Safety Deposit Box

Saturday, April 08, 2006

The Day of...

September 11, 2001 - The National Reconnaissance Office in Chantilly, Virginia is preparing for an exercise in which a small corporate jet crashes into their building.

NORAD is in a number of military exercises.

The first - Vigilant Guardian, is described by Lt. Col. Dawne Deskins as "an exercise that would pose an imaginary crisis to North American Air Defense outposts nationwide."

The second - Northern Vigilance, moved fighter jets to Alaska and Canada to fight off an imaginary Russian fleet.


"Northern Guardian" and "Northern Vigilance" (NORAD exercises on 911/2001)

Copyright 2001 Toronto Star Newspapers, Ltd.
Toronto Star
December 9, 2001 Sunday Ontario Edition
SECTION: BUSINESS; Pg. B05
LENGTH: 974 words
HEADLINE: The scene at NORAD on Sept. 11
BYLINE: Scott Simmie, Toronto Star

Original headline
"Northern Guardian": The Scene at NORAD on Sept. 11
Copyright 2001 Toronto Star Newspapers, Ltd.
Toronto Star
December 9, 2001
Sunday Ontario edition
by Scott Simmie

Playing Russian war games ... and then someone shouted to look at the monitor

EARLY morning, Sept. 11. A lifetime before the attacks on New York and Washington.
Deep inside a mountain in Colorado and far beneath the granite of North Bay, members of the North American Aerospace Defence Command (NORAD) are at full "battle staff" levels for a major annual exercise that tests every facet of the organization.

Operation Northern Vigilance, planned months in advance, involves deploying fighter jets to locations in Alaska and northern Canada. Part of this exercise is pure simulation, but part is real world: NORAD is keeping a close eye on the Russians, who have dispatched long-range bombers to their own high north on a similar exercise.

Everything is going as planned when Capt. Mike Jellinek arrives for his 6 a.m. shift. The Canadian will be overseeing the crew staffing a crucial post inside the mountain - NORAD's command centre.

Whether it's a simulation or a real-world event, the role of the centre is to fuse every critical piece of information NORAD has into a concise and crystalline snapshot.

An hour into his shift, something unscripted happens. NORAD's Northeast Air Defence Sector (NEADS), based in Rome, N.Y., contacts the mountain.

The Federal Aviation Administration has evidence of a hijacking and is asking for NORAD support. This is not part of the exercise.

In a flash, Operation Northern Vigilance is called off. Any simulated information, what's known as an "inject," is purged from the screens.

Someone shouted to look at the monitor displaying CNN.

"At that point, we saw the World Trade Center, one of the towers, smoke coming out of it. And a minute later, we watched the live feed as the second aircraft swung around into the second tower," says Jellinek.

He had one question for the people on the line from NEADS: "Was that the hijacked aircraft you were dealing with?" he asked.

Yes, it was, came the reply.

And then, Jellinek says, "it got really, really busy."

Maj.-Gen. Rick Findley, director of NORAD operations, had just completed the night shift. Usually, Findley would be across town at NORAD headquarters at Peterson Air Force Base. But because of the exercise and the time difference with Russia, he'd been working nights in the mountain. He was just preparing to leave when the disaster began unfolding.

It was a scenario unlike any NORAD had trained for.

"Lots of other reports were starting to come in," Findley recalls. "And now you're not too sure. If they're that clever to co-ordinate that kind of attack, what else is taking place across North America? So we were in a very high-tempo mode, trying to stay one step ahead.
"In the face of all this tragedy, people seemed to know what to do. Everyone seemed to understand that there was a crisis that was not well-defined yet."

Orders were quickly given to get more combat aircraft in the sky. Tankers for in-flight refuelling were at the ready.

Combat aircraft were dispatched to escort Air Force One in case the president was at risk. AWAC jets, designed to track air traffic and offer targeting information to combat aircraft, were deployed.

Because no one yet knew who was behind the attack - or what else might be en route - the giant blast doors designed to protect the Cheyenne Mountain Operations Center from a nuclear blast were sealed.

The massive steel slabs, weighing 25 tonnes each, had not been closed in a non-exercise event since the Cold War.

At the Peterson base, staff began covering windows with tape and paper to minimize flying glass should an explosion occur.

The base, NORAD's administrative headquarters, went to a security status known as Threatcon Delta. It's the highest state of alert and had not been in effect since the 1962 Cuban missile crisis.

"It was very eerie here," says Helen Booth, who co-ordinates services for the base's Canadian contingent.

"There was a real sense of crisis."

As that crisis unfolded, NORAD set up a secure line so it could brief key officials and act on their decisions. Jellinek was listening as President George W. Bush made the order to drain the skies of commercial aircraft.

Jellinek, who is close to retirement and doesn't have to "suck up to anyone," says it was one of two courageous decisions made at the very top level.

"The second one was: If it looks like a plane is going to be used as a missile, shoot it down. Again, what a gutsy call. Unprecedented, that we may have to shoot down a civilian airliner to prevent a greater disaster. And that decision was made very quickly."

Another timely decision was made halfway around the world. The Russians, on seeing the attacks in New York and Washington, immediately cancelled their own exercises, turning back their bombers and calling off planned missile testing. The Russians knew NORAD would have its hands full.

"They said: 'Okay, we're pulling back,'" Jellinek says. "They sent the message to the State Department clearly and unambiguously: 'Don't worry about our movements, we're going to stay down for a while.' Very, very useful. Very helpful."

More than three months later, NORAD's heightened tempo and battle-staff levels continue. The challenge will be to decide when, if ever, to scale back.

"Knock on wood, I hope that nothing happens," says Findley, rapping his knuckles on a table.
"But all it will take is one more terrorist event somewhere in the world to reinforce all of that unease again. And how do you back away from what you're doing now if it continues to be a very sporadic conflict?"

Adds Jellinek: "Folks are now having much more serious looks at what are the possible threats to us. What is the right balance of fiscal responsibility, operational responsibility, versus actual threat versus capability?

"It's a complex equation ... but it's one that has been thrust in everyone's face right now."

GRAPHIC: Tom Kimmell FOR THE TORONTO STAR COMMAND CENTRE: Canadian Capt. Mike Jellinek was at the helm in Cheyenne Mountain when two hijacked jets hit the World Trade Center and NORAD "got really, really busy."

(No original url to be found anymore)

Three F-16's from Washington D.C.'s National Guard at Andrews Airforce Base, 15 miles from the Pentagon, are flown 180 nautical miles away for a training mission in North Carolina. This left 14 fighter jets to protect the entire United States

The Hunt for Osama?

Hospital Worker: I Saw Osama

Jan. 28, 2002
--------------------------------------------------------------------------------
(CBS) Everyone remembers what happened on Sept. 11 and, reports CBS News Correspondent Barry Petersen, here's the story of what may have happened the night before.

In a tale as twisted as the hunt for Osama bin Laden, CBS Evening News has been told that the night before the Sept. 11 terrorists attack, Osama bin Laden was in Pakistan. He was getting medical treatment with the support of the very military that days later pledged its backing for the U.S. war on terror in Afghanistan.

Pakistan intelligence sources tell CBS News that bin Laden was spirited into a military hospital in Rawalpindi for kidney dialysis treatment.

"On that night," said a medical worker who wanted her identity protected, "they moved out all the regular staff in the urology department and sent in a secret team to replace them." She said it was treatment for a very special person and "the special team was obviously up to no good."

"They military had him surrounded," said a hospital employee who also wanted his identity masked, "and I saw the mysterious patient helped out of a car. Since that time," he said, "I have seen many pictures of the man. He is the man we know as Osama bin Laden. I also heard two army officers talking to each other. They were saying that Osama bin Laden had to be watched carefully and looked after."

