Saturday, July 23, 2005                                               The Daily Battle Against Subjectivity
Signs Logo
 


PODCAST July 23, 2005

Signs of the Times
Commentary

The world as seen from around the kitchen table

Podcast Icon Click to stream mp3
mp3 download icon Click to download mp3 (14 megs)
mp3 download icon Click to download mp3 (6 megs)



In our latest podcast, (left to right) editors Henry See, Scott Ogrin, and Joe Quinn discuss 9/11 in an exclusive interview with Darren Williams, creator of the Pentagon Strike flash animation.

Below are some of the articles cited so that you can read the material yourselves.

Next show we'll be discussing the latest news, including an update on the second round of London bombings.

If you have any questions, write us at:


If you like music but don't like Bush, then check out the latest Signs of the Times production, You Lied.



Articles mentioned this week:


Links to SOTT Articles on 9/11
July 23, 2005

World Trade Center Attack: What Next? - by Laura Knight-Jadczyk

9-11 The New Pearl Harbor: Who Benefits? - by Laura Knight-Jadczyk

Eye-witnesses's Accounts of Pentagon Crash Don't Add Up - by Signs of the Times Editors

"Pentagon Strike" Makes Waves In Washington - by Signs of the Times Editors

American Coup d'état - by Henry See

Oh Say, Can You See? - by Henry See

MOSSAD and Moving Companies - by Laura Knight-Jadczyk

The Mossad Happy Dance - by Laura Knight-Jadczyk

The Bush Administration and 9/11 - 100 Reasons For Dissent - by Jonathan Metcalfe

Co-Opting the 9/11 Truth Movement Or Exposing the Big Con – Lies and Disinformation At The End Of Civilisation As We Know It - by Joe Quinn

Jim Hoffman - Booby Trap For 9/11 Truth Seekers - by Joe Quinn

The Cosmic COINTELPRO Timeline - by SOTT and QFS

Click here to comment on this article



Conspiracy Theories Flourish on the Internet
By Carol Morello
Washington Post Staff Writer
Thursday, October 7, 2004; Page B01

Working from his home office in a small town in England, Darren Williams spent four weeks this summer making a short but startling video that raises novel questions about the 2001 attack on the Pentagon.

The video, "9/11: Pentagon Strike," suggests that it was not American Airlines Flight 77 that slammed into the Pentagon, but a missile or a small plane.

With rock music as a backdrop, the video offers flashes of photographs taken shortly after impact, interspersed with witness accounts. The pictures seem incompatible with damage caused by a jumbo jet, and no one mentions seeing one. Red arrows point to unbroken windows in the burning building. Firefighters stand outside a perfectly round hole in a Pentagon wall where the Boeing 757 punched through; it is less than 20 feet in diameter.

Propelled by word of mouth, Internet search engines and e-mail, the video has been downloaded by millions of people around the world.

American history is rife with conspiracy theories. Extremists have fed rumors of secret plots by Masons, bankers, Catholics and Communists. But now urban legends have become cyberlegends, and suspicions speed their way globally not over months and weeks but within days and hours on the Web.

"The dissemination is almost immediate," said Doug Thomas, a University of Southern California communications professor who teaches classes on technology and subgroups. "It's not just one Web site saying, 'Hey, look at this.' It's 10,000 people sending e-mails to 10 friends, and then they send it on."

The Pentagon video could be a case study. Williams created a Web site for the video, www.pentagonstrike.co.uk. Then he e-mailed a copy to Laura Knight-Jadczyk, an American author living in France whose books include one on alien abduction. Williams, 31, a systems analyst, belongs to an online group hosted by Knight-Jadczyk that blends discussions of science, politics and the paranormal.

On Aug. 23, Knight-Jadczyk posted a link to the video on the group's Web site, www.cassiopaea.org. Within 36 hours, Williams's site collapsed under the crush of tens of thousands of visitors. But there were others to fill the void.

In Texas, a former casino worker who downloaded the video began drawing almost 700,000 visitors a day to his libertarian site. In Louisiana, a young Navy specialist put the video on his personal Web page, usually visited by a few friends and relatives; suddenly, the site was inundated by more than 20,000 hits. In Alberta, traffic to a cabdriver's site shot up more than sixfold after he supplied a link to the video.

Across thousands of sites, demand for the video was so great that some webmasters solicited donations to pay for the extra bandwidth.

"Pentagon Strike" is just the latest and flashiest example of a growing number of Web sites, books and videos contending that something other than a commercial airliner hit the Pentagon.

Most make their case through the selective use of photographs and eyewitness accounts reported during the confusion of the first hours after the attack. They say they don't know what really happened to American Airlines Flight 77 and don't offer other explanations. The doubters say they are just asking questions that have not been answered satisfactorily.

The ready and growing audience for conspiracy theories about the Sept. 11, 2001, attacks has been particularly galling to those who worked on the National Commission on Terrorist Attacks Upon the United States, the bipartisan panel known as the 9/11 commission.

"We discussed the theories," said Philip D. Zelikow, the commission's executive director. "When we wrote the report, we were also careful not to answer all the theories. It's like playing Whack-A-Mole. You're never going to whack them all. They satisfy a deep need in the people who create them. What we tried to do instead was to affirmatively tell what was true and tell it adding a lot of critical details that we knew would help dispel concerns."

Conspiracy theories are common after traumatic events. Michael Barkun, a political scientist at Syracuse University who has written books on the culture of conspiracies, said contradictory and inconclusive eyewitness accounts often leave room for different interpretations of events.

"Conspiracy theories are one way to make sense of what happened and regain a sense of control," Barkun said. "Of course, they're usually wrong, but they're psychologically reassuring. Because what they say is that everything is connected, nothing happens by accident, and that there is some kind of order in the world, even if it's produced by evil forces. I think psychologically, it's in a way consoling to a lot of people."

The belief that the government is lying about the Sept. 11 attacks is coming from both the right and the left. Experts say more than suspicion of the Bush administration is at work.

"It seems that since the end of the Cold War, the enemy is the United States government, the enemy is within," said Rick Ross, whose Ross Institute of New Jersey monitors cults and other controversial groups, many of which see manipulative forces working behind the scenes. "Instead of projecting conspiracy theories out, it's become internalized."

Zelikow, for example, lacks credibility with many who question the work of the 9/11 commission because he wrote a book with national security adviser Condoleezza Rice. He believes that it is futile to discuss evidence with people convinced of a conspiracy.

"The hardcore conspiracy theorists are totally committed," Zelikow said. "They'd have to repudiate much of their life identity in order not to accept some of that stuff. That's not our worry. Our worry is when things become infectious, as happened with the [John F. Kennedy] assassination. Then this stuff can be deeply corrosive to public understanding. You can get where the bacteria can sicken the larger body."

David Ray Griffin considers himself an unlikely recruit to what is called the "9/11 Truth Movement." The retired theologian, who taught religion for three decades at Claremont School of Theology, initially dismissed the notion that it was not an airliner that hit the Pentagon. But after visiting several Internet sites raising questions about the attack, he ended up writing a book. "The New Pearl Harbor," published in the spring, argues that a Boeing 757 would have caused far more damage and left more wreckage strewn around the Pentagon.

"There are reasons why people doubt the official story," he said. "There are photographs taken, and there is no Boeing in sight."

Suspicions formed as the Pentagon still smoldered.

