsory collective sacrifice and slavery, devised by the middle-aged and elderly for the purpose of pressing the young into doing the public dirty work. It further serves to make the youth as guilty as the elders, thus making criticism of the elders by the youth less likely (Generational Stabilizer). It is marketed and and sold to the public under the label of “patriotic = national” service.

Once a candid economic definition of the draft is achieved, that definition is used to outline the boundaries of a structure called a Human Value System, which in turn is translated into the terms of game theory. The value of such a slave laborer is given in a Table of Human Values, a table broken down into categories by intellect, experience, post-service job demand, etc.

Some of these categories are ordinary and can be tentatively evaluated in terms of the value of certain jobs for which a known fee exists. Some jobs are harder to value because they are unique to the demands of social subversion, for an extreme example: the value of a mother’s instruction to her daughter, causing that daughter to put certain behavioral demands upon a future husband ten or fifteen years hence; thus, by suppressing his resistance to a perversion of a government, making it easier for a banking cartel to buy the State of New York in, say, twenty years.

Such a problem leans heavily upon the observations and data of wartime espionage and many types of psychological testing. But crude mathematical models (algorithms, etc.) can be devised, if not to predict, at least to predeterminate these events with maximum certainty. What does not exist by natural cooperation is thus enhanced by calculated compulsion. Human beings are machines, levers which may be grasped and turned, and there is little real difference between automating a society and automating a shoe factory.

These derived values are variable. (It is necessary to use a current Table of Human Values for computer analysis.) These values are given in true measure rather than U.S. dollars, since the latter is unstable, being presently inflated beyond the production of national goods and services so as to give the economy a false kinetic energy (“paper” inductance).

The silver value is stable, it being possible to buy the same amount with a gram of silver today as it could be bought in 1920. Human value measured in silver units changes slightly due to changes in production technology.


Factor I

As in every social system approach, stability is achieved only by understanding and accounting for human nature (action/reaction patterns). A failure to do so can be, and usually is, disastrous.

As in other human social schemes, one form or another of intimidation (or incentive) is essential to the success of the draft. Physical principles of action and reaction must be applied to both internal and external subsystems.

To secure the draft, individual brainwashing/programming and both the family unit and the peer group must be engaged and brought under control.

Factor II – Father

The man of the household must be housebroken to ensure that junior will grow up with the right social training and attitudes. The advertising media, etc., are engaged to see to it that father-to-be is pussy-whipped before or by the time he is married. He is taught that he either conforms to the social notch cut out for him or his sex life will be hobbled and his tender companionship will be zero. He is made to see that women demand security more than logical, principled, or honorable behavior.

By the time his son must go to war, father (with jelly for a backbone) will slam a gun into junior’s hand before father will risk the censure of his peers, or make a hypocrite of himself by crossing the investment he has in his own personal opinion or self-esteem. Junior will go to war or father will be embarrassed. So junior will go to war, the true purpose not withstanding.

Factor III – Mother

The female element of human society is ruled by emotion first and logic second. In the battle between logic and imagination, imagination always wins, fantasy prevails, maternal instinct dominates so that the child comes first and the future comes second. A woman with a newborn baby is too starry-eyed to see a wealthy man’s cannon fodder or a cheap source of slave labor. A woman must, however, be conditioned to accept the transition to “reality” when it comes, or sooner.

As the transition becomes more difficult to manage, the family unit must be carefully disintegrated, and state-controlled public education and state-operated child-care centers must be become more common and legally enforced so as to begin the detachment of the child from the mother and father at an earlier age. Inoculation of behavioral drugs [Ritalin] can speed the transition for the child (mandatory). Caution: A woman’s impulsive anger can override her fear. An irate woman’s power must never be underestimated, and her power over a pussy-whipped husband must likewise never be underestimated. It got women the vote in 1920.

Factor IV – Junior

The emotional pressure for self-preservation during the time of war and the self-serving attitude of the common herd that have an option to avoid the battlefield – if junior can be persuaded to go – is all of the pressure finally necessary to propel Johnny off to war. Their quiet blackmailings of him are the threats: “No sacrifice, no friends; no glory, no girlfriends.”