Those who know bin Laden say he suffers from numerous ailments — back and stomach problems.

Ahmed Rashid, who has written extensively on the Taliban, said the military was often there to help before Sept. 11.

"There were reports that Pakistan intelligence had helped the Taliban buy dialysis machines and the rumor was that these were for wanted for Osama bin Laden," said Rashid.

Doctors at the hospital told CBS News there was nothing special about that night, but they declined our request to see any records. Government officials reached Monday night denied that bin Laden received any medical treatment that night.

A U.S. official, speaking on condition of anonymity, said Tuesday the United States has seen nothing to substantiate the report.

It was Pakistan's President Pervez Musharraf who said in public what many suspected: that bin Laden suffers from kidney disease, saying he thinks bin Laden may be near death.

His evidence — watching the most recent video, showing a pale and haggard bin Laden, his left hand never moving. Bush administration officials admit they don't know if bin Laden is sick or even dead.

"With respect to the issue of Osama bin Laden's health, I just am...don't have any knowledge," said Secretary of Defense Donald Rumsfeld.

The U.S. has no way of knowing who in Pakistan's military or intelligence supported the Taliban or Osama bin Laden, maybe up to the night before Sept. 11 by arranging dialysis to keep him alive. So the U.S. may not know if those same people might help him again — perhaps to freedom.




©MMII, CBS Worldwide Inc. All Rights Reserved.

Condoleeza Rice warns San Francisco Mayor not to fly the day of the attack

Willie Brown got low-key early warning about air travel
- Phillip Matier, Andrew Ross
Wednesday, September 12, 2001

For Mayor Willie Brown, the first signs that something was amiss came late Monday when he got a call from what he described as his airport security - - a full eight hours before yesterday's string of terrorist attacks -- advising him that Americans should be cautious about their air travel.

The mayor, who was booked to fly to New York yesterday morning from San Francisco International Airport, said the call "didn't come in any alarming fashion, which is why I'm hesitant to make an alarming statement."

In fact, at the time, he didn't pay it much mind.

"It was not an abnormal call. I'm always concerned if my flight is going to be on time, and they always alert me when I ought to be careful."

Exactly where the call came from is a bit of a mystery. The mayor would say only that it came from "my security people at the airport."

Mike McCarron, assistant deputy director at SFO, said the Federal Aviation Administration "routinely" issues security notices about possible threats. He said two or three such notices have been received in the past couple of months,

but none in recent days.

Whatever the case, Brown didn't think about it again until he was up, dressed and waiting for his ride to the airport for an 8 a.m. flight to New York, where he was to attend a state retirement board meeting. That was when he turned on the TV, and like millions of other Americans, saw the twin towers of the World Trade Center crumble and the Pentagon go up in smoke.

Before the mayor was even out the door, District Attorney Terence Hallinan - - the man Brown said just last week should be recalled -- was checking in and offering help.

What followed was a conversation made up of equal parts gravity and formality.

"You know, you're the first call I've gotten on this," Brown said to Hallinan, as they were signing off.

With that, the mayor hung up and headed for City Hall. Along the way, he made the call to close all city buildings for the day and city schools as well.

He also talked with representatives of the Bank of America building and the Transamerica Pyramid, who agreed that because the structures were such high- profile symbols they too should be closed for the day.

Once Brown arrived at City Hall, calls were made in quick order to Municipal Railway director Michael Burns: "I want a complete backup in case anything happens to the subway tunnels," Brown said.

The Coast Guard: "To make sure the bridges were being protected."

And to the health, police and fire departments to make sure they were staffed for the emergency.

The last call went to Tom Ammiano, the mayor's longtime political nemesis and president of the Board of Supervisors.

"We may have to declare a state of emergency, although it's not something I want to do at this point because it kicks in all sorts of things -- but we may have to be ready," the mayor said.

Ammiano apparently agreed, because an hour or so later -- when the two sat next to each other at a city department heads meeting at the command center -- the call was made for only a "limited" state of emergency. One that would allow the courts, city offices and schools to close, but still keep the city pretty much in working order.

"What I want," the mayor said, "is for things to be to run as normally as possible, but sagely."

And for the most part they did. As for what comes next?

"With any luck, we'll be back to normal by tomorrow -- but with a heightened sense of awareness," Brown said as he sipped coffee with reporters at Citizen Cake on Grove Street.

But as for long-term safety?

"We can only do what we can," the mayor said, adding, "Hell, if they can't protect the Pentagon from attack, what can they protect?"

BART BLOCKS: Don't go looking for a rest room on BART -- they're all locked.

According to BART information officer Ron Rodriguez, a memorandum went out yesterday ordering all station rest rooms to be locked until further notice. They've also put out the word to watch for suspicious packages.

THE OTHER BROWN: Over in Oakland, Mayor Jerry Brown was trying his best to keep things normal as well.

"We're carrying on," Brown said. "I think the most important thing is for people to stay calm and understand that the power of terrorism is psychological.

"The goal is to sow disunity and to undermine our faith in the leadership of the country."

A few blocks away, Democratic pollster Paul Maslin sat in his office high- rise and wondered about the long-term effect of the attacks.

"It's like one part Pearl Harbor, one part Northern Ireland and one part I don't know what," was how Maslin summed it up.

Maslin -- who does polling for Gov. Gray Davis, among others -- said the strangest call he got yesterday was from one of the biggest Democratic consultants in Washington, D.C., who had just bolted his apartment.

"This was a grown man in his 50s, and he was scared out of his wits because he'd heard that a second plane was headed for the Pentagon," Maslin said.

"We can't even begin to gauge the long-term effects of this yet, but I will say, I don't think we'll ever be the same."

Chronicle columnists Phillip Matier and Andrew Ross appear Sundays, Mondays and Wednesdays. They can also be heard on KGO Radio on Mondays, Wednesdays and Thursdays. Matier can be seen regularly on KRON-TV. Got a tip? Call them at (415) 777-8815. Their e-

Page A - 17
San Francisco Chronicle

Top Pentagon Officials Cancel Flights On September 10, 2001

NEWSWEEK 9.24.2001

Newsweek journalists Evan Thomas and Mark Hosenball reported on September 24, 2001 that a group of top Pentagon officials suddenly canceled travel plans for September 11, 2001, apparently because of security concerns. Newsweek removed the story from the internet but you can read the transcript below. Scroll to the end of the article.

Such a polite, neat young man. He brought his landlord coffee and cookies. He remembered to use his frequent-flier number when he bought his ticket from Boston to Los Angeles—business class. And a good student, too, reported his flight instructor, though he seemed more interested in turning the plane than landing it. A little standoffish, maybe, but he could knock back a vodka with his buddies. So it was uncharacteristic for Mohamed Atta to be running a little behind when he boarded American Airlines Flight 11 on Tuesday shortly before 8 a.m. One of his bags never made it aboard, but maybe that was intentional, too, for inside was a suicide note.
THE FBI BELIEVES that Atta was in control when Flight 11 crashed into the North Tower of the World Trade Center, but maybe not. The hijackers had an abundance of piloting talent—four of the five terrorists aboard had some flight training. Indeed, there were enough hijackers with piloting skills to fly four airliners—two for New York, and two for Washington.