For 2 1/2 years, the attack on the Pentagon has been discussed and researched by members of Knight-Jadczyk's online group, the Quantum Future School.

The group's talks formed the basis for articles in which Knight-Jadczyk argues that after the attack on the World Trade Center, eyewitnesses at the Pentagon were predisposed to see a large airliner. She believes that the Pentagon was attacked by a smaller plane and that members of the Bush administration were somehow complicit because it was beneficial for war-profiteers and Israel.

Interviewed by telephone from what she said is a 17-bedroom castle outside Toulouse, where she lives with her Polish physicist husband and five children, Knight-Jadczyk acknowledged that her group is considered "fringe."

Knight-Jadczyk, 52, a Florida native, has been a psychic and a channeler. She is now involved in experiments in what she calls "superluminal communication," which she described as involving "time loops" that would enable people to communicate with their former selves.

Knight-Jadczyk said she never imagined anyone outside her group would ever view "Pentagon Strike."

"The fact everybody's been sending it to his brother and his cousin, almost frenetically, reflects the fact that there is a deep unease," she said. "They don't come out and say it. They don't want to be accused of being with terrorists, anti-American or anti-patriotic. But they still feel something's wrong."

Bret Dean of Fort Worth said he considers it "baloney" to question whether a plane hit the Pentagon. But he also believes that the government ignored warning of the attacks.

After posting a link to the video on his libertarian site, www.freedomunderground.org, Dean recorded more than 8 million hits. At least one came from inside the Defense Department, he said.

"I don't think the video is an instigator," said Dean, 45, a former casino worker. "It's a symptom. A lot of people don't trust the government's explanation because the government's classified all the information."

Asked if there were unreleased photographs of the attack that would convince the doubters, Zelikow, of the 9/11 commission, said, "No."

"The question of whether American 77 hit the Pentagon is indisputable," Zelikow said. "One reason you tend to doubt conspiracy theories when you've worked in government is because you know government is not nearly competent enough to carry off elaborate theories. It's a banal explanation, but imagine how efficient it would need to be."

Comment: Well, what can we say, there may be something to the 'butterfly wing' effect after all.

First of all, we would like to say that we understand that there are many restrictions placed on mainstream media reporters and editors by 'vested interests', and we applaud any attempt these reporters and editors make to nevertheless give the truth a chance to shine. The recent Dan Rather episode and the treatment he received from the Bush gang is a case in point.

We are not unappreciative therefore of the obvious time and effort that went into producing the above article and the opportunity it presents to millions of Washington Post readers to get a closer and more accurate representation of the facts about the attack on the Pentagon and the 9/11 attacks in general.

That said, we would like to address some of the points made by some of the people interviewed for the article.

The first point is made by the author Ms. Morello. She notes that:

Most [conspiracy theorists] make their case through the selective use of photographs and eyewitness accounts reported during the confusion of the first hours after the attack. They say they don't know what really happened to American Airlines Flight 77 and don't offer other explanations. The doubters say they are just asking questions that have not been answered satisfactorily.

What is most interesting about this statement is that if photographs exist that raise questions about the official story of the Pentagon strike, and if such photographs received very little or no attention in the mainstream media, then it is simply logical to conclude that some of the major media outlets were themselves engaging in "selective use of photographs". Nevertheless, it is those individuals who seek out these rare photographs and video footage to question the official line who are accused of picking and choosing material to support their "conspiracy theory". If material has been withheld from the American and global populations, there is no conspiracy theory - there is an actual conspiracy to conceal the truth, period.

Ms. Morello continues:

The ready and growing audience for conspiracy theories about the Sept. 11, 2001, attacks has been particularly galling to those who worked on the National Commission on Terrorist Attacks Upon the United States, the bipartisan panel known as the 9/11 commission.

"We discussed the theories," said Philip D. Zelikow, the commission's executive director. "When we wrote the report, we were also careful not to answer all the theories. It's like playing Whack-A-Mole. You're never going to whack them all. They satisfy a deep need in the people who create them. What we tried to do instead was to affirmatively tell what was true and tell it adding a lot of critical details that we knew would help dispel concerns."

Members of the 9/11 commission may say that they tried to tell what was true, but did they?

Click here to comment on this article


Harper's Cover - 9/11 Report A Whitewash
Monday, 4 October 2004

In an essay of the new October Issue of "Harper's Magazine", editor and professor Benjamin DeMott describes, ''how the 9/11 Commission Report defrauds the nation''. DeMott is also author of the books "The Imperial Middle" and "The Trouble With Friendship"

DeMott seems to go a bit further, than just outrage about "negligence".

Here are some excerpts from his 12-page essay:

"..this was the promise, after all: answers. Answers in return for serious attention...

The Promise was not kept. The plain, sad reality - I report this following four full days studying the work - is that The 9/11 Commission Report, despite the vast quantity of labor behind it, is a cheat and a fraud.

It stands as a series of evasive maneuvers that infantalize the audience, transform candor into iniquity, and conceal realities that demand immediate inspection and confrontation.

Because it is continously engaged in scotching all attempts to distinguish better from worse leadership responses, the Commission can't discharge its duty to educate the audience about the habits of mind and temperament essential in those to discharge command responsibility during crises. It can't tell the truth about what was done and not done, thought and not thought, at crucial turning points...

..the 567 pages, which purport to provide definitive interpretations of the reactions, are in fact useless to historians, because seeming terror of bias transforms query after commissarial query after commissarial query - and silence after silence - into suggested new lines of self-justification for the interviewees. In the course of blaming everyone a little, the Commission blames nobody - blurs the reasons for the actions and hesitations of successive administrations, masks choices that, fearlessly defined, might actually have vitalized our public discourse...

...there's little mystery about why the Commission is tongue-tied. It can't call a liar a liar.

The most momentous subject before the 9/11 Commission was: What did President Bush know about the Al Qaeda threat to the United States, when did he know it, and if he knew little, why so?...

...conceivably it was at or near the moment when Bush took his position that the members of the Commission who heard him grasped that casting useful light on the relation between official conduct and national unpreparedness would be impossible.

The reason? The President's claim was untrue. It was a lie, and the Commissioners realized they couldn't allow it to be seen as a lie...

...nevertheless the chief executive, seated before the Commission, declared: Nobody told me. And challenging the chief executive as a liar entailed an unthinkable cost - the possible rending of the nations social and political fabric...

...The President told us the August 6 report was historical in nature.

Each paragraph of the Bin Laden briefing is directed not at the past but at the present or future...

...The Commissioners have heard that Bush received more than forty briefings naming Al Quaeda as a danger...

...The President expressed himself to National Security Adviser Rice in March or April of 2001 as 'tired of swatting at flies' and, on the same occasion, declared that he wanted 'to play offense...(wanted) to take the flight to the terrorists'...

...Faced with The 9/11 Commission Report, this country's true need now is to shout Shame!

Comment: Lies, lies, and more lies. Is this "the truth" that the 9/11 Commission was tasked with revealing? Yet the biggest lie of all is the one that not even Harper's is willing to confront: that there may well have been complicity in the organisation of the 9/11 attacks by members of the U.S government itself. It seems that the commission didn't try very hard to tell the truth after all.

But don't take our word for it. Do the research yourself. We are here only to raise questions, present evidence we have uncovered and open the door to consideration of an idea that many Americans simply refuse to believe possible.

Getting back to the Washington Post article:

Ms. Morello states:

"The doubters [of the 9/11 conspiracy theory] say they are just asking questions that have not been answered satisfactorily."