Factor V – Sister

And what about junior’s sister? She is given all the good things of life by her father, and taught to expect the same from her future husband regardless of the price.

Factor VI – Cattle

Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.

This concludes what is available of this document.




Tips, Tools and How-tos for Safer Online Communications 

Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

Select an article from our index to learn about a tool or issue, or check out one of our playlists to take a guided tour through a new set of skills.



Understanding the basics: What digital surveillance is, and how you can fight it.



Step-by-step guides to help you install and use handy software and tools.



Detailed guides for specific situations.


An Introduction to Public Key Cryptography and PGP

Attending Protests (International)

Attending Protests (United States)

Choosing the VPN That’s Right for You

Communicating with Others

Facebook Groups: Reducing Risks

How Do I Protect Myself Against Malware?

Key Verification

Protecting Yourself on Social Networks

The Problem with Mobile Phones

Things to Consider When Crossing the US Border



The Basic Attention Token is one of the most compelling projects in the Ethereum space right now, and if successful, would fundamentally change the way advertising works on the internet. The white paper released by Brave Software is a high-level description of the idea and why it’s important for the future of the internet. While the paper is light on Ethereum-specific details about the token mechanics, it still outlines the problems with the digital advertising ecosystem and presents a compelling case for a possible path forward built on top of the Ethereum blockchain.

Link to the White Paper underneath the video





Facebook announced that it assembled a team of 60 people to develop a technology allowing users to “think” commands and messages at their smartphones. The system would be able to literally read your mind … constantly. What could go wrong?

The people at Facebook are going down a path that can only be described as post-Orwellian. Not satisfied with the fact that their users willingly share their most intimate information on a daily basis, Facebook is looking to reshape the world and decipher thoughts that haven’t even been verbalized.

More here:







Of great interest and utility:  the new GDELT mapping API for creating point, ADM1 and country-level maps of the geography of global news coverage from nearly all countries worldwide in 65 languages over the last 24 hours, updating every 15 minutes.

The API, which is fully free and open, generates both instant embeddable browser-based interactive maps and GeoJSON optimized for use with platforms like Carto.


Specify any keyword or phrase and search the English machine translations of all content monitored in those 65 languages, allowing you to search across languages. For each keyword, the system compiles a list of all locations (down to the resolution of a hilltop in many areas) that were found within a sentence or two of your keyword and constructs a map showing the locations mentioned most frequently in context with your search. You can also map specific languages, domains, by tone, etc.

Perhaps most uniquely, we are releasing a set of experimental maps that apply the deep learning image categorization we perform on global news imagery each day (more than a quarter billion images processed last year) and let you search by 10,000 labels of objects and activities depicted in the image, the OCR’d text in more than 80 languages depicted in the image, all of the text contained in the image file’s metadata fields, the textual caption of the image as it appeared in each article, and the result of a Google Images reverse search that compiles a list of all of the captions used for that image anywhere it was found on the open web and assigns several million topical labels.

As but one simple, but extremely powerful example – one of our research threads revolves around how violence is depicted across the world and the differing levels of normative baselines (for example, here in the US ISIS beheadings are typically shown with a “before” image or a heavily pixelated image, whereas in the presses of certain other countries the raw graphic image is frequently shown; similarly in the US we rarely see imagery of drowned refugees with the notable exception of Alan Kurdi, while the presses of other countries run graphic imagery of those who perish on a more frequent basis). Understanding how violence is depicted in the presses of the world and how those baselines are changing offers a lot of insight into the question of desensitization and the communication of crises.

The new API allows you to create such a map in just a few seconds and have it live update every 15 minutes – here is one such example map that displays up to five images from the domestic press of each country over the last 24 hours that were determined to potentially depict some sense of “violence” (click on each country to see the images from its local press). (WARNING: many of these images are very disturbing). While you will see some errors here and there, overall this gives a very visceral sense of the differences in depiction of violence throughout the world.