At the White House on that beautiful, clear morning, the occupants were running for their lives. Vice President Dick Cheney had already been hustled into a bunker designed to withstand the shock of a nuclear blast when, at about 9:30 a.m., Secret Service men told staffers leaving the West Wing to run, not walk, as far away as possible. “There’s a plane overhead, don’t look back!” shouted a policeman. Agents were yelling at women to shed their high-heeled shoes so they could run faster. Several staffers saw a civilian airliner, reflecting white in the bright sunlight, appearing to circle nearby. Perhaps unable to spot the White House, the hijackers at the control of American Airlines Flight 77 dive-bombed the Pentagon instead.

How could a small band of religious zealots knock down the World Trade Center, the most visible symbol of capitalism, killing thousands in lower Manhattan, and come so close to destroying the executive mansion of the most powerful nation on earth? Part of the answer is that few U.S. government officials really believed they could. Consider the dazed reaction of top officials of the Federal Aviation Administration, the agency charged with safely controlling the nation’s airways. Although a couple of aircraft had been behaving erratically on the radar screens of flight controllers for at least 15 minutes, officials at FAA headquarters did not suspect that a hijacking had occurred until the second plane, United Airlines Flight 175, rammed the South Tower of the World Trade Center at 9:05. A half hour later, when the third plane, American Flight 77, hit the Pentagon, the FAA officials responded in classic bureaucratic fashion. “Get out your security manuals,” ordered one top official. The officials dutifully began reading their manuals to determine who among them were deemed “essential” and should stay and work, and who should go home for the day.

U.S. Air Force fighter planes did not arrive to protect the nation’s capital for another 15 minutes. Pentagon officials had watched helplessly as the suicide airliner bore in on the nation’s military command center. In the chaotic aftermath, the plane at the greatest risk of getting shot down was the one flying the attorney general of the United States. At least that’s the way it seemed to the pilot, David Clemmer, a Vietnam combat veteran who received a warning as he flew the nation’s chief law-enforcement officer, John Ashcroft, back to Washington from an aborted speaking engagement in the Midwest. Land your plane immediately, Clemmer was instructed by an air-traffic controller, or risk getting shot down by the U.S. Air Force. Clemmer turned to an FBI agent assigned to guard Ashcroft and said, “Well, Larry, we’re in deep kimchi here, and basically, all the rules you and I know are out the window.” The pilot notified air-traffic controllers that he was carrying the attorney general—but was worried that the message wouldn’t get through to military commanders controlling the airspace around Washington. “Thinking out of the box,” as Clemmer put it, he asked for—and got—a fighter escort into Washington. His plane, guarded by an F-16, was one of the last to land on the East Coast that day.

Within a day or two, the haplessness, the confusion, the mentality of “it can’t happen here” had been wiped away, perhaps forever. An aircraft carrier patrolled off New York Harbor, past the skyline so horrifically sundered by the destruction of the World Trade Center. Washington was an armed camp on hair-trigger alert. “We’re at war,” declared President George W. Bush. “We will not only deal with those who dare attack America, we will deal with those who harbor them and feed them and house them.” The FBI had launched the largest manhunt in history, code-named PENTTBOM (for Pentagon and Twin Towers), tracking the suspected 19 suicide bombers and their backers around the nation and abroad. Intelligence officials told NEWSWEEK that they feared that between 30 and 50 teams of terrorists were still on the loose. It was hard to tell if the threat was real, or if America was gripped with the sort of frenzy that seized the nation after the Japanese bombed Pearl Harbor—and many citizens assumed that Japanese troops would soon be marching on Chicago. Northwest Airlines confirmed that flight attendants were staying away from work in droves. And bomb scares became routine. By Saturday, FBI agents had detained 25 people wanted for questioning on immigration violations and issued arrest warrants for two other “material witnesses.”
Congress will no doubt hold hearings to assign the fault for a massive failure of intelligence. At the CIA, NEWSWEEK has learned, officials looked at the Justice Department’s list of dead hijackers aboard American Flight 77, the plane that hit the Pentagon, and recognized three of them as terrorism suspects. (“Oh s—t,” exclaimed one official.) In late August, the agency had asked the FBI to find two of the men, one of whom was believed to be connected to a suspect in the October 2000 bombing of the destroyer the USS Cole. But the FBI was still looking when the hijackers struck.

The blame game will go on. But the finger-pointing may miss a darker and more troubling truth about the shocking attack. It is very difficult for a free and open society to defend against terrorists who are at once patient, smart and willing to die. The operatives run by Al Qaeda, the terrorist organization that reports to bin Laden, appear to be all three. As the PENTTBOM investigation exposes the sophisticated and long-conceived suicide plot, a portrait of evil genius emerges.

It is often said that Islamic extremists wish to turn back history. They want to destroy the Western modernity that threatens to eclipse their fantasy of an 11th-century theocracy. But, like a judo expert who leverages his opponent’s superior weight and mass against him, Islamic terrorists have found a diabolically clever way to flip the Great Satan on his back. Blending into American society for months and even years, quietly awaiting the signal to move, bin Laden’s operatives have learned how to turn two of America’s greatest strengths—openness and technology—into weapons against the American people. Armed with pocket knives, they transformed U.S. airliners into guided missiles, flying bombs packed with 60,000 gallons of explosive fuel. That feat, while awesome, could be just the beginning. Talking on cell phones and by encrypted e-mail, operatives in bin Laden’s far-flung network can communicate from Afghanistan to Miami with little risk of immediate detection. It is chilling to think what they could accomplish if they get their hands on the acme of Western military science, the nuclear bomb. Without doubt, they are trying.

“The ability to take our expertise and turn it on us is exhilarating to them,” says Sen. Ron Wyden, a member of the Senate intelligence committee. “They stay at it and stay at it to learn how to defeat our technological systems. It’s like rattling doors through the neighborhood, looking for one to break in. That’s what they’re doing with our technology.” The lock to America’s rickety, overburdened air-control system was especially easy to pick. But America’s water and electrical supplies aren’t much better safeguarded. And teenage computer hackers have already demonstrated how to use the wide-open Internet to wreck cyberhavoc on American businesses and homes.
For all their professed devotion to medieval religiosity, the terrorists themselves appear to have comfortably blended into American culture. They do not appear to be poor, or desperate or down on their luck, like the stereotype of a young Arab man drawn to the false promise of entering Paradise through martyrdom. At least one of the 19 had a family, and all apparently lived comfortable middle-class lives, with enough money to rent cars, go to school and violate the Quran’s ban on alcohol by visiting the occasional bar. A senior European intelligence official told NEWSWEEK that some of the hijackers may have had Swiss bank accounts, which have now been frozen by Swiss authorities. Two of the alleged hijackers aboard Flight 93, Ahmed Alhaznawi and Ziad Jarrahi, drove a Ford Ranger and lived in a quiet neighborhood in Lauderdale-by-the-Sea, Fla. In front of the house was a wooden wind chime carrying the message THIS HOUSE IS FULL OF LOVE. NEWSWEEK has learned that the Pentagon has referred to the FBI reports that three of the hijackers may have received help from Uncle Sam—as trainees at Pensacola Naval Air Station in Florida; two others may have studied at Air Force facilities.

Osama bin Laden, their spiritual leader and financier, comes from a privileged background himself. One of more than 50 children of Yemeni billionaire parents who got rich off construction contracts in Saudi Arabia, bin Laden, for a time, made money on those most Western of beverages, Coke and Pepsi. During the early ’90s, while he lived in Sudan, he owned part of a company that produced gum arabic, an essential ingredient of many soft drinks. Bin Laden may not have a vast personal fortune, at least not the $300 million ascribed to him, but he is able to secure funds from nefarious sources. According to intelligence sources, his agents are involved in drug running and he receives “blood money” payment from frightened Arab regimes that want to buy protection from his zealotry. According to U.S. intelligence sources, bin Laden is able to pay pensions to the families of suicide bombers.