Of course, the logical response to this is: "Why has the 9/11 commission not satisfactorily answered the questions?"

Luckily, 9/11 Commission Executive Director Philip D. Zelikow gave of his time to answer our concerns. In the article he states:

"When we wrote the report, we were also careful not to answer all the theories. It's like playing Whack-A-Mole. You're never going to whack them all. They satisfy a deep need in the people who create them. What we tried to do instead was to affirmatively tell what was true and tell it adding a lot of critical details that we knew would help dispel concerns."

Notice the words: "careful NOT to answer all the theories?" Naturally, we allow for the fact that the Commission did not have time or resources to report on every single allegation or aspect of the attacks, but is it not reasonable to suggest that the question: "Where is the wreckage of the plane that hit the Pentagon?", should have been towards the top of the list? Apparently not for Mr. Zelikow...

Note also Zelikow's comment that certain theories (of a "conspiratorial nature we suppose) "fulfill a deep need in the people who create them".

We wonder just what theories and what sort of "deep need" Mr. Zelikow is referring to. Perhaps he means the theory that, if there was no commercial aircraft wreckage outside the Pentagon, then there is a chance that it was not a commercial aircraft that actually hit the building? If so, then how can he reasonably suggest that someone "created" such a theory? Clearly such a statement is not a theory, but rather a hard fact (unless proven otherwise by Mr. Zelikow) and was not "created" by anyone, but is self-evident.

We also have to wonder why, in this case, Mr. Zelikow would not see fit to fulfill his responsibility to provide the proof of his assertion that it was indeed a plane that hit the Pentagon. It should be remembered that it was not "conspiracy theorists" who claimed that a 757 commerical aircraft hit the Pentagon, it was the US government. The burden of proof therefore lies with the government, and not with those who ask for proof. The most remarkable thing in all of this is that, if a Boeing 757 really did hit the Pentagon, it should be very easy for the government to provide clear and irrefutable proof of this. Yet we are still waiting.

As for the "deep need" that such self-evident facts provoke in people, we can only assume that the "deep need" that Zelikow is referring to is the "deep need" for the TRUTH that at least some people seem to possess.

Next we note the comment, which we assume is by Michael Barkun, political scientist at Syracuse University, where he states:

"Conspiracy theories are common after traumatic events."

Really? Is it really true that "traumatic events" often give rise to some form of "conspiracy theory"? Is it a commonly held belief that a person involved in a traumatic car accident for example will immediately seek to develop a conspiracy theory to explain it?? What of death? If a family member dies in tragic yet natural circumstances, where there exists clear evidence of the cause, do the traumatized surviving family members immediately begin a quest to uncover some devilish scheme to explain the death? Of course not. The truth is that conspiracy theories commonly exist where there is clear evidence that all of the truth about a given situation has not been presented or is being withheld.

Richard M. Dolan studied at Alfred University and Oxford University before completing his graduate work in history at the University of Rochester, where he was a finalist for a Rhodes scholarship. Dolan studied U.S. Cold War strategy, Soviet history and culture, and international diplomacy. He has written about "conspiracy" in the following way:

The very label [conspiracy] serves as an automatic dismissal, as though no one ever acts in secret. Let us bring some perspective and common sense to this issue.

The United States comprises large organizations - corporations, bureaucracies, "interest groups," and the like - which are conspiratorial by nature. That is, they are hierarchical, their important decisions are made in secret by a few key decision-makers, and they are not above lying about their activities. Such is the nature of organizational behavior. "Conspiracy," in this key sense, is a way of life around the globe.

Within the world's military and intelligence apparatuses, this tendency is magnified to the greatest extreme. During the 1940s, [...] the military and its scientists developed the world's most awesome weapons in complete secrecy... [...]

Anyone who has lived in a repressive society knows that official manipulation of the truth occurs daily. But societies have their many and their few. In all times and all places, it is the few who rule, and the few who exert dominant influence over what we may call official culture. - All elites take care to manipulate public information to maintain existing structures of power. It's an old game.

America is nominally a republic and free society, but in reality an empire and oligarchy, vaguely aware of its own oppression, within and without. I have used the term "national security state" to describe its structures of power. It is a convenient way to express the military and intelligence communities, as well as the worlds that feed upon them, such as defense contractors and other underground, nebulous entities. Its fundamental traits are secrecy, wealth, independence, power, and duplicity.

Nearly everything of significance undertaken by America's military and intelligence community in the past half-century has occured in secrecy. The undertaking to build an atomic weapon, better known as the Manhattan Project, remains the great model for all subsequent activities. For more than two years, not a single member of Congress even knew about it although its final cost exceeded two billion dollars.

During and after the Second World War, other important projects, such as the development of biological weapons, the importation of Nazi scientists, terminal mind-control experiments, nationwide interception of mail and cable transmissions of an unwitting populace, infiltration of the media and universities, secret coups, secret wars, and assassinations all took place far removed not only from the American public, but from most members of Congress and a few presidents. Indeed, several of the most powerful intelligence agencies were themselves established in secrecy, unknown by the public or Congress for many years.

Since the 1940s, the US Defense and Intelligence establishment has had more money at its disposal than most nations. In addition to official dollars, much of the money is undocumented. From its beginning, the CIA was engaged in a variety of off-the-record "business" activities that generated large sums of cash. The connections of the CIA with global organized crime (and thus de facto with the international narcotics trade) has been well established and documented for many years. - Much of the original money to run the American intelligence community came from very wealthy and established American families, who have long maintained an interest in funding national security operations important to their interests.

In theory, civilian oversight exists over the US national security establishment. The president is the military commander-in-chief. Congress has official oversight over the CIA. The FBI must answer to the Justice Department. In practice, little of this applies. One reason has to do with secrecy. [...]

A chilling example of such independence occurred during the 1950s, when President Eisenhower effectively lost control of the US nuclear arsenal. The situation deteriorated so much that during his final two years in office, Eisenhower asked repeatedly for an audience with the head of Strategic Air Command to learn what America's nuclear retaliatory plan was. What he finally learned in 1960, his final year in office, horrified him: half of the Northern Hemisphere would be obliterated.

If a revered military hero such as Eisenhower could not control America's nuclear arsenal, nor get a straight answer from the Pentagon, how on earth could Presidents Truman, Kennedy, Johnson, or Nixon regarding comparable matters?

Secrecy, wealth and independence add up to power. Through the years, the national security state has gained access to the wrorld's most sophisticated technology sealed off millions of acres of land from public access or scrutiny, acquired unlimited snooping ability within US borders and beyond, conducted overt or clandestine actions against other nations, and prosecuted wars without serious media scrutiny. Domestically, it maintains influence over elected officials and communities hoping for some of the billions of defense dollars. [including scientists, universities, etc.]

Deception is the key element of warfare, and when winning is all that matters, the conventional morality held by ordinary people becomes an impediment. When taken together, the examples of official duplicity form a nearly single totality. They include such choice morsels as the phony war crisis of 1948, the fabricated missile gap claimed by the air force during the 1950s, the carefully managed events leading to the Gulf of Tonkin resolution... [...]

The secrecy stems from a pervasive and fundamental element of life in our world, that those who are at the top of the heap will always take whatever steps are necessary to maintain the status quo.

[S]keptics often ask, "Do you really think the government could hide [anything] for so long?" The question itself reflects ignorance of the reality that secrecy is a way of life in the National Security State. Actually though, the answer is yes, and no.