Similarly, here is a map of rubble, destruction, flooding and fire that we are using in a series of forthcoming projects to ground truth the severity of natural disasters as they occur in realtime (note that this particular map below shows the imagery of damage FROM the press of that country, which may reflect events in other countries as well):


Looking at text, you can map a particular news outlet like AllAfrica:


Or source language like Chinese:


Or the phrase “Donald Trump”, aggregated to the country level:


You can find many more examples, along with full documentation on the announcement this morning:


Feel free to email me directly with any questions! We are super excited to see what you all are able to do with these new capabilities! And stay tuned for our temporal API being released in a few weeks!












mass psychological abuse

mass psychological abuse

12 Signs That America Has Become A Politically-Correct Madhouse

By Michael Snyder, on March 29th, 2017

What in the world has happened to the United States? We are rapidly getting to the point where political correctness is in danger of becoming our national religion. Of course most people would not even call it a “religion”, but for most Americans this unwritten set of rules shapes everything that they think, do and say. Many had been hoping that the spell of political correctness would be broken by the election of Donald Trump, but that obviously has not happened. The forces of political correctness still have a stranglehold on our education system, on all forms of entertainment, on our legal system, and on most of the politicians in both political parties.

The unwritten rules of political correctness are shifting and changing all the time, and if you don’t keep up with them the penalties can be extremely severe.

If you do or say the wrong thing at the wrong time, you could lose your friends, you could lose your job, and you could potentially even lose your reputation.

In fact, there have been numerous people over the past year that have been publicly crucified in the court of public opinion for doing or saying something that was not politically-correct.

And with each passing day, the forces of political correctness take a little bit more ground.




The following are 12 signs that America has become a politically-correct madhouse…

#1 According to Time Magazine, a book entitled “Santa’s Husband” will be released on October 10th by a major U.S. publisher that depicts Santa as “a gay man in an interracial relationship”.

#2 A middle school in North Hollywood is facing substantial budget cuts because they have too many non-minority students

Outrage has grown at Walter Reed Middle School in North Hollywood, as the school faces layoffs and increased class sizes due to a law limiting funds for schools with a higher white student body.

The Los Angeles Unified School District provides more funding for schools where the white population is below 30 percent.

In a letter to parents, the district noted the highly regarded middle school had been above the percentage for the past couple years.

#3 According to Michael Moore, historians will mark “March 28, 2017, as the day the extinction of human life on earth began” because Donald Trump has rolled back Obama’s climate change regulations.

#4 One of my readers just sent me a photo that his 16-year-old son took at school. It is a photo of a slide that was being projected on to a large screen at the front of his classroom that contained this message: “Polls show that young people today are more accepting of lesbian, gay, bisexual and transgender people than ever before. Why do you think that is?”


#5 An elementary school in California has banned the game of “tag” because it is too dangerous.

#6 At one high school in Iowa, students were recently denounced as “racists” for dressing up in red, white and blue for a basketball game.

#7 In North Carolina, as early as the first grade a “gender unicorn” is being used to teach children “about sexual orientation and gender identity“…

Just last year in our home city of Charlotte, North Carolina, the Charlotte Mecklenburg School System used the “gender unicorn” to teach students—as young as first grade—all about sexual orientation and gender identity. This cute, little, fury animal was used to promote the idea that sexual orientation asks the question, “Who do you go to bed with?” while gender identity asks the question, “Who do you go to bed as?” And these can be fluid, of course. Kids can change whenever and however they want.

#8 According to Dr. Michael Brown, bathroom scales have been taken out of the gym at one college campus for a very strange reason: “Administrators at Carleton University have removed the bathroom scales from the campus gym, claiming that ‘being fixated on weight’ does not ‘have any positive affect [sic] on your health.’”

#9 A Christian university in Minnesota has told professors “to stop using terms such as ‘man’ and ‘mankind’ because they are too masculine“.

#10 Snickers bars will soon be sold in rainbow wrappers “as part of a pro-LGBT ad campaign“.

#11 A 32-year-old man will now compete in international volleyball events as a transgender woman, and may end up qualifying for the Olympics as a female athlete…

The now 32-year old says volleyball has been the constant in a life full of changes. In January, she was just approved by USA Volleyball to compete as a woman. Before that, she was required to play in the men’s division at all USAV sanctioned events.