Mohamed Atta was, according to investigators, the perfect soldier in bin Laden’s army. He was a citizen of the world. Traveling on a passport from the United Arab Emirates, he lived in Germany for a time, studying at the Technical University in Hamburg. He frequented a nightspot named Sharky’s Billiard Bar (“the Bar With Mega-Possibilities”), wore black jeans, and rented—but failed to return—a video of John Carpenter’s “Vampire.” At the same time, he requested and received a prayer room at the university for himself and about 20 other Muslim students. In the last two years, he began to wear Muslim dress.
Atta, 33, may have had a shadowy past. According to German authorities, he is suspected in the bombing of an Israeli bus in 1986, when he was only 18 or 19 years old. If true, he should have been denied immigration visas. Instead, he was able to move freely between Germany and the United States. He was clearly preparing for some sort of terrorist action for months. According to law-enforcement authorities, he may have begun casing Logan Airport in Boston more than six months ago. And, NEWSWEEK has learned, he was seen last winter in Norfolk, Va., where, the FBI believes, he may have been surveying the giant U.S. Navy base as a target. Already, say investigators, there are important links between the hijackers who attacked American targets last week and the plotters who tried to sink the USS Cole in Yemen last October.

Atta had plenty of cash. He wrote a $10,000 check to take flight lessons at one of Florida’s many flight schools. (Because of its year-round good weather and proximity to the beach, Florida attracts many international flight students, especially from the Middle East; background checks are said to be minimal.) Last December, he and another man paid $1,500 for six hours in a Boeing 727 simulator. “Looking back at it, it was a little strange that all they wanted to do was turns,” Henry George, who runs SimCenter, Inc., at Opa-Locka Airport, told The Miami Herald. “Most people who come here want to do takeoffs and landings.”
At the time, Atta aroused no suspicion. When he turned in his rent-a-car in Pompano Beach, Fla., on Sept. 9, before heading north on his suicide mission, he reminded the dealer, Brad Warrick, that the car needed to be serviced. “The only thing out of the ordinary,” Warrick recalled, “was that he was nice enough to let me know the car needed an oil change.” Atta and several friends were regulars at a Venice bar called the 44th Aero Squadron, decorated in the motif of a bomber-squadron bunker, complete with sandbags. “I never had any problems with them,” said the owner, Ken Schortzmann. They didn’t want to be bothered, but didn’t drink heavily and flirt with the waitresses, like some of the other flight students. Atta seemed to be the leader. “He had a fanny pack with a big roll of cash in it,” said Schortzmann.

Last week Atta and two of his buddies seem to have gone out for a farewell bender at a seafood bar called Shuckums. Atta drank five Stoli-and-fruit-juices, while one of the others drank rum and Coke. For once, Atta and his friends became agitated, shouting curse words in Arabic, reportedly including a particularly blasphemous one that roughly translates as “F—k God.” There was a squabble when the waitress tried to collect the $48 bill (her shift was ending and she wanted her tip). One of the Arabs became indignant. “I work for American Airlines. I’m a pilot,” he said. “What makes you think I’d have a problem paying the bill?”

Although investigators now suspect that Atta may been the leader of his cell, it is not clear if and when he was, in effect, “triggered.” The pattern of bin Laden’s terrorism is to insert operatives into a country where they are “sleepers,” burrowed deep into the local culture, leading normal lives while awaiting orders. Intelligence sources believe that one or two control agents run by bin Laden’s Qaeda may have slipped into the United States in the last couple of weeks to activate the airliner plot. The idea of using suicide pilots may have been germinating for a very long time. One of the other pilot-hijackers on Flight 11, Waleed Alshehri, attended flight school in Florida in 1997. Last week FBI Director Robert Mueller told a news conference, “The fact that they received flight training in the U.S. is news.” But maybe it shouldn’t have been. Only last September an Orlando, Fla., cabdriver named Ihab Ali was indicted for refusing to answer questions about his ties to the bin Laden organization, including his “pilot training in Oklahoma,” according to court papers. Indeed, the records of the terrorism trial in New York for the August 1998 bombings of two U.S. embassies in Africa offer a wealth of information about bin Laden’s use of U.S.-trained pilots.
One of them, Essam Al-Ridi, who had been trained at a Texas flight school, was a key government witness, testifying that bin Laden’s associates used him to try to buy a private jet to transport Stinger ground-to-air missiles from Pakistan to Sudan.

It is not known exactly how many of bin Laden’s operatives are still on the loose. One of the most intriguing suspects may be Amer Mohammed Kamfar, 41. Last winter or fall, he showed up in Florida and took flight lessons at FlightSafety Academy. He rented a house in Vero Beach, where he had a wife, who dressed in the traditional chador, and several children. Kamfar, who called himself “John,” “shopped at Wal-Mart and ate a lot of pizza,” according to a neighbor. Two weeks ago he packed up his family and left the area. Last week Florida cops put out an all-points bulletin, warning that Kamfar may be toting an AK-47.
Two of the suicide bombers may have just slipped out of the federal government’s grasp. According to intelligence sources, on Aug. 21 the CIA passed along information to the Immigration and Naturalization Service on a man who belonged on the watch list for terror suspects. The man, Khalid al-Midhar, had been videotaped in Kuala Lumpur talking to one of the suspected terrorists in the Cole bombing (the man is now in jail in Yemen). When the INS ran its database, it found that al-Midhar was already inside the United States. The CIA asked the FBI to find him and an associate, Salem Alhamzi. But the bureau didn’t have much to go on. They listed their U.S. residence as “the Marriott Hotel in New York.” There are 10 Marriott-run hotels in New York. The bureau checked all of them and found nothing. Al-Midhar and Alhamzi were listed among the five hijackers of American Airlines Flight 77.

Ever since the Customs Service foiled an apparent bomb plot on the eve of the millennium, U.S. intelligence has been very edgy about an attack on America. The man caught crossing between British Columbia and Seattle with explosives and timers in his car, Ahmed Ressam, later confessed that he planned to blow up Los Angeles International Airport. Ressam allegedly worked for a shadowy group of Algerian terrorists with ties to bin Laden. Twice a week, the “Threat Committee,” a group of top intelligence officials and diplomats, meets in the White House complex to review dozens of terrorist threats at home and abroad. In late June the CIA warned of possible terrorist action against U.S. targets, including those in the United States, for the Fourth of July. Nothing happened, but then in July the agency again warned about possible attacks overseas. The threat seemed grave enough to force U.S.ships in Middle Eastern ports to head for sea. Three weeks ago there was another warning that a terrorist strike might be imminent. But there was no mention of where.

On Sept. 10, NEWSWEEK has learned, a group of top Pentagon officials suddenly canceled travel plans for the next morning, apparently because of security concerns. But no one even dreamed that four airliners would be hijacked and plunged into targets in New York and Washington. Some officials complain that the intelligence community has been too focused on terrorists obtaining weapons of mass destruction—biological, chemical and nuclear—while overlooking low-tech threats—like the use of penknives and box cutters to hijack a plane.

The Threat Committee has every reason to worry about bin Laden’s trying to get hold of a nuke. During the New York trial of the men accused of bombing the embassies in Africa, one bin Laden associate testified that the boss had hatched a 1993 plan to spend $1.5 million to buy black-market uranium. He apparently failed—that time
Now the Bush administration and Congress seemed primed to do just about anything to foil future attacks. Justice Department lawyers have been told to take a fresh look at “everything,” one official said. Perhaps the most startling idea under examination would be a new presidential order authorizing secret military tribunals to try accused terrorists. The idea first occurred to former attorney general William Barr after the bombing of Pan Am Flight 103 over Lockerbie, Scotland, in 1988. Barr, at the time chief of the Justice Department’s Office of Legal Counsel, got the idea after learning that his office was used during World War II to try—in secret—German saboteurs who were later hanged. The idea was rejected, but it’s being revived on the theory that terrorists are de facto military “combatants” who don’t deserve the full run of constitutional rights.