Yes, in that cover-ups are standard operating procedure, frequently unknown to the public for decades, becoming public knowledge by a mere roll of the dice. But also no, in that ... information has leaked out from the very beginning. It is impossible to shut the lid completely. The key lies in neutralizing and discrediting unwelcomed information, sometimes through official denial, other times through proxies in the media.

[E]vidence [of conspiracy] derived from a grass roots level is unlikely to survive its inevitable conflict with official culture. And acknowledgement about the reality of [conspiracies] will only occur when the official culture deems it worthwhile or necessary to make it. Don't hold your breath.

This is a widespread phenomenon affecting many people, generating high levels of interest, taking place in near-complete secrecy, for purposes unknown, by agencies unknown, with access to incredible resources and technology. A sobering thought and cause for reflection. [Richard Dolan]

Keep Mr. Dolan's comments in mind as we continue our examination of the Washington Post article.

Mr. Barkun goes on to say:

"Conspiracy theories are one way to make sense of what happened and regain a sense of control," Barkun said. "Of course, they're usually wrong, but they're psychologically reassuring.

We agree that conspiracy theories arise as a result of the need in people to "make sense" of, or understand the truth of, a given situation. As to whether conspiracy theories are "wrong", such a sweeping statement is extremely disingenuous and is not in the purview of Mr. Barkun or anyone else to make.

The truth or otherwise about the conspiracy theories surrounding the events at the WTC and the Pentagon can be easily established if Mr. Zelikow would see fit to present clear and objective proof that corroborates the official US government story of what happened on September 11, 2001.

As regards the idea that conspiracy theories are "psychologically reassuring", this is pure nonsense. In fact, if there is one common reaction that all of our detractors have exhibited when confronted with the evidence of a government cover up, it is fear. Is it "consoling" to think that one's own government is behind the attacks of 9/11 and the subsequent crackdown on civil liberties, rather than believing it was the work of foreign terrorists? We think not.

"Psychological reassurance" then, is definitely not to be found in objective investigation of the facts about 9/11, but rather in fleeing from those facts and the decidedly uncomfortable and disconcerting reality which they present.

The term conspiracy theory is in fact not appropriate to describe the allegations of those who claim that there is more to 9/11 than we are being told. In general, a theory is an idea or hypothesis that lacks any evidence to support it. There exists copious evidence to support the argument that the US government knows more about the events of 9/11 than they are telling us. As such, that evidence does not form a conspiracy theory, but rather evidence for the distinct possibility of an actual conspiracy.

In short, consider the following logical deductions derived from a single fact:

While the government claimed that "al-Qaeda" perpetrated the 9/11 attacks, no one actually claimed responsibility. (The FBI released a tape purportedly showing Osama Bin Laden confessing to the attacks, but that tape was clearly a fake.)

If there was no credible claim of responsibility for the attacks, it is logical to assume that the persons who were actually responsible would attempt to hide their involvement.

It is also logical to assume then that, if we find any person or persons who are clearly attempting to cover up or stall any investigation which attempts to reveal the facts of 9/11, then that person or persons may well be somehow involved in the attacks themselves. It's just common sense, right?

Think about that.

Getting back then to the Washington Post article:

It is rather interesting that the article references one Mr. Rick Ross as an "expert". As it happens, we have had encounters with Mr. Ross in the past and this led to an article about him located here, where we include our correspondence with Mr. Ross as well as information about his convictions for theft. For example:

"Mr Ross, by his own admission, conspired to steal furniture and appliances at model homes - Those who comment on Mr Ross also alleged that he "bought and used stolen credit cards". As Mr Ross indicates: "The conviction in no way, shape or form involved "stolen credit cards." Obviously, buying and using stolen credit cards would not be "Conspiracy to commit Grand Theft," it would instead be simply "Grand Theft," which is more serious and a felony".

With Mr Ross' liturgical nature I am surprised that this statement has not been challanged, let alone that it remains on the internet, if indeed it is a "false statements with malicious intent." Is it then the fact that semantics are again involved here? Was there "bought and used stolen credit cards" without a conviction?"

Second Criminal Conviction & Felony: 1975

Mr Ross was later approached by a friend who offered to make him a partner in a diamond robbery involving 306 items valued at $100,000. That led to Rick Ross' second arrest, for grand theft and conspiracy, a guilty plea, a conviction and 6 weeks in Maricopa County Jail, Arizona. A subsequent psychiatric evaluation reduced what might have or should have been a prison sentence to a probation sentence.

Here you will find an article about another of Mr. Ross's activities which includes this interesting tidbit:

It was CAN and one of its highest-ranking deprogrammers, convicted felon Rick Ross, who provided the information which spurred the deadly raid on the Branch Davidian compound at Mount Carmel in Waco, Texas. Ross and other CAN officials worked with apostate former Davidians to convince law enforcement that "lethal force" was justified at Mount Carmel. (For a detailed story of what happened at Waco, see "Fanning the Fires at Waco," from Freedom's Special Report on CAN, available on request.) The 86 lives lost at Waco speak volumes of CAN's involvement.

So do the legion of criminal acts, charges and convictions surrounding CAN and its members. Many of its officers, members and associates were charged with or convicted of criminal acts, including its former president, Michael Rokos, and former security adviser Galen Kelly, a felon found guilty of criminal charges associated with kidnapping for the purpose of deprogramming.

It's interesting how such a guy becomes a "consulted expert," isn't it?

Returning to the Washington Post article, Ms. Morello makes the following comment:

Zelikow, for example, lacks credibility with many who question the work of the 9/11 commission because he wrote a book with national security adviser Condoleezza Rice. He believes that it is futile to discuss evidence with people convinced of a conspiracy.

Is it not logical to question Zelikow's beliefs and statements given that he has worked closely with Condoleezza Rice, a member of the very administration that he was supposed to be investigating? Furthermore, Rice has herself proven that she has lied and deceived the American public on several occasions...

[Read the rest of our response to the Washington Post article here.]

Click here to comment on this article


Pandora's Box

MKULTRA and the weaponization of the human psyche

by Charles S. Viar

On 23 October 1983, a truck packed with explosives crashed through the perimeter of the U.S. Marine expeditionary force at the Beirut International Airport. Moments later it slammed into a temporary barracks and exploded, killing 241 Marines serving with an international peacekeeping force that had been dispatched to Lebanon at the request of the Lebanese government. Within a matter of minutes a second truck penetrated the lines of the French contingent located nearby and detonated, killing 58 French paratroops. As a result of the carnage, the Reagan Administration made the politically costly decision to withdraw from that country; and the governments of Great Britain, France and Italy followed suit. Lebanon dissolved into chaos, and a bitter civil war ensued pitting the traditional Christian elite backed by Israel against an emergent Muslim majority supported by Syria, Iran, Iraq and Libya.

At the time, US policymakers dismissed the suicide bombings as a tactical gambit conceived and executed by local fanatics. But with the benefit of hindsight, it is now clear that they marked the beginning of a general offensive against the West. For in the 19 years that have since elapsed, more than 200 suicide attacks have been conducted against Israel, Russia, Chechnya, India, Sri Lanka and the United States – and these have reshaped the face of modern war.

