Category Archives: Documents

The Occult Technology of Power

A Project of the Society for Illuminating the Sources of Power

Copyright 1974 by Alpine Enterprises, PO Box 766, Dearborn, Michigan 48121. All Rights Reserved for Printed Editions. E-text editions may be distributed without limit as long as the address of the Copyright Holder or publisher is included. Printouts from e-text are not allowed.

ISBN 0-55950-009-3
Library of Congress Card Catalog Number 88-083670


To My Son:

“The world is governed by very different personages from what is imagined by those who are not behind the scenes.” — Benjamin Disraeli (Earl of Beaconsfield)

In this thin volume you will find the transcripts of your initiation into the secrets of my empire Read them again not for the arcane knowledge which is now second nature you, hut in order to re-experience the shock and awe you felt twenty years ago when at age thirty the fabulous scope of my power was revealed to you by my trusted, and now mostly departed advisors. Remember the surprise, to the point of disbelief, with which you beheld the invisibly delicate, but invincible chains of deceit, confusion, or coercion with which we finance capitalists enslave this chaotic world. Remember the feats of will and strategy that have been required to retain our position. Then, inspect your retinue carefully. Your heir must be equal to and eager for the task much as you were. Choose him carefully. As I lie here waiting for the end I can afford to relish the thought our empire lasting forever as I never dared while in charge. Rational power calculations, so easily disrupted by the thrill of power, are now entirely in your hands.

“Know, Will, Dare, and be Silent!” — Aleister Crowley


THE TRANSCRIPTS

1. My Introduction to Your Initiation

2. Professor A. on the Role of Fraud in Nature

3. Professor Q. on Occult Knowledge as the Key to Power

4. Professor M. on the Economics of Central Banking

5. Professor B. on the Functions of the Central Bank in the Mature Finance Capitalist System

6. Professor G. on Social and Business Legislation and Policy

7. Professor D. on the Role of Public Education

8. Professor X. on Prestigious Associations and Secret Societies

9. Professor Y. on Covert Operations and Intelligence

10. My Closing Remarks

11. Afterwords by the Transcriber [Author?]

12. Bibliography


1.     MY INTRODUCTION TO YOUR INITIATION ~

“Man is a rope stretched between the animal and the Superman a rope over an abyss.”

“I teach you the Superman. Man is something to be surpassed.” — Friedrich Nietzsche

“Self reverence, self-knowledge, self-control these three alone lead to sovereign power.” — Alfred Lord Tennyson

“And nothing, not God, is greater to one than one’s self is.” — Walt Whitman

“Do what thou wilt shall be the whole of the law.” — Aleister Crowley: The Book of the Law

My Son, the time has arrived to make formal what you have confidently awaited for some years. Of all your brothers, sisters, and cousins, as well as the offspring of my close allies, I have chosen you to be heir to my empire. All the trust funds, foundations, and accounts through which my empire is controlled shall pass into your hands upon my retirement. All my alliances, understandings, and enmities with my handful of peers around the globe shall gradually become yours. Over the next twenty years we shall collaborate closer and closer, you and I, until, we finally act as one.

For ten years you have toured my empire in a succession of managerial assignments and are now familiar with the outward operations of my crucial banking, foundation, governmental, and think tank organizations. Until now, my advisors and I have deflected your questions as to how and if my diverse operations and holdings, which seem autonomous and even contradictory, are integrated into an organic whole to serve the dynasty’s interests. The fact that you asked these questions, rejecting my carefully nurtured public image as an idle, coupon clipping philanthropist, was a major factor in the high esteem in which I hold you. Most of your competitors found puppet leadership in any one of my organizations so awesome and gratifying that they immediately eliminated themselves from the contest for the top position which you have won. Such men of limited vision are necessary for my success. They bend unconsciously to the subtle pressures to which I expose them. They can be led in any direction I choose by simple-minded rationalizations aimed at their vanity without being privy to my motives which would be short lived secrets in their undisciplined and envious minds.

Most important in your selection as my successor, however was your psychological nature which has been faithfully reported to me over the years by my associates many of whom have advanced psychological training. A man in my position must have total mastery over his emotions. All actions affecting the power of the dynasty must be taken on the basis of coldly reasoned power calculations if the dynasty is to survive and prosper at the expense of its subjects and rivals. All power is impossible to those whose pursuit is ruled by sentimentality, love, envy power-lust revenge, prejudice, hatred, justice, alcohol, drugs, or sexual desire. Sustained power is impossible to those who repress all their irrational longings into their subconscious only to have them return in compulsive, out of control behavior that inevitably leads to their ruin. Although often clothed in the rationalizations of power calculation, compulsive behavior is at root, the emotionalism of a frightened child, desperately projecting his inner agony into a reality he is afraid to under stand, much less master.

Although you now must begin to pursue it consciously you have already displayed the alienation from your emotional nature that is so essential to achieving real worldly power. You must recognize your emotional nature as a primitive survival mechanism that was appropriate for the jungle and perhaps useful to common men, but useless for the tasks that confront us finance capitalists. Attachment to what you do, just because you do it, is the primary psychological characteristic of ordinary mortals. Such cognitive dissonance spells disaster for us. Our emotional mechanism makes our lives worth living, but is no guide to the occult arts of intrigue. So, continue to gratify your senses and emotions fully at your leisure. As long as the empire prospers you will have the resources to indulge in systematic gratification which will leave your irrational urges sated and, therefore, powerless. You will never be in the unenviable position of the middle class strivers who must, from lack of resources, repress their emotional natures if they are to attain any power whatever during their lives. Typically, they end up taking their pleasure from the victories and cruelties of their struggle. Thus, their end ceases to be power and they eventually defeat themselves with reckless behavior in pursuit of dominant thrills.

I have brought you into seclusion with my most trusted advisors in order to inaugurate a new phase of your instruction. Your formal training in the “official” political-economic world is now complete. This weekend will mark the beginning of your training in the occult technology of power that lurks behind outer appearances. As your tutors will explain, “occult” or secret knowledge is the basis of all power in human society, so I use the word “occult” advisedly, in its pristine usage. As I am sure you are aware by now, productivity in itself does not secure power and therefore does not secure the gratifications of life. After all, slaves can be productive. None of my organizations in which you served so well are concerned with advancing the techniques of satisfying human needs and desires. Rather, all are dedicated to the surreptitious centralization of productive, but especially coercive, efforts in my hands or in creating the intellectual climate in which such veiled control would be tolerated in the future. I destroy or paralyze productive efforts that cannot be ensnarled in my web

After a break Professor A. will take the floor in order to put finance capitalism into full biological perspective. His short talk will be followed by similar abbreviated summaries by his six associates, all of whom you know well. The rest of the weekend will be devoted to forthright fielding of your questions.


2.     PROFESSOR A. ON THE ROLE OF FRAUD IN NATURE ~

“Are we not all predatory animals by instinct? If humans ceased wholly from preying upon each other, could they continue to exist?” — Anton S. LaVey

“Nature, to be commanded must be obeyed ” — Francis Bacon

Organisms typically base their success primarily on deception and rely on actual force or mutually advantageous trade (symbiosis) as little as possible. This should be nearly self-evident, but is generally overlooked due to the moral codes we elitists foist on our subjects. Let me give a few examples in case the moral culture has to some extent impaired your powers of objective observation. Camouflage is universal among predators and victims alike. Blossoms imitate fragrances and colors which are sexually attractive to certain insects in order to effect pollination. Dogs bark ferociously and feign attack on enemies of whom they are, in fact, terrified. The Venus Fly Trap plant lures flies to their deaths. Men proclaim their altruism to others and even themselves while they selfishly scramble for personal advantage. If you doubt that fraud is normal in nature you should read section 3 of the first chapter of Robert Ardrey’s “The Social Contract” for a wealth of fascinating examples. (Of course Ardrey fails to grasp the full application to contemporary human society of his brilliant insights into man’s animal nature.)

Human mental prowess and communicative powers have merely provided superb elaboration on nature’s old theme of fraud and added its own distinctive feature: self delusion. Primitive animal hierarchies are based on bluff and bluster, and each member is well aware of and accepts, at least temporarily, its position in the hierarchy. The same wild enthusiasm and fascination for dominance and submission rages in human hearts. However, fraud is taken one step further. Not only is fraudulent bluff and bluster used to achieve dominance but fraudulent altruism and collective institutions are used to conceal dominance once achieved. Human hierarchies, in contrast to the animal variety, are best sustained when the members are deluded regarding the oppressive nature, or better, even the very existence of the hierarchy!

Visible rulers are highly vulnerable. Thus we see visible rulers claiming to be representatives of God, the common good, the material forces of history, the general will (either through vote or intuition), tradition, or other intellectual “spooks” that serve to lessen the envy of the ruled for the rulers. Encouraging such self-delusions among the masses of the ruled is universal for visible governments. However, such spooks are little protection for the leaders of such systems against their sophisticated elite rivals and no protection against men like your father. The Roman Empire was unquestioned by the mass of its subjects for centuries, but the Emperors lived in constant fear of coup and assassination.

By embracing deception wholeheartedly at every level, finance capitalism, or rule through money, has fashioned the ultimate system yet devised for the secure exercise of power. Men like your father, the hidden masters of finance capitalism, govern those who govern, produce, and think through invisible financial tentacles, the operations of which will be elucidated later by my colleagues. Dominance in all aspects of society is surreptitiously accomplished while the great majority of the ruled, and even most of the visible leaders, believe themselves to be fairly autonomous, if harried, members of a pluralistic society. Nearly everyone believes major decisions to be the vector sum of autonomous pressures exerted by business, labor, government, consumers, social classes, and other special interests. In fact, the vectors of societal power are carefully balanced by us so that any net movement is in a direction chosen by us. The only fly in the ointment is the occasional, but extremely messy, interferences by competing financial dynasties. This disconcerting problem will not be a major topic for this weekend.

I now yield to Professor Q. who will elucidate the central secrets of your father’s immense money power.


3.      PROFESSOR Q. ON OCCULT KNOWLEDGE AS THE KEY TO POWER ~

“The theory of aggregate production which is the point of the following book, nevertheless can be much easier adapted to the conditions of a totalitarian state than the theory of production and distribution of a given production put forth under conditions of free competition…” — John Maynard Keynes ~ Forward to the German Edition of the General Theory (September 7, 1936)

Throughout history, secure ruling elites arise through secret, or occult knowledge which they carefully guard and withhold from outsiders The power of such elites or cults diminishes as their occult knowledge is transformed into “scientific” knowledge and vanishes as soon as it becomes “common sense.” Before analyzing the secrets of the finance capitalist money cult let us glance for historical perspective at occult astronomy, the oldest source of stable rule known to man of which astrology is hut the pathetic remnant.

As soon as men abandoned the life of wandering, tribal hunters to till the soil they needed to predict the seasons. Such knowledge was required in order to know when to plant, when to expect floods in fertile valleys, when to expect rainy seasons, and so on. Months of backbreaking work were wasted by the unavailability of the calendar, a convenience we take for granted. The men who first studied and grasped the regularities of sun, moon, and stars that presage the seasons had a valuable commodity to sell and they milked it to the fullest at the expense of their credulous fellowmen. The occult priesthoods of early astronomers and mathematicians such as the designers of Stonehenge, convinced their subjects that they alone had contact with the gods, and thus, they alone could assure the return of planting seasons and weather favorable to bountiful harvests. The staging (predicting) of solar and lunar eclipses was particularly effective in awing the community. The general success resulting from following the priesthood’s tilling, planting, nurturing, and harvesting timetables insured the priesthood’s power. Today’s Christmas holiday season continues the tradition set by ancient priesthoods, who conducted rituals on the winter solstice to reverse the retreat of the sun from the sky.  Their invariable success was followed by wild celebrations.  Popular knowledge of seasonal regularities was discouraged by every manner of mysticism and outlandish ritual imaginable.  Failures in prediction were blamed on sins of the people and used to justify intensified oppression. For centuries people who had literally no idea of the number of days between seasons and couldn’t count anyway, cheerfully gave up a portion of their harvests, as well as their most beautiful daughters, to their “faithful servants” in the priesthoods.

The power of our finance capitalist money cult rests on a similar secret knowledge, primarily in the field of economics. Our power is weakened by real advances in economic science (Fortunately, the public at large and most revolutionaries remain totally ignorant of economics). However, we established money lords have been able to prolong and even reverse our decline by systematically corrupting economic science with fallacious and spurious doctrines. Through our power in the universities, publishing, and mass media we have been able to reward the sincere, professorial cranks whose spurious doctrines happen to rationalize in terms of “common good” the government supported institutions, laws, and economic measures upon which our money powers depend. Keynesianism is the highest form of phony economics yet developed to our benefit. The highly centralized, mixed economy resulting from the policies advocated by Lord Keynes for promoting “prosperity” has all the characteristics required to make our rule invulnerable to our twin nemeses: real private competition in the economic arena and real democratic process in the political arena. Laissez-faire or free market, classical economics was our original attempt to corrupt economic science. Its beautiful internal consistency blinded economists for many years to the fact that it had virtually nothing to do with current reality. However, we are so powerful today that it is no longer possible to conceal our imposing institutions with the appearances of free competition Keynesianism rationalizes this omnipotent state which we require, while retaining the privileges of private property on which our power ultimately rests. Although the interim reforms advocated by Marx in his Communist Manifesto such as central banking, income tax, and other centralizing measures can be corrupted to coincide exactly with our requirements, we no longer allow Marxist movements major power in developed countries. Our coercive institutions are already in place. Any real steps toward communism would mean our downfall. Of course, phony Marxism is an excellent ideological veil in which to cloak our puppet dictators in underdeveloped areas.

Secondarily, the power of the lords of money rests on an occult knowledge in the area of politics and history. We have quite successfully corrupted these sciences. Although many people are familiar with our secrets through such books as 1984 by the disillusioned George Orwell, few take them seriously and usually dismiss such ideas as paranoia. Since real politics is motivated by individual self-interest, history is viewed most accurately as a struggle for power and wealth We do our best to obscure this self-evident truth by popularizing the theory that history is made by the impersonal struggles between ideas, political systems, ideologies, races, and classes.  Through systematic infiltration of all major intellectual, political, and ideological organizations, using the lure of financial support and instant publicity, we have been able to set the limits of public debate within the ideological requirements of our money power.

The so-called Left-Right political spectrum is our creation. In fact, it accurately reflects our careful, artificial polarization of the population on phony issues that prevents the issue of our power from arising in their minds. The Left supports civil liberties and opposes economic or entrepreneurial liberty. The Right supports economic liberty and opposes civil liberty. Of course neither can exist fully (which is our goal) without the other. We control the Right-Left conflict such that both forms of liberty are suppressed to the degree we require Our own liberty rests not on legal or moral “rights,” but on our control of the government bureaucracy and courts which apply the complex, subjective regulations we dupe the public into supporting for our benefit.

Innumerable meaningless conflicts to divert the attention of the public from our operations find fertile ground in the bitter hatreds of the Right/Left imbroglio. Right and Left are irreconcilable on racial policy, treatment of criminals, law enforcement, pornography, foreign policy, women’s lib, and censorship to name just a few issues. Although censorship in the name of “fairness” has been useful in broadcasting and may yet be required in journalism, we generally do not take sides in these issues. Instead we attempt to prolong the conflicts by supporting both sides as required. War, of course, is the ultimate diversionary conflict and the health of our system. War provides the perfect cover of emergency and crisis behind which we consolidate our power. Since nuclear war presents dangers even to us, more and more we have resorted to economic crisis, energy shortages, ecological hysteria, and managed political drama to fill the gap. Meaningless, brushfire wars, though, remain useful.

We promote phony free enterprise on the Right and phony democratic socialism on the Left. Thus, we obtain a “free enterprise” whose “competition” is carefully regulated by the bureaucracy we control and whose nationalized enterprises are controlled directly through our government. In this way we maintain a society in which the basis of our power, legal titles to property and money, remain secure, but in which the peril of free, unregulated competition is avoided and popular sovereignty is nullified. The democratic process is a sitting duck for our money power. Invariably we determine the candidates of the major parties and then proceed to pick the winners. Any attempts at campaign reforms simply put the rules of the game more firmly under our government’s control.

Totalitarianism of the fascist of communist varieties is no danger to us as long as bastions of private property remain to serve as our bases of operation. Totalitarian governments of both Right and Left, because of the vulnerability of their highly visible leaders to party rivals, can be manipulated easily from abroad. Primarily, totalitarian dictatorships efficiently prevent new money lords that could challenge our power from arising in whole continents, civilizations, and races.

Perhaps a few words on ideology proper are in order before I conclude. The only valid ideology, of course is rational egoism, that is, the maximization of the individual’s gratification by whatever means prove practical. This requires power over nature, especially, when possible, power over other humans who are the most versatile and valuable tools of all. Fortunately, we do not have a society of egoists. Money lords would be impossible in such a society as the mental spooks and rationalizations by which we characteristically manipulate and deceive would be a laughing stock Under such circumstances a policy of live and let live or true “laissez-faire” anarchy might be the only alternative. Certainly a hierarchical order would be difficult to maintain by force alone. However, in the current era, while minds are yet in the thrall of altruistic collectivistic, and divine moralistic spooks, the egoist’s rational course is to utilize such spooks to control others.

The next speaker, Professor M., will detail the key institution of our power: Central Banking.


4.  PROFESSOR M. ON THE ECONOMICS OF CENTRAL BANKING ~

“It (a bank) can take the depositors’ goods, the goods that it holds for safekeeping, and lend them out to people on the market. It can earn interest on these loans, and as long as only a small percentage of depositors ask to redeem their certificates at any one time, no one is the wiser.  Or, alternatively, it can issue pseudo warehouse receipts for goods that are not there and lend these on the market. This is the more subtle practice. The pseudo receipts will be exchanged on the same basis as the true receipts, since there is no indication on their face whether they are legitimate or not. It should be clear that this practice is outright fraud.” — Murray Rothbard: Man, Economy, and State

“The bold effort the present bank has made to control the Government, the distress it has wantonly produced,. . ., are but premonitions of the fate that awaits the American People should they be deluded into a perpetuation of this institution (The Bank of the United States), or the establishment of another like it.” — Andrew Jackson (December 2, 1834)

As you have a doctorate degree in economics from a great university I will touch as lightly as my verbosity allows on facts accepted by economic “science” and proceed to occult aspects of Central Banking.

Since the division of labor is the key to all human achievement and satisfaction, a system of exchange is crucial. Barter is hopelessly complicated. A command economy, in which each does and receives what be is told, is also hopelessly cumbersome and fails to take advantage of individual initiative, ability, and concrete knowledge. A medium of exchange, money, is the obvious solution. (Even our highly centralized economies on the socialist model now enthusiastically embrace money as an indispensable simplifying tool in their economic planning.)

When left to themselves people of a given geographical area settled upon a durable luxury commodity, usually gold or silver, to use as money. Because money is a store of value as well as a medium of exchange, people saved part of their gold income rather than spending it all. This gold was often stored in the vaults of a local goldsmith, the precursor of the modern banker, for safekeeping. The depositor received a receipt that entitled him to an equal quantity and quality of gold on demand from the goldsmith. At some point the goldsmith realized that there was no reason he could not loan out some of the gold for interest as long as he kept gold on hand sufficient to meet the fairly predictable withdrawal rate. After all, be simply promised to pay on demand, not bold the gold as such. Better yet, be could simply issue more receipts for gold than be bad gold and the receipts, renamed notes, could circulate freely among the populace as money.

However, he soon found that there was a definite limit set on this process by reality. Not all the extra notes issued circulated forever among the public. The rate of note redemption began to increase rapidly as the receipts passed into the hands of people unfamiliar with his reputation and especially when competitive goldsmiths, always eager for more gold reserves, came into possession of his notes. To prevent a disastrous run on his gold reserves, note issuance had to be kept within bounds. But the spending power of over-issuance was a grave temptation. Especially relished was the power over governments, industry, and merchants that the miraculous loan power of the goldsmith could obtain. Many succumbed to temptation, overextended themselves and brought ruin to their depositors while others slowly became wealthy bankers by pursuing conservative loan policies.

At this point, according to economic “science,” Central Banks are instituted to protect the public from periodic financial catastrophe at the hands of unscrupulous fractional reserve bankers. Nothing could be further from the truth. Central Banks are established to remove the limitation on over-issuance that reality places on competitive banking systems. As early as ancient Babylon and India, Central Banking, the art of monopolizing the issuance of money, had been developed into a perfect method for looting the general public. Even today many bankers copy the traditions of the earlier exploitive priesthoods and design their banks to resemble temples! Defenses of Central Banking are simply part of the deception that lies at the heart of all power elites.

Let us look at the way a new Central Bank is created where none has existed previously. We bankers approach the Prince or ruling assembly (both of whom always want more money to fight wars or to curry favor with the people and, typically, are ignorant of economics) with a compelling proposal: “Grant our bank a national Charter to regulate private banking and to issue legal tender notes, that is, force our notes to be accepted as payment for all debts, pubic and private. In exchange we will provide the government all the notes it prudently requires at interest rates easily payable with existing taxes. The increased government purchasing power thus created will simultaneously assure the power an prestige of the currently precarious nation and stimulate the sluggish, credit starved economy to new heights of prosperity. Most important the violent banking panics and credit collapses caused by unscrupulous private bankers will be replaced by our even handed, beneficent and scientific management of money and banking. Our public-spirited expertise will be at the disposal of the state while we remain independent enough of momentary political pressures to assure sound management.”