USAV requires transgender women to undergo hormone replacement therapy consistently for at least one year — with proper documentation — and they also have to change their identification, like passports and birth certificates, to female. Before, some organizations, including the Olympics, would require trans athletes to have sex reassignment surgery.

#12 Planned Parenthood has killed millions of children, but nobody from that organization ever seems to get into trouble with the law. Instead, two activists that exposed the fact that Planned Parenthood is auctioning off baby parts to the highest bidder have been charged with 15 felonies in the state of California.

In this type of environment, people like me are becoming dinosaurs. If you follow my work on a regular basis, you know that I am not afraid to do or say things that might offend some people.

Of course I am not actually trying to offend anyone, but I won’t let the forces of political correctness dictate what I can or cannot say about a particular topic.

Ultimately, political correctness is a tool that progressives use to silence the opposition.

They want to make it a crime to think or say anything that they might find offensive, and to a substantial degree it is working.

Our founders intended for us to permanently have a right to free speech, but now we have moved into a time when saying the wrong thing can get you brutally persecuted.

I would like to be optimistic that we can start to roll back the forces of political correctness, but as I noted at the beginning of this article, they have control of our schools, our courts, our entertainment and most of our political leaders.

But of course we can never give up the fight, because if they win life in America will ultimately become a complete and total nightmare.





How To Spot A Media Psy-Op 

“… The American political establishment appears to have settled into an aggressive disinformation campaign against its own citizens as a result of the way it lost control of the narrative in 2016, and that campaign is only escalating…. A lot of my readers probably tuned out from mainstream media long ago, as did I, but as the manipulators of the political establishment become more desperate their movements are becoming a lot more obvious, and they’ve been giving us a lot of valuable information lately. I encourage you to tune back in as much as you feel inclined to, because when they really overextend, these mouthpieces of the oligarchy actually tell us where they don’t want us to look…..” 


On word salads, neuro-linguistic programming, “quick, rhythmic delivery and seamless insertions”, “designed to forcefully marry two unrelated ideas in the minds of the audience” (like “election hacking”), Astro-turfing, “mass psychological abuse”, and “the four D’s — deny, disrupt, degrade, deceive”. 




“… The electromagnetic/digital storm emanating from television, computer and cell phone screens flood the neural pathways of the brain drowning synapses. The ferocious digital winds from the storm twist and rattle axons, neurons and dendrites like the winds from a powerful thunderstorm that shears leaves off of trees and bends branches to and fro. The lightning strikes from this digital storm randomly sever connections in the cerebral cortex, just as a lightning strike violently amputates the limbs from a tree. And, at times, the electromagnetic field and its constituents, now having translated itself into images, sounds and text, crash into the cerebral cortex and send shock waves through the entire structure of the brain down to the base of the spinal cord. The cerebral cortex has been trashed.

The New Cocaine?

The digital storm, though ultimately damaging, is stimulating. It rushes to find the nucleus accumbens and floods it with dopamine which the hippocampus, in turn, ‘memorizes’ as rapid stimulus for satisfaction or pleasure. The amygdala then ‘records’ the event making sure that the human response is ‘conditioned’ to find pleasure and, indeed, seek it out desperately.  The brain reboots itself and in so doing its human face. Addiction ensues and brains/humans change.

The digital storm forms a ‘new brain’ and, hence, human character. Transmogrification becomes complete. Perhaps it’s all evolution’s plan. But interesting symptoms appear indicating this could be devolution.

The addiction to the digital storm is so overwhelming that the brain creates a punishing craving mechanism: connection insecurity.  Its emotion is fear, the fear of not being connected, or being seen, or taking part in the social scene. It’s the fear of missing out on the daily on-line world and being MIA to comment on the latest incidental text, image or sound. To eliminate connection insecurity the brain creates an addiction that resembles the cocaine addict’s frenzied search for more having snorted up the buy and the stash.

Don’t See Me, Touch Me, Read Me

You can see it in the mothers and fathers that push their infant children down the sidewalk talking into the cell-phone rather than talking to the child. What does that child store in the brain? Gossip? Recipes? Sports trivia?