Despite the spectacular aerial assaults that destroyed the World Trade Center and badly damaged the Pentagon on 11 September, Western analysts remain loath to recognize this basic fact. According to the still prevalent conventional wisdom, suicide attacks are born of desperation and despair - in this case, from the pervasive social and economic malaise that afflicts the Muslim world. Like the Japanese Kamikazes of an earlier era, Western analysts have dismissed them as little more than a deadly nuisance. This is unfortunate, for had they reached deeper into history they might have realized that the suicide attacks are strategic rather than tactical in nature; and that their objective is not to wreak local havoc, but rather to overturn the global balance of power. Moreover, they might also have found that this strategy is based upon the modern rediscovery of an ancient art - specifically, the conquest and weaponization of the human psyche.

Although tyrants have sought to enslave the human mind from times immemorial, the first known success was an Eleventh Century figure by the name of Hasan bin Sabah. Said to have been of noble birth, Hasan was forced to flee his native Persia after having become embroiled in a financial scandal at the Imperial Court. After finding sanctuary in Egypt, he is reported to have studied the teachings and organizational structure of an underground cult known as the Dar ul Kikmat. During this same time frame, he is also said to have mastered the Dark Arts.

Whatever the actual truth, Hasan had returned to Persia by 1094; and with the aid of indigenous allies he seized control of the mountain fortress of Alamut. There he founded a sect that achieved infamy as the Assassini. Formally known as the Shiah Ismai, this sect claimed to hold in its possession secret and sacred truths; but in fact, it was a terrorist organization that sought to impose its will upon the Islamic World by systematically assassinating political figures that opposed its ends. Until finally crushed by Mongol invaders in 1250, the Assassini shook the political structures of the Middle East to their very foundations.

According to legend, Hasan created a virtual paradise in a valley beneath his mountain citadel to recruit and train initiates. Hasan is said to have dispatched his followers to the public houses of the area, where they would drug and kidnap young men, and transport them to the valley. There they would awaken from their stupor to find themselves in luxurious surroundings, tended to by scores of beautiful young women. Having been informed by the maidens that they had been transported to Paradise by angels, the hapless victims would spend their days gorging upon wine, sex and mind-altering drugs. Then they would mysteriously re-awaken in their former surroundings, alone and bereft. Months might pass without incident as they resumed their ordinary and miserable lives; but then suddenly and mysteriously, they would reawaken in what they credulously believed to be the Muslim Heaven. After three or four such experiences, most became willing slaves to Hasan and his murderous schemes. Persuaded that Hasan was Allah made manifest upon the Earth, they killed their assigned targets without pity or remorse; and then went willingly to their deaths, certain of their place in Paradise.

Although this story of Hasan’s recruitment and training techniques is fantastic, it is well supported by historical evidence.1 Moreover, it closely resembles the ARTICHOKE technique that was developed and successively refined by the Soviet, Nazi, and Western intelligence services between 1920 and 1973. It was thus empirical science rather than Black Magic that made possible Hasan's reign of terror; and if this science once perished in the flaming ruins of Alamut, it has in this century been entirely restored. Like the mythical Phoenix it has arisen from the ashes; and it now threatens to shake the world once more.

II

Although the Soviet Union and Nazi Germany – and, apparently, Great Britain – mounted large-scale research programs designed to develop techniques for psychological control at an early date, the United States did not actively pursue the subject until the Second World War. Then the Office of Strategic Services – forerunner to the Central Intelligence Agency – enlisted behavioral scientists for specialized problem solving. Foremost among these was the development of technical solutions to the urgent problems of agent recruitment, handling and assessment. Although the OSS had at its disposal a wealth of human talent and essentially unlimited funds, the hurriedly constructed organization lacked experienced case officers to recruit and run field agents behind enemy lines. Acutely aware that their lack of practiced personnel rendered them vulnerable to deceptions, senior OSS officers turned to the behavioralists for a scientific solution. Their top priority was the development of a “truth serum,” which they hoped would make possible fast and accurate assessments of agent reliability.

Despite frantic efforts, the OSS failed to find an effective interrogative drug. Yet the lure was so enormous that even after the war the newly created CIA continued the effort undeterred. But it was not until the 1949 trial of Cardinal Josef Mindszentry by the Soviet-installed Hungarian communist regime that the CIA realized that drugs held other promises as well. In the course of Mindszentry’s trial, his deportment, demeanor and speech led CIA analysts to the conclusion that he had been successfully subjected to an extraordinary form of psychological manipulation. Although the technique was unknown to CIA psychologists, it was clearly of such efficacy and power as to cause him to confess to crimes he did not commit and could not have committed;2 and they were quite certain that drugs were somehow involved. The Soviets had clearly mastered a new form of totalitarian control; and discovering its secrets became an urgent intelligence priority. On April 20, 1950, CIA Director Roscoe Hillenkoetter approved the United States’ government’s first research and development program expressly designed to develop techniques for the control of the human mind. It was known through successive incarnations as Project BLUEBIRD, ARTICHOKE, MKULTRA and MKSEARCH; and eventually came to encompass 149 distinct behavioral science research programs and 33 related non-behavioral projects over the course of twenty-three years.

The open-ended research program that Hillenkoetter approved was given sudden impetus by two dramatic developments. The first was the outbreak of war in Korea sixty-six days later; the second was the public breakdown of the U. S. ambassador to the Soviet Union some two years thereafter. During the Korean conflict American forces often performed poorly in the field against enemy armies that had no prior experience in mechanized warfare; and in one particularly shameful incident, an entire U.S. army division fled the field.

Moreover, the conduct of American servicemen in captivity was shocking. Fifteen per cent of American prisoners of war held by the Chinese Communists actively collaborated with their captors, and a full seventy per cent signed fraudulent confessions to war crimes or written denunciations of the United States government. More alarming still, large numbers of those that signed confessions or denunciations refused to recant after their repatriation.3 Many were suspected of having returned to the United States as willing spies for the enemy; and some were later proven to be.4 Of similar concern was the bizarre behavior of Ambassador George F. Kennan at Templehof airport while en route to London from Moscow. There Kennan exploded in anger at a naïve question posed by an inexperienced reporter; and as a result of his ill-advised response was declared persona non grata by the Soviet regime. Such were the times that many senior American officials were convinced that this incident provided strong evidence that Kennan had fallen victim to Soviet mind control.5

The general outline of the CIA’s behavioral science research program – commonly, but incorrectly referred to as MKULTRA - was inadvertently revealed by the Rockefeller Commission in 1975. Established by President Ford to investigate allegations of CIA illegality, the Commission’s Final Report contained a one-line reference to a federal employee who had killed himself after having been unwittingly drugged by a CIA officer as part of an MKULTRA experiment. This sparked a press furor that eventually resulted in more extensive congressional investigations chaired by Sen. Edward F. Kennedy. Not surprisingly, both the press and the Sen. Kennedy focused their investigations upon the more lurid aspects of MKULTRA, which included the kidnapping, drugging and torturing of American citizens on American soil for research purposes and the effort to develop “programmed assassins.” Overlooked in the process were the CIA’s efforts to determine the effects of electromagnetism upon the psyche, electromechanical stimulation of the brain, a form of technologically-based ESP, remote viewing, precognition, psychokinesis and, especially, nonaural voice communications with radio and microwave transmissions. This was unfortunate, for their researchers made gains in most of these areas and scored dramatic breakthroughs in others. 6

According to declassified financial records and the testimony of retired CIA officers, the CIA had by 1961 developed implant devices for dogs, making it possible for their handlers to guide them through various courses by remote.7 During this same time frame they also developed techniques for disrupting bodily functions with radio waves. By the mid-1960’s they had successfully developed and field-tested nonaural voice communications with both radio and micro waves; and by 1977 they had developed and field-tested a rudimentary form of electromechanical “mind reading.”8 But despite overwhelming evidence to the contrary, they have steadfastly maintained that they failed entirely in their quest to control the human mind.