For a while this system seems to work remarkably well with full employment for everyone. The government an public does not notice that we issuers of the new notes are using the notes we create out of thin air to surreptitiously build economic empires at the expense of established interests. Because of the legal tender laws, few of the new notes issued by the Central Bank are returned for redemption in gold. In fact, private banks and even a few foreign banks may begin to use the Central Bank’s notes as reserves for further issuance of credit. Soon enough, though, prices begin to rise as the added notes increase demand relative to the quantity of goods and services. As the value of their savings decline more and more foreigners in particular begin to question the value of the Central Bank’s notes and start to demand redemption in gold. We, of course do not take responsibility for the rampant inflation when it comes.  We blame inflation on evil speculators who drive up prices for personal gain, as well as the greed of organized labor and business who are promptly made subject to wage and price controls. Even the consumer can be made to feel guilty for agreeing to pay the high prices! Mistaking symptoms for causes the government accepts the banker’s analysis of the problem and continues to give the Bank free reign in monetary policy.

By slowing the rate of note issuance periodically, the ultimate crisis stage is postponed until many decades after the original Central Bank Charter was granted. Before the rapidly dwindling gold reserves on which faith in our Bank depends is exhausted we abruptly contract our loan volume to private industry and government as well. With the contraction of the money supply a great deflationary crash begins in earnest with all its attendant unemployment, bankruptcies, and civil strife. We do not take responsibility for the depression. We blame it on evil hoarders who are refusing to spend their money and the prophets of doom who are spoiling business confidence. The government accepts this analysis and leaves monetary policy in our hands. If things go well we bankers channel the fury and unrest into puppet movements and pressure groups that carry our agents into full control of the government. Once in charge we devalue our outstanding bank notes in terms of gold and make them inconvertible for all but possibly foreign Central Banks and begin plans to restore a “prosperity” that will be totally ours.

When lucky, we are able to confiscate the gold of private citizens as punishment for hoarding during the climax of the depression.

Once the old order is subdued during the chaos of the crash and desperation of the depression, the field is open for our full finance capitalist system to be realized. If the money lords behind the Central Bank can avoid lapsing into political and economic competition among themselves a new and lasting order can be established. A war timed for this period of consolidation provides the perfect excuse for the regimentation required to crush all opposition.

Professor B., a former Chairman of a Central Bank, will explain the functioning of the Central Plank in the typical, fully developed finance capitalist system.


5.      PROFESSOR B. ON THE FUNCTION OF THE CENTRAL BANK IN THE MATURE FINANCE CAPITALIST SYSTEM ~

“We are undone, my dear sir, if legislation is still permitted which makes our money, much or little, real or imaginary, as the moneyed interests shall choose to make it.” — Thomas Jefferson

“From now on depressions will be scientifically created.” —  Congressman Charles A. Lindberg, Sr.-1923

In its pristine form a Central Bank is a private monopoly of a nation’s money and credit issuance supported by the coercive power of the state. That the Central Bank be directly in our hands is vital until our new order is firmly established throughout the governmental, business, intellectual and political spheres of society. After our order is consolidated, formal nationalization of the Central Bank with great fanfare is usually advisable in order to dispel any lingering suspicion that it is operated for private gain. Of course only loyal agents of the dynasty are allowed to obtain high offices in the Bank and our power remains intact. Obvious private monopolies are always the targets of sharp reformist agitators. Only the most paranoid, however, can see through the public facade to the private monopoly of the nationalized or quasi-nationalized Central Bank.

The Central Bank is the primary monopoly on which all our monopoly power depends. The occult power of the Central Bank to create money out of nothing is the fountainhead that fuels our far-flung financial and political empire. I will make a quick survey of a few of the ways this secret money power is brought to bear.

Basically, the power of our Central Bank flows from its control over the points of entry into the economy of new, inflationary money which it creates out of thin air. Ordinarily, bills of exchange, acceptances, private bonds, government bonds and other credit instruments are purchased by the Central Bank through specially privileged dealers in order to put the new money, often only checking accounting entries, into circulation. The dealers are allowed a large profit since they are fronts operated by our agents. Our purchase of government securities pleases the government, as our purchase of private debt pleases private debtors. As a quid pro quo to assure “good management” our agents are given directorships, managerial posts, and offices in the corporations and government’s so benefited. As the addiction to the narcotic of inflationary easy credit grows and grows we demand more and more control of our dependent entourage of governments and corporations. When we finally end the easy credit to “combat inflation” the enterprises and governments either fall directly into our hands, bankrupt, or are rescued at the price of total control.

Also, we ruling bankers control the flow of money in the economy through the wide authority of the Central Bank to license, audit, and regulate private banks. Banks that loan to interests outside the loyal entourage are “audited” by the Central Bank and found to be dangerously overextended. Just a hint of insolvency from the respected Central Bank authorities is enough to cause a run on the disobedient bank or at least dry up its vital lines of credit. Soon the banking establishment learns to follow the hints and nods of your father’s agents at the Central Bank automatically.

Further, the periodic cycles of easy money and tight money that we initiate through our control of the Central Bank cause corresponding fluctuations in all markets. Our inner circle knows in advance the timing of these cycles and, therefore reaps windfall profits by speculating in commodity, stock, currency, gold, and bond markets. Monopolistic stock and commodity Exchanges are a vital adjunct to our power made possible by our Central Bank power. We do not allow a fair auction market to exist, but make a great show of “tough” government regulation to create a false sense of confidence among small investors. With the aid of our regulatory charade and financial power we are able to maintain Exchanges tailored to our entourage’s need to manipulate stock prices at the expense of independent investors. Our privileged specialists on the floors of our Exchanges, aided by the propaganda of our financial press and brokerage houses, continually play on naivete and greed to drain the savings of the unwary into our coffers. The stock, commodities, and securities held in trading accounts by the Exchange and brokerage houses provides us with a clout far beyond our own actual holdings with which we can manipulate prices and win proxy fights for corporate takeovers.

Little danger to our lucrative racket exists from public-spirited regulation. Our manipulations are so complex that only the most brilliant experts could comprehend them. To most economists our Exchange operations appear to be helpful efforts to “stabilize” the market. We ruling bankers, if able to keep peace among ourselves, become richer and richer as time passes without the annoyance of exerting productive effort of benefit to others.

The next speaker, Professor G. will discuss the secrets of social legislation and policy that do so much to cement our power.


6.     PROFESSOR G. ON SOCIAL AND BUSINESSLEGISLATION AND POLICY ~

“There is no proletarian, not even a Communist, movement, that has not operated in the interests of money, in the direction indicated by money, and for the time being permitted by money–and that without the idealists among its leaders having the slightest suspicion of the fact.” — Oswald Spengler: “Decline of the West”

“Also at the (SDS) convention, men from Business International Roundtables… tried to buy up some radicals. These are the world’s leading industrialists and they convene to decide how our lives
are going to go… We were also offered Esso (Rockefeller) money. They want us to make a lot of radical commotion so they can look more in the center as they move to the left.” — James Kunen: “The Strawberry Statement: Notes of a College Revolutionary”

The danger to our system clearly is not that the “people” will spontaneously rise up and dispossess us. The “people” never initiate anything. All successful movements are led from the top, usually without the knowledge of the movement, by men like your father with vast resources and brilliant plans. The real danger arises in the upper-middle classes. Occasionally, these people make vast fortunes through some brilliant technological innovation in their business or through the favor of local politicians that escape our influence. Because of their ignorance of the reality of our power, however, the new rich usually fall easily into our hands. For instance, they seldom realize until too late that the dozens of loans they may owe to apparently independent banks can be called simultaneously with a mere nod from your father. Graver danger is presented by those whose enterprises are so successful as to be self-financing. Since the advent of the corporate income tax truly self-financing corporations are extremely rare. Most disquieting is when these upstarts acquire the covert or open support and advice of your father’s major international antagonists. This is particularly dangerous in countries with long democratic traditions where it is difficult to make our arbitrary rulings stick.

The best solution is to enact comprehensive taxes and business regulations in the name of the common good. Such measures reduce the incidence of significant upstart competition to manageable levels. This policy, of course, strangles innovation and productivity. Reduction of the GNPs in countries under your father’s control would be acceptable in the interests of secure power under the pretext of conservation, ecology, or no-growth stability except that if carried too far your father’s clout vis-a-vis his international rivals would be impaired. The most difficult problem for the money lord is determining the level of social and economic freedom he dares allow for the sake of his international power. Only method is to maintain a home base of carefully monitored, relative freedom on which to base the economic and military strength required to maintain an empire of totalitarian dictatorships abroad. The following measures, however, are found necessary by nearly all money lords:

1. Steeply Graduated Income Tax ~ Income tax does not affect us because our money was accumulated before the tax was imposed and most of it is now safely protected in our network of tax exempt foundations. Foundation income and capital can legally be used to finance the bulk of our social, economic, literary, and even political propaganda. In a pinch it is easily diverted to illegal uses. Expensive “studies” required by our profitable economic operations can be legitimately financed through foundations.

To the middle classes, however, income tax makes life into an endless treadmill. Even the most productive find themselves unable to accumulate significant capital. They are forced into the clutches of our Central Bank entourage for injections of the inflationary credit which we are privileged to create out of nothing. The self-financing wealth of the legendary 19th Century robber barons and early Twentieth Century tycoons is no longer possible. Although your grandfather owed his start to just those wide-open conditions, he was among the first of the super-rich to advocate the erection of the tax wall that is now in place. Please note that in democratic countries eternal vigilance is required to prevent our tax shield from being riddled with loop holes by conniving legislators, who are usually of the tax oppressed, upper-middle class origins themselves.

2. Business Regulation ~ When upstarts slip through our financial tentacles and tax shields, perhaps with the aid of outsiders, a second line of defense becomes vital licensing in the crucial area of broadcasting has proven particularly necessary. This makes serious upstart-led mass political challenge impossible. Harassment by bureaucrats armed with arbitrary and voluminous industrial safety regulations is a new and increasingly effective technique. Security registration requirements, “to protect the small investor,” can cause fatal delays in an upstart’s ability to raise capital on the stock market. Ecological considerations are easily perverted to stymie the plans of those who would upset the stability of our carefully planned system.

Anti-trust law, however, is our ultimate weapon. The handy doctrine of “pure and perfect” competition which we have fostered in our universities is ideally suited to convict any successful competitor, at our discretion. If the competitor charges a lower price than ours he is accused of “unfair competition” aimed at driving us from the field to impair future competition. If he asks the same price as we, he is open to the charge of collusion. If he charges more than us, he is obviously exploiting his “monopoly power” at the expense of the consumer. Fortunately, the rulings of our bureaucrats are so complicated that even when successfully appealed in court many years elapse before the ruling is rendered. By then our goals are often achieved through harassment.

Product quality, safety, and testing regulations are excellent methods by which we insulate our established industries from potential competition. Beside raising the costs of entry into the auto business, for instance, the cost of “safety” can be passed to the consumer along with a healthy profit mark-up.

3. Subsidies, Tariffs, and Foreign Aid ~ Although direct subsidies can occasionally be procured for our entourage of corporations by appealing to the masses’ desire to preserve jobs, this exploitive technique is usually too obvious. Tariffs are easily passed, but lead to retaliation against our foreign holdings. Foreign aid and soft (sure to be defaulted) government guaranteed loans, however, fill the bill perfectly under modern conditions. Foreign aid maintains our empire of foreign dictators abroad while providing guaranteed, highly profitable sales to our corporations at home base. Foreign aid should always be contingent on the purchase of goods, usually military hardware, that only our entourage of firms can provide. Few have the courage to oppose such altruistic aid to the “starving masses” of the “third world.”

4. Centralization of Power ~ Real division of power between national, state, and local government is dangerous to our system. When local politicians have real autonomy, even in limited spheres, they can do much to enable upstarts to challenge our power. Our program is to bring all levels of government under our sway through such innovations as federal aid, revenue sharing, high federal taxation, and regional government.

5. Alliance with the Lower Classes ~ In order to keep our valuable regulatory machinery in place and under our control we must have the mass support of the numerous lower classes against our vigorous, but scarce middle-class rivals. The best method is to provide the lower classes with subsidies at the expense of the middle class. This creates a mutual hatred that prevents the middle class from appealing effectively to the lower classes for support. Social security, free health care, unemployment benefits, and direct welfare payments, while doing nothing for us directly, create a dependent class whose support for our critical measures can easily be made part of a package deal. Please note also that the major labor unions began with our financing and are led to this day by leaders of our choosing. No one can rise to or remain at the top of a rough and tumble union without our financial backing. In spite of their rebellious rhetoric, bought union leaders are the source of our power over the management of firms with widely held stock. Unions are the ultimate weapon for destroying otherwise invulnerable, self-financing rivals. Further, downward flexibility of wages and prices which obtains without widespread unionization would increase the ability of the economy to survive without our aid during the economic crises we create.

Bread and circuses are as useful today as in Roman times for mobilizing the mob against our staid adversaries. Next, Professor D. will describe our education policies.


7.     PROFESSOR D. ON THE ROLE OF PUBLIC EDUCATION ~

“In our dreams we have limitless resources and the people yield themselves with perfect docility to our molding hands. The present educational conventions fade from our minds, and unhampered by tradition, we work our good will upon a grateful and responsive rural folk . . . The task we set before ourselves is a beautiful one, to train these people as we find them to a perfectly ideal life just as they are. So we will organize our children into a little community and teach them to do in a perfect way the things their fathers and mothers are doing in an imperfect way in the home, in shop, and on the farm.”  — The objective of Rockefeller “philanthropies” stated by him and Gates in Occasional Letter No. 1 of Rockefeller’s General Education Board.

“A general state education is a mere contrivance for molding people to be exactly like one another; and as the mold in which it casts them is that which pleases the predominant power in the government — whether this be a monarch, a priesthood, an aristocracy, or the majority of the existing generation — in proportion as it is efficient and successful, it establishes a despotism over the mind, leading by natural tendency to one over the body.” — John Stuart Mill

In order to maintain our system of power, the institution of universal public education is indispensable. The anarchy of private education in which any manner of dangerous ideas could be spread cannot be tolerated. Thus we make private education financially impossible to all but the few mostly the elite offspring of our financial entourage, by means of burdensome taxation and regulation. The primary purpose of public education is to inculcate the idea that our crucial institutions of coercion and monopoly were created for the public good by popular national heroes to blunt the past power of the malefactors of great wealth. Crucial is to create the impression that, although the people have been exploited in the past, today the wealthy are at the mercy of an all-powerful government which is firmly in the hands of the people or do-gooding liberals.

For those of more sophistication who reject this Pollyanna view of reality, we promote the “liberal reformer mentality” which holds that a new era of reform is on the verge of crushing forever the last vestiges of money lordism. Of course, the reforms, after taking shape as a bewildering myriad of regulatory agencies and taxes, are found to be ineffective in subordinating our power to the popular will, whereupon we stir up another era of progressive reform.

Our contrived Left-Right spectrum which our compulsory education helps to make universal is valuable in assuring that this charade does not get out of hand. The Pollyannas in the middle are neither dangerous nor useful in this endeavor. What is needed is a feeble, but persistent right-conservatism to moderate and emasculate the liberal reforms. Conservatives tend to resist all the advances in centralized, government power that we lead the liberals to see as necessary in order to totally end the “undemocratic” power of money in society. Conservatism would rather promote a “pluralism” of competing interests in which money is the medium of competition than risk the excesses of “big government,” When “liberal” reforms show signs of exceeding our intentions and actually threaten to place our key institutions in the hands of the people, we can always count on the conservatives to defend our power under the illusion that they are defending the legitimate rights of “free-enterprise capitalists.” On the rare occasions when conservatives call for subjecting our enterprises to laissez-faire competition, we can count on the dominant liberal reformers to insist on more government interference, unaware of our desire for such, in effect, self-administered regulation.

The Right has such a fear of the Left’s dream of democratic collectivism and the Left such a hatred for what it sees as the Right’s elitist, rugged individualism that there is little danger that they will ever join forces to overturn our government-backed monopolies even though we violate the ideals of both left and right.

Centralization of control at the state, or preferably national level, assists in building the climate of opinion we require in public education. Failing to obliterate local control, other methods nearly as effective are available. Our overwhelming financial clout in the publishing industry can induce relatively uniform textbook selection. Further leverage can be created by promoting teacher colleges and teaching machines. National teacher’s associations and unions are also an excellent power base from which to foster our programs of indoctrination.

With our great influence in publishing and publicity we are able to, selectively popularize educational theorists whose views are incidentally beneficial, compatible, or at least not in conflict with our own goals. This way we obtain sincere, energetic activists to propagate our desires without having to reveal our motives or even existence. We do not want an educational system that produces hard-driving individuals bent on amassing great wealth and power. Therefore, we discourage education that would develop the potential powers of students to their fullest. “Liberal” education that stresses knowledge for its own sake or even sophistry and sterile mental gymnastics is of no danger to us. “Relevant,” vocational, or career-oriented education also poses no danger to our power. Education that prepares students to accept a cog-like existence in our military-industrial-social-welfare-regulation complex is ideal. Progressive education with its stress on “social adjustment” also produces the conformity we require of our subjects. Emphasis on competitive sports may produce a certain amount of disruptive competitiveness among the participants, but primarily has the effect of creating life-long voyeuristic spectators who will enthusiastically sublimate their competitiveness into endless hours of following college and professional sports on the boob tube. Space spectaculars and dramatic political infighting are also marvelous diversions with which to occupy the masses.

Anyone seeking social change will gravitate to the field of education. Our strategy is simple: Let only those succeed whose influence would be compatible with our power. Encourage all who would develop the passive or receptive mode of existence. Discourage all who promote the aggressive or active capacities. Build a great cult of salvation through endless education, touting it as the “democratic” path to success Deride the frontal approach to success of the “outmoded’ rugged individualist.

Before yielding the floor to Professor X., who will discuss the role of secret societies and prestigious clubs, I would like to comment on the demise of religious education as a vehicle for social control. Religion, in its time, was a remarkable weapon for inculcating subservience, altruism, and self-abnegation among our subjects. We did not give up this weapon voluntarily. Your grandfather, for one, supported the Baptist faith well after most finance capitalists had turned wholly to secular ideologies. However, a trend toward rationality in human affairs plods along inexorably quite outside the reach of our power. Only in our totalitarian dictatorships can this trend be quashed entirely. In the semi-open societies in which our money power is based, the forces of reason can only be impeded and diverted. Some have theorized that, eventually, widespread rational egoism will overturn our order. I am confident that secular faiths and just plain confusion will suffice to sustain our power for many centuries to come.


8.      PROFESSOR X. ON PRESTIGIOUS ASSOCIATIONS AND SECRET SOCIETIES ~

“Every compulsion is put upon writers to become safe, polite, obedient, and sterile. In protest, I declined election to the National Institute of Arts and Letters some years ago, and now I must decline the
Pulitzer Prize.” — Upton Sinclair

“It is useless to deny, because it is impossible to conceal, that a great part of Europe–the whole of Italy and France and a great portion of Germany, to say nothing of other countries–is covered with a network of these secret societies, just as the superficies of the earth is now being covered with railroads.” — Benjamin Disraeli (Earl of Beaconsfield), July 14, 1856

In preserving and protecting our grasp on nations we must exert veiled control of all major opinion molding associations and especially prestigious clubs which attract the leaders in various fields and do so much to influence the dispensing of commanding positions in government and business. Associations of the leading scholars, businessmen, writers, religionists, artists, bureaucrats, newsmen, ideologists, publishers, broadcasters, and professional men as well as special interest groups representing laborers, farmers, consumers, racial minorities, and so on must be subtly kept under the broad limits of our sway. Since membership dues and fees are never sufficient to support their ambitious activities, voluntary, non-profit organizations are easy prey for the nearly unlimited financial resources of our entourage. However, our real motive, to further our political and economic power, must not be revealed in the process. Our policies must be laboriously rationalized in terms compatible with prevalent ideologies and moralities or the material advantage of the groups involved. Leaders of such groups are remarkably quick to accept our rationalizations when financial support is extended. We engage in outright bribery only as a last resort, and then, only in extreme cases. Our long-range interests are better served by temporarily postponing a policy victory than by risking exposure of our power by attempting outright bribery. In fact, clumsy bribery and intimidation attempts are characteristic of our foolish nouveau-riche opponents.

As an example, if we decide that federal rather than state chartering or licensing of corporations would further our control over the economy, we would not simply order politicians and opinion leaders to support our desires. Corporations not relishing central control would be suspicious that something was afoot and might expose our plot. Our strategy would be as follows:

1. Sacrifice one of our less competent management teams in a well-publicized corporate scandal in order to focus attention on the “widespread problem of corporate corruption under current, lax regulations.”

2. Through well-funded agents, thrust into the publicity spotlight intellectuals or groups who already support federal licensing as a piecemeal step toward socialism. (One can find pre-existing supporters for nearly any measure with sufficient effort.)

3. After the issue is before the public, offer to support through foundations the “objective” study of the federal licensing proposals being discussed with an eye toward proposing legislation. Often, simultaneous support for studies by disreputable, irrational groups who will oppose the proposal is useful as well. Provide no platform for
well-reasoned opposition.

4. When a ground swell of support appears to be building provide the interested lobbying organizations with plenty of funds to grease the palms of politicians. The enactment of the federal licensing law thus appears as the will of society. Last-ditch opposition automatically appears mean spirited, obstructionist, reactionary, and paranoid, serving only to discredit our opposition.

In our fully developed system of finance capitalist thought control and promotion control, our hierarchy of prestigious associations is capped by a single prestige society: The Council of World Affairs. This organization is a front for the secret society of which your father is head. This secret society is made up of the people who have spoken, plus six others not present. You are replacing Professor Q. who is to retire shortly. Eventually you will replace your father. We thirteen are your father’s advisors and only confidants. All other agents are misled as to the bulk of our objectives and motives. Their knowledge is restricted to the details required by their assignments. The penalty for disloyalty is death.

The Council is invaluable for propagating our policy decisions to our entourage without revealing our motives and strategy. In many instances, policy can he successfully sold to our entourage and thus transmitted to the multitudes by merely airing it along with appropriate rationalizations in a single awe-inspiring session of the Council. The informal power of the Council is such that our policy manipulations are usually attainable without the clumsy exercises in brute power that invariably snag the independent power seekers. The Council is at the heart of what is called the Establishment and we are at the heart of the Council.