Civil libertarians may balk, but never underestimate the desire for revenge. Consider some statistics: more people were killed by the suicide hijackers last week than the number of American soldiers killed in the entire American Revolution. Or at Antietam, the bloodiest one-day battle of the Civil War. Or at Pearl Harbor. Or on D-Day. And those were soldiers. War had become more and more remote and sterile to Americans who experienced combat as a phenomenon that occurred on TV, either in movies or occasionally by watching cruise missiles light up Baghdad on the evening news. Now those same American civilians are in a war. Not as spectators, but as targets With Michael Isikoff, Dan Klaidman, Martha Brant, Debra Rosenberg, Weston Kosova, Andy Murr, George Wehrfritz, Catharine Skipp and John Lantig <

Heightened Security Alert Had Just Been Lifted

By Curtis L. Taylor and Sean Gardiner
STAFF WRITERS

September 12, 2001

The World Trade Center was destroyed just days after a heightened security alert was lifted at the landmark 110-story towers, security personnel said yesterday.

Daria Coard, 37, a guard at Tower One, said the security detail had been working 12-hour shifts for the past two weeks because of numerous phone threats. But on Thursday, bomb-sniffing dogs were abruptly removed.

"Today was the first day there was not the extra security," Coard said. "We were protecting below. We had the ground covered. We didn't figure they would do it with planes. There is no way anyone could have stopped that."

Security guard Hermina Jones said officials had recently taken steps to secure the towers against aerial attacks by installing bulletproof windows and fireproof doors in the 22nd-floor computer command center.

"When the fire started, the room was sealed," said Jones, who was in the command center when explosions rocked the building. "Flames were shooting off the walls....We started putting wet towels under the doors. The Fire Department unsealed the door and grabbed us by the hand and said, 'Run!' "

Security worker Diane Easton said she was out front writing tickets when notice of "a plane flying too low" placed security personal on alert.

"The plane went right through the building...and debris started falling everywhere, then 15 minutes later the second plane," Easton said.

Nancy Joyner said several police officers were knocked down and then were stampeded in the ensuing frenzy.

"People were flying out of the windows; there was nothing we could do," Joyner said. "People were pulled from the top floors by the wind tunnel created."

A "Put Option" is a bet that a stock will fall...

Terrorist trade probe widens
Options buying rose in firms that attack affected

By Robert Manor and Melissa Allison
Tribune staff reporters
Published September 19, 2001

Securities regulators around the world are investigating whether the terrorists involved in last week's attack profited in financial markets, possibly by buying options on the stock of United Airlines, Boeing, American Airlines and other companies in the knowledge that prices would fall.

Traders say a suspiciously high volume of preattack options trades in AMR Corp., parent of American, and UAL Corp., United's parent, in particular, yielded huge profits after terrorists crashed aircraft belonging to the two airlines into the World Trade Center and the Pentagon.

The Chicago Board Options Exchange said Wednesday it is investigating options trading prior to the attack.

Sources familiar with the matter said the Securities and Exchange Commission is also investigating whether terrorists traded options or other financial instruments to capitalize on the calamity they were planning.

One Chicago trader said the big increase in options trading is evidence that some people knew about the coming disaster.

"Somebody knew about it, whether it was a broker or somebody who knew these guys, or it's one of these terrorist cells," said Jon Najarian, founder of options specialist Mercury Trading in Chicago.

If investigators turn up evidence the terrorists meant to profit by the drop in stock prices, it could be useful in identifying those behind the attack and disrupting their sources of money, experts said.

The Foreign Terrorist Asset Tracking Center, a task force made up of the CIA, FBI, Treasury Department, Secret Service and IRS, was set up several days ago to expose the financial holdings of Osama bin Laden and other terrorists. The task force "is collecting this information for the purpose of identifying the various sources of funding these organizations are receiving," said one Treasury official, on condition of anonymity. "It takes a significant amount of capital to organize these attacks."

In any case, someone was buying extraordinarily large numbers of a financial instrument called put options in the days before the attack.

Put options give the buyer the right to sell a stock at a fixed price by a certain date. People buy put options, known as puts for short, in the belief a stock's price is about to fall. Most puts expire after 90 days, so an investor typically buys them shortly before he expects the stock's price to drop.

Put options in United, Boeing and American all grew in value when the stock market reopened Monday because stock prices of the three companies fell dramatically. United, for example, fell $13.32 during the day.

On Sept. 6, put volume on United Airlines was 3,150, more than four times its average daily put volume this year, according to data from the Options Clearing Corp. Put volume for Boeing on Sept. 7 totaled 27,294, more than five times its average daily put volume this year.

The day before the attacks, put volume on American Airlines stock was 4,516, nearly 11 times its average daily volume for the year.


The insurance industry, also expected to be hard hit by the effects of the terrorist attacks, saw similar plays on its put options. Citigroup, which has a large insurance arm, and insurance broker Marsh & McLennan Cos. experienced extraordinarily high put volumes just days before the attacks.

Overseas, regulators were said to be investigating trades in reinsurance companies, those that underwrite the exposures of insurance companies and may have to pay big claims stemming from the attacks.

Buyers made millions

Buyers of the puts made huge sums of money. Najarian, the Chicago trader, noted that 1,535 puts purchased the day before the attack "gave the buyer the right to sell 153,500 shares at $30." When American's stock price fell, the owner of those puts gained $1.7 million.

Many millions of dollars would have been made on similar puts at exchanges here and elsewhere.

The Boeing put volumes did not ring alarm bells at the Chicago Board Options Exchange, because large institutional clients sometimes place orders that big, said Michael Hoban at ZH Partners JV, the specialist for Boeing at the CBOE. "In retrospect, it makes you think back, that maybe it was something linked to [the attacks]," Hoban said. "Let the investigators determine that."

At the Tribune's request, Chris Johnson, managing quantitative analyst with Schaeffer's Investment Research, examined the big jump in American's put options on the day before the attack.

"We saw an increase of 73 percent in one trading session before the day of the incident," Johnson said. "That is significant."

Some experts suggest that bin Laden, if he is behind the attacks, may also have motivation to try to profit from them.

bin Laden advisers

Although bin Laden is known to be rich--he inherited $80 million at the age of 13 and operates dozens of businesses in the Middle East and Africa--anti-terrorist analysts doubt that he can by himself finance a global campaign against the U.S. "He has got some very astute and adept people working for him," said Steven Emerson, head of the Investigative Project, a counterterrorist research institute in Washington. Emerson said bin Laden has access to accountants and other advisers capable of putting together an assault on the world's financial markets.

Associates of bin Laden have carried out sophisticated financial crimes in the past. After the 1993 bombing of the World Trade Center, investigation showed bin Laden and others in the Middle East had made an estimated $100 million a year through consumer coupon fraud.

Ben Jacobson, CEO of the investigative consulting firm Peregrine Group, testified before Congress about the fraud. He said people associated with bin Laden ran an extensive operation stealing coupons offering discounts on groceries and other items and returning them to clearing houses for reimbursement.



Copyright © 2006, Chicago Tribune

Buyer's remorse?