III

There are perhaps three reasons for the CIA’s implausible denials. The first is legal responsibility. For as the Kennedy hearings established, CIA officers wildly exceeded their authority in the course of MKULTRA. Innocent citizens were kidnapped off the streets and drugged, hypnotized and subjected to physical torture. These actions were and remain felonious; and had the criminal justice system taken its proper course, scores of CIA officers would have faced capital charges. The second reason is the explosive nature of the data they developed in the course of their experiments. For contrary to common belief, the human psyche lacks systemic integrity. Rather than the tightly integrated system that has been historically assumed, it is in fact a loosely related collage of drives, inhibitions, orientations, functions, desires and beliefs – all of which are subject to external manipulation. The third and final reason is the extraordinary ease of reengineering the human mind. With the ARTICHOKE technique, a psyche may be broken apart, restructured and reassembled almost to specification in approximately four hours – all without the victim’s consent, or even his conscious awareness.

Despite almost two and a half centuries of scientific study, hypnosis remains poorly understood; and at present, all that is known with certainty is that hypnotic states are natural phenomenon that occur under certain – and often quite ordinary – circumstances. These states may be induced by external stimuli – and especially, by a skilled practitioner of hypnosis – and are related more or less closely to another psychological phenomenon known as disassociation. Hypnotic states extend across a broad spectrum, ranging from a light hypnotic trance in which subject is alert and fully aware, to a very deep trance in which the subject looses both conscious awareness and volition. At this level, the will of the subject may be suborned; and through a process of faux identification, entirely by that of a hypnotist.

Because hypnotic states are inherent potentialities of the human mind, everyone is subject to hypnosis. But under most circumstances, only about 20 percent of the population is capable of achieving the deepest hypnotic state required by ARTICHOKE. To escape this difficulty, practitioners first anesthetize their subject/victims with sodium pentothal and then stimulate them with Benzedrine. This produces an indeterminate physical state somewhere between sleep and waking consciousness, making it possible to place the victim/subject in a deep trance.

Once the desired level of hypnosis is achieved, the subject/victim’s psyche is systematically disassembled by isolating and identifying his or her drives, inhibitions, orientations, functions, desires and beliefs. In this process, particular attention is given to the so-called ego-defenses.

Ego-defenses protect the individual from unwanted or threatening intrusions into conscious awareness; and for that reason are essential to ordinary functioning. Operating heavy equipment for example is an exceedingly hazardous endeavor; and safety requires the operator to concentrate carefully. To do so, he must repress his most basic instinct to flee from the danger. In the process, he must also avoid making untoward associations through a process known as inhibition.

Ego-defenses are a matter of common experience, and one need merely reflect upon ones own behavior in various circumstances to observe their operation. Nonetheless, the number and nomenclature remains a matter of debate among psychologists and psychiatrists. But for operational purposes, the CIA embraced the classical catalogue presented by Anna Freud. According to Dr. Freud, there are nine innate ego-defenses and one potentiality: regression, repression, reaction formation, isolation, undoing, projection, introjection, turning-against-the-self and reversal. The last – which differs from the others in the sense that it actively promotes mental health, rather than psychological stability – is sublimation, or the displacement of instinctual drives.9

Ego defenses normally operate automatically, far below the level of conscious awareness. But in a state of deep hypnosis they may be isolated and brought to a state of awareness through a process of regression. They hypnotist, for example, might summon forth projection by asking the subject/victim to go back in time to his early childhood and recall an incident in which he was so angry with his mother that he screamed at her, and accused her of wanting to deliberately harm him. Once the subject complied, the hypnotists would evoke the particular emotions of that moment by expressing his sympathy and providing his assurances that the sentiments were right and proper. He would then inform the subject/victim that this was especially true as his mother had deceived him all his life. Rather than John Doe, as his mother had falsely informed him, his real name was “Frank” or whatever name came to the hypnotist’s mind. Most often, the hypnotist would then inform the subject/victim that he was in fact of noble birth or lineage, and that someone – perhaps the Communists, or the Jews, the Freemasons or perhaps the villain de jour - had wickedly denied him this birthright. Identifying himself to the subject/victim as a secret friend who’s identity must never be revealed to anyone, the hypnotist would suggest that the subject/victim be reminded of his terrible mistreatment - and exalted status - whenever he might throw something in the trash or launch a paper airplane in flight. The hypnotist would then would ask the subject victim to recall another incident from his youth in which, for example, he created something – perhaps a sand castle at the beach – and then obliterated it, wiping all traces away. By this means the hypnotist would summon forth the ego defense undoing. The hypnotist would then gently explain how he was different from “Frank” – and incidentally, much superior – and give him a new name, accompanied by a similar story of exalted birth and stolen birthright. The hypnotist might then introduce the ego-defense undoing – now grandly named “Robert”, for example – to projection - that is, to “Frank ” - and then tell them a story as to how they are related and why they should work together in what circumstances. The process would then be repeated with each ego-defense in turn, until all had been identified, named, ennobled by a fantastic story, provided with suitable reinforcers and, perhaps, given instructions for a subsequent rendezvous for “refreshment.” By this means a new psychic structure is constructed – creating, in effect, highly specialized multiple personalities within a single psychic system without the subject/victim’s knowledge. Once this is done, the next challenge is to reshape his relationship to external reality.

The human mind has four basic orientations: thinking, feeling, sensing and intuition. In simple terms, this means that the mind relates to external phenomenon by way of reasoned thought, emotions, physical sensations or intuitive knowledge. Thinking and feeling are considered to be superior functions, as they involve making judgments; while physical sensations and intuition are regarded as inferior functions. In any given circumstance, at least three of the four are engaged by external stimuli; and in a well-functioning psyche, they tend to be more or less congruent. In eating a chocolate bar, for example, a normal and healthy individual might think it good for satisfying a consciously recognized need for energy, feel it to be good it for providing a physical lift, and sense it to be good for the release of endorphins it caused within the brain. In contrast, a reasonably informed adult smoking a cigarette would know it to be bad, feel it to be good for relieving his nicotine cravings, but still sense it to be bad for wreaking havoc within his body.

Realigning the subject/victim’s orientation toward the external world is essential to ARTICHOKE, for success is measured in part by separating the subject/victim from reality. This is unfortunately easily done, by attaching a powerful and pleasurable physical memory to an otherwise unappealing situation. To do so, the hypnotist might for example ask the subject/victim to recall his fondest memory of physical pleasure; and then associate it with words and images to the unappealing situation referenced above. In this way the subject/victim’s physical memories of intimacy with his first love might be associated with a particularly dangerous activity, thereby creating an artificial attraction to that activity. A soldier sent into battle, for example, might correctly think it dangerous but feel it wonderfully euphoric; and even though he sensed that something was terribly wrong with this feeling, he would not be able to escape it. In a very literal sense, he would be drawn towards danger.