At the Council’s inception, we worked hard to attract the successful of all fields with all the prestige that our money power could buy. We had to work hard convincing the independent, self-made Council members to move in harmony with our policy objectives. We had many failures. Now everything is changed. Membership is no longer a reward for success as much as it is a prerequisite for major success. Without Council membership only the most outstanding can achieve national prominence. With membership, glaring mediocrities, with the “right” attitudes, achieve prominence. In fact, mediocrities are much more adapted to propagating our policy rationalizations and less likely to detect and oppose our ulterior motives. A power lusting mediocrity is not likely to judge his benefactors too harshly or inquire diligently into the nature of the power structure that brought him what he fears was undeserved success. The vanity of even idealistic, committed humanitarians militates against such a course.

The Council is now a giant employment agency of loyalists ready to parrot our public line from the commanding posts of government, foundations, broadcasting, industry, banking, and publishing. Although Council members are encouraged to take sides and bicker over the diversionary issues we create to entertain and enfeeble the populace, their solidarity in defending our power structure, root and branch, when pressed is a sight to behold! And to think that most see themselves as righteous defenders of the public good while they dismiss whispered rumors of our power structure as “kooky paranoia.”

Classical secret societies with elaborate circles within circles no longer play a major role in finance capitalist power structures. Most wide membership secret societies have degenerated into middle class excuses for escaping the wife and kids once a month for the company of men. But secret societies were a major weapon of our bourgeoisie forebearers in their struggle with the old feudal order of kings and princes. Under authoritarian despotism of the old style, the secret society was the only place a free-thinking man could express himself. Through threats of exposure, loyalty oaths, patronage, deception, and rewards we bound such malcontents into a fierce force for our revolution. The multitude of degrees, occult mumbo-jumbo, and vague humanitarianism concealed the real goals of our secret societies from the bulk of the membership. The roles of the “Illuminated” Masonic Lodges in European revolutions were decisive in our final victory over the old order.

I now yield the floor to Professor Y. who will discourse on the real “secret societies” the Modern Finance Capitalist State:  the National Security Institutions and Intelligence Agencies.


9.     PROFESSOR Y. ON COVERT OPERATIONS AND INTELLIGENCE ~

In our fully developed state-capitalist systems we have found absolute control of governmental intelligence gathering and covert operations to be vital.

Besides providing a valuable tool in our struggle with rival dynasties, such control is now an integral and necessary part of our day-to-day operations. Large intelligence communities are inevitable, given the system of all encompassing governments which we have imposed upon the world during our ascent to power. Our power would be short-lived indeed if the pervasive influence and power of these iron-disciplined intelligence agencies fell into the hands of mere politicians, especially those beyond our control.

We do not allow intelligence agencies to pursue the “national interest,” the way the public conceives “spies” to operate. Politicians cannot be permitted to divert the power and influence of our intelligence community from the esoteric requirements of our Money Power to petty political struggles.

Neither nationalistic aspirations of races and peoples nor ideological visions of intellectuals for humanity can be allowed to pervert intelligence and covert operations. Our rationalizations, both within the intelligence community and to the public at large, must be diverse and flexible, but the intelligence community must further without exception the inexorable goals we have set for humanity.

No crisis is more serious for our Money Power than an attempt by a head of government to assume personal control of intelligence and operations or to by-pass existing agencies by setting up parallel ones. Such intrusions must be met decisively. Although a contrived scandal to remove the offending politician from office is the first line of defense, we dare not shrink from assassination when necessary.

Perhaps the most accurate overview of our intelligence community can be achieved by visualizing it as a “nationalized secret society.” Our predecessors, in their struggle against the old order of kings and princes, had to finance secret societies such as the Illuminati, Masons, German Union, etc. out of their own pockets.

At great expense and risk such secret societies were able to infiltrate the major governmental and private institutions of the nations that our noble predecessors targeted for take over by the Money Power. Such bureaucratic takeovers are expensive and time consuming. They can be considered complete only when promotions, raises, and advancements are no longer based on objective service to the stated organizational objectives, but are in the hands of the infiltrating group and its secret goals.

How much easier it is for us, the inheritors of a fully developed state-capitalist system! By appealing to “national security” we are able to finance and erect secret societies of a colossal scope, far beyond the wildest dreams of our path breaking predecessors. Besides the benefits of public financing reaped by these “nationalized secret societies,” we obtain a decisive advantage from the fact that these our “spook” operations are sanctioned by law!

Maintaining discipline, loyalty, and secrecy is no longer solely a matter of propaganda, blackmail, patronage, and intimidation. Although these remain important tools, especially in emergency cases, ordinary discipline among initiates (now called agents) can be encouraged by appealing to patriotism and can be enforced in courts of law by prosecuting “national security violations.”

As massive as our intelligence community has become in itself, we still operate strictly on the finance capitalist principle of leverage. Just as a rational finance capitalist never owns more stock in a corporation than the bare minimum required for control, intelligence operatives are placed only in as many key positions as are required to control the target organizations. Our goal, after all, is agent control of all significant organizations, not intelligence community member ship for the entire population.

The organizational pattern of baffling “circles within circles,” characteristic of classical secret societies, is retained and refined by our intelligence community. That “one hand not know what the other is doing” is essential to the success of our operations. In most cases, we do not allow the operatives themselves to know the ultimate, and when possible, even the short-range objectives of their assignments.

They operate under “covers” that disguise our goals not only from the public and target groups, but from the agents themselves. For instance, many agents operating under “left cover” are led to believe that the agency, or at least their department, is secretly, but sincerely motivated by socialistic ideology. Thus, they assume that the intelligence agency’s ultimate goal is to guide left-wing groups in “productive” directions, even though they cannot always see how their own assignment fits into those assumed goals.

Other “left-cover” agents, those with right-wing predilections, are encouraged to believe the agency is simply “monitoring” violence prone, subversive groups in order to protect the public. When such agents are asked to participate in or even lead radical activity they assume that the ultimate objective is to fully infiltrate and destroy the organization for the good of the country. This is very seldom the case. We waste little or no money protecting the “public” or defending the “nation.”

Agents operating under “right-cover” are handled in symmetrical fashion. Agents with right-wing prejudices are encouraged to believe the agency is right-wing. Left-prejudiced agents are asked to operate under “right-cover” in order to “monitor” dangerous rightist organizations. Most intelligence agents remain blithely ignorant of the big picture which is so clear to us from our spectacular vantage point. Very few have enough information or intelligence to reason out how their specific and sometimes baffling assignments promote the legislative, judicial, operational and propaganda needs of our Money Power. Most would never try. They are paid too much to think about such things.

Agents with a “gangster-cover” are of two types. First, there is the sincere gangster that draws his salary from an intelligence agency. He is led to believe that the gangland “Godfathers” control the government agency for their own purposes. Actually, the situation is the opposite. The agency controls the gangster for other purposes. Second, is the sincere crime fighter who is led to believe that the agency is at tempting to infiltrate and monitor the gangsters as a preliminary step to destroying organized crime. Such “upstanding” agents commit many crimes in their zeal to rid the country of organized crime!

To envision how we operate in this lucrative field, let’s briefly look at the mechanics of dope smuggling. Police and customs officials are told to leave certain gangsters alone, even when transporting suspicious cargoes. This is made to seem perfectly proper since it is well known that secret police infiltrators of organized crime must participate in crimes in order to gain the confidence of gangsters.

What customs agent would want to upset a carefully laid plan to “set-up” the underworld kingpins of dope pushing! But the agent, as well as the police who cooperate, are mistaken in believing that the purpose of the assignment to help smuggle dope is ultimately to smash organized crime. If he could see the big picture, as we can, the agent would see that practically all our dope is smuggled by federal intelligence agents and secret police! How ever could such a volume be transported safely? Real harassment and prosecution is reserved for those who enter the field without our approval.

Here is our organized crime strategy: On the one hand we pass laws to ensure that mankind’s favorite pastimes (vices) are illegal. On the other hand, we cater to these “vices” at a huge monopoly profit with complete immunity from prosecution.

A new and growing methodology of our intelligence community is psychologically and drug-controlled agents. Properly, these are referred to as “behavior modified” agents, or, in the vernacular, “zombies.” With the use of hypnotic drugs, brain washing, sensory deprivation, small group “sensitivity” training, and other behavior modification techniques, the scope of which was hinted in the movie “Clockwork Orange,” complete personalities can be manufactured from scratch, to the specifications of value structure profiles we design by computer to suit our purposes. Such personalities are quite neurotic and unstable due to defects in our still developing technology, but still useful for many purposes.

The primary virtue of “zombies,” of course, is loyalty. Agents that are subconsciously programmed for the assignment at hand cannot be conscious traitors. All a “zombie” can do is reveal how compulsive and psychotic he is with regard to his “cause.” Even to trained psychologists he simply appears to be the proverbial “lone nut.” Although the “zombie” may have memories of psychotherapy at a government agency when questioned under hypnosis, this is unlikely to raise suspicion in the mind of court-appointed psychologists. After all, “lone nuts” should be kept in insane asylums and subjected to psychotherapy! At most, the government hospital will be reprimanded for letting a loony loose before he was cured.

Until our techniques can be perfected the use of “zombies” must be restricted to “national dramas” designed to justify the growing power of our centralized governments over the lives of our people. Most suicidal radicals and “crazies” who so mysteriously avoid arrest for years at a time are “zombies” conditioned to terrorize the public in the name of some irrational ideology. After repeated doses of such terror, the public is conditioned to accept the necessity of our intrusive police state with very little objection.

The way is clear for an accelerated program of behavior modification research to be conducted mostly at public expense in the name of mental health and rehabilitation. Such research can be conducted with little complaint in prisons, refugee camps, drug rehabilitation centers, government hospitals, veterans hospitals, and even public schools and day care centers. Mental institutions, methadone maintenance centers, and prisons are fertile fields for recruiting the deranged or drug-addicted persons most suitable for “zombie” conversions. Of course, only a few of our most trusted agents actually participate in the creation of “zombies.” The brilliant researchers and experimenters who make most of the breakthroughs earnestly believe that their techniques are destined strictly for the betterment of mankind.

Inevitably, a fraction of the population objects to behavior modification as an infringement of man’s “sacred” free will even if they are convinced that our intentions are benign. We carefully leak a few scandals to satisfy such persons that our experiments are being kept within bounds and that excesses are being stopped. Our artificial scandals exposing the “excesses” of coercive psychology are carefully designed to make the researchers seem incompetent and clumsy to the point of maiming and killing their “patients.” This effectively conceals the fantastic strides we have made toward total behavioral control. Great things are going to be possible in the future.

I now return the floor to your father for his concluding remarks.


10.     MY CLOSING REMARKS ~

My son, you surely have many questions about my strategy in the seemingly momentous economic and political crises that are shaking national and international affairs. You and I will begin handling them in detail shortly. For tonight, let me be brief. Most of the current national upheavals are stage-managed to consolidate our monopoly position in government and business against the continual nuisance of economically competent, but politically naive competitors. Likewise, most international crises are managed to exert pressure on our obstreperous, reluctant puppet dictators in underdeveloped areas. These events are fairly easy to manage. I expect to place such management in your hands as soon as possible.

The real challenge lies in dealing with my international peers. These are the real crises since they are crises of my power structure, not just of my subject populations and puppets. In the vast chess game with my peers there are no rules and no proven tactics. Mutual vulnerability, alone, limits the conflict. My peers and I have labored for decades to erect a world government and banking system under which we could all share finance capitalism’s millennium without the nightmare of internecine warfare. With the advent of nuclear war a new world order seemed particularly desirable. I say ostensibly we have labored for world government because none of us are sure the others will ever voluntarily surrender sovereignty to the group. The schedule set after the last World War has not been met. So far, the world government idea has served mainly to enthuse collectivist intellectuals, and secondarily to veil each finance capitalist’s maneuvers for supremacy from the rest.

The future course of finance capitalism is difficult to predict. Our empires are too fragile to risk all-out battles for supremacy among ourselves. Our power would dissipate to second echelon wealthy during the struggle. Yet we continue to chip away at rival empires on the premise that offense is the best defense. On the other hand, purely political leaders are helpless before our money power. When Caesars arise, they are of our making.

Perhaps our system will simply remain much as it is, secure on the national level and disturbingly pluralistic at the international level, until reason and egoism have developed among our populations to such an extent that our occult technology of money power becomes obvious to all who think and must yield to either anarchy or a more advanced form of deception.


11.    AFTERWORD BY THE TRANSCRIBER ~

“The names of some of these banking families are familiar to all of us and should be more so. They include Baring, Lazard, Erlanger, Warburg, Schroder, Seligman, the Speyers, Mirabaud, Mallet, Fould, and above all Rothschild and Morgan.” — Dr. Carroll Quigley: “Tragedy and Hope”

Any resemblance of these characters to persons living or dead is purely coincidental. Any resemblance of their methodology to that of real ruling elites is purely intentional. The extent to which I represent or exaggerate the self-conscious, intentional power technology of real politico-economic rulers and their unity is for the reader to decide after studying available empirical evidence.

I am providing a bibliography of relevant historical works to aid the curious reader. I have included no works written from spurious pluralistic suppositions no one seems to consider pluralism as a proposition requiring evidence since they are flooding the market. Unfortunately, many works listed affirm that ideas rather than individual struggles for wealth and power propel history; that is, they view the elites they observe ruling the world as ideologically motivated. Thus we have the spectacle of the Right claiming that major finance capitalists such as the Rockefellers or Rothschilds are “communist” conspirators or “socialists.” On the other hand, we see the Left claiming that the same people are bent on imposing laissez -faire capitalism, or in a slightly more realistic vein, are fanatical proponents of fascism. Virulent white racism is another ideology foolishly ascribed to the ruling class by the Left. This opinion is nicely balanced by the charge from the Right that the elite wants to “mongrelize” and thus submerge the white race. As usual the elite, completely free of prejudice, supports both sides of this battle for its own ends.

As should be clear by now, I believe that finance capitalists (Ferdinand Lundberg has dubbed them finpols, or financial politicians) are understandably attempting to make their power as extensive as possible without incurring the severe risks which plague pubpols (public politicians). (It seems that only the most daring finpols are willing to take on the additional risks of pubpoldom, perhaps only because they are denied the reins to the family’s fortune by more privileged relatives.) Pubpols lose their privacy and thus their right to sexual impropriety in addition to incurring vulnerability to electioneering and worse in “democratic” countries. In most areas of the world the lot of the pubpols is even worse. Purge, assassination, and armed coup are regular events. While totalitarianism of Right or Left at home eliminates the shield of secure private property desired by finpols, laissez–faire is likewise rejected out-of-hand as hell-on-earth by enlightened power-seekers.

Egoism, mitigated only by the reality of circumstance, is the motive to realistically attribute to healthy elites. An elite under the spell of mental spooks could not hold sway for long. Although finpol statism is increasingly a crisis for its victims, there is as yet no evidence that the elite itself is in serious crisis. Even inflation, the current crisis for the powerless, is simply another crisis to be managed toward the end of consolidating, extending, and refreshing elite power. No doubt the depression which must inevitably follow will be managed to even better effect at the expense of the masses.

I have classified the bibliography into the categories Right and Left. In each list I begin with the most objective works and proceed to the works most infected with mental spooks and emotional hysteria. These books should be read for empirical data, not theoretical insight. A list of less ideologically biased works is provided as well. I quote and recommend authors, not to imply support for my scenario where there is none, but to credit a few of those who have provided grist for my thoughts.


12.    BIBLIOGRAPHY ~

“We are much beholden to Machiavelli and others, that write what men do, and not what they ought to do.” — Francis Bacon

Indispensable Thoughts on History, Economics, Politics, Philosophy, and Human Nature:

Murray N. Rothbard: Economic Determinism and the Conspiracy Theory of History Revisited; Audio-Forum.

Nash: America’s Great Depression;1972.

Carroll Quigley: Tragedy and Hope; Macmillan, 1966

Gabriel Kolko: The Triumph of Conservatism; Quadrangle

Carroll Quigley: The Evolution of Civilizations.

Anton S. LaVey: The Satanic Bible; Avon Books, 1969.

Arkon Daraul: Secret Societies; Citadel Press, 1962.

Count Egon Caesar Corti: The Rise of the House of Rothschild; ibid.,  The Reign of the House of Rothschild; Cosmopolitan Book Corp., 1928.

Max Stirner: The Ego and His Own; Libertarian Book Club, 1963.

Robert Ardrey: The Social Contract; Dell Publishing; 1970.

Friedrich Nietzsche: Beyond Good and Evil: Prelude to a Philosophy of the Future; Random House, 1966.

George Orwell: Animal Farm; New American Library

Niccolo Machiavelli: The Prince.

Ludwig von Mises: Theory and History; Arlington House, 1969.

Henry Regnery: Human Action; 1966.

James J. Martin: Revisionist Viewpoints; Ralph Myles Publisher, 1971.

Committee on Government Operations, U.S. Senate: Disclosure of Corporate Ownership; U.S. Government Printing Office, 1974.

Antony C. Sutton: Wall Street and the Bolshevik Revolution; ibid., Wall Street and FDR; Arlington House, 1975.

The Left on the Ruling Class:

Gabriel Kolko: The Triumph of Conservatism; Quadrangle Books, 1967.

Richard Ney: The Wall Street Gang; Praeger Publishers, 1974.

Ferdinand Lundberg: The Rich and the Super-Rich; Lyle Stuart, 1968.

Ferdinand Lundberg: America’s 60 Families; Vanguard, 1938.

William G. Domhoff: Who Rules America?; Prentice Hall, 1967.

W.G. Domhoff: The Higher Circles; Random House, 1970.

Matthew Josephson: Money Lords; New American Library, 1973.

M. Josephson: The Robber Barons; Harcourt Brace & Co., 1934.

George H. Shibley: The Money Question; Stable Money Publishing Co., 1896.

Jules Archer: The Plot to Seize the White House; Hawthorn Books, 1973.

William Hoffman: David: Report on a Rockefeller; Dell Publishing, 1972.

Joel Andreas: The Incredible Rocky; North American Congress on Latin America, 1973.

Gustavus Myers: The History of the Great American Fortunes; 1907

The Right on the Conspiracy Theory of History:

Antony C. Sutton: National Suicide; Arlington House, 1973.

Charles A. Lindbergh, Sr.: The Economic Pinch; Dorrance & Company, Inc., 1923, Reprinted by Omni Publications.

Louis T. McFadden: Collective Speeches of Congressman McFadden; Omni Publications, 1970.

H.S. Kenan: The Federal Reserve Bank; The Noontide Press, 1968.

Gary Allen: None Dare Call It Conspiracy; Concord Press, 1973.

G. Allen: Richard Nixon: The Man Behind the Mask; Western Islands, 1971.

G. Allen: The Rockefeller File; ’76 Press, 1976.

Dan Smoot: The Invisible Government; The Dan Smoot Report, Inc., 1962.

W. Cleon Skousen: The Naked Capitalist; The Author, 1970.

Taylor Caldwell: Captains and Kings; Fawcett Publications, 1973.

John Robison: Proofs of Conspiracy; 1798, Reprinted by Western Islands.

Nesta Webster: Secret Societies and Subversive Movements; Christian Book Club, 1967.

A. N. Field: The Truth About the Slump; 1931, Reprinted by Omni Publications, 1962.

William Robert Plumme: The Untold History; The Committee for the Restoration of the Republic, 1964.

June Grem: Karl Marx: Capitalist; Enterprise Publications, 1972.

Emanuel Josephson: Rockefeller Internationalist: Man Who Misrules the World; Chedney Press, 1962.


1 Comment

Filed under Cover-up!, Documents, Economic Meltdown, Esoteric, Police State, World at War, Zionism

New Legislation Authorizes FEMA Camps In U.S.

Paul Joseph Watson
Prison Planet.com
Tuesday, January 27, 2009

New Legislation Authorizes FEMA Camps In U.S. 270109top

A new bill introduced in Congress authorizes the Department of Homeland Security to set up a network of FEMA camp facilities to be used to house U.S. citizens in the event of a national emergency.

The National Emergency Centers Act or HR 645 mandates the establishment of “national emergency centers” to be located on military installations for the purpose of to providing “temporary housing, medical, and humanitarian assistance to individuals and families dislocated due to an emergency or major disaster,” according to the bill.

The legislation also states that the camps will be used to “provide centralized locations to improve the coordination of preparedness, response, and recovery efforts of government, private, and not-for-profit entities and faith-based organizations”.

Ominously, the bill also states that the camps can be used to “meet other appropriate needs, as determined by the Secretary of Homeland Security,” an open ended mandate which many fear could mean the forced detention of American citizens in the event of widespread rioting after a national emergency or total economic collapse.

Many credible forecasters have predicted riots and rebellions in America that will dwarf those already witnessed in countries like Iceland and Greece.

With active duty military personnel already being stationed inside the U.S. under Northcom, partly for purposes of “crowd control,” fears that Americans could be incarcerated in detainment camps are all too real. 

The bill mandates that six separate facilities be established in different Federal Emergency Management Agency Regions (FEMA) throughout the country.

The camps will double up as “command and control” centers that will also house a “24/7 operations watch center” as well as training facilities for Federal, State, and local first responders.

The bill also contains language that will authorize camps to be established within closed or already operating military bases around the country.

As we have previously highlighted, in early 2006 Halliburton subsidiary Kellogg, Brown and Root was awarded a $385 million dollar contract by Homeland Security to construct detention and processing facilities in the event of a national emergency.

The language of the preamble to the agreement veils the program with talk of temporary migrant holding centers, but it is made clear that the camps would also be used “as the development of a plan to react to a national emergency.”