Or at the family dinner table where adults and children feel compelled to check email or take calls not wishing to be offline for 60 minutes at Sunday dinner. Worse still, the dinner hosts have to remind the cell-phone users to ‘please silence your cell-phones’ as if in the movie theater.

And walking down the street, the ability to say ‘good morning or good evening’ has been eroded as everyone seems to be working a conversation via the cell-phone or looking down at email. It’s a world of people walking with their heads-down on the street. It’s heads-down in elevators, offices and even in church pews on Sunday.

The brain’s pause and contemplative thought functions have been degraded and exist like abandoned and rusty rail road tracks.  The brain has replaced these two elements with a reflexive response mechanism from the unconscious and unfiltered mind.

Such is the mind of the President of the United States, Donald Trump and his penchant for Twitter, television and newspapers. His thinking, like the bulk of the American citizenry, is limited to 150 characters a thought.  Producing 150 characters is an exhaustive effort for most these days. No doubt, a student has been assigned to describe the novel War and Peace in 150 characters. Tell us what is unique about your life in 150 characters, they’ll ask.

And don’t dare write an article of more than 500-750 words on a subject, because ‘readers’ will not stick with it, they say. ‘Give me all bullet points, our President says.

When in falling asleep, or in your dreams, you ‘see’ text scrolling vertically/horizontally (and you can read some of it) or you observe images of computer screens with data displayed (which you can interpret) your brain and you have been altered. And when you notice that these images start to appear in your recurring dreams and it seems to be altering your deepest consciousness, it’s probably time to seek shelter from the digital storm. ….”





The shadow of George Orwell’s Big Brother government is quickly being usurped by a nebulous web of private companies with abilities just as sinister.

“There’s a great deal beyond what the CIA and NSA does” in terms of US espionage efforts, award-winning journalist and activist Barrett Brown said on a recent episode of By Any Means Necessary, a Radio Sputnik program hosted by former Party for Socialism and Liberation vice presidential candidate Eugene Puryear.

Brown asked listeners to participate in a short thought experiment. Put yourself in the shoes of a leader at one of America’s intelligence organizations, like the Pentagon Cyber Command, the Defense Intelligence Agency or the National Security Council.

“Even then, you don’t know the size of America’s effective surveillance and propaganda capabilities, because a lot of these capabilities are contracted out to private companies,” Brown noted. He has been involved with the hacktivist group Anonymous since 2011, he said.

“There’s so much going on with these contracting firms, there’s so much compartmentalization, that no one single person knows exactly what’s possible these days,” he added.

Puryear pointed out that Amazon has become the government’s go-to supplier for server farms, while Palantir has agreed to do the same for Immigration and Customs Enforcement (ICE).

When Democrats and Republicans across Washington began hurling bold allegations that a Russian government operation had materially altered the results of the election, they pointed to the hacking of the Democratic National Committee’s compromised email servers.

And their evidence for the explosive claims? A report from CrowdStrike, a private sector cyber consultant. The DNC never gave the FBI permission to access its servers. And it turns out that CrowdStrike previously tied ‘Russian hacking’ to events that never happened, Sputnik reported March 23.

Now, some of those companies may be able to sell internet users’ data to other firms, marketers, or even that vague non-profit organization claiming to be non-partisan and independent.


“I’m interested in taking what we saw with Anonymous, for instance,” he continued, “and trying to make it a bit more rigorous.” Brown evinced the sentiment that the power of the internet to connect any two individuals, without an intermediary, is largely underestimated by both pro-state authorities and independent hackers who want to keep the government in check.

The implications of this are accentuated, Brown says, by the notion that by riding the power of the internet, small groups of people can “achieve extraordinary leverage over how things develop.”

Despite the power of the US security state, its unbounded contracted capabilities included, Brown and his ideology seem to embody cultural anthropologist Margaret Mead’s famous quote: “Never doubt that a small group of thoughtful, committed citizens can change the world; indeed it’s the only thing that ever has.”