The next difficulties for the hypnotist to overcome are the subject/victim’s inhibitions – which are, for operational purposes, the subject/victim’s most basic beliefs. The subject/victim might for example believe himself incapable of performing certain particularly challenging physical or mental tasks; but this belief is ultimately based upon his self image - and this is quite literally a picture of himself that he has formed within his own mind. To change that belief, it is necessary only to change that picture, substituting for example a perhaps realistic image of himself for an image of a far superior man capable of overcoming any obstacle. To do this, the hypnotist need only play to the subject/victim’s vanity, pride and desire. For in almost all cases, these temptations are sufficient to persuade him to willfully suspend his own disbelief.

Some inhibitions are more difficult to overcome than others, especially those that involve basic moral issues; and this is particularly true in terms of the prohibition against the taking of human life. During World War Two for example, American soldiers rarely displayed overt acts of cowardice and in fact routinely demonstrated a high level of courage under fire. Nonetheless, the overwhelming majority of American soldiers would not shoot to kill. Studies undertaken after the war demonstrated this fact conclusively; for it was found that a mere 25 per cent of the Army’s frontline troops were responsible for almost 100% of the casualties inflicted upon the enemy. 10

To avoid this difficulty, the hypnotist uses a variety of techniques upon the subject/victims. One of these is the alteration of self-image described above; but a more powerful technique is known as “permissioning.” To do so, the hypnotist questions the subject/victim intensively as to why he believes that killing is wrong, and tries to find exceptions. Extensive research demonstrated that in most cases the inhibition against killing is traceable to the influence of the subject/victim’s mother during his most formative stage; and to overcome this the hypnotist might present killing in certain circumstances as exceptions that the subject/victim’s mother would approve of; or perhaps even impersonate the subject/victim’s mother, to falsely assure him that the taking of life under specified circumstances would be permissible after all. Once this inhibition has been overcome, excepted, or rationalized through hypnotic deceit, all that remains to be done is to install additional “reinforcers” in the subject/victim’s mind, assign to him his particular task and, if necessary, schedule a follow-up “appointment.” Thus the subject/victim may be instructed that each time he saw a telephone pole he was to reaccept and reaffirm as right, proper and true all that occurred while in the hypnotic state; and to re-accept and re-affirm his mission.

IV

As declassified CIA documents make clear, a principal objective of MKULTRA was to develop techniques that would allow the Agency to exert control over an individual to such an extent that he would do their bidding “against his will and even against such fundamental laws of nature such as self-preservation.” Technically, they failed; but only because a parallel project run by the Department of Defense achieved success first. The CIA research and development program was reportedly shut down in 1973, and the ARTICHOKE techniques perfected by the military were adopted wholesale.

There is no evidence that either the CIA or the US military operationalized ARTICHOKE, but other intelligence services were less circumspect. There is clear evidence that the Soviet and Soviet Bloc intelligence services made ample use of it. The Soviets were decades ahead of the West in the race to weaponize the human psyche, and they exploited their advantage to its maximum potential. Throughout the 1950’s and 1960’s the West received a steady stream of false defectors, dispatched abroad by the KGB to disinform the Western intelligence services. To ensure that they delivered their false messages and no more, most were subjected to ARTICHOKE. The KGB later shared its expertise with their North Vietnamese allies; and by 1966, suicide bombings in Saigon, Da Nang and Hue began to exact a heavy toll upon American rear-echelon troops. These bombings did not significantly contribute to the North Vietnamese victory, but they did exact a measurable toll upon the morale of US forces.

Exactly when the Soviets shared ARTICHOKE with their Arab allies is unknown, but they had clearly acquired the capability by the latter part of the 1970’s. Their intelligence services are said to have passed it to various terrorist groups under their control by the late 1980’s; and this knowledge is now widely believed to have diffused throughout the terrorist underground. Although this supposition remains unproven, it meshes neatly with the historical record. The first suicide bombing sponsored by an Arab intelligence service occurred in Beirut in 1983; and the first suicide bombing conducted by an Arab terrorist organization followed 11 years later. [...]

VI

As of this writing, there has been no public discussion of ARTICHOKE-assisted suicide bombings. Indeed, all official discussions of suicide attacks have carefully omitted any reference to ARTICHOKE as an element of the suicide attack strategy. They have instead focused upon the supposed religious fanaticism of the bombers.

Religious fanaticism is undoubtedly a significant factor in the recruitment of volunteers for so-called martyrdom operations, and it is certainly a strong contributing factor to their success. But in and of itself, religious fanaticism fails to explain the remarkably low failure rate of suicide bombings. To date, not a single recruit is known to have defected to either Israel or the United States; and only one is known to have refused to carry out his assigned mission. On the basis of current public source reports, the failure rate of suicide bombers appears to be about 1 in 80; and such an extraordinary figure is only attributable to scientific technique.

Thus far the only countermeasure known to have been employed by Israeli and American – and, presumably - European security services is Remote Influence Technology, or RIT. An offshoot of MKULTRA distantly related to ARTICHOKE, RIT employs radio and microwave frequencies to broadcast subliminal messages to general or specific targets. Although RIT appeared promising in field tests and is said to have performed well during the 1989 invasion of Panama, it appears to have fallen short in this particular application. Israel is said to have initiated intensive RIT broadcasts in September of 2000, with no apparent success. Similarly, the National Security Agency’s much vaunted effort to use RIT against Osama bin Laden in Afghanistan has been judged an unqualified failure, and apparently abandoned.

On the basis of the available evidence, then, it would appear that technological solutions to the problem of ARTICHOKE-assisted suicide bombings are unlikely in the near or medium range future. The only plausible alternative is classical counterintelligence - that is, intelligence operations that are designed to counter, i.e., negate, the effectiveness of targeted intelligence services by infiltrating, penetrating and suborning their ranks. Because counterintelligence has historically focused upon opposing intelligence services rather than terrorist organizations, classical CI may be imperfectly suited for this task. Nonetheless, no other alternative readily suggests itself.

Unfortunately, the United States is singularly ill equipped to undertake this effort, for the national counterintelligence capability was systematically destroyed during the anti-intelligence hysteria of the 1970’s; and the feeble attempt to re-establish it by the Reagan Administration arguably died with James Angleton in May of 1987. A scholar of international renown, Angleton was widely regarded as the premier theorist of counterintelligence during the Twentieth Century; and during his long tenure as chief of CIA counterintelligence, he is credited with creating Americas first and only national counterintelligence capability. Unfortunately, Angleton’s refusal to accept Henry Kissinger’s policy of détente with the Soviet Union precipitated his dismissal in December of 1973; and within a matter of years, the CIA’s counterintelligence staff was disbanded altogether.

[But does that mean such a programme wasn't continued by rogue elements within the CIA, and by that we mean elemens who may be linked to the neocons? - SOTT]

Creating a new counterintelligence capability configured for both classical counterintelligence and counter terrorist operations is a daunting task; and even if the political will for this undertaking is suddenly found, it will take at least a decade to achieve full functionality. Nonetheless, the need is compelling, and the prospects are bright. For Al Qaeda and other Islamic terrorist organizations not only accept Western volunteers; they seem to revel in the practice. The fact that at least two Americans, two Britons, and an Australian have been found among captured Al Qaeda fighters demonstrated the permeability of this organization, and augers well for success. Even in the absence of a national counterintelligence capability – with the training and support functions that this implies – it should be a comparatively simple task to place American or Allied agents in the ranks of the Islamic terrorist organizations; and once emplaced, to begin the long task of reducing them from within. Given the ghastly potential of suicide bombers, their first and foremost objective should be obtaining the names and locations of the terrorist’s ARTICHOKE operators, and their subject/victims.