As far back as 2002, FEMA sought bids from major real estate and engineering firms to construct giant internment facilities in the case of a chemical, biological or nuclear attack or a natural disaster.

A much discussed and circulated report, the Pentagon’s Civilian Inmate Labor Program, was more recently updated and the revision details a “template for developing agreements” between the Army and corrections facilities for the use of civilian inmate labor on Army installations.”

Alex Jones has attended numerous military urban warfare training drills across the US where role players were used to simulate arresting American citizens and taking them to internment camps.

Read the new legislation in full below.

————————————————————————

National Emergency Centers Establishment Act (Introduced in House)

HR 645 IH

111th CONGRESS

1st Session

H. R. 645
To direct the Secretary of Homeland Security to establish national emergency centers on military installations.

IN THE HOUSE OF REPRESENTATIVES

January 22, 2009
Mr. HASTINGS of Florida introduced the following bill; which was referred to the Committee on Transportation and Infrastructure, and in addition to the Committee on Armed Services, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned

——————————————————————————–

A BILL
To direct the Secretary of Homeland Security to establish national emergency centers on military installations.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the `National Emergency Centers Establishment Act’.

SEC. 2. ESTABLISHMENT OF NATIONAL EMERGENCY CENTERS.

(a) In General- In accordance with the requirements of this Act, the Secretary of Homeland Security shall establish not fewer than 6 national emergency centers on military installations.

(b) Purpose of National Emergency Centers- The purpose of a national emergency center shall be to use existing infrastructure–

(1) to provide temporary housing, medical, and humanitarian assistance to individuals and families dislocated due to an emergency or major disaster;

(2) to provide centralized locations for the purposes of training and ensuring the coordination of Federal, State, and local first responders;

(3) to provide centralized locations to improve the coordination of preparedness, response, and recovery efforts of government, private, and not-for-profit entities and faith-based organizations; and

(4) to meet other appropriate needs, as determined by the Secretary of Homeland Security.

SEC. 3. DESIGNATION OF MILITARY INSTALLATIONS AS NATIONAL EMERGENCY CENTERS.

(a) In General- Not later than 60 days after the date of the enactment of this Act, the Secretary of Homeland Security, in consultation with the Secretary of Defense, shall designate not fewer than 6 military installations as sites for the establishment of national emergency centers.

(b) Minimum Requirements- A site designated as a national emergency center shall be–

(1) capable of meeting for an extended period of time the housing, health, transportation, education, public works, humanitarian and other transition needs of a large number of individuals affected by an emergency or major disaster;

(2) environmentally safe and shall not pose a health risk to individuals who may use the center;

(3) capable of being scaled up or down to accommodate major disaster preparedness and response drills, operations, and procedures;

(4) capable of housing existing permanent structures necessary to meet training and first responders coordination requirements during nondisaster periods;

(5) capable of hosting the infrastructure necessary to rapidly adjust to temporary housing, medical, and humanitarian assistance needs;

(6) required to consist of a complete operations command center, including 2 state-of-the art command and control centers that will comprise a 24/7 operations watch center as follows:

(A) one of the command and control centers shall be in full ready mode; and

(B) the other shall be used daily for training; and

(7) easily accessible at all times and be able to facilitate handicapped and medical facilities, including during an emergency or major disaster.

(c) Location of National Emergency Centers- There shall be established not fewer than one national emergency center in each of the following areas:

(1) The area consisting of Federal Emergency Management Agency Regions I, II, and III.

(2) The area consisting of Federal Emergency Management Agency Region IV.

(3) The area consisting of Federal Emergency Management Agency Regions V and VII.

(4) The area consisting of Federal Emergency Management Agency Region VI.

(5) The area consisting of Federal Emergency Management Agency Regions VIII and X.

(6) The area consisting of Federal Emergency Management Agency Region IX.

(d) Preference for Designation of Closed Military Installations- Wherever possible, the Secretary of Homeland Security, in consultation with the Secretary of Defense, shall designate a closed military installation as a site for a national emergency center. If the Secretaries of Homeland Security and Defense jointly determine that there is not a sufficient number of closed military installations that meet the requirements of subsections (b) and (c), the Secretaries shall jointly designate portions of existing military installations other than closed military installations as national emergency centers.

(e) Transfer of Control of Closed Military Installations- If a closed military installation is designated as a national emergency center, not later than 180 days after the date of designation, the Secretary of Defense shall transfer to the Secretary of Homeland Security administrative jurisdiction over such closed military installation.

(f) Cooperative Agreement for Joint Use of Existing Military Installations- If an existing military installation other than a closed military installation is designated as a national emergency center, not later than 180 days after the date of designation, the Secretary of Homeland Security and the Secretary of Defense shall enter into a cooperative agreement to provide for the establishment of the national emergency center.

(g) Reports-

(1) PRELIMINARY REPORT- Not later than 90 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting jointly with the Secretary of Defense, shall submit to Congress a report that contains for each designated site–

(A) an outline of the reasons why the site was selected;

(B) an outline of the need to construct, repair, or update any existing infrastructure at the site;

(C) an outline of the need to conduct any necessary environmental clean-up at the site;

(D) an outline of preliminary plans for the transfer of control of the site from the Secretary of Defense to the Secretary of Homeland Security, if necessary under subsection (e); and

(E) an outline of preliminary plans for entering into a cooperative agreement for the establishment of a national emergency center at the site, if necessary under subsection (f).

(2) UPDATE REPORT- Not later than 120 days after the date of the enactment of this Act, the Secretary of Homeland Security, acting jointly with the Secretary of Defense, shall submit to Congress a report that contains for each designated site–

(A) an update on the information contained in the report as required by paragraph (1);

(B) an outline of the progress made toward the transfer of control of the site, if necessary under subsection (e);

(C) an outline of the progress made toward entering a cooperative agreement for the establishment of a national emergency center at the site, if necessary under subsection (f); and

(D) recommendations regarding any authorizations and appropriations that may be necessary to provide for the establishment of a national emergency center at the site.

(3) FINAL REPORT- Not later than 1 year after the date of the enactment of this Act, the Secretary of Homeland Security, acting jointly with the Secretary of Defense, shall submit to Congress a report that contains for each designated site–

(A) finalized information detailing the transfer of control of the site, if necessary under subsection (e);

(B) the finalized cooperative agreement for the establishment of a national emergency center at the site, if necessary under subsection (f); and

(C) any additional information pertinent to the establishment of a national emergency center at the site.

(4) ADDITIONAL REPORTS- The Secretary of Homeland Security, acting jointly with the Secretary of Defense, may submit to Congress additional reports as necessary to provide updates on steps being taken to meet the requirements of this Act.

SEC. 4. LIMITATIONS ON STATUTORY CONSTRUCTION.

This Act does not affect–

(1) the authority of the Federal Government to provide emergency or major disaster assistance or to implement any disaster mitigation and response program, including any program authorized by the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5121 et seq.); or

(2) the authority of a State or local government to respond to an emergency.

SEC. 5. AUTHORIZATION OF APPROPRIATIONS.

There is authorized to be appropriated $180,000,000 for each of fiscal years 2009 and 2010 to carry out this Act. Such funds shall remain available until expended.

SEC. 6. DEFINITIONS.

In this Act, the following definitions apply:

(1) CLOSED MILITARY INSTALLATION- The term `closed military installation’ means a military installation, or portion thereof, approved for closure or realignment under the Defense Base Closure and Realignment Act of 1990 (part A of title XXIX of Public Law 101-510; 10 U.S.C. 2687 note) that meet all, or 2 out of the 3 following requirements:

(A) Is located in close proximity to a transportation corridor.

(B) Is located in a State with a high level or threat of disaster related activities.

(C) Is located near a major metropolitan center.

(2) EMERGENCY- The term `emergency’ has the meaning given such term in section 102 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5122).

(3) MAJOR DISASTER- The term `major disaster’ has the meaning given such term in section 102 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5122).

(4) MILITARY INSTALLATION- The term `military installation’ has the meaning given such term in section 2910 of the Defense Base Closure and Realignment Act of 1990 (part A of title XXIX of Public Law 101-510; 10 U.S.C. 2687 note).

Research related articles:

  1. Rangel To Push Universal Military Draft Legislation Once More
  2. FEMA sources confirm coming martial law
  3. The failure of the NIST WTC 7 report to address concerns raised in Appendix C of the 2002 FEMA Building Performance Study
  4. Treasury Sends to Congress Legislation to Buy Troubled Assets
  5. Pentagon to Detail Troops to Bolster Domestic Security
  6. Hurricane Gustav: National Emergency Environment Sets the Stage for the McCain Election Campaign
  7. NIST Concludes “Fire” Caused WTC 7 “Collapse” when FEMA Report Concluded Fuel Tank Explosion had “low probability” of Knocking Down Tower
  8. Military Examines Role In Domestic Defense
  9. Torture Camps Minutes From Olympic Sites
  10. U.S. troops may be deployed in Arizona, Southwest U.S.
  11. List of Labor Camps Released to International Journalists in China
  12. There Might Be a Financial Crisis, But the World’s Arms Dealers Are Doing Just Fine

Research related articles:

  1. High school receives homeland security grant
  2. FEMA Starts PR Campaign With New Channel on YouTube
  3. National Guard Soldiers to Usher in New Year at Times Square
  4. Albuquerque Examiner: Report argues for domestic police role for military
  5. Oregon Pursues Mileage Tax and Tracking Legislation
  6. U.S. Military Preparing for Domestic Disturbances
  7. Ariz. police say they are prepared as War College, IMF warn of economic riots, unrest

Leave a comment

Filed under Documents, Police State

The Scientific Outlook

This series examines Bertrand Russell’s 1931 book The Scientific Outlook. Bertrand Arthur William Russell, 3rd Earl Russell (1872-1970) was a renowned British philosopher and mathematician who was an adamant internationalist and worked extensively on the education of young children. This included running an experimental school in the 1920’s with his second wife Dora Black. He was the founder of the Pugwash movement which used the spectre of Cold War nuclear annihilation to push for world government. Among many other prizes, Russell was awarded the Nobel Prize in Literature in 1950 and UNESCO’s (United Nations Educational, Scientific, and Cultural Organization) Kalinga prize for the popularization of science in 1957.

Part 1 of this series examines science as power-thought and the use of scientific technique to increase the power of an elite scientific minority over the unscientific masses. Part 2 examines the composition of the society of experts who will use scientific technique to dominate the masses. At the forefront of this society of experts is the expert “manipulator”, whom Lenin is the archetype. This society also aims to conceal its power and influence behind political veils like democracy. Part 3 explores the application of scientific technique to education with an emphasis on the distinction between education for the “governing class” and “working class”. Part 4 looks at the use of education, the Press, radio and Hollywood as forms of propaganda. Part 5 examines the use of behaviourism, psycho-analysis and physiological manipulation as applied to education. Part 6 examines the application of scientific technique to the reproduction of human beings including the separate breeding techniques to be applied to the “governing class” compared with the “working class”. This also includes the creation of a “priestly class” within the ruling governing class. Part 7 explores the changes to freedom and equality in the scientific society. This includes changes in the relationship between individual freedom and the collective good, freedom of speech and the Press, freedom to choose ones own career and the freedom to have children. Part 8 examines the changes to free trade and labour in the scientific. Including the removal of competition and the choice between pre-determined work or prison. The final article describes the creation of two artificial societies including the design and implementation of a new religion specifically for that new planned society. The two societies described are: Japan following their 1867 revolution and Russia following the Bolshevik revolution.

Leave a comment

Filed under Documents

The Federal Reserve Abolition Act

By Stephen Lendman

<!– –>December 28, 2008 “Baltimore Chronicle” — On June 15, 2007, Ron Paul introduced HR 2755: Federal Reserve Abolition Act. There were no co-sponsors, no further action was taken, and the legislation was referred to the House Committee on Financial Services and effectively pigeonholed and ignored.

It’s a bold and needed measure to “abolish the Board of Governors of the Federal Reserve System and the Federal reserve banks, to repeal the Federal Reserve Act, and for other purposes.”

The bill provides for management of employees, assets and liabilities of the Board during a dissolution period, and more as follows:

  • it designates the Director of the Office of Management and Budget to liquidate Fed assets in an orderly and expeditious manner;
  • transfer them to the General Fund of the Treasury after satisfying all claims against the Board and any Federal reserve bank;
  • assume all outstanding Board and member bank liabilities and transfer them to the Secretary of the Treasury; and
  • after an 18-month period, submit a report to Congress “containing a detailed description of the actions taken to implement this Act and any actions or issues relating to such implementation that remain uncompleted or unresolved as of the date of the report.”

On November 22, “End the Fed” protests were held in 39 or more cities nationwide (including New York, Chicago, Los Angeles and Washington, DC), but you’d hardly know it for lack of coverage. Attendee demands were simple and emphatic:

  • end a private banking cartel’s illegal monopoly control over the nation’s money supply and price;
  • return that power to the US Treasury as the Constitution mandates;
  • end a fiat currency system backed by the waning full faith and credit of the government; and
  • return the country to a sound, hard currency monetary system.

“End the Fed! Sound Money for America!” is their slogan, and writer and US policy critic Webster Tarpley puts it well:

“….the privately owned central bank….has been looting and wrecking the US economy for almost a hundred years. We must end a system where unelected, unaccountable cliques of bankers and financiers loyal to names like Morgan, Rockefeller, and Mellon set interest rates and money supply behind closed doors, leading to de-industrialization, mass impoverishment, and a world economic and financial depression of incalculable severity.”

In theory, the Fed was established to stabilize the economy, smooth out the business cycle, manage a healthy, sustainable growth rate, and maintain stable prices. In fact, it failed dismally. It contributed to 19 US recessions (including the Great Depression) and significantly to the following equity market declines that accompanied them as measured by the Dow or S & P 500 average – the S &P’s inception was 1923; it became the S & P 500 in 1957:

  • 40.1% (Dow) from 1916 – 1917;
  • 46.6% (Dow) from 1919 – 1921;
  • the 1929 (Dow) crash in two stages – 47.9% in 1929 followed by a strong, temporary rebound; then – 86%; an 89% peak to trough total from October 1929 to July 1932;
  • 49.1% (Dow) from 1937 – 1938;
  • 40.4% (Dow) from 1939 – 1942;
  • 25.3% (S & P) from 1946 – 1947;
  • 19.8% (S & P) in 1957;
  • 26.8% (S & P) from 1961 – 1962;
  • 19.3% (S & P) in 1966;
  • 32.7% (S & P) from 1968 – 1970;
  • 45.1% (S & P) from 1973 – 1974;
  • 20.2% (S & P) from 1980 – 1982;
  • 32.9% (S & P) in 1987;
  • 19.2% (S & P) in 1990;
  • 18.8% (S & P) in 1998;
  • 49.1% (S & P) from 2000 – 2002; and
  • about 50% (S & P) and counting (excluding a bear market rebound) from October 2007.

The Fed is also directly responsible for monetary inflation and the decline in the US standard of living since its year end 1913 inception and especially since the 1970s. From the late 18th century to 1913, virtually no inflation existed under the gold standard except during times of war. Using government data, it now takes over $2000 to equal $100 of pre-Fed purchasing power. In other words, a 1913 dollar is worth about a nickel today.

At that time, a dollar was defined as 1/20 of an ounce of gold or about an ounce of silver. The Fed then changed the standard away from precious metals to the full faith and credit of the government. Ever since (except for periods such as the 1930s) inflation eroded the currency’s value and (more than ever) continues to do it today.

It’s why one analyst calls the dollar “nothing more than a popular symbol for the tangible substances it once represented – gold and silver.” Its true value represents the world’s waning confidence in America’s ability to honor its debt obligations, and with good reason.

Under the Federal Reserve System (besides inflation), we’ve had rising consumer debt; record budget and trade deficits; a soaring national debt; a high level of personal and business bankruptcies; today, millions of home foreclosures; high unemployment; the loss of the nation’s manufacturing base; growing millions in poverty; an unprecedented wealth gap between the rich and all others; and a hugely unstable economy now lurching into crisis mode.

In a November 24 Wall Street Journal op-ed, Hong Kong-based author and equity strategist Christopher Wood believes “The Fed Is Out of Ammunition.” With trillions in personal wealth erased, “there is little doubt that we are witnessing a classic debt-deflation bust at work, characterized by falling prices, frozen credit markets and plummeting asset values.”

He notes how “over-investment and over-speculation” on borrowed money got us here. Today, the Fed can control the supply of money but not its velocity or the rate it turns over. The current collapse set it in reverse with no signs of an impending turnaround.

Wood believes monetary and fiscal measures won’t work. There are no easy solutions – “not as long as politicians and central bankers (won’t) let financial institutions fail,” and let market forces wash out excesses over time.

The Fed and Treasury will spend trillions of dollars to correct things, “but will merely compound (the problem) by adding debt to debt.” The current crisis will end up “discrediting mechanical monetarism – and with it the fiat paper-money system….The catalyst will be foreign creditors fleeing the dollar for gold. That will in turn lead to global recognition of the need for a vastly more disciplined global financial system” with gold very likely playing a part.

Absent a hard money currency has led to the kind of monetary madness that Nouriel Roubini calls “crazy” policy actions – an explosion of quantitative easing in the trillions with no end of it in sight.

Absent a hard money currency has led to the kind of monetary madness that Nouriel Roubini calls “crazy” policy actions – an explosion of quantitative easing in the trillions with no end of it in sight.

Roubini: “The Fed Funds rate has been abandoned…as we are already effectively at (zero interest rates) that signal a liquidity trap….Even (a sharp) fall in mortgage rates….will be of small comfort to debt burdened households as only those (that) qualify for refinancing will be able to” net out a “modest” monthly mortgage saving of about $150.

The Fed’s “desperate policy actions….will eventually lead to much higher real interest rates on the public debt and weaken the US dollar (the result of a) tsunami of implicit and explicit public liabilities and monetary debt.” It will get foreign investors to “ponder the long-term sustainability of the US domestic and external liabilities,” and why not. They keep growing exponentially, and with nothing restraining a runaway Fed, dollar debasing may continue to the point where no one will want to hold them. It’s gotten some analysts to recommend moving a portion of savings out of them into gold – the ultimate safe haven in times of crisis.

Abolish the Fed and Return the Nation’s Money Creation Power to Congress Where It Belongs

Ron Paul has been in the vanguard of the Abolish the Fed movement, and on September 10, 2002 on the House floor said:

“Since the creation of the Federal Reserve, middle and working-class Americans have been victimized by a boom-and-bust monetary policy. In addition, most Americans have suffered a steadily eroding purchasing power because of the Federal Reserve’s inflationary policies. This represents a real, if hidden, tax imposed on the American people….”

“It is time for the Congress to put the interests of the American people ahead of the special interests. Abolishing the Federal Reserve will allow Congress to reassert its constitutional authority over monetary policy.”

“Abolishing the Federal Reserve and returning to a constitutional system (as mandated) will enable America to return to the type of monetary system envisioned by our nation’s founders: one where the value of money is consistent because it is tied to a commodity such as gold….I urge my colleagues (to co-sponsor) my legislation to abolish the Federal Reserve.”

Paul introduced his legislation in the 106th, 107th, 108th, and 110th Congresses. Each time, it died in committee. On November 22, he attended the End the Fed rally in Houston and addressed the crowd.

He called the current economic crisis as bad or worse than in the 1930s and said: “we know who caused it. It was the Federal Reserve that gave us all this trouble.” He explained that we had a “free ride for decades because we’ve had a system that was devised where the dollar could act as if it were gold.”

Not after August 1971 when Nixon closed the gold window, ended the 1944 Bretton Woods Agreement, and no longer let dollars be backed by gold or converted into it in international markets. A “new economic system” was created. It let us “spend beyond our means, live beyond our means, print money beyond our means,” and it caused our current dilemma.

We created “an appearance of great wealth. But it was doomed to fail,” and it became apparent in the past year: “the failure of the dollar reserve standard that was set up in August of 1971. It has ended. The only question” is what will replace it?

There’s all kinds of talk, including setting up a new international fiat currency “with the loss of US sovereignty in total. We have to stop this move towards one world government and a one world currency.” Otherwise our freedom and Constitution will be lost. When it was written, it contained prohibitions.

Article I, Section 8 gives Congress alone the right to coin (create) money and regulate the value thereof. The founders also wanted gold and silver to be legal tender, not fiat money, nor should there be a central bank. In 1935, the Supreme Court ruled that Congress cannot constitutionally delegate this power to another body. By creating the Federal Reserve System in 1913, Congress violated the Constitution it was sworn to uphold and defrauded the American public. Today’s crisis is the fruit of its action, but watch out.

“The writing is on the wall, and the end of this system” approaches. “They cannot patch it up, they can’t up it back together again. They know it and we know it. The only argument is what is it going to be replaced with?”

For now, “Central banks in the West especially have been dumping gold to artificially lower (its price) to pretend the dollar is of great value. They’re still doing it, but they’re running out of time (and) out of gold.” It’s shifting to stronger economic powers, ones who’ve been saving money, loaning it back to us, “and are ready to buy up America if we continue to do this. So it is a contest (between fiat) money and hard money, and that is such an important issue.” It reflects what Daniel Webster once said:

“There can be no legal tender in this country….but gold and silver. This is a constitutional principle….of the very highest importance.” Gold, however, wasn’t the original monetary system standard. Silver was, the silver dollar, and only a constitutional amendment can change it.

Paper currency as well, whether backed by gold or not, wasn’t the hard money authorized by the Constitution. Honest money is honest weights and measures of silver and gold. Federal Reserve Notes are paper fiat debt obligations. Fiat currency of any kind is a mechanism of wealth transference from the public to a privileged elite – through inflation and loss of purchasing power. It creates debt for the many and wealth for the few, especially when a private banking cartel controls it.