July 24, 2001 - Larry A. Silverstein, who already owned World Trade Center 7, signs a 3.2 billion dollar 99 year lease on the entire World Trade Center complex, 6 weeks before 911. Included in the lease is a 3.5 billion dollar insurance policy specifically covering acts of terrorism.

Real Estate Weekly, May 2, 2001 by Natalie Keith

After months of negotiations that came down to the wire, Silverstein Properties Inc. and Westfield America Inc. reached a $3.21 billion agreement on a long-term lease for the 110-story World Trade Center.

"This is a dream come true," said Larry Silverstein. "We will be in control of a prized asset. There is nothing like it in the world."

The 99-year lease deal, struck late last week with the Port Authority of New York and New Jersey, is being called the largest real estate transaction in New York City's history. The net lease covers four buildings at the 10.6 million SF complex, including the twin towers and the retail mall. Westfield, which owns several shopping centers, will handle 427,448 SF of retail space under the agreement.

The agreement ends months of speculating over the fate of the world-famous property, including a failed attempt by the Port Authority to reach an agreement with Vornado Realty Trust and reports that negotiations with Silverstein were on the verge of collapsing. It also ends a three-year effort by the Gov. George Pataki and the Port Authority to put the World Trade Center into private hands. With a net lease, the agency can get out of the real estate business but still maintain the revenue stream from the building.

"This is the largest real estate transaction in New York City and one of the largest privatizations ever of a government asset," Pataki said. "This agreement al lows the private sector to bring its expertise to managing this landmark, and it frees the Port Authority re sources for improvements in airports, tunnels and bridges."
Continue article
Advertisement

A group led by Silverstein reportedly worked 24 hours straight to hammer out details of the 1,000-page agreement. Silverstein and his partners signed over a $100 million letter of credit, the first installment of a $616 million down payment. GMAC Commercial Mortgage Corp. is reportedly providing an $800 million loan to Silverstein and his partners.

The Port Authority had originally wanted an $800 million down payment but reduced the amount in exchange for slightly higher annual rent payments. Silverstein and Westfield are scheduled to close the deal in July, though they have the option of pushing out the closing another 30 days.

Silverstein and Westfield will make annual rent payments to the Port Authority and reportedly spend $200 million on capital improvements. The amount of the rent payments was not disclosed although Port Authority real estate director Cherrie Nanninga has said they are more than "nine figures per year."

With the agreement, Silverstein will add the twin towers at One and Two World Trade Center and two 9-story office buildings at Four and Five World Trade Center to its 5.5 million SF portfolio, which currently includes Seven World Trade Center.

One detail that has not yet been resolved pertains to taxes. Last year, the World Trade Center paid $29 million in payments in lieu of taxes under a long-time agreement between the city and the Port Authority. Mayor Rudolph Giuliani has insisted, however, that the new owners must pay full property taxes for the property, equal to about $100 million per year.

The Port Authority currently occupies 900,000 SF of the complex but will reduce occupancy to about 720,000 SF. Silverstein said rents under old leases are between $30 to $33 per SF -- about 20 percent below market. About 300,000 SF are vacant, he said.

"During the last decade, the Port Authority has vastly increased the value of this public asset through effective management and by emphasizing service to tenants," said Port Authority executive director Neil Levin. "Occupancy, at about 97 percent, is at an historic high. Asking rents for offices and retail shops have doubled in the last five years."

The World Trade Center was built more than 30 years ago as a way to stimulate economic development downtown. When it opened its doors in 1970, many called it a white elephant. In the years that followed, the World Trade Center developed an international reputation and is now viewed as a cultural icon. In recent years occupancy and revenues have soared, with many forecasting a rosy future for the complex. More than 430 companies from 28 countries lease space in the complex. An estimated 40,000 people work in the World Trade Center, and another 140,000 visit the complex daily.

In 1998, New York and New Jersey agreed to put the building on the auction block hoping to attract bids of $1.5 billion or more. More than 30 bidders vied for the complex, with the list being narrowed to three -- Vornado Realty Trust, which bid $3.25 billion, Silverstein and Westfield, which bid $3.22 billion, and a joint venture of Brookfield Financial Properties and Boston Properties, which bid $3.1 billion.

"It's extraordinary in every sense and we will seek to develop its potential, raising it to new and greater heights," Silverstein said.

COPYRIGHT 2001 Hagedorn Publication
COPYRIGHT 2001 Gale Group

Friday, April 07, 2006

Unmanned aircraft trials

February 28, 1998 - The Globalhawk, Raytheon's unmanned aircraft vehicle completes its first flight over Edwards Airforce Base in California at an altitude of 32,000 feet, cruising altitude for a commercial jet liner.

World Trade Center in cross-hairs

August 1997 - The cover of FEMA's Emergency Response to Terrorism depicts the World Trade Center in cross-hairs.

Remote controlled Boeing

December 1, 1984 - A remote controlled Boeing 720 takes off from Edwards Airforce Base and is crash landed by NASA for fuel research. Before its destruction the plane flew a total of 16 hours and 22 minutes, including 10 take-offs, 69 approaches, and 13 landings.

Operation Northwoods

March 13, 1962 - Lymon Lemnitzer, Chairman of the Joint Chiefs of Staff, presents a proposal to Secretary of Defense Robert Macnamara named Operation Northwoods. The document proposed staging terrorist attacks in and around Guantanamo Bay to provide a pretext for military intervention in Cuba. The plans included starting rumors about Cuba using clandestine radio, landing friendly Cubans inside the base to stage attacks, starting riots at the main gate, blowing up ammunition inside the base, starting fires, sabotaging aircraft and ships on the base, bombing the base with mortar shells, sinking a ship outside the entrance, staging funerals for mock victims, staging a terror campaign in Miami, Florida and Washington, D.C., and finally - destroying a drone aircraft over Cuban waters. The passengers, federal agents in reality, would allegedly be college students on vacation. A plane at Egland Airforce Base would be painted and numbered as a duplicate of a registered civil aircraft belonging to a C.I.A. front in Miami. The duplicate would be substituted for the real plane and loaded with the passengers. The real plane would be converted into a drone. The two planes would rendezvous south of Florida. The passenger laden plane would land at Egland Airforce Base to evacuate its passengers, and return to its original status. The drone would pick up the scheduled flight plan and, over Cuban waters, transmit a mayday signal before being blown up by remote control.

The plan is rejected by Macnamara. President John F. Kennedy personnally removes Lemnitzer as Chairman of the Joint Chiefs of Staff.

CIA agent alleged to have met Bin Laden in July 2001

July 4, 2001 - Osama bin Laden, wanted by the United States since 1998, receives medical attention at the American Hospital in Dubai, where he's visited by a local chief of the CIA.

French report claims terrorist leader stayed in Dubai hospital:

Anthony Sampson
Thursday November 1, 2001
The Guardian

Two months before September 11 Osama bin Laden flew to Dubai for 10 days for treatment at the American hospital, where he was visited by the local CIA agent, according to the French newspaper Le Figaro.

The disclosures are known to come from French intelligence which is keen to reveal the ambiguous role of the CIA, and to restrain Washington from extending the war to Iraq and elsewhere.

Bin Laden is reported to have arrived in Dubai on July 4 from Quetta in Pakistan with his own personal doctor, nurse and four bodyguards, to be treated in the urology department. While there he was visited by several members of his family and Saudi personalities, and the CIA.

Article continues
The CIA chief was seen in the lift, on his way to see Bin Laden, and later, it is alleged, boasted to friends about his contact. He was recalled to Washington soon afterwards.

Intelligence sources say that another CIA agent was also present; and that Bin Laden was also visited by Prince Turki al Faisal, then head of Saudi intelligence, who had long had links with the Taliban, and Bin Laden. Soon afterwards Turki resigned, and more recently he has publicly attacked him in an open letter: "You are a rotten seed, like the son of Noah".