“… psychological abuse isn’t considered a serious social taboo like physical and sexual child abuse. We need public awareness initiatives to help people understand just how harmful psychological maltreatment is for children and adolescents….”



Imagine if governments could project massive, realistic holograms into the sky above entire societies, such as the image of a deity significant to a region. Imagine the implications if such a vision started speaking – the words appearing ‘telepathically’ as thoughts directly inside people’s heads. Disturbingly, this scenario may not be science fiction, as the technology for mass deception and psychological manipulation on a major scale has existed for decades.


bypassed by reality

bypassed by reality


9/11 Truth floundering

Maginot Line strategic thinking/action style bypassed by reality


Angry combative egocentric self-promotion, unsubstantiated claims about disinformation and more, and endless years-long debate about minutiae combine get in the way of recognizing that the perps have thus far succeeded in placing themselves beyond the possibility of being brought to justice.  (They run the justice system; they run the information systems; they have established pervasive surveillance; they own and possess most if not all the weapons.)

It should be noted that on the forthcoming anniversary, during a public event in New York City, there will be a “day-long evidentiary hearing on the World Trade Center’s destruction, which will be conducted by a panel of esteemed lawyers.

More info


• Daniel Sheehan, litigated cases related to the Pentagon Papers and the Iran/Contra Affair;

• Judge Ferdinando Imposimato, Honorary President of the Supreme Court of Italy;

• Richard Gage, AIA, AE911Truth

• Dr. J. Leroy Hulsey, University of Alaska Fairbanks;

• Wayne Madsen, J. Michael Springmann

• Mark Crispin Miller, professor of Media, Culture, and Communication at NYU

• William Pepper, International Human Rights attorney”

In theory, I’d heard it said, that this group will investigate which legal venue is most appropriate to present whatever they decide is actionable evidence. [The event can be seen by “live stream” and will eventually be encapsulated in a video.] Described as the most exciting event in the 9/11 Truth movement in some time, it might also come to be seen as its last gasp.

(I’m not a lawyer, never played one on TV, and didn’t stay last night in any of the right inns, but I’ve wondered before why, if a case can be formally entered, the legal process of discovery can’t be used as a form of leverage, a can-opener.)

Highly recommended by several respected and persevering truth activists is this 2-hour long Demolition of Truth: Psychologists Examine 9/11 – Broadcast Version:


a video which “presents testimony from highly-credentialed scientists, engineers, and military experts, including Dr. Robert Bowman, Dr. Lynn Margulis, Dr. Niels Harrit, and many more. This expert testimony is interwoven with analyses by social scientists who examine the psychological impact of 9/11 and the phenomena that have kept us blinded to truths too painful to acknowledge, even to ourselves.

The film concludes with steps we can take, individually and collectively, toward healing. An epilogue by actor Ed Asner summarizes these analyses, emphasizing the role played by mainstream media that, lamentably, parrot their government sources rather than question them.”


Those highlights aside, the 9/11 Truth movement, hard to find unless you know where to look for it, is splintered and struggling to find methods, tools, techniques, energized volunteers, and a lack of rancor.

It has been out-thought, out-spent by many many orders of magnitude, infiltrated, COINTELPRo’ed, and turned into an utterly confusing jiggly pile of gelatinous goop.

Most recent controversies include the ages-old “plane vs. no plane” theories for the Pentagon site, multiple theories about what if anything actually slammed into the side of the WTC Towers, and the exact nature of the technologies and techniques that were used to bring down three skyscrapers.


I don’t care if my first responder rescuer brethren and the victims were blown up or down, by thermite or nukes, with Saudi or Israeli help; I want to see the perps walk to the gallows, and everyone who is or was complicit in the cover-up shunned for life.

One outgrowth of the Bernie Sanders for President campaign is https://brandnewcongress.org/home.

Here’s the Wikipedia entry: https://en.wikipedia.org/wiki/Brand_New_Congress.

It’s certainly interesting that people have faith in campaigning at a time when the major meme is that foreign governments will hack the election, Bernie will campaign for someone backed financially by an individual proven to be working overtime at the insertion of political chaos into sovereign nation (including the US), and the US is actively involved in overturning election results in other nations.