Our existing monetary system combines money, credit and debt into a dishonest system of empty promises in exchange for future ones. There is no eventual payment, only unfulfillable assurances to new generations that will be forced to pay for the debt now accumulated. It’s a moneychangers dream – ever-expanding debt and a continuing interest rate stream, masquerading as wealth creation for the people. It’s in fact a system of bondage and indebtedness benefitting the few at the expense of the many, a modern-day feudalism. It’s how an elite 1% got to own 70% of the nation’s wealth.

In the 1920s, Josiah Stamp, Bank of England president said:

“Banking was conceived in iniquity and was born in sin. Bankers own the earth. Take it away from them, but leave them the power to create deposits, and with a flick of the pen (today a computer keyboard) they will create enough deposits to buy it back again. However, take it away from them, and all the great fortunes like mine will disappear, and they ought to disappear, for this would be a happier and better world to live in. But if you wish to remain the slaves of Bankers and pay the cost of your own slavery, let them continue to create deposits.”

Creating the Federal Reserve System to let bankers and not the government control the price and amount of fiat money debased the currency and is the root cause of today’s financial problems. A return to honest gold and silver weights and measures is needed. The Constitution states that nothing but these metals are money and that paper bills of credit (like Federal Reserve notes) aren’t allowed. Even ones backed by gold as the Constitution doesn’t grant Congress the power to be bankers. It may only coin (create) and borrow money, not loan it out or give it away – and certainly not to bankers at the expense of the public interest.

Further, the Constitution contains no provision allowing Congress to enact legal tender laws. Article I, Section 10 forbids the individual states from making “anything but gold and silver coin a legal tender in payment of debts.” However, US Code, 31 USC 5103, establishes US coins and currency, including Federal Reserve notes, as legal tender and has been used to debase the currency ever since – the way Gresham’s Law works: bad (or debased) money drives out good (the kind with little difference between its nominal and commodity values).

For example, until 1964, US coins (except pennies and nickels) contained 90% silver. Starting in 1965, dimes and quarters were converted to their current nickel – copper composition. Half-dollars (now produced in limited quantities) had 90% silver. It then dropped to 40% in 1965 and by 1971 all US coins (except pennies and commemorative mintings) contained nickel and copper and no silver – a good example of debasing. As for paper currency, it’s just paper.

Under a private banking cartel’s control, it’s been misused, stolen, and corrupted the way New York Times columnist Floyd Norris suggests in his November 24 article headlined: “Another Crisis, Another Guarantee.” First the banks, then the auto companies, and who knows who’s next in line for theirs. “As the nation’s obligations rise into the trillions, at some point investors (and the public) may begin to question whether a government running huge deficits can also credibly promise that the dollar will not lose its value.” How can there be any faith and credit left when it’s vanishing and the Fed and Treasury operate like giant hedge funds.

It got UK-based Eclectica Asset Management chief investment officer, Hugh Hendry, concerned enough to say: “All (US) financials will be owned by the government in a year. I bet you. It’s not good,” but it’s coming. US taxpayers will be “paying for this for a long time,” and it’s deeply concerning considering the amount of money creation – with no end in sight as problems keep mounting and limitless amounts keep being thrown at them.

On November 25 the Financial Times associate editor, Wolfgang Munchau, also worries about the Fed’s “weapon of mass desperation” (so-called quantitative easing); focusing only on deflation and risking a currency crisis. He calls it a flawed, dangerous and shocking oversight – the possibility of “a mass flight out of dollar assets (at some point) and a large rise in US market interest rates, followed by a huge recession.”

A Bloomberg.com November 24 headline highlights the problem: “US Pledges Top $7.7 trillion to Ease Frozen Credit,” and it might as well have said there’s plenty more where that came from if needed. With another $800 committed to two new loan programs the total reached $8.5 trillion, according to Bloomberg or nearly 60% of US 2007 GDP of $14 trillion, and the numbers keep rising exponentially because the problems continue to mount.

Bloomberg puts it in perspective saying “the (current) commitment dwarfs (TARP and puts) Federal Reserve lending last week (at) 1900 times the weekly average for the three years before the crisis,” and with the added $800 billion it’s about 2100 times pre-crisis levels.

In addition, the Fed refuses to identify recipients of about $2 trillion of emergency handouts or what troubled assets (if any) it’s accepting as collateral. Call it lending or spending. They’re public tax dollars being spread around like confetti and debasing it all as a result.

The Free Lakota Bank

On November 21, this writer discussed how Lakotahs are treated in an article titled “Fate of Lakotahs Highlights America’s Failed Native American Policies.” On November 24, the following press release and follow-up information announced:

“People of Lakota Launch Private Bank for Only Silver and Gold Currencies.” All deposits are “liquid, meaning they can be withdrawn at any time in minted rounds. Some may confuse our economic system with isolationism….which it is not. Since we currently produce much more than we consume, we have the right to decide what medium of exchange to accept for our effort. And so we accept only value for value. Across our great land, over thousands of tribes and merchants participate in our system of trade. We invite others to trade with us and bring value back into our transactions.”

This is the world’s first non-reserve, non-fractional bank that accepts only silver and gold currencies for deposit. The Lakotas “invite people of any creed, faith or heritage to unite in an effort to reclaim control of wealth. It is our hope that other tribal nations and American citizens recognize the importance of silver and gold as currency and decide to mirror our system of honest trade.”

The bank states that it issues, circulates and accepts for deposit “only AOCS – Approved silver and gold currencies.” It calls paper not real money but “merely a promise to pay – a mortgage on wealth that does not exist, backed by a gun aimed at those who are expected to produce it. Since we deal only in real money, we do not participate in any central bank looting schemes.” When corruption is rewarded and “honesty becom(es) self-sacrifice….you may know that your society is doomed.” Even as victims of adversity, Lakotas are working to prevent it.

End the Fed

Privatized money control is the single greatest threat to democratic freedom. As former lawyer, economist, academic, and Canadian prime minister (from 1935 – 1948) William Lyon Mackenzie King once said:

“Until the control of the issue of currency and credit is restored to government and recognized as its most conspicuous and sacred responsibility, all talk of sovereignty of Parliament and of democracy is idle and futile….Once a nation parts with control of its credit, it matters not who makes (its) laws….Usury once in control will wreck any nation,” and indeed it has, far more now than ever.

It worried Thomas Jefferson enough to call banking institutions “more dangerous to our liberties than standing armies” at a much simpler time in our history. The right to create and control money belongs to the people through their elected representatives. For the past 95 years, powerful bankers accountable to no one have had it. They effectively run the country (and own it), and unless We the People change things, we’ll continue to be victimized by economic tyranny and the eventual political kind that’s coming.


Steve LendmanStephen Lendman is a Research Associate of the Centre for Research on Globalization. He lives in Chicago and can be reached at lendmanstephen@sbcglobal.net.

Also visit his blog site at sjlendman.blogspot.com and listen to The Global Research News Hour on RepublicBroadcasting.org Mondays from 11AM to 1PM US Central time for cutting-edge discussions with distinguished guests on world and national topics. All programs are archived for easy listening.

Mr. Lendman’s stories are republished in the Baltimore Chronicle with permission of the author.

Leave a comment

Filed under Commentary, Documents

Has The US Supreme Court No Shame?

By Devvy
Exclusive to Rense.com
12-15-8
Shame: the painful feeling arising from the consciousness of something dishonorable, improper, ridiculous, etc., done by oneself or another;.disgrace; ignominy
Today, and for the second time, the U.S. Supreme Court shirked its duty and responsibility to hear a case that has direct bearing on whether Barack Hussein Obama aka Barry Soetoro, aka Barry Obama, aka Barack Dunham, aka Barry Dunham, is a legitimate candidate to be America’s next president. Without question, should the U.S. Supreme Court have ruled Obama ineligible to qualify as a candidate for the presidency, it would have created an unprecedented upheaval, but we the people have the right to a legitimate president no matter the pain of completing the process. The Founding Fathers and colonials gave their honor, their money and their blood as principled individuals. They stood their ground and so shall we the people despite the cowardly path chosen by these justices.
The stonewalling by Obama and his legal legions in Obama’s refusal to respond to the allegations that he does not meet constitutional requirements for citizenship redefines hubris. One can imagine his joy today when the order was posted that the U.S. Supreme Court again spit on the U.S. Constitution for political expediency and out of sheer cowardice. There can be no other explanation for the court refusing to hear the Leo Donofrio and Cort Wrotnowski cases.
As Leo said in a recent post on his web site, it doesn’t matter what the cell damaged media lap dogs say about these cases. What matters is the supreme law of the land. Today’s DENIED by the “high” court makes it perfectly clear that those nine justices don’t have the guts to take on such a huge decision. Never mind the million plus letters that were sent to the court by Americans who demand the supreme law of the land be upheld. Never mind the pompous blathering by politicos on web sites who care nothing for the U.S. Constitution. The one and only question was and still remains: Was Barack Hussein Obama a natural born citizen at birth?
There are still a number of cases on going. The electoral college delegates meet at all 50 state capitols today to vote for this impostor. What happens next will depend on what these electors do during the vote. Further updates will follow.
There has been so much disinformation and distortions about all the cases relating to this issue on the Internet. Having read a great deal of the blarney out there by bloggers, TV and radio talk show hosts and columnists who support Obama, I can tell you 99.999% of them never read a single word in any of the briefs submitted to the Supreme Court. Their own words condemn them as either intellectually lazy or simply ignorant.
Emotions have run high over this controversy which all could have been avoided had Obama simply come clean about his citizenship. Instead, this impostor has chosen to commit a fraud against the American people that, should he be sworn in, will simply prolong the inevitable. Obama is going down, it’s just a matter of time. If sworn in, he will begin his presidency the same as the famous Clinton duo: drowning in controversy and rage from Americans who still believe in the supreme law of the land.
I fully understand time is an issue for Americans. However, to really understand how serious the question is regarding Obama’s eligibility, one must take the time to at least read some of the most factual information available. If Obama could have proven his citizenship, he would have done so many, many months ago. He’s bluffing we the people will simply go away and allow him to be sworn in as Impostor in Chief. That isn’t going to happen.
In an effort to make things easier and because I’m not certain how long Leo will leave his web site up and running, I have put several documents into the audio section of my web site. You can listen via the computer, download to a CD and listen on the road, in commute traffic, on a train or plane. Share these recordings with friends, family and those who still believe we are a nation of laws, not lies. These recording include Leo’s submission to the U.S. Supreme Court, Cort’s submission and additional filing with the court, some of the material from Leo’s site (with his permission) and a critically important column from Dr. Edwin Vieira on what will happen should Obama get sworn into office.
Those recordings can be found here:
http://www.devvy.net/audio/dec08/rense/dec15_commentary.html
Dr. Edwin Vieira’s column is in the link above. You can read the full text of his column here:
http://www.newswithviews.com/Vieira/edwin186.htm
The reason Edwin’s column is so important is because lays out what will happen if Obama signs another unconstitutional “hate crime” law or anti-Second Amendment law. The defendant in the case can then go after Obama as his defense. Edwin also details how one member of the House of Representatives and one member of the Senate can challenge the electoral college votes.
This case is absolutely germane to the issue and part of it (to read the entire decision would have taken a couple of hours) is in the new audio section cited above.
U.S. v. WONG KIM ARK, 169 U.S. 649 (1898)
UNITED STATES
v.
WONG KIM ARK.
No. 132.
March 28, 1898
The full text may be read here:
http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl? court=us&vol=169&invol=649
Leo Donofrio’s web site is:
http://www.blogtext.org/naturalborncitizen/
and:
http://naturalborncitizen.wordpress.com/
Phil Berg’s web site is:
http://www.obamacrimes.com/
Dr. Orly Taitz’s web site is:
http://www.drorly.blogspot.com/
United States Justice Foundation:
http://www.usjf.net/
WND has a current and very well done news item on this issue:
http://www.worldnetdaily.com/index.php?fa=PAGE.view&pageId=83693