The American hospital in Dubai emphatically denied that Bin Laden was a patient there.

Washington last night also denied the story.

Private planes owned by rich princes in the Gulf fly frequently between Quetta and the Emirates, often on luxurious "hunting trips" in territories sympathetic to Bin Laden. Other sources confirm that these hunting trips have provided opportunities for Saudi contacts with the Taliban and terrorists, since they first began in 1994.

Bin Laden has often been reported to be in poor health. Some accounts claim that he is suffering from Hepatitis C, and can expect to live for only two more years.

According to Le Figaro, last year he ordered a mobile dialysis machine to be delivered to his base at Kandahar in Afghanistan.

Whether the allegations about the Dubai meeting are confirmed or not, the wider leaks from the French secret service throw a worrying light on the rivalries and lack of coordination between intelligence agencies, both within the US and between western allies.

A familiar complaint of French intelligence is that collaboration with the Americans has been essentially one-way, with them happy to receive information while giving little in return.

Ashcroft Flying High



WASHINGTON, July 26, 2001
--------------------------------------------------------------------------------
(CBS) Fishing rod in hand, Attorney General John Ashcroft left on a weekend trip to Missouri Thursday afternoon aboard a chartered government jet, reports CBS News Correspondent Jim Stewart.

In response to inquiries from CBS News over why Ashcroft was traveling exclusively by leased jet aircraft instead of commercial airlines, the Justice Department cited what it called a "threat assessment" by the FBI, and said Ashcroft has been advised to travel only by private jet for the remainder of his term.

"There was a threat assessment and there are guidelines. He is acting under the guidelines," an FBI spokesman said. Neither the FBI nor the Justice Department, however, would identify what the threat was, when it was detected or who made it.


A senior official at the CIA said he was unaware of specific threats against any Cabinet member, and Ashcroft himself, in a speech in California, seemed unsure of the nature of the threat.

"I don't do threat assessments myself and I rely on those whose responsibility it is in the law enforcement community, particularly the FBI. And I try to stay within the guidelines that they've suggested I should stay within for those purposes," Ashcroft said.

Asked if he knew anything about the threat or who might have made it, the attorney general replied, "Frankly, I don't. That's the answer."

Earlier this week, the Justice Department leased a NASA-owned G-3 Gulfstream for a 6-day trip to Western states. Such aircraft cost the government more than $1,600 an hour to fly. When asked whether Ashcroft was paying for any portion of the trips devoted to personal business, a Justice Department spokeswoman declined to respond.

All other Bush Cabinet appointees, with the exception of Interior and Energy with remote sites to oversee, fly commercial airliners. Janet Reno, Ashcroft's predecessor as attorney general, also routinely flew commercial. The secretaries of State and Defense traditionally travel with extra security on military planes.

The Justice Department insists that it wasn't Ashcroft who wanted to fly leased aircraft. That idea, they said, came strictly from Ashcroft's FBI security detail. The FBI had no further comment.

Policy changes in case of Hijacking

June 2001 - The Department of Defense initiates new instructions for military intervention in the case of a hijacking. It states:

4. Policy.
a. Aircraft Piracy (Hijacking) of Civil and Military Aircraft. Pursuant
to references a and b, the Administrator, Federal Aviation Administration
(FAA), has exclusive responsibility to direct law enforcement activity
related to actual or attempted aircraft piracy (hijacking) in the “special
aircraft jurisdiction” of the United States. When requested by the
Administrator, Department of Defense will provide assistance to these
law enforcement efforts. Pursuant to reference c, the NMCC is the focal
point within Department of Defense for providing assistance. In the
event of a hijacking, the NMCC will be notified by the most expeditious
means by the FAA. The NMCC will, with the exception of immediate
responses as authorized by reference d, forward requests for DOD
assistance to the Secretary of Defense for approval.
DOD assistance to
the FAA will be provided in accordance with reference d. Additional
guidance is provided in Enclosure A.

April 2001 - NORAD simulation rejected as "too unrealistic"

Pentagon crash 'too unrealistic'

By Bryan Bender, Globe Staff, 4/14/2004

WASHINGTON -- Five months before Sept. 11, 2001, the officers responsible for defending American airspace wanted to test their ability to prevent a hijacked airliner from being crashed into the Pentagon, but the scenario was rejected by the Joint Chiefs of Staff as impractical, a Joint Chiefs spokesman confirmed yesterday.

The disclosure was made after a government watchdog group released a leaked e-mail from a former official at the North American Air Defense Command. In the message, the official told colleagues a week after the attacks that in April 2001 NORAD requested that war games run by the Joint Chiefs include an ''event having a terrorist group hijack a commercial airline . . . and fly it into the Pentagon."

Last night, Pentagon spokesman Lieutenant Commander Dan Hetlage confirmed the account, saying: ''That scenario was rejected because it would have become a whole exercise in and of itself. It wasn't looked on at the time as being practicable."

The NORAD proposal is the clearest sign yet that national security officials were worried before 9/11 about terrorists using hijacked airliners as missiles, despite testimony that senior leaders, including National Security Adviser Condoleezza Rice, didn't know of such concerns.

A secret Aug. 6, 2001, memo prepared for President Bush said Al Qaeda terrorists in the United States might be planning to hijack airliners, but it did not raise the possibility that Al Qaeda could slam those planes into buildings -- let alone the Pentagon, which was struck by American Airlines Flight 77.

Rice testified before the commission investigating the 9/11 attacks last week that ''it did not raise the possibility that terrorists might use airplanes as missiles."

However, she held out the possibility that some government officials might have raised concerns, without senior officials' knowledge, about such a mode of attack.

Officials at NORAD apparently were concerned. But the e-mail said, the US Pacific Command, which was overseeing the exercises simulating a war with North Korea, ''didn't want it because it would take attention away from their exercise objectives, and Joint Staff action officers rejected it as too unrealistic."

The author of the message, a former NORAD official, could not be located yesterday.

Peter Stockton, chief investigator for the Project on Government Oversight, said yesterday he was told by the source who provided the memo that a special forces officer attached to the NORAD command at the time had first proposed the Pentagon scenario be practiced.

Concerns that terrorists might use hijacked airliners as missiles dates back to the 1996 Olympic games in Atlanta, when jets were placed on patrol to guard against such a threat.

Testifying before the 9/11 commission yesterday, former FBI Director Louis Freeh said that ''I believe it came up in a series of these, as we call them, special events."

But Freeh said, ''I never was aware of a plan that contemplated commercial airliners being used as weapons after a hijacking."

© Copyright 2004 Globe Newspaper Company.

Pentagon Boeing simulation a coincidence?



October 24, 2000 - The Pentagon conducts the first of two training exercises called MASGOW which simulate a Boeing 757 crashing into the building.

Charles Burlingame, an ex-Navy F-4 pilot, who worked in the Pentagon, participates in this exercise before retiring to take a job at American Airlines where, less than a year later, his Boeing 757 allegedly crashes into the building.

A New Pearl Harbor Needed

On the Statement of Principles page of the Project for the New American Century, a neo-conservative think tank whose membership includes Dick Cheney, Donald Rumsfeld, Paul Wolfowitz and Jeb Bush.



In September of 2000 the PNAC releases their report entitled Rebuilding America's Defenses which on page 63 states, "Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor."

NORAD had drills of jets as weapons

By Steven Komarow and Tom Squitieri, USA TODAY

WASHINGTON — In the two years before the Sept. 11 attacks, the North American Aerospace Defense Command conducted exercises simulating what the White House says was unimaginable at the time: hijacked airliners used as weapons to crash into targets and cause mass casualties.