VII

For more than a century and a half, Hasan bin Sabah and his followers terrorized the Muslim world by systematically murdering anyone who stood in their way. In this, their principal weapon was the programmed assassin, psychologically weaponized with a technique strikingly similar to ARTICHOKE. In terms of strategy, tactics and technique, the Assassini were the historical predecessors of today’s suicide bombers; and for that reason they are instructive.

The Medieval Islamic elite failed to devise an effective strategy against suicide assassins, and for that they paid a fearsome price. It was not until the Mongol Conquest that the Assassini were finally suppressed, and then only by sheer brutality. Lacking modern sensibilities, the Mongols laid waste their strongholds and surrounding areas; and all known, suspected, and potential supporters of the Assassini were summarily put to the sword. The number of people killed by the Mongol’s in their campaign against the Assassini has been lost to history, but it was surely in the hundreds of thousands and it may have numbered in the millions.

Contemporary suicide bombers pose an almost identical challenge to the political structures of the contemporary world. ARTICHOKE-assisted terrorism is capable of successfully attacking almost any target at a highly favorable exchange ratio; and for that reason, it has revolutionized modern warfare. The political and economic structures of the Western states are now at grave risk; and the danger grows daily with the proliferation of weapons of mass destruction.

Barring an improbable technological breakthrough, the only plausible option for the United States is a strategy of suppression based upon the classical counterintelligence techniques of infiltration, penetration and subornation. Although such a strategy would be difficult for the United States to undertake at the present time, it offers every promise of long-term success. All that is required is political will, ingenuity, and patience – and a commitment to national survival.

___________________________________________

Originally published in INTELLIGENCE BRIEFS: a publication of the Center for Intelligence Studies, vol. 2, number 4, June/ July, 2002.

Notes

1. See for example Jim Marrs’ Rule by Secrecy. [New York: Harper Collins, 2000.] pp’s 280-285.

2. Marks, John. The Search for the Manchurian Candidate: The CIA and Mind Control. [ New York: W.W. Norton and Company, 1979] See especially Chapter 2.

3.Ibid., p. 134

4. Ranelagh, John. The Agency: The Rise and Decline of the CIA. [London: Weidenfeld and Nicolson, 1986.] p. 215. Editor’s Note: The most spectacular example of this phenomenon may have been British rather than American. George Blake, a senior MI-6 officer, was captured by the North Koreans shortly after the Korean War began on June 25, 1950. In 1961 a Soviet Bloc defector exposed him, and he was arrested and sentenced to 42 years. He escaped from Wormwood Scrubs prison in 1966 with the help of former prisoners and made his way to Moscow

5 Ibid., p. 205. Editors Note: U.S. Ambassador Elbridge Durbrow strongly disagreed with this assessment. A former Chief of Mission to the Moscow embassy and a close associate of Kennan, Durbrow was convinced that he had long since been suborned by the Soviets and that the Templehof incident was staged to provide a pretext for Kennan’s departure from the foreign service. Although Durbrow did not rule out a prior Soviet mind control operation against Kennan, he was nonetheless convinced that Kennan was an ideologically motivated recruit to the Soviet cause. In conversation with the writer at the office of the Security and Intelligence Fund in Washington, D.C., Spring of 1985.

6 Editor’s Note: The CIA has thus far managed to keep these aspects of MK-ULTRA secret. Amongst the very few CIA documents that have surfaced to date regarding these efforts is a 1977 academic paper authored by Dr. Kenneth A. Kress, entitled Parapsychology in Intelligence. This paper confirms the CIA’s investigation of the paranormal and reports mixed results. Similar programs run by the Department of Defense are however reasonably well documented, and the CIA’s successes may be inferred from these. The DoD achieved impressive success in remote viewing – a form of psychic observation – and in fact formed an operational remote viewing intelligence unit. Perhaps the best open-source publication available is Jim Schnabel’s Remote Viewers: The Secret History of America’s Psychic Spies. [New Your: Dell Publishing, 1997]. See also W. Adam Mandelbaum’s The Psychic Battlefield: A History of the Military Occult Complex. [New York: S. Martin’s Press, 2000].

7 Marks, Op. Cit., pp’s. 224-225

8 Editor’s Note: The above referenced information was provided to the writer by senior U.S. intelligence officials, speaking on the condition of anonymity. Because all of the devices referenced above are now commercially manufactured - including a mechanism that can remotely sense, isolate, and record “emotion signature clusters,” making possible a limited form of “mind reading” - it would seem that the U.S. intelligence community is more concerned about dates of deployment than the fact of development.

9 Freud, Anna. The Ego and the Mechanisms of Defense (Revised Edition) [Madison: International Universities Press, Inc., 1966.] Chap. 4.

10 As recounted by U.S. Army Gen. S. L. A. Marshall in his monograph, A Soldier’s Load and the Mobility of a Nation. Currently published by the U.S. Marine Corps Association, Quantico, VA.

11Marks, Op. Cit., p. 25.

Comment: Obviously, this bit of propaganda mixes facts with idea that the US never really developed these techniques. He also goes to pains to tie modern suicide bombers with the Assassini in order to plant the association of "Islam = terrorism" into the reader's mind, a more subtle form of mind control.

While the author tries to guide his reader to the idea that it is the Soviets who put these techniques into the hands of the "Islamic terrorists", another conclusion that can be drawn from the facts is that it was American and Israeli intelligence who have been using these techniques to promote "suicide bombers" among the Palestinians in order to set the public against the Palestinians and their cause. Israel's long history of false flag operations is well documented. In fact, on September 10, 2001 the Army School of Advanced Military Studies issued a report written by elite US army officers that gave the following description for Mossad:

"Wildcard. Ruthless and cunning. Has capability to target US forces and make it look like a Palestinian/Arab act." [Washington Times, September 10, 2001]

If we step back and look at the facts with a bit of distance, we see that in the intervening years, alone of the countries on the planet, Israel has benefited from 9/11. The subsequent invasion of Iraq was part of the Israeli agenda, brought to Washington by the neoconservatives who serve as advisers to the Likud government when they aren't in office in Washinton, and most likely, even when they are supposed to be representatives of the American people. Furthermore, Israel is promoted as the model for how to deal with "terrorism". Americans and the British are encouraged to believe "we are all Israelis" when bombs are exploded in their cities.

Laura Knight-Jadczyk looks at the question of Mass Mind Control in her new article.

Click here to comment on this article


Readers who wish to know more about who we are and what we do may visit our portal site Quantum Future



Remember, we need your help to collect information on what is going on in your part of the world!

We also need help to keep the Signs of the Times online.


Send your comments and article suggestions to us Email addess


Fair Use Policy

Contact Webmaster at signs-of-the-times.org
Cassiopaean materials Copyright © 1994-2005 Arkadiusz Jadczyk and Laura Knight-Jadczyk. All rights reserved. "Cassiopaea, Cassiopaean, Cassiopaeans," is a registered trademark of Arkadiusz Jadczyk and Laura Knight-Jadczyk.
Letters addressed to Cassiopaea, Quantum Future School, Ark or Laura, become the property of Arkadiusz Jadczyk and Laura Knight-Jadczyk
Republication and re-dissemination of our copyrighted material in any manner is expressly prohibited without prior written consent.