Leave a comment

Filed under Cover-up!, Documents

Mind Control Patents

11-7-6

US Patents On Subliminal Suggestion & Mind Control
Note – These are just a portion of the patents available on the net which deal with mind control, mental and emotional influencing, perception engineering and brain functioning performed remotely and/or directly through the electronic media and other venues and methods of application. Keep in mind these are patents filed in the public domain. Unknown and black ops technology created within the military industrial complex obviously remain hidden. Clearly, the ability to control the mental processes, attitudes, fears and perceptions of mass America is clearly far more advanced than the average American understands…or would like to believe. -JR
Nervous System Manipulation by EM Fields from Monitors
Loos, Hendricus
Abstract: Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be embedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. USP # 6,488,617 (December 3, 2002)
Method and Device for Producing a Desired Brain State Katz, Bruce
Abstract ~ A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until the gap is minimized and/or removed. USP # 6,487,531 (November 26, 2002)
Signal Injection Coupling into the Human Vocal Tract
Tosaya, Carol
Abstract ~ A means and method are provided for enhancing or replacing the natural excitation of the human vocal tract by artificial excitation means, wherein the artificially created acoustics present additional spectral, temporal, or phase data useful for (1) enhancing the machine recognition robustness of audible speech or (2) enabling more robust machine-recognition of relatively inaudible mouthed or whispered speech. The artificial excitation (a) may be arranged to be audible or inaudible, (b) may be designed to be non-interfering with another user’s similar means, (c) may be used in one or both of a vocal content-enhancement mode or a complimentary vocal tract-probing mode, and/or (d) may be used for the recognition of audible or inaudible continuous speech or isolated spoken commands. USP # 6,430,443 (August 6, 2002)
Method and Apparatus for Treating Auditory Hallucinations
Karell, Manuel
Abstract ~ Stimulating one or more vestibulocochlear nerves or cochlea or cochlear regions will treat, prevent and control auditory hallucinations. USP # 6,426,919 (July 30, 2002)
Portable and Hand-Held Device for Making Humanly Audible Sounds…
Gerosa, William
Abstract ~ A portable and hand-held device for making humanly audible sounds responsive to the detecting of ultrasonic sounds. The device includes a hand-held housing and circuitry that is contained in the housing. The circuitry includes a microphone that receives the ultrasonic sound, a first low voltage audio power amplifier that strengthens the signal from the microphone, a second low voltage audio power amplifier that further strengthens the signal from the first low voltage audio power amplifier, a 7-stage ripple carry binary counter that lowers the frequency of the signal from the second low voltage audio power amplifier so as to be humanly audible, a third low voltage audio power amplifier that strengthens the signal from the 7-stage ripple carry binary counter, and a speaker that generates a humanly audible sound from the third low voltage audio power amplifier. USP # 6,292,688 (September 18, 2001)
Method and Apparatus for Analyzing Neurological Response to Emotion-Inducing Stimuli
Patton, Richard
Abstract ~ A method of determining the extent of the emotional response of a test subject to stimului having a time-varying visual content, for example, an advertising presentation. The test subject is positioned to observe the presentation for a given duration, and a path of communication is established between the subject and a brain wave detector/analyzer. The intensity component of each of at least two different brain wave frequencies is measured during the exposure, and each frequency is associated with a particular emotion. While the subject views the presentation, periodic variations in the intensity component of the brain waves of each of the particular frequencies selected is measured. The change rates in the intensity at regular periods during the duration are also measured. The intensity change rates are then used to construct a graph of plural coordinate points, and these coordinate points graphically establish the composite emotional reaction of the subject as the presentation continues. USP # 6,258,022 (July 10,2001)
Behavior Modification
Rose, John
Abstract ~ Behavior modification of a human subject takes place under hypnosis, when the subject is in a relaxed state. A machine plays back a video or audio recording, during which the subject is instructed to activate a device to create a perceptible stimulation which is linked, through the hypnosis, with a visualization of enhanced or improved performance. After the hypnosis, the user can reactivate the device at will, whenever the improved performance, such as an improved sporting performance, is desired. This will again create the perceptible stimulation and thus induce the required visualization. USP # 6,239,705 (May 29,2001)
Intra-Oral Electronic Tracking Device
Glen, Jeffrey
Abstract ~ An improved stealthy, non-surgical, biocompatable electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Optionally, an amplifier may be utilized to boost signal strength. The power supply energizes the receiver. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a position locating signal to be received by a remote locator. In another embodiment of the present invention, the microcircuitry comprises a receiver, a passive mode to active mode activator, a transmitter, an antenna and a power supply. Optionally, an amplifier may be utilized to boost signal strength. The power supply energizes the receiver. Upon receiving a coded activating signal, the transmitter is energized. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator. USP # 6,167,304 (December 26, 2000)
Pulse Variability in Electric Field Manipulation of Nervous Systems
Loos, Hendricus
Abstract ~ Apparatus and method for manipulating the nervous system of a subject by applying to the skin a pulsing external electric field which, although too weak to cause classical nerve stimulation, modulates the normal spontaneous spiking patterns of certain kinds of afferent nerves. For certain pulse frequencies the electric field stimulation can excite in the nervous system resonances with observable physiological consequences. Pulse variability is introduced for the purpose of thwarting habituation of the nervous system to the repetitive stimulation, or to alleviate the need for precise tuning to a resonance frequency, or to control pathological oscillatory neural activities such as tremors or seizures. Pulse generators with stochastic and deterministic pulse variability are disclosed, and the output of an effective generator of the latter type is characterized. USP # 6,135,944 (October 24, 2000)
Method of Inducing Harmonious States of Being
Bowman, Gerard D., et al.
Abstract: A method of inducing harmonious states of being using vibrational stimuli, preferably sound, comprised of a multitude of frequencies expressing a specific pattern of relationship. Two base signals are modulated by a set of ratios to generate a plurality of harmonics. The harmonics are combined to form a “fractal” arrangement. USP # 6,122,322 (September 19, 2000)
Subliminal Message Protection
Jandel, Magnus
Abstract ~ The present invention relates to a method and to a system for detecting a first context change between two frames. When a second context change between a further two frames occurs within a predetermined time interval, the frames accommodated within the two context changes are defined as a subliminal message. An alarm is sent to an observer upon detection of a subliminal message. USP # 6,091,994 (July 18, 2000)
Pulsative Manipulation of Nervous Systems
Loos, Hendricus
Abstract ~ Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject’s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a “knot” in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities, and is characterized by a large increase of the time needed to silently count backward from 100 to 60, with the eyes closed. The invention can be used by the general public for inducing relaxation, sleep, or sexual excitement, and clinically for the control and perhaps a treatment of tremors, seizures, and autonomic system disorders such as panic attacks. Embodiments shown are a pulsed fan to impart subliminal cooling pulses to the subject’s skin, and a silent device which induces periodically varying flow past the subject’s skin, the flow being induced by pulsative rising warm air plumes that are caused by a thin resistive wire which is periodically heated by electric current pulses. USP # 6,081,744 (June 27, 2000)
Electric Fringe Field Generator for Manipulating Nervous Systems
Loos, Hendricus
Abstract ~ Apparatus and method for manipulating the nervous system of a subject through afferent nerves, modulated by externally applied weak fluctuating electric fields, tuned to certain frequencies such as to excite a resonance in neural circuits. Depending on the frequency chosen, excitation of such resonances causes in a human subject relaxation, sleepiness, sexual excitement, or the slowing of certain cortical processes. The electric field used for stimulation of the subject is induced by a pair of field electrodes charged to opposite polarity and placed such that the subject is entirely outside the space between the field electrodes. Such configuration allows for very compact devices where the field electrodes and a battery-powered voltage generator are contained in a small casing, such as a powder box. The stimulation by the weak external electric field relies on frequency modulation of spontaneous spiking patterns of afferent nerves. The method and apparatus can be used by the general public as an aid to relaxation, sleep, or arousal, and clinically for the control and perhaps the treatment of tremors and seizures, and disorders of the autonomic nervous system, such as panic attacks. USP # 6,052,336 (April 18, 2000)
Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier
Lowrey, Austin, III
Abstract ~ An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and/or frequency modulated with an information input signal originating from an information input source. If the signals are amplitude modulated, a square root function of the information input signal is produced prior to modulation. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound. USP # 6,039,688 (March 21, 2000)
Therapeutic Behavior Modification Program, Compliance Monitoring and Feedback System
Douglas, Peter, et al.
Abstract ~ A therapeutic behavior modification program, compliance monitoring and feedback system includes a server-based relational database and one or more microprocessors electronically coupled to the server. The system enables development of a therapeutic behavior modification program having a series of milestones for an individual to achieve lifestyle changes necessary to maintain his or her health or recover from ailments or medical procedures. The program may be modified by a physician or trained case advisor prior to implementation. The system monitors the individual’s compliance with the program by prompting the individual to enter health-related data, correlating the individual’s entered data with the milestones in the behavior modification program and generating compliance data indicative of the individual’s progress toward achievement of the program milestones. The system also includes an integrated system of graphical system interfaces for motivating the individual to comply with the program. Through the interfaces, the individual can access the database to review the compliance data and obtain health information from a remote source such as selected sites on the Internet. The system also provides an electronic calendar integrated with the behavior modification program for signaling the individual to take action pursuant to the behavior modification program in which the calendar accesses the relational database and integrates requirements of the program with the individual’s daily schedule, and an electronic journal for enabling the individual to enter personal health-related information into the system on a regular basis. In addition, the system includes an electronic meeting room for linking the individual to a plurality of other individuals having related behavior modification programs for facilitating group peer support sessions for compliance with the program. The system enables motivational media presentations to be made to the individuals in the electronic meeting room as part of the group support session to facilitate interactive group discussion about the presentations. The entire system is designed around a community of support motif including a graphical electronic navigator operable by the individual to control the microprocessor for accessing different parts of the system. USP # 6,017,302 (January 25, 2000)
Subliminal Acoustic Manipulation of Nervous Systems
Loos, Hendricus
Abstract ~ In human subjects, sensory resonances can be excited by subliminal atmospheric acoustic pulses that are tuned to the resonance frequency. The 1/2 Hz sensory resonance affects the autonomic nervous system and may cause relaxation, drowsiness, or sexual excitement, depending on the precise acoustic frequency near 1/2 Hz used. The effects of the 2.5 Hz resonance include slowing of certain cortical processes, sleepiness, and disorientation. For these effects to occur, the acoustic intensity must lie in a certain deeply subliminal range. Suitable apparatus consists of a portable battery-powered source of weak subaudio acoustic radiation. The method and apparatus can be used by the general public as an aid to relaxation, sleep, or sexual arousal, and clinically for the control and perhaps treatment of insomnia, tremors, epileptic seizures, and anxiety disorders. There is further application as a nonlethal weapon that can be used in law enforcement standoff situations, for causing drowsiness and disorientation in targeted subjects. It is then preferable to use venting acoustic monopoles in the form of a device that inhales and exhales air with subaudio frequency. USP # 6,011,991 (January 4, 2000)
Communication System & Method Including Brain Wave Analysis…
Mardirossian, Aris
Abstract: A system and method for enabling human beings to communicate by way of their monitored brain activity. The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found. If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal. USP # 6,006,188 (December 21, 1999)
Speech Signal Processing for Determining Psychological or Physiological Characteristics…
Bogdashevsky, Rostislav, et al. Abstract ~ A speech-based system for assessing the psychological, physiological, or other characteristics of a test subject is described. The system includes a knowledge base that stores one or more speech models, where each speech model corresponds to a characteristic of a group of reference subjects. Signal processing circuitry, which may be implemented in hardware, software and/or firmware, compares the test speech parameters of a test subject with the speech models. In one embodiment, each speech model is represented by a statistical time-ordered series of frequency representations of the speech of the reference subjects. The speech model is independent of a priori knowledge of style parameters associated with the voice or speech. The system includes speech parameterization circuitry for generating the test parameters in response to the test subject’s speech. This circuitry includes speech acquisition circuitry, which may be located remotely from the knowledge base. The system further includes output circuitry for outputting at least one indicator of a characteristic in response to the comparison performed by the signal processing circuitry. The characteristic may be time-varying, in which case the output circuitry outputs the characteristic in a time-varying manner. The output circuitry also may output a ranking of each output characteristic. In one embodiment, one or more characteristics may indicate the degree of sincerity of the test subject, where the degree of sincerity may vary with time. The system may also be employed to determine the effectiveness of treatment for a psychological or physiological disorder by comparing psychological or physiological characteristics, respectively, before and after treatment. USP # 5,954,630 (September 21, 1999)
FM Theta-Inducing Audible Sound…
Masaki, Kazumi, et al.
Abstract ~ An audible sound of modulated wave where a very low-frequency wave of about 20 hertz or lower is superposed on an audio low-frequency wave effectively stimulates Fm theta in human brain waves to improve attention and concentration during mental tasks when auditorily administered. The audible sound is also effective in stimulation of human alpha wave when the very low-frequency wave lies within the range of about 2-10 hertz. Such audible sound is artificially obtainable by generating an electric signal which contains such a modulated wave, and transducing it into audible sound wave. USP # 5,954,629 (September 21, 1999)
Brain Wave Inducing System
Yanagidaira, Masatoshi, et al.
Abstract ~ Sensors are provided for detecting brain waves of a user, and a band-pass filter is provided for extracting a particular brain waves including an .alpha. wave included in a detected brain wave. The band-pass filter comprises a first band-pass filter having a narrow pass band, and a second band-pass filter having a wide pass band. One of the first and second band-pass filters is selected, and a stimulation signal is produced in dependency on an .alpha. wave extracted by a selected band-pass filter. In accordance with the stimulation signal, a stimulation light is emitted to the user in order to induce the user to relax or sleeping state. USP # 5,935,054 (August 10, 1999)
Magnetic Excitation of Sensory Resonances
Loos, H.
Abstract:The invention pertains to influencing the nervous system of a subject by a weak externally applied magnetic field with a frequency near 1/2 Hz. In a range of amplitudes, such fields can excite the 1/2 sensory resonance, which is the physiological effect involved in “rocking the baby”. USP # 5,922,016 (July 13, 1999)
Apparatus for Electric Stimulation of Auditory Nerves of a Human Being
Wagner, Hermann
Abstract ~ Apparatus for electric stimulation and diagnostics of auditory nerves of a human being, e.g. for determination of sensation level (SL), most conformable level (MCL) and uncomfortable level (UCL) audibility curves, includes a stimulator detachably secured to a human being for sending a signal into a human ear, and an electrode placed within the human ear and electrically connected to the stimulator by an electric conductor for conducting the signals from the stimulator into the ear. A control unit is operatively connected to the stimulator for instructing the stimulator as to characteristics of the generated signals being transmitted to the ear. USP # 5,868,103 (February 9, 1999)
Method and Apparatus for Controlling an Animal
Boyd, Randal
Abstract ~ An apparatus for controlling an animal wherein the animal receives a control stimulus of the release of a substance having an adverse effect upon the animal as a corrective measure. The apparatus includes a transmitter for producing a transmitted field, and a releasable collar for attaching to the neck of the animal. The collar includes a receiver for receiving the transmitted field and for producing a received signal, a control circuit for determining when the received signal indicates that the animal requires a corrective measure and for producing a control signal, a container for containing the substance having an adverse effect upon the animal, and a mechanism for releasing the substance from the container into the presence of the animal upon the production of the control signal by the control circuit. In use, the transmitter is set to produce the transmitted field and the collar is attached to the neck of the animal. As the animal moves about, the receiver in the collar receives the transmitted field and produces a received signal. The control circuit determines when the received signal indicates that the animal requires a corrective measure. A control signal is produced by the control circuit when the determination is made that the animal requires a corrective measure. Upon the production of the control signal, the substance having an adverse effect upon the animal is released from the container and into the presence of the animal. USP # 5,784,124 (July 21, 1998)
Supraliminal Method of Education…
D’Alitalia, Joseph A., et al. Abstract: A method of behavior modification involves having a patient view supraliminal video messages superimposed upon an underlying video presentation. The video messages incorporate messages wherein at least some of the messages link a desired modified behavior to positive feelings of the patient. A supraliminal message generator and superimposer iteratively selects individual messages for display from the sequence of messages, decompressing the messages as required, and places the selected messages in a buffer memory of a video generation device. A processor of the supraliminal message generator and superimposer then fades the selected message from an invisible level to a visible level on the video display, and then fades the selected message from the visible level back to the invisible level. USP # 5,649,061 (July 15, 1997)
Device and Method for Estimating a Mental Decision
Smyth, Christopher
Abstract ~ A device and method for estimating a mental decision to select a visual cue from the viewer’s eye fixation and corresponding single event evoked cerebral potential. The device comprises an eyetracker, an electronic biosignal processor and a digital computer. The eyetracker determines the instantaneous viewing direction from oculometric measurements and a head position and orientation sensor. The electronic processor continually estimates the cerebral electroencephalogramic potential from scalp surface measurements following corrections for electrooculogramic, electromyogramic and electrocardiogramic artifacts. The digital computer analyzes the viewing direction data for a fixation and then extracts the corresponding single event evoked cerebral potential. The fixation properties, such as duration, start and end pupil sizes, end state (saccade or blink) and gaze fixation count, and the parametric representation of the evoked potential are all inputs to an artificial neural network for outputting an estimate of the selection interest in the gaze point of regard. The artificial neural network is trained off-line prior to application to represent the mental decisions of the viewer. The device can be used to control computerized machinery from a video display by ocular gaze point of regard alone, by determining which visual cue the viewer is looking at and then using the estimation of the task-related selection as a selector switch. USP # 5,644,363 (July 1, 1997)
Apparatus for Superimposing Visual Subliminal Instructions on a Video Signal
Mead, Talbert
Abstract: A subliminal video instructional device comprises circuitry for receiving an underlying video signal and presenting this signal to horizontal and vertical synchronization detection circuits, circuitry for generating a subliminal video message synchronized to the underlying video signal, and circuitry for adding the subliminal video message to the underlying video signal to create a combination video signal. USP # 5,586,967 (December 24, 1996)
Method & Recording for Producing Sounds and Messages to Achieve Alpha & Theta Brainwave States…
Davis, Mark E.
Abstract: A method and recording for the use in achieving alpha and theta brainwave states and effecting positive emotional states in humans, is provided which includes a medium having a musical composition thereon with an initial tempo decreasing to a final tempo and verbal phrases recorded in synchrony with the decreasing tempo. USP # 5,562,597 (October 8, 1996)
Method & Apparatus for Reducing Physiological Stress
Van Dick, Robert C.
Abstract: Physiological stress in a human subject is treated by generating a weak electromagnetic field about a quartz crystal. The crystal is stimulated by applying electrical pulses of pulse widths between 0.1 and 50 microseconds each at a pulse repetition rate of between 0.5K and 10K pulses per second to a conductor positioned adjacent to the quartz crystal thereby generating a weak electromagnetic field. A subject is positioned within the weak electromagnetic field for a period of time sufficient to reduce stress. USP # 5,551,879 (September 3, 1996)
Dream State Teaching Machine
Raynie, Arthur D.
Abstract ~ A device for enhancing lucidity in the dream state of an individual. The device includes electronic circuitry incorporated into a headband for the user to wear while sleeping. The circuitry includes a detector for fitting adjacent to the eye of the sleeping individual, for detecting Rapid Eye Movement (REM), which occurs during the dream state. The detector emits a signal that is evaluated by additional circuitry to determine whether or not REM sleep is occurring. If REM sleep is occurring, a signal is generated to operate a recorded, which typically plays prerecorded messages through the headphones engaging the ear of the sleeping individual. USP # 5,539,705 (July 23, 1996)
Ultrasonic Speech Translator and Communication System
M. A. Akerman, M., et al.
Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc. USP # 5,507,291 (April 16, 1996)
Method & Apparatus for Remotely Determining Information as to Person’s Emotional State ~
Stirbl, et al.
Abstract: In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas. USP # 5,522,386 (June 4, 1996)
Apparatus for Determination of the Condition of the Vegetative Part of the Nervous System
Lerner, Eduard
Abstract: Apparatus for use in the determination of the condition of the vegetative part of the nervous system and/or of sensory functions of an organism, i.e. a human being or animal. The apparatus comprises devices for generating and supplying to said organism at least one sensory stimulus chosen from a group of sensory stimuli, such as visual, sound, olfactory, gustatory, tactile or pain stimuli, and devices for measuring the skin potential and the evoked response of the organism to a stimulus. The measured data are processed by processing devices for automatically controlling the supply of at least one stimulus for providing a non-rhythmical sequence of stimuli. Preferably, pairs of stimuli are supplied for developing a conditioned reflex. USP # 5,480,374 (January 2, 1996)
Method and Apparatus for Reducing Physiological Stress
Van Dick, Robert
Abstract ~ Physiological stress in a human subject is treated by generating a weak electromagnetic field about a grounded electrode by the application of pulses of between 5 and 50 microseconds each at a pulse rate of between 0.5K and 10K pulses per second to a power electrode, the power electrode and grounded electrode being coupled to high voltage pulse generation means. A subject is positioned within the weak electromagnetic field for a period of time sufficient to cause an increase in his or her alpha or theta brain wave levels. USP # 5,479,941 (January 2, 1996)
Device for Inducing Altered States of Consciousness
Harner, Michael
Abstract ~ A rotating device for producing altered states of consciousness in a subject is provided. The subject’s body rotates about a point in the center of the body support means at a speed between about 10 and about 60 revolutions per minute. In a preferred embodiment the direction of rotation is periodically reversed. USP # 5,392,788 (February 28, 1995)
Method and Device for Interpreting Concepts and Conceptual Thought…
Hudspeth, William J.
Abstract ~ A system for acquisition and decoding of EP and SP signals is provided which comprises a transducer for presenting stimuli to a subject, EEG transducers for recording brainwave signals from the subject, a computer for controlling and synchronizing stimuli presented to the subject and for concurrently recording brainwave signals, and either interpreting signals using a model for conceptual perceptional and emotional thought to correspond EEG signals to thought of the subject or comparing signals to normative EEG signals from a normative population to diagnose and locate the origin of brain dysfunctional underlying perception, conception, and emotion. USP # 5,356,368 (October 18, 1994)
Method & Apparatus for Inducing Desired States of Consciousness
Monroe, Robert E.
Abstract: Improved methods and apparatus for entraining human brain patterns, employing frequency following response (FFR) techniques, facilitate attainment of desired states of consciousness. In one embodiment, a plurality of electroencephalogram (EEG) waveforms, characteristic of a given state of consciousness, are combined to yield an EEG waveform to which subjects may be susceptible more readily. In another embodiment, sleep patterns are reproduced based on observed brain patterns during portions of a sleep cycle; entrainment principles are applied to induce sleep. In yet another embodiment, entrainment principles are applied in the work environment, to induce and maintain a desired level of consciousness. A portable device also is described. USP # 5,352,181 (October 4, 1994)
Method & Recording for Producing Sounds and Messages…
Davis, Mark E.
Abstract: A method and recording for use in achieving Alpha and Theta brain wave states and effecting positive emotional states in humans to enhance learning and self-improvement, is provided which includes a medium having a musical composition recorded thereon with an initial tempo decreasing to a final tempo and verbal phrases, comprising between approximately 4 and approximately 8 words, recorded in synchrony with the decreasing initial tempo. USP # 5,330,414 (July 19, 1994)
Brain Wave Inducing Apparatus
Yasushi, Mitsuo
Abstract: A random signal generator outputs a random noise signal to a band pass filter which selectively passes frequency components in the frequency range of a desired brain wave from a subject. The output of the band pass filter is supplied to an automatic level controller. The automatic level controller sets the output of band pass filter to a predetermined amplitude. Then, the output of the automatic level controller is fed to a stimulating light generator, which converts the output of the automatic level controller into a light signal for stimulating the subject in order to induce the desired brain wave from the subject. The light signal is then emitted into the subject’s eyes. USP # 5,289,438 (February 22, 1994)
Method & System for Altering Consciousness
Gall, James
Abstract: A system for altering the states of human consciousness involves the simultaneous application of multiple stimuli, preferable sounds, having differing frequencies and wave forms. The relationship between the frequencies of the several stimuli is exhibited by the equation g = 2.sup.n/4 .multidot.f where: f = frequency of one stimulus; g = frequency of the other stimuli or stimulus; and n = a positive or negative integer which is different for each other stimulus. USP # 5,245,666 (September 14, 1993)
Personal Subliminal Messaging System
Mikell, Bruce T.
Abstract ~ A personal subliminal messaging system includes a wide range linear subliminal modulator (43), a digital audio recording or play device (46), a microphone (51) to pick up the sound at the ear, and an earpiece (50) to deliver the subliminal message. The sound level at the user’s ear is detected and measured. After risetime and decay conditioning of the varying dc control signal, the wide range linear modulator (43) uses this signal to control the level of the message to the earpiece (50). The user adjusts the system for a liminal of a subliminal level. The psychoacoustic phenomena of Post Masking is used to increase the integrity of the message in subliminal messaging systems. USP # 5,270,800 (December 14, 1993)
Subliminal Message Generator
Sweet. Robert L.
Abstract: A combined subliminal and supraliminal message generator for use with a television receiver permits complete control of subliminal messages and their manner of presentation. A video synchronization detector enables a video display generator to generate a video message signal corresponding to a received alphanumeric text message in synchronism with a received television signal. A video mixer selects either the received video signal or the video message signal for output. The messages produced by the video message generator are user selectable via a keyboard input. A message memory stores a plurality of alphanumeric text messages specified by user commands for use as subliminal messages. This message memory preferably includes a read only memory storing predetermined sets of alphanumeric text messages directed to differing topics. The sets of predetermined alphanumeric text messages preferably include several positive affirmations directed to the left brain and an equal number of positive affirmations directed to the right brain that are alternately presented subliminally. The left brain messages are presented in a linear text mode, while the right brain messages are presented in a three dimensional perspective mode. The user can control the length and spacing of the subliminal presentations to accommodate differing conscious thresholds. Alternative embodiments include a combined cable television converter and subliminal message generator, a combine television receiver and subliminal message generator and a computer capable of presenting subliminal messages. USP # 5,224,864 (July 6, 1993)
Method of Recording and Reproducing Subliminal Signals that are 180 Degrees Out of Phase
Woith, Blake F.
Abstract ~ A subliminal recording includes both subliminal message and mask signals applied to both tracks of a two track recording medium. The subliminal message signals are identical in content, and are recorded in an out-of-phase relationship. The mask signals are recorded in phase. The resulting recording may be utilized in the conventional manner for subliminal recordings. By combining the composite signals in an inverted relationship, the mask signals cancel while the subliminal message signals are additive, thus allowing the presence of the subliminal message signal to be confirmed on the recording. USP # 5,221,962 (June 22, 1993)
Subliminal Device having Manual Adjustment of Perception Level of Subliminal Messages
Backus, Alan L., et al.
Abstract: A method and apparatus for presenting subliminal visual and/or audio messages which allows user verification of message content and presence, as well as proper adjustment of message obviousness while accounting for ambient conditions and user sensitivities is disclosed. This method and apparatus also presents synchronized reinforced sensory input of subliminal messages. This is performed by simultaneously overlaying images received from a VCR over a plurality of television signals. This apparatus directs overlay images over RF television signals having both audio and video components USP # 5,215,468 (June 1, 1993)
Method and Apparatus for Introducing Subliminal Changes to Audio Stimuli
Lauffer, Martha A., et al.
Abstract ~ A method and apparatus for introducing gradual changes to an audio signal so that the changes are subliminal. The changes can involve tempo and volume, for example, and can take the form of a gentle gradient having ever increasing/decreasing ramp-like changes over a sufficient duration, or a more complex program involving several gentle gradients. In the preferred embodiment, an enhanced audio play-back device such as a portable audio cassette recorder can be programmed to subliminally alter the characteristics of a standard pre-recorded tape containing music, for example. As a motivational tool during walking, jogging or other repetitive exercise, the tempo is gradually increased over a period of time to encourage a corresponding gradual (and subliminal) increase in physical exertion by a user whose rate of movement is proportional to the tempo of the music. The tempo can be either manually changed in conjunction with a subliminal program, or by itself in an override mode, or by itself in a version of the present-inventive audio play-back device which allows only manual tempo alternation. In an alternate embodiment, a special pre-recorded tape contains subliminal changes in tempo, for example, for play-back on a standard audio cassette recorder (which operates at one speed, only) to cause the same effect as the preferred embodiment. USP # 5,213,562 (May 25, 1993)
Method of Inducing Mental, Emotional and Physical States of Consciousness…
Monroe, Robert A.
Abstract: A method having applicability in replication of desired consciousness states; in the training of an individual to replicate such a state of consciousness without further audio stimulation; and in the transferring of such states from one human being to another through the imposition of one individual’s EEG, superimposed on desired stereo signals, on another individual, by inducement of a binaural beat phenomenon. USP # 5,194,008 (March 16, 1993)
Subliminal Image Modulation Projection and Detection System and Method
Mohan, William L., et al.
Abstract ~ Weapon training simulation system including a computer operated video display scene whereon is projected a plurality of visual targets. The computer controls the display scene and the targets, whether stationary or moving, and processes data of a point of aim sensor apparatus associated with a weapon operated by a trainee. The sensor apparatus is sensitive to non-visible or subliminal modulated areas having a controlled contrast of brightness between the target scene and the targets. The sensor apparatus locates a specific subliminal modulated area and the computer determines the location of a target image on the display scene with respect to the sensor apparatus USP # 5,175,571 (December 29, 1992)
Glasses with Subliminal Message
Tanefsky, Faye, et al.
Abstract ~ A pair of subliminal imaging spectacles is provided with a matched pair of visual subliminal images designed and placed so as to merge into one image due to the stereoscopic effect of human vision and thus to impart a subliminal message to the wearer. USP # 5,170,381 (December 8, 1992)
Method for Mixing Audio Subliminal Recordings
Taylor, Eldon, et al.
Abstract ~ Audio subliminal recordings are made in which in addition to using a primary carrier, such as music, two audio channels are used to deliver subliminal messages to the brain. On one channel, accessing the left brain hemisphere, the message delivered is meaningfully spoken, forward-masked, permissive affirmations delivered in a round-robin manner by a male voice, a female voice and a child’s voice. On the other channel, accessing the right brain, directive messages, in the same voices, are recorded in backward-masked (or meta-contrast). The three voices are recording in round-robin fashion with full echo reverberation. The audio tracks are mixed using a special processor which converts sound frequencies to electrical impulses and tracks the subliminal message to synchronize the subliminal message in stereo with the primary carrier. The processor maintains constant gain differential between the primary carrier and the subliminal verbiage and, with the subliminal verbiage being recorded with round-robin, full echo reverberation, ensures that none of a message is lost. The primary carrier should be continuous music without breaks or great differences in movements. USP # 5,159,703 (October 27, 1992)
Silent Subliminal Presentation System
Lowery, Oliver
Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. USP # 5,151,080 (September 29, 1992)
Method & Apparatus for Inducing & Establishing a Changed State of Consciousness
Bick, Claus Abstract: An electroacoustic device includes a sound generator as well as a system for producing synthetic human speech, connected to a modulation stage for superimposing the output signals thereof. The superimposed output signals are applied via an amplifier stage to one of a headphone system or loudspeaker system. USP # 5,135,468 (August 4, 1992)
Method & Apparatus of Varying the Brain State of a Person by Means of an Audio Signal
Meissner, Juergen P.
Abstract: A method of varying the brain state of a person includes the steps of supplying the first audio signal to one ear of the person, supplying a second audio signal to the other ear of the person, and substantially continuously varying the frequency of at least one of the first and second audio signals to vary the brain state of the person. USP # 5,134,484 (July 28, 1992)
Superimposing Method & Apparatus Useful for Subliminal Messages
Willson, Joseph
Abstract: Data to be displayed is combined with a composite video signal. The data is stored in a memory in digital form. Each byte of the data is read out in sequential fashion to determine: the recurrence display rate of the data according to the frame sync pulses of the video signal; the location of the data within the video image according to the line sync pulses of the video signal; and the location of the data display within the video image according to the position information. Synchronization of the data with the video image is derived from the sync pulses of the composite video signal. A similar technique is employed to combine sound data with an audio signal. Data to be displayed may be presented as a subliminal message or may persist for a given time interval. The data may be derived from a variety of sources including a prerecorded or live video signal. The message may be a reminder message displayed upon a television screen to remind the viewer of an appointment. The data may be stored in a variety of different memory devices capable of high speed data retrieval. The data may be generated locally on-line or off-line and transferred to memory which stores the data necessary to create the message. USP # 5,128,765 (July 7, 1992)
System for Implementing the Synchronized Superimposition of Subliminal Signals
Dingwall, Robert
Abstract ~ An apparatus and system for the controlled delivery of a subliminal video and/or audio message on to a source signal from a video tape player or similar. The source signal is divided into audio and video portions. A video processor reads sychronization information from the source signal. A controller transmits a stored subliminal image at designated times to a mixer amplifier fully synchronized with the source signal. Concurrently, an audio subliminal message is applied to the source audio at a volume level regulated at some fraction to the source audio. The combined signals are transmitted to a monitor for undistracted viewing. USP # 5,123,899 (June 23, 1992)
Method & System for Altering Consciousness
Gall, James
Abstract: A system for altering the states of human consciousness involves the simultaneous application of multiple stimuli, preferable sounds, having differing frequencies and wave forms. The relationship between the frequencies of the several stimuli is exhibited by the equation g = s.sup.n/4 .multidot.f where: f = frequency of one stimulus; g = frequency of the other stimuli of stimulus; and n=a positive or negative integer which is different for each other stimulus. USP # 5,052,401 (October 1, 1991)
Product Detector for a Steady Visual Evoked Potential Stimulator and Product Detector
Sherwin, Gary
Abstract ~ An automated visual testing system is disclosed which presents an alternating steady state visual stimulus to a patient through an optical system that modifies the stimulus image. As the image changes, the patient produces evoked potentials that change. The evoked potentials are detected by a product detector which produces the amplitude of the evoked potentials. The product detector includes filters which isolate the patient’s evoked potentials, a modulator which detects the response using the stimulus source frequency and a demodulator that determines the amplitude of the response. The product detector detects the level of the steady state evoked potential signals even in the presence of substantial background noise and extraneous electroencephalograhic signals. These detectors can be used to monitor the evoked potential produced by visual, aural or somatic steady state stimuli. The components described above can be used to produce a system that can determine to which of several different displays an observer is paying attention by providing images that blink at different frequencies and product detectors for each of the stimulus frequencies. The product detector producing the highest output indicates the display upon which the observer is focused. USP # 5,047,994 (September 10, 1991)
Supersonic Bone Conduction Hearing Aid and Method
Lenhardt, Martin, et al.
Abstract ~ A supersonic bone conduction hearing aid that receives conventional audiometric frequencies and converts them to supersonic frequencies for connection to the human sensory system by vibration bone conduction. The hearing is believed to use channels of communications to the brain that are not normally used for hearing. These alternative channels do not deteriorate significantly with age as does the normal hearing channels. The supersonic bone conduction frequencies are discerned as frequencies in the audiometric range of frequencies. USP # 5,036,858 (August 6, 1991)
Method & Apparatus for Changing Brain Wave Frequency
Carter, John L., et al.
Abstract: A method for changing brain wave frequency to a desired frequency determines a current brain wave frequency of a user, generates two frequencies with a frequency difference of a magnitude between that of the current actual brain wave frequency and the desired frequency but always within a predetermined range of the current actual brain wave frequency, and produces an output to the user corresponding to the two frequencies. One apparatus to accomplish the method has a computer processor, a computer memory, EEG electrodes along with an amplifier, a programmable timing generator responsive to the computer processor for generating the two frequencies, audio amplifiers and a beat frequency generator driving a visual frequency amplifier. USP # 5,027,208 (June 25,1991)
Therapeutic Subliminal Imaging System
Dwyer, Jr., Joseph, et al.
Abstract ~ A therapeutic subliminal imaging system wherein a selected subliminal message is synchronized with and added to an existing video signal containing a supraliminal message. A television receiver or video recorder can be used to provide the supraliminal message and a video processing circuit varies the intensity of that perceptible message to incorporate one or more subliminal images. USP # 5,017,143 (May 21, 1991)
Method and Apparatus for Producing Subliminal Images
Backus, Alan, et al. Abstract ~ A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior. Subliminal graphic images having translucent visual values locally dependent on background values in order to maintain desired levels of visual contrast. USP # 4,958,638 (September 25, 1990)
Non-Contact Vital Signs Monitor
Sharpe, Steven, et al.
Abstract ~ An apparatus for measuring simultaneous physiological parameters such as heart rate and respiration without physically connecting electrodes or other sensors to the body. A beam of frequency modulated continuous wave radio frequency energy is directed towards the body of a subject. The reflected signal contains phase information representing the movement of the surface of the body, from which respiration and heartbeat information can be obtained. The reflected phase modulated energy is received and demodulated by the apparatus using synchronous quadrature detection. The quadrature signals so obtained are then signal processed to obtain the heartbeat and respiratory information of interest. USP # 4,924,744 (May 15, 1990)
Apparatus for Generating Sound through Low Frequency and Noise Modulation
Lenzen, Reiner
Abstract ~ In an apparatus for generating sound, there are provided a plurality of channels for generating sounds. Each of the channels includes a memory for storing waveform data, and at least one of the channels includes a noise generator so that various kinds of sounds including rhythm sound-effects sound, effects sound-vibrato etc. are generated. There is further provided a controller by which voice sound signal is passed through the channels so that artificial sound, voice sound etc. are generated. There is still further provided a circuit for adjusting an amplitude level of a whole sound which is obtained by mixing output sounds of the channels so that far and near sound is produced. Further, each of the channels includes left and right attenuators which divide a channel sound into left and right channel sounds. Still further, the apparatus comprises a low frequency oscillator for controlling a depth of frequency modulation, and a controller for writing sampling data of a predetermined waveform into serial addresses of a memory. USP # 4,889,526 (December 26, 1989)
Non-Invasive Method & Apparatus for Modulating Brain Signals…
Rauscher, Elizabeth A.
Abstract: This invention incorporates the discovery of new principles which utilize magnetic and electric fields generated by time varying square wave currents of precise repetition, width, shape and magnitude to move through coils and cutaneously applied conductive eletrodes in order to stimulate the nervous system and reduce pain in humans. Timer means, adjustment means, and means to deliver current to the coils and conductive eletrodes are described, as well as a theoretical model of the process. The invention incorporates the concept of two cyclic expanding and collapsing magnetic fields which generate precise wave forms in conjunction with each other to create a beat frequency which in turn causes the ion flow in the nervous system of the human body to be efficiently moved along the nerve path where the locus of the pain exists to thereby reduce the pain. The wave forms are created either in one or more coils, one or more pairs of electrodes, or a combination of the two. USP # 4,883,067 (November 28, 1989)
Method & Apparatus for Translating the EEG into Music…
Knispel, Joel, et al.
Abstract: A method and apparatus for applying a musical feedback signal to the human brain, or any other brain, to induce controllable psychological and physiological responses. A signal representing the ongoing electroencephalographic (EEG) signal of a brain preferably is obtained from the electrode location on the scalp known as CZ or P3 in clinical notation. A signal processor converts the ongoing EEG into electrical signals which are converted into music by synthesizers. The music is acoustically fed back to the brain after a time delay calculated to shift the phase of the feedback in order to reinforce specific or desired ongoing EEG activity from the scalp position of interest. The music is comprised of at least one voice that follows the moment-by-moment contour of the EEG in real time to reinforce the desired EEG activity. The music drives the brain into resonance with the music to provide a closed loop or physiological feedback effect. Preferably, the musical feedback comprises additional voices that embody psychoacoustic principles as well as provide the content and direction normally supplied by the therapist in conventional biofeedback. The invention contemplates numerous applications for the results obtained. USP # 4,877,027 (October 31, 1989)
Hearing System
Brunkan, Wayne B.
Abstract: Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frewuency modulated bursts. each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. the burst width is between 500 nanoseconds and 100 microseconds. The pulse width is in the range of 10 nanoseconds to 1 microsecond. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated. USP # 4,858,612 (August 22, 1989)
Hearing Device
Stocklin, Philip L.
Abstract: A method and apparatus for stimulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and secribed. A microphone is used to transform sound signals into eletrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. the multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the mamal which are representative of the original sound received by the microphone. USP # 4,834,701 (May 30, 1989)
Apparatus for Inducing Frequency Reduction in Brain Wave
Masaki, Kazumi
Abstract: Frequency reduction in human brain wave is inducible by allowing human brain to perceive 4-16 hertz beat sound. Such beat sound can be easily produced with an apparatus, comprising at least one sound source generating a set of low-frequency signals different each other in frequency by 4-16 hertz. Electroencephalographic study revealed that the beat sound is effective to reduce beta-rhythm into alpha-rhythm, as well as to retain alpha-rhythm. USP # 4,821,326 (April 11, 1989)
Non-Audible Speech Generation Method & Apparatus
MacLeod, Norman
Abstract: A non-audible speech generation apparatus adn method for producing non-audible seech signals which includes an ultasonic transducer or vibrator for projecting a series of glottal shaped ultrasonic pulses to the vocal track of a speaker. The glottal pulses, in the approximate frequency spectrum extending from 15 kilohertz to 105 kilohertz, contains harmonics of approximately 30 times the grequency of the acoustical harmonicsgenerated by the vocal cords, but which may nevertheless be amplitude modulated to produce non-auduble speech by the speaker’s silently mouthing of words. The ultrasonic speech is then received by an ultasonic transducer disposed outside of the speaker’s mouth and electronically communicated to a translation device which down converts the ultrasonics signals to corresponding signals in the audible frquency range and synthesizes the signals into artificial speech. USP # 4,777,529 (October 11, 1988)
Auditory Subliminal Programming System
Schultz, Richard M., et al.
Abstract: An auditory subliminal programming system includes a subliminal message encoder that generates fixed frequency security tones and combines them with a subliminal message signal to produce an encoded subliminal message signal which is recorded on audio tape or the like. A corresponding subliminal decoder/mixer is connected as part of a user’s conventional stereo system and receives as inputs an audio program selected by the user and the encoded subliminal message. The decoder/mixer filters the security tones, if present, from the subliminal message and combines the message signals with selected low frequency signals associated with enhanced relaxation and concentration to produce a composite auditory subliminal signal. The decoder/mixer combines the composite subliminal signal with the selected audio program signals to form composite signals only if it detects the presence of the security tones in the subliminal message signal. The decoder/mixer outputs the composite signal to the audio inputs of a conventional audio amplifier where it is amplified and broadcast by conventional audio speakers. USP # 4,734,037 (March 29, 1988)
Message Screen
McClure, J. Patrick
Abstract: A transparent sheet is disclosed having a message thereon. The sheet has a first side adapted to be attached facing a plate which is normally viewed by a viewer and a second side facing the viewer. The message is arranged to be readably intelligible from the second side but is not liminally visible to the viewer when viewed from a normal viewing distance from the second side under normal viewing conditions. The message has a subliminal effect upon the viewer when viewed from the normal viewing distance from the second side under normal viewing conditions. A viewer can electively subject him or herself to subliminal messages while viewing television at leisure. USP # 4,717,343 (January 5, 1988)
Method of Changing a Person’s Behavior
Densky, Alan B.
Abstract: A method of conditioning a person’s unconscious mind in order to effect a desired change in the person’s behavior which does not require the services of a trained therapist. Instead the person to be treated views a program of video pictures appearing on a screen. The program as viewed by the person’s unconscious mind acts to condition the person’s thought patterns in a manner which alters that person’s behavior in a positive way. USP # 4,699,153 (October 13, 1987)
System for Assessing Verbal Psychobiological Correlates
Shevrin, Howard, et al.
Abstract: A system for assessing psychobiological conditions of a subject utilizes a plurality of words which are selected to be in four categories as critical stimuli. The words are presented by a tachistoscope to the subject in subliminal and supraliminal modes of operation. Subliminal stimulation of the subject is achieved by presenting the selected words for an exposure period of approximately one millisecond. The supraliminal exposure time is approximately thirty milliseconds. Prior to stimulation, the subject is diagnosed in accordance with conventional psychoanalytical techniques to establish the presence and nature of a pathological condition. The words are selected and categorized in four groups: pleasant words, unpleasant words, words related to a diagnosed conscious pathological condition, and words related to a diagnosed unconscious pathological condition. The brain wave responses which are evoked by the stimulation are collected via electrodes and analyzed in accordance with a transinformation technique which is based on information signal theory for establishing a probabilistic value which corresponds to the information content of the evoked responses. USP # 4,692,118 (September 8, 1987)
Video Subconscious Display Attachment
Mould, Richard E.
Abstract: An apparatus and method for introducing messages to the subconscious mind is disclosed, which includes a panel positioned adjacent a television screen, with the panel having non-distractive messages imprinted thereon, such that as the subject consciously focuses his attention on the video screen, his subconscious mind records the message from the panel that is within his peripheral vision. USP # 4,616,261 (October 7, 1986)
Method & Apparatus for Generating Subliminal Visual Messages
Crawford, James R., et al.
Abstract: A system for generating a subliminal message during the display of a normal television program on a television receiver utilizes a personal computer to generate an RF carrier modulated with video signals encoding the subliminal message. The computer runs under the control of an application program which stores the subliminal message and also controls the computer to cause it to generate timing signals that are provided to a single pole double-throw switch. The source of the normal television program and the video output of the computer are connected to the two switch inputs and the switch output is connected to the television receiver antenna system. The timing signals cause the switch to normally display the conventional television program and to periodically switch to the computer output to generate the subliminal message. The video output of the computer includes horizontal and vertical synchronizing signals which are of substantially the same frequency as the synchronizing signals incorporated within the normal program source but of an arbitrary phase. USP # 4,573,449 (March 4, 1986)
Method for Stimulating the Falling Asleep and/or Relaxing Behavior of a Person
Warnke, Egon F.
Abstract: A method and apparatus is provided with which a person suffering from sleeplessness can be more easily relaxed and may more rapidly fall asleep. In particular, sound pulses are emitted by an electro-acoustic transducer, according to the cadence of which, the person seeking to fall asleep is induced to breathe in and out over a predetermined period of time. By suitably selecting the pulse sequence frequency, the pitch and the amplitude of the sound pulses may be adjusted thereby enhancing the process of falling asleep. USP # 4,508,105 (April 2, 1985)
Shadow Generating Apparatus
Whitten, Glen, et al.
Abstract ~ Disclosed is an apparatus for inducing various brain wave patterns through visual stimulation. The apparatus comprises a pair of spectacles or other viewing apparatus having a liquid crystal display embedded in each lens. By repetitively activating and deactivating the liquid crystals, shadows are generated which are perceived by the subject individual wearing the viewing apparatus. Responding to the frequency of shadow generation, the subject’s brain is thereby induced to generate sympathetic brain wave frequencies. The apparatus finds particular utility in the generation of alpha waves. Because learning is enhanced when the brain is in the alpha state, activities such as listening to tapes or lectures and the like can be carried out with greater facility. Shadow generation is accomplished through the use of a timing mechanism for each liquid crystal display and the frequency for each is adjustable over a wide range, permitting synchronous or asynchronous timing. USP # 4,395,600 (July 26, 1983)
Auditory Subliminal Message System & Method
Lundy, Rene R., et al.
Abstract: Ambient audio signals from the customer shopping area within a store are sensed and fed to a signal processing circuit that produces a control signal which varies with variations in the amplitude of the sensed audio signals. A control circuit adjusts the amplitude of an auditory subliminal anti-shoplifting message to increase with increasing amplitudes of sensed audio signals and decrease with decreasing amplitudes of sensed audio signals. This amplitude controlled subliminal message may be mixed with background music and transmitted to the shopping area. To reduce distortion of the subliminal message, its amplitude is controlled to increase at a first rate slower than the rate of increase of the amplitude of ambient audio signals from the area. Also, the amplitude of the subliminal message is controlled to decrease at a second rate faster than the first rate with decreasing ambient audio signal amplitudes to minimize the possibility of the subliminal message becoming supraliminal upon rapid declines in ambient audio signal amplitudes in the area. A masking signal is provided with an amplitude which is also controlled in response to the amplitude of sensed ambient audio signals. This masking signal may be combined with the auditory subliminal message to provide a composite signal fed to, and controlled by, the control circuit. USP # 4,388,918 (June 21, 1983) \