Or maybe thinking of sweeping Congress clean is simply a successful and thriving grassroots effort rebounding in rhizome fashion from having been trampled… time will tell.

Does 9/11 justice emanate from political struggle, legal maneuvering, or transformational thinking?

Has the entire idea of 9/11 awareness been superseded, or OODA-looped?

The OODA loop is a strategic theory created by USAF Lt. Col. John Boyd.  The Wiki article on him will send you off — if you are interested — to Coram’s biography, several compendiums of briefing papers and articles, Boyd’s own “Creation and Destruction” thesis, and more. I’ve written in depth about the possible applications of this theory to the 9/11 event. [It was a multi-part series published as part of my blog at the discussion board CommonGroundCommonSense.org where I was a member and leading 9/11 truth advice. CGCS, as it was known among its members, was an outgrowth of the Kerry For President election campaign, had multiple facilitators (one of whom still blogs as Snuffysmith), and itself was heavily infiltrated by governmental employees, neocons masquerading as progressives, sayanim and others. The discussion board was eventually closed down as members left, and the text evaporated, though you can still find remnants: http://911blogger.com/node/2480.

At 9/11 Blogger, I was known as Mr. Jouet or Magmak1; Magmak1 was my user name at CGCS.

Here’s another: http://angrybearblog.com/2008/01/ooda-loop-applied.html

and a third here in the Prison Planet forum .

My point is that the 9/11 truth movement may well have been “caught responding to situations that have already changed”.


One of the first 9/11 activists was Catherine Austin Fitts; almost immediately, she said “follow the money”, and she is an expert at tracking money. One example is that her proprietary software, which was seized by the US government (along with her company) as she was hounded by legal attacks that put her in front of Stanley Sporkin, asserted effectively in August 2002 [ https://ratical.org/co-globalize/CAFmrl.html ], that multiple US government agencies “may be in a position to steal literally hundreds of billions of dollars with no one the wiser”.

A sampling of other Fitts articles:




Fitts was talking about covert or black budgets in 2002, and writing about narco-dollars, money-laundering et al.

Since then, we have learned that the CIA operates its own venture capital company, has been running multiple companies in the US and around the world as extensions of its operational capacities, has run candidates for the Presidency, cultivated the current occupant of the White House, continues to run what used to be called Operation Mockingbird, and much more in the world of covert ops. The informational technology tolls and companies alone would require another article; I’ve already covered Palantir extensively.

Now, you might not believe in little green men, or flying saucers, or a bunch of “conspiracy theories”, and agnostic I may personally be, never having seen any, but Fitts has persevered against personal and corporate assault, and her observations and writings have stood the test of time.  Housing bubbles. privatized prisons and Wall Street shenanigans are now understood. And she has followed her ability to see, find and follow deep state covert budgets into a multi-year and continuing survey of what she calls “space-based economies”, which border on topics like deep underground military bases, “breakaway civilization”, space travel and interstellar transport, occult energy sources, and the world of transhumanism (which has its own Presidential campaign and grass roots politics effort).  It was said recently that we are living in the era of the last members of the human race.

Preposterous? Well, go do the reading. I’ve written about the transitional end-game in engineering human evolution, paying special attention to Genetic, Robotic, Information, and Nanotechnologies which, when merged and meshed with artificial intelligence, will have a high probability of creating a “curve of change unlike anything we humans have ever seen and that each of them, taken individually, are transformative” and “each hold the potential to change human nature itself.”


Source of image:



If the goal is the creation of groups of new humans who will be able to think faster and more creatively, have near-photographic memories, read books with total recall and comprehension in minutes, repair their own bodies and maintain peak health, live longer, require less sleep, and communicate more quickly with greater clarity to allow coordinated action in shorter time periods, and if DARPA is well down this path already and there are hundreds of well-funded and expertly-managed corporate enterprises working on these kinds of projects, then I must respectfully submit that the 9/11 Truth movement is still searching for answers in a pile of rubble and dust that was trucked off to landfills by mob-run trucking companies to be re-engineered into something else altogether, and that what they desire, whether through political or judicial means, will soon break off and float into space.