Leave a comment

Filed under Documents

Flashback: U.S. Counterinsurgency Manual Leaked, Calls for False Flag Operations, Suspension of Human Rights

Julian Assange
Statism Watch
Monday June 15, 2008

Editor’s note: Most of the tactics described below are now being implemented and used in the United States against the American people.

Wikileaks has released a sensitive 219 page US military counterinsurgency manual. The manual, Foreign Internal Defense Tactics Techniques and Procedures for Special Forces (1994, 2004), may be critically described as “what we learned about running death squads and propping up corrupt government in Latin America and how to apply it to other places”. Its contents are both history defining for Latin America and, given the continued role of US Special Forces in the suppression of insurgencies, including in Iraq and Afghanistan, history making.

 
  Vietnam
   
  Counterinsurgency tactics now used in Afghanistan and Iraq were first field tested in Vietnam and Latin America.
   

The leaked manual, which has been verified with military sources, is the official US Special Forces doctrine for Foreign Internal Defense or FID.

FID operations are designed to prop up a “friendly” government facing a popular revolution or guerilla insurgency. FID interventions are often covert or quasi-covert due to the unpopular nature of the governments being supported (”In formulating a realistic policy for the use of advisors, the commander must carefully gauge the psychological climate of the HN [Host Nation] and the United States.”)

The manual directly advocates training paramilitaries, pervasive surveillance, censorship, press control and restrictions on labor unions & political parties. It directly advocates warrantless searches, detainment without charge and (under varying circumstances) the suspension of habeas corpus. It directly advocates employing terrorists or prosecuting individuals for terrorism who are not terrorists, running false flag operations and concealing human rights abuses from journalists. And it repeatedly advocates the use of subterfuge and “psychological operations” (propaganda) to make these and other “population & resource control” measures more palatable.

The content has been particularly informed by the long United States involvement in El Salvador.

In 2005 a number of credible media reports suggested the Pentagon was intensely debating “the Salvador option” for Iraq.[1]. According to the New York Times Magazine:

The template for Iraq today is not Vietnam, with which it has often been compared, but El Salvador, where a right-wing government backed by the United States fought a leftist insurgency in a 12-year war beginning in 1980. The cost was high — more than 70,000 people were killed, most of them civilians, in a country with a population of just six million. Most of the killing and torturing was done by the army and the right-wing death squads affiliated with it. According to an Amnesty International report in 2001, violations committed by the army and associated groups included ‘‘extrajudicial executions, other unlawful killings, ‘disappearances’ and torture. . . . Whole villages were targeted by the armed forces and their inhabitants massacred.’’ As part of President Reagan’s policy of supporting anti-Communist forces, hundreds of millions of dollars in United States aid was funneled to the Salvadoran Army, and a team of 55 Special Forces advisers, led for several years by Jim Steele, trained front-line battalions that were accused of significant human rights abuses.

From the WikiLeaks site:

DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 5 December 2003. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-SFD, Fort Bragg, North Carolina 28310-5000.

Destruction Notice: Destroy by any method that must prevent disclosure of contents or reconstruction of the document.

[…]

Insurgent Strategies.

There are three general strategies of insurgency: foco, mass-oriented, and traditional.

Foco Insurgency.

A foco (Spanish word meaning focus or focal point) is a single, armed cell that emerges from hidden strongholds in an atmosphere of disintegrating legitimacy. In theory, this cell is the nucleus around which mass popular support rallies. The insurgents build new institutions and establish control on the basis of that support. For a foco insurgency to succeed, government legitimacy must be near total collapse. Timing is critical. The foco must mature at the same time the government loses legitimacy and before any alternative appears. The most famous foco insurgencies were those led by Castro and Che Guevara. The strategy was quite effective in Cuba because the Batista regime was corrupt and incompetent. The distinguishing characteristics of a foco insurgency are The deliberate avoidance of preparatory organizational work. The rationale is based on the premise that most peasants are intimidated by the authorities and will betray any group that cannot defend itself. The development of rural support as demonstrated by the ability of the foco insurgency to strike against the authorities and survive. The absence of any emphasis on the protracted nature of the conflict.

Fidel Castro/Cuba

In 1952, Fidel Castro began his revolutionary movement in Cuba. After an unsuccessful attack of Ft. Moncada, he was imprisoned. Upon release in 1955 he fled to Mexico to train a new group of guerrilla warriors. In 1956, Castro and 82 of his followers returned to Cuba on a yacht. Of this group, only 12 of Castro’s followers made their way to the Sierra Maestra mountains. From his remote mountain base, he established a 100to 150-man nucleus. As Castro’s organization grew, small unit patrols began hit-and-run type operations. While Castro continued to expand his area of influence, the popularity of the corrupt Batista government waned. In May of 1958, the government launched an attack on the Sierra Maestra stronghold. Castro withdrew deeper into the mountains, while spreading his message on national reform. Batista’s continuing repression of the country led to general strikes and continuing growth in popular support for Castro’s small cell of revolutionaries. Finally, Batista fled the country on 1 January 1959, and Castro established a junta and became the Prime Minister and President.

Mass-Oriented Insurgency

This insurgency aims to achieve the political and armed mobilization of a large popular movement. Mass-oriented insurgencies emphasize creating apolitical and armed legitimacy outside the existing system. They challenge that system and then destroy or supplant it. These insurgents patiently build a large armed force of regular and irregular guerrillas. They also construct a base of active and passive political supporters. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside, Their political leadership normally is distinct from their military leadership. Their movement normally establishes a parallel government that openly proclaims its own legitimacy. They have a well-developed ideology and decide on their objectives only after careful analysis. Highly organized, they mobilize forces for a direct military and political challenge to the government using propaganda and guerrilla action. The distinguishing characteristics of a mass-oriented insurgency are:

Political control by the revolutionary organization, which assures priority of political considerations. Reliance on organized popular support to provide recruits, funds, supplies, and intelligence. Primary areas of activity, especially in early phases, in the remote countryside where the population can be organized and base areas established with little interference from the authorities. Reliance upon guerrilla tactics to carry on the military side of the strategy. These tactics focus on the avoidance of battle, except at times and places of the insurgents choosing, and the employment of stealth and secrecy, ambush, and surprise to overcome the initial imbalance of strength. A phased strategy consisting first of a primarily organizational phase in which the population is prepared for its vital role. In the second phase, armed struggle is launched and the guerrilla force gradually builds up in size and strength, The third phase consists of mobile, more conventional warfare. Conceptually, this third phase is accompanied by a popular uprising that helps overwhelm the regime. It is a concept of protracted war.

Vietnam Conflict.

The Vietnam conflict (1959-1975) is one example of a mass-oriented insurgency. In December 1960, under the leadership of Ho Chi Minh, the National Liberation Front was formed in North Vietnam. Its main goal was to establish shadow governments at all levels in South Vietnam to take control of the population from the South Vietnamese. The National Liberation Front also used propaganda and guerrilla action, expecting the South Vietnamese population to rally to their side and overthrow the government. The insurgency was actually a failure because the mass uprising of the population, envisioned by the communist leaders, never occurred. Relentless guerrilla attacks did serve to weaken the government of South Vietnam, but they did not cause it to fall. In the spring of 1975, North Vietnam launched a massive conventional invasion of South Vietnam using armored vehicles. Saigon, the capital city, fell on 30 April.

Traditional Insurgency.

This insurgency normally grows from very specific grievances and initially has limited aims. It springs from tribal, racial, religious, linguistic, or other similarly identifiable groups. The insurgents perceive that the government has denied the rights and interests of their group and work to establish or restore them. They frequently seek withdrawal from government control through autonomy or semiautonomy. They seldom specifically seek to overthrow the government or control the whole society. They generally respond in kind to government violence. Their use of violence can range from strikes and street demonstrations to terrorism and guerrilla warfare. These insurgencies may cease if the government accedes to the insurgents demands. The concessions the insurgents demand, however, are so great that the government concedes its legitimacy along with them.

Huk Rebellion.

The Huk rebellion in the Philippines can be considered a traditional insurgency despite its Communist origin. The Huks first surfaced as an armed force resisting the Japanese occupation of the Second World War. After the war, when other resistance bands disarmed, the Huks did not. After the American liberation, the Huks saw a chance to seize national power at a time when the newly proclaimed Philippine Republic was in obvious distress as a result of a monetary crisis, graft in high office, and mounting peasant unrest. By 1950, the Huks had built a force of 12,800 armed guerrillas with thousands of peasant supporters on central Luzon. They were defeated in a series of actions by the Armed Forces of the Philippines led by Ramon Magsaysa. By 1965, they were nearly extinct, down to 75 members. Largely agrarian, the Huks do not view the government as totally in need of replacement but believe that many of the people in it need to be replaced. Recently the Huk movement has been gaining popular support, once again on the island of Luzon.

[…]

Counterintelligence

[…]

Most of the counterintelligence measures used will be overt in nature and aimed at protecting installations, units, and information and detecting espionage, sabotage, and subversion. Examples of counterintelligence measures to use are

  • Background investigations and records checks of persons in sensitive positions and persons whose loyalty may be questionable.
  • Maintenance of files on organizations, locations, and individuals of counterintelligence interest.
  • Internal security inspections of installations and units.
  • Control of civilian movement within government-controlled areas.
  • Identification systems to minimize the chance of insurgents gaining access to installations or moving freely.
  • Unannounced searches and raids on suspected meeting places.
  • Censorship.

[…]

PSYOP [Psychological Operations] are essential to the success of PRC [Population & Resources Control]. For maximum effectiveness, a strong psychological operations effort is directed toward the families of the insurgents and their popular support base. The PSYOP aspect of the PRC program tries to make the imposition of control more palatable to the people by relating the necessity of controls to their safety and well-being. PSYOP efforts also try to create a favorable national or local government image and counter the effects of the insurgent propaganda effort.

Control Measures

SF [US Special Forces] can advise and assist HN [Host Nation] forces in developing and implementing control measures. Among these measures are the following:

  • Security Forces. Police and other security forces use PRC [Population & Resources Control] measures to deprive the insurgent of support and to identify and locate members of his infrastructure. Appropriate PSYOP [Psychological Operations] help make these measures more acceptable to the population by explaining their need. The government informs the population that the PRC measures may cause an inconvenience but are necessary due to the actions of the insurgents.
  • Restrictions. Rights on the legality of detention or imprisonment of personnel (for example, habeas corpus) may be temporarily suspended. This measure must be taken as a last resort, since it may provide the insurgents with an effective propaganda theme. PRC [Population & Resources Control] measures can also include curfews or blackouts, travel restrictions, and restricted residential areas such as protected villages or resettlement areas. Registration and pass systems and control of sensitive items (resources control) and critical supplies such as weapons, food, and fuel are other PRC measures. Checkpoints, searches, roadblocks; surveillance, censorship, and press control; and restriction of activity that applies to selected groups (labor unions, political groups and the like) are further PRC measures.

[…]

Legal Considerations. All restrictions, controls, and DA measures must be governed by the legality of these methods and their impact on the populace. In countries where government authorities do not have wide latitude in controlling the population, special or emergency legislation must be enacted. This emergency legislation may include a form of martial law permitting government forces to search without warrant, to detain without bringing formal charges, and to execute other similar actions.

[…]

Psychological Operations

PSYOP can support the mission by discrediting the insurgent forces to neutral groups, creating dissension among the insurgents themselves, and supporting defector programs. Divisive programs create dissension, disorganization, low morale, subversion, and defection within the insurgent forces. Also important are national programs to win insurgents over to the government side with offers of amnesty and rewards. Motives for surrendering can range from personal rivalries and bitterness to disillusionment and discouragement. Pressure from the security forces has persuasive power.

[…]

Intelligence personnel must consider the parameters within which a revolutionary movement operates. Frequently, they establish a centralized intelligence processing center to collect and coordinate the amount of information required to make long-range intelligence estimates. Long-range intelligence focuses on the stable factors existing in an insurgency. For example, various demographic factors (ethnic, racial, social, economic, religious, and political characteristics of the area in which the underground movement takes places) are useful in identifying the members of the underground. Information about the underground organization at national, district, and local level is basic in FID [Foreign Internal Defense] and/or IDAD operations. Collection of specific short-range intelligence about the rapidly changing variables of a local situation is critical. Intelligence personnel must gather information on members of the underground, their movements, and their methods. Biographies and photos of suspected underground members, detailed information on their homes, families, education, work history, and associates are important features of short-range intelligence.

Destroying its tactical units is not enough to defeat the enemy. The insurgent’s underground cells or infrastructure must be neutralized first because the infrastructure is his main source of tactical intelligence and political control. Eliminating the infrastructure within an area achieves two goals: it ensures the government’s control of the area, and it cuts off the enemy’s main source of intelligence. An intelligence and operations command center (IOCC) is needed at district or province level. This organization becomes the nerve center for operations against the insurgent infrastructure. Information on insurgent infrastructure targets should come from such sources as the national police and other established intelligence nets and agents and individuals (informants).

The highly specialized and sensitive nature of clandestine intelligence collection demands specially selected and highly trained agents. Information from clandestine sources is often highly sensitive and requires tight control to protect the source. However, tactical information upon which a combat response can be taken should be passed to the appropriate tactical level.

The spotting, assessment, and recruitment of an agent is not a haphazard process regardless of the type agent being sought. During the assessment phase, the case officer determines the individual’s degree of intelligence, access to target, available or necessary cover, and motivation. He initiates the recruitment and coding action only after he determines the individual has the necessary attributes to fulfill the needs.

All agents are closely observed and those that are not reliable are relieved. A few well-targeted, reliable agents are better and more economical than a large number of poor ones.

 

A system is needed to evaluate the agents and the information they submit. The maintenance of an agent master dossier (possibly at the SFOD B level) can be useful in evaluating the agent on the value and quality of information he has submitted. The dossier must contain a copy of the agent’s source data report and every intelligence report he submitted.

Security forces can induce individuals among the general populace to become informants. Security forces use various motives (civic-mindedness, patriotism, fear, punishment avoidance, gratitude, revenge or jealousy, financial rewards) as persuasive arguments. They use the assurance of protection from reprisal as a major inducement. Security forces must maintain the informant’s anonymity and must conceal the transfer of information from the source to the security agent. The security agent and the informant may prearrange signals to coincide with everyday behavior.

Surveillance, the covert observation of persons and places, is a principal method of gaining and confirming intelligence information. Surveillance techniques naturally vary with the requirements of different situations. The basic procedures include mechanical observation (wiretaps or concealed microphones), observation from fixed locations, and physical surveillance of subjects.

Whenever a suspect is apprehended during an operation, a hasty interrogation takes place to gain immediate information that could be of tactical value. The most frequently used methods for gathering information (map studies and aerial observation), however, are normally unsuccessful. Most PWs cannot read a map. When they are taken on a visual reconnaissance flight, it is usually their first flight and they cannot associate an aerial view with what they saw on the ground.

The most successful interrogation method consists of a map study based on terrain information received from the detainee. The interrogator first asks the detainee what the sun’s direction was when he left the base camp. From this information, he can determine a general direction. The interrogator then asks the detainee how long it took him to walk to the point where he was captured. Judging the terrain and the detainee’s health, the interrogator can determine a general radius in which the base camp can be found (he can use an overlay for this purpose). He then asks the detainee to identify significant terrain features he saw on each day of his journey, (rivers, open areas, hills, rice paddies, swamps). As the detainee speaks and his memory is jogged, the interrogator finds these terrain features on a current map and gradually plots the detainee’s route to finally locate the base camp.

If the interrogator is unable to speak the detainee’s language, he interrogates through an interpreter who received a briefing beforehand. A recorder may also assist him. If the interrogator is not familiar with the area, personnel who are familiar with the area brief him before the interrogation and then join the interrogation team. The recorder allows the interrogator a more free-flowing interrogation. The recorder also lets a knowledgeable interpreter elaborate on points the detainee has mentioned without the interrogator interrupting the continuity established during a given sequence. The interpreter can also question certain inaccuracies, keeping pressure on the subject. The interpreter and the interrogator have to be well trained to work as a team. The interpreter has to be familiar with the interrogation procedures. His preinterrogation briefings must include information on the detainee’s health, the circumstances resulting in his detention, and the specific information required. A successful interrogation is contingent upon continuity and a welltrained interpreter. A tape recorder (or a recorder taking notes) enhances continuity by freeing the interrogator from time-consuming administrative tasks.

[…]

Political Structures. A tightly disciplined party organization, formally structured to parallel the existing government hierarchy, may be found at the center of some insurgent movements. In most instances, this organizational structure will consist of committed organizations at the village, district province, and national levels. Within major divisions and sections of an insurgent military headquarters, totally distinct but parallel command channels exist. There are military chains of command and political channels of control. The party ensures complete domination over the military structure using its own parallel organization. It dominates through a political division in an insurgent military headquarters, a party cell or group in an insurgent military unit, or a political military officer.

[…]

Special Intelligence-Gathering Operations

Alternative intelligence-gathering techniques and sources, such as doppelganger or pseudo operations, can be tried and used when it is hard to obtain information from the civilian populace. These pseudo units are usually made up of ex-guerrilla and/or security force personnel posing as insurgents. They circulate among the civilian populace and, in some cases, infiltrate guerrilla units to gather information on guerrilla movements and its support infrastructure.

Much time and effort must be used to persuade insurgents to switch allegiance and serve with the security forces. Prospective candidates must be properly screened and then given a choice of serving with the HN [Host Nation] security forces or facing prosecution under HN law for terrorist crimes.

Government security force units and teams of varying size have been used in infiltration operations against underground and guerrilla forces. They have been especially effective in getting information on underground security and communications systems, the nature and extent of civilian support and underground liaison, underground supply methods, and possible collusion between local government officials and the underground. Before such a unit can be properly trained and disguised, however, much information about the appearance, mannerisms, and security procedures of enemy units must be gathered. Most of this information comes from defectors or reindoctrinated prisoners. Defectors also make excellent instructors and guides for an infiltrating unit. In using a disguised team, the selected men should be trained, oriented, and disguised to look and act like authentic underground or guerrilla units. In addition to acquiring valuable information, the infiltrating units can demoralize the insurgents to the extent that they become overly suspicious and distrustful of their own units.

[…]

After establishing the cordon and designating a holding area, the screening point or center is established. All civilians in the cordoned area will then pass through the screening center to be classified.

National police personnel will complete, if census data does not exist in the police files, a basic registration card and photograph all personnel over the age of 15. They print two copies of each photo- one is pasted to the registration card and the other to the village book (for possible use in later operations and to identify ralliers and informants).

The screening element leader ensures the screeners question relatives, friends, neighbors, and other knowledgeable individuals of guerrilla leaders or functionaries operating in the area on their whereabouts, activities, movements, and expected return.

The screening area must include areas where police and military intelligence personnel can privately interview selected individuals. The interrogators try to convince the interviewees that their cooperation will not be detected by the other inhabitants. They also discuss, during the interview, the availability of monetary rewards for certain types of information and equipment.

[…]

Civilian Self-Defense Forces [Paramilitaries, or, especially in an El-Salvador or Colombian civil war context, right wing “death squads”]

When a village accepts the CSDF program, the insurgents cannot choose to ignore it. To let the village go unpunished will encourage other villages to accept the government’s CSDF program. The insurgents have no choice; they have to attack the CSDF village to provide a lesson to other villages considering CSDF. In a sense, the psychological effectiveness of the CSDF concept starts by reversing the insurgent strategy of making the government the repressor. It forces the insurgents to cross a critical threshold-that of attacking and killing the very class of people they are supposed to be liberating.

To be successful, the CSDF program must have popular support from those directly involved or affected by it. The average peasant is not normally willing to fight to his death for his national government. His national government may have been a succession of corrupt dictators and inefficient bureaucrats. These governments are not the types of institutions that inspire fight-to-the-death emotions in the peasant. The village or town, however, is a different matter. The average peasant will fight much harder for his home and for his village than he ever would for his national government. The CSDF concept directly involves the peasant in the war and makes it a fight for the family and village instead of a fight for some faraway irrelevant government.

[…]

Members of the CSDF receive no pay for their civil duties. In most instances, however, they derive certain benefits from voluntary service. These benefits can range from priority of hire for CMO projects to a place at the head of ration lines. In El Salvador, CSDF personnel (they were called civil defense there) were given a U.S.-funded life insurance policy with the wife or next of kin as the beneficiary.If a CSDF member died in the line of duty, the widow or next of kin was ceremoniously paid by an HN official. The HN administered the program and a U.S. advisor who maintained accountability of the funds verified the payment. The HN [Host Nation] exercises administrative and visible control.

Responsiveness and speedy payment are essential in this process since the widow normally does not have a means of support and the psychological effect of the government assisting her in her time of grief impacts on the entire community. These and other benefits offered by or through the HN government are valuable incentives for recruiting and sustaining the CSDF.

[…]

The local CSDF members select their leaders and deputy leaders (CSDF groups and teams) in elections organized by the local authorities. In some cases, the HN [Host Nation] appoints a leader who is a specially selected member of the HN security forces trained to carry out this task. Such appointments occurred in El Salvador where the armed forces have established a formal school to train CSDF commanders. Extreme care and close supervision are required to avoid abuses by CSDF leaders.

[…]

The organization of a CSDF can be similar to that of a combat group. This organization is effective in both rural and urban settings. For example, a basic group, having a strength of 107 members, is broken down into three 35-man elements plus a headquarters element of 2 personnel. Each 35-man element is further broken down into three 1 l-man teams and a headquarters element of 2 personnel. Each team consists of a team leader, an assistant team leader, and three 3-man cells. This organization can be modified to accommodate the number of citizens available to serve.

[…]

Weapons training for the CSDF personnel is critical. Skill at arms decides the outcome of battle and must be stressed. Of equal importance is the maintenance and care of weapons. CSDF members are taught basic rifle marksmanship with special emphasis on firing from fixed positions and during conditions of limited visibility. Also included in the marksmanship training program are target detection and fire discipline.

Training ammunition is usually allocated to the CSDF on the basis of a specified number of rounds for each authorized weapon. A supporting HN government force or an established CSDF logistic source provides the ammunition to support refresher training.

[…]

Acts of misconduct by HN [Host Nation] personnel

All members of training assistance teams must understand their responsibilities concerning acts of misconduct by HN personnel. Team members receive briefings before deployment on what to do if they encounter or observe such acts. Common Article 3 of the four Geneva Conventions lists prohibited acts by parties to the convention. Such acts are-

  • Violence to life and person, in particular, murder, mutilation, cruel treatment, and torture.
  • Taking of hostages.
  • Outrages against personal dignity, in particular, humiliating and degrading treatment.
  • Passing out sentences and carrying out executions without previous judgment by a regularly constituted court that affords all the official guarantees that are recog-nized as indispensable by civilized people.
  • The provisions in the above paragraph represent a level of conduct that the United States expects each foreign country to observe.

If team members encounter prohibited acts they can not stop, they will disengage from the activity, leave the area if possible, and report the incidents immediately to the proper in-country U.S. authorities. The country team will identify proper U.S. authorities during the team’s initial briefing. Team members will not discuss such matters with non-U.S. Government authorities such as journalists and civilian contractors.

[…]

Most insurgents’ doctrinal and training documents stress the use of pressure-type mines in the more isolated or less populated areas. They prefer using commandtype mines in densely populated areas. These documents stress that when using noncommand-detonated mines, the insurgents use every means to inform the local populace on their location, commensurate with security regulations. In reality, most insurgent groups suffer from various degrees of deficiency in their C2 [Command & Control] systems. Their C2 does not permit them to verify that those elements at the operational level strictly follow directives and orders. In the case of the Frente Farabundo Marti de la Liberation Nacional (FMLN) in El Salvador, the individual that emplaces the mine is responsible for its recovery after the engagement. There are problems with this concept. The individual may be killed or the security forces may gain control of the area. Therefore, the recovery of the mine is next to impossible.

[…]

Homemade antipersonnel mines are used extensively in El Salvador, Guatemala and Malaysia. (Eighty percent of all El Salvadoran armed forces casualties in 1986 were due to mines; in 1987, soldiers wounded by mines and booby traps averaged 50 to 60 per month.) The important point to remember is that any homemade mine is the product of the resources available to the insurgent group. Therefore, no two antipersonnel mines may be the same in their configuration and materials. Insurgent groups depend to a great extent on materials discarded or lost by security forces personnel. The insurgents not only use weapons, ammunition, mines, grenades, and demolitions for their original purpose but also in preparing expedient mines and booby traps.

[…]

A series of successful minings carried out by the Viet Cong insurgents on the Cua Viet River, Quang Tri Province, demonstrated their resourcefulness in countering minesweeping tactics. Initially, chain-dragging sweeps took place morning and evening. After several successful mining attacks, it was apparent that they laid the mines after the minesweepers passed. Then, the boats using the river formed into convoys and transited the river with minesweepers 914 meters ahead oft he convoy. Nevertheless, boats of the convoy were successfully mined in mid-channel, indicating that the mines were again laid after the minesweeper had passed, possibly by using sampans. Several sampans were observed crossing or otherwise using the channel between the minesweepers and the convoy. The convoys were then organized so that the minesweepers worked immediately ahead of the convoy. One convoy successfully passed. The next convoy had its minesweepers mined and ambushed close to the river banks.

[…]

Military Advisors

[…]

Psychologically pressuring the HN [Host Nation] counterpart may sometimes be successful.Forms of psychological pressure may range from the obvious to the subtle. The advisor never applies direct threats, pressure, or intimidation on his counterpart Indirect psychological pressure may be applied by taking an issue up the chain of command to a higher U.S. commander. The U.S. commander can then bring his counterpart to force the subordinate counterpart to comply. Psychological pressure may obtain quick results but may have very negative side effects. The counterpart will feel alienated and possibly hostile if the advisor uses such techniques. Offers of payment in the form of valuables may cause him to become resentful of the obvious control being exerted over him. In short, psychologically pressuring a counterpart is not recommended. Such pressure is used only as a last resort since it may irreparably damage the relationship between the advisor and his counterpart

PSYOP [Psychological Operations] Support for Military Advisors

The introduction of military advisors requires preparing the populace with which the advisors are going to work. Before advisors enter a country, the HN [Host Nation] government carefully explains their introduction and clearly emphasizes the benefits of their presence to the citizens. It must provide a credible justification to minimize the obvious propaganda benefits the insurgents could derive from this action. The country’s dissenting elements label our actions, no matter how well-intended, an “imperialistic intervention.”

Once advisors are committed, their activities should be exploited. Their successful integration into the HN [Host Nation] society and their respect for local customs and mores, as well as their involvement with CA [Civil Affairs] projects, are constantly brought to light. In formulating a realistic policy for the use of advisors, the commander must carefully gauge the psychological climate of the HN and the United States.

Leave a comment

Filed under Documents