One of the imagined targets was the World Trade Center. In another exercise, jets performed a mock shootdown over the Atlantic Ocean of a jet supposedly laden with chemical poisons headed toward a target in the United States. In a third scenario, the target was the Pentagon — but that drill was not run after Defense officials said it was unrealistic, NORAD and Defense officials say.

NORAD, in a written statement, confirmed that such hijacking exercises occurred. It said the scenarios outlined were regional drills, not regularly scheduled continent-wide exercises.

"Numerous types of civilian and military aircraft were used as mock hijacked aircraft," the statement said. "These exercises tested track detection and identification; scramble and interception; hijack procedures; internal and external agency coordination and operational security and communications security procedures."

A White House spokesman said Sunday that the Bush administration was not aware of the NORAD exercises. But the exercises using real aircraft show that at least one part of the government thought the possibility of such attacks, though unlikely, merited scrutiny.

On April 8, the commission investigating the Sept. 11 attacks heard testimony from national security adviser Condoleezza Rice that the White House didn't anticipate hijacked planes being used as weapons.

On April 12, a watchdog group, the Project on Government Oversight, released a copy of an e-mail written by a former NORAD official referring to the proposed exercise targeting the Pentagon. The e-mail said the simulation was not held because the Pentagon considered it "too unrealistic."

President Bush said at a news conference Tuesday, "Nobody in our government, at least, and I don't think the prior government, could envision flying airplanes into buildings on such a massive scale."

The exercises differed from the Sept. 11 attacks in one important respect: The planes in the simulation were coming from a foreign country.

Until Sept. 11, NORAD was expected to defend the United States and Canada from aircraft based elsewhere. After the attacks, that responsibility broadened to include flights that originated in the two countries.

But there were exceptions in the early drills, including one operation, planned in July 2001 and conducted later, that involved planes from airports in Utah and Washington state that were "hijacked." Those planes were escorted by U.S. and Canadian aircraft to airfields in British Columbia and Alaska.

NORAD officials have acknowledged that "scriptwriters" for the drills included the idea of hijacked aircraft being used as weapons.

"Threats of killing hostages or crashing were left to the scriptwriters to invoke creativity and broaden the required response," Maj. Gen. Craig McKinley, a NORAD official, told the 9/11 commission. No exercise matched the specific events of Sept. 11, NORAD said.

"We have planned and executed numerous scenarios over the years to include aircraft originating from foreign airports penetrating our sovereign airspace," Gen. Ralph Eberhart, NORAD commander, told USA TODAY. "Regrettably, the tragic events of 9/11 were never anticipated or exercised."

NORAD, a U.S.-Canadian command, was created in 1958 to guard against Soviet bombers.

Until Sept. 11, 2001, NORAD conducted four major exercises a year. Most included a hijack scenario, but not all of those involved planes as weapons. Since the attacks, NORAD has conducted more than 100 exercises, all with mock hijackings.

NORAD fighters based in Florida have intercepted two hijacked smaller aircraft since the Sept. 11 attacks. Both originated in Cuba and were escorted to Key West in spring 2003, NORAD said.



June 2000 - The Department of Justice releases a terrorist training manual with the World Trade Center in cross-hairs.

Silent Weapons for Quiet Wars

This document is the doctrine adopted by the Policy Committee of the Bilderburg Group during its first known meeting in 1954. A copy found in 1969 was in the possession of Naval Intelligence. The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.

”Top Secret Silent Weapons for a Quiet War"
An Introductory Programming Manual Operations Research Technical Manual

WELCOME ABOARD

This publication marks the 25th anniversary of the Third World War, called the "Quiet War," being conducted using subjective biological warfare, fought with "silent weapons."

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120 SECURITY

It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i .e., slavery and genocide.

This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war.

Furthermore, whenever any person or group of persons in a position of great power, and without the full knowledge and consent of the public, uses such knowledge and methodology for economic conquest -- it must be understood that a state of domestic warfare exists between said person or group of persons and the public. The solution of today's problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral, or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without a loss of discretion or humility. Such virtues are exercised in your own best interest.

Do not deviate from them.

HISTORICAL INTRODUCTION

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the military management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics). It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high speed computerized data processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were too slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician, George B. Dantzig. Then, in 1948, the transistor, invented by J. Bardeen, W. H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements. With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a four year grant to Harvard College, funding the Harvard economic research project for the study of the structure of the American economy. One year later, in 1949, the United States Air Force joined in. In 1952 the original great period terminated, and a high level meeting of the elite was held to determine the next phase of social operations research.

The Harvard project had been very fruitful as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy -- copyright 1953 by Wassily Leontief, International Sciences Press Inc., White Plains, New York.)

Engineered in the last half decade of the 1940's, the new Quiet War machine stood, so to-speak, in sparkling gold plated hardware on the showroom floor by 1954. With the creation of the Maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power became a possibility only decades away. The combination was irresistible. The Quiet War was quietly declared by the international elite at a meeting held in 1954.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon system has never suffered any major setbacks. This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.

POLITICAL INTRODUCTION

In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent weapon technology were as accessible for a public utopia as they were for providing a private utopia. The issue of primary concern that of dominance, revolved around the subject of the energy sciences.

ENERGY

Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems; mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping. All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue, "who will be the beneficiary?".

In 1954 this was the issue of primary concern. Although the so-called "moral Issues" were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such a people are beasts of burden and steaks on the table by choice and consent.

CONSEQUENTLY, in the interest of future world order, peace, and tranquility, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.

In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name 'silent weapons'.

In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.

In order to achieve a totally predictable economy, the low class elements of the society must be brought under total control, i.e., must be house-broken, trained,
and assigned a yoke and long term social duties from a very early age, before they have an opportunity to question the propriety of the matter.

In order to achieve such conformity, the lower class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government operated day care centers for the occupationally orphaned children.

The quality of education given to the lower class must be of the poorest sort, so that the meat of ignorance isolating the the inferior class from the superior class is and remains incomprehensible to the inferior class.

With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintaining some measure of social order, peace, and tranquility for the ruling upper class.


DESCRIPTIVE INTRODUCTION OF THE SILENT WEAPON


Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in it its own manner of functioning. It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone's daily social life. Yet it makes an unmistakable 'noise', causes unmistakable physical and mental damage, and unmistakably interferes with daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attached and subdued by a weapon. The public might instinctively feel that something is wrong, but because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence.

Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it. When a silent weapon is applied gradually to the public, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological war fare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.

THEORETICAL INTRODUCTION

"Give me control over a nation's currency, and I care not who makes its laws."
Mayer Amschel Rothschild (1743-1812)

Today's silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayor Amschel Rothschild.

Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th century terms, and to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.

GENERAL ENERGY CONCEPTS

In the study of energy systems, there always appear three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts, called passive components.

(1) In the science of physical mechanics, the phenomenon of of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring. In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.

(2) In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass and can be represented by a mass or a flywheel in motion. In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.

(3) In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts system energy into heat. In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term 'resistor' being the one generally used to express the concept of friction, and the term 'conductor' being generally used to describe a more ideal device (e.g., wire) employed to convey electric energy efficiently from one location to another. The property of a resistor or conductor is measured as either resistance or conductance, reciprocals. In economics these three energy concepts are associated with:

(1) Economic Capacitance -- Capital (money, stock/inventory, investments in building and durables, etc.)

(2) Economic Conductance -- Goods (production flow coefficients)

(3) Economic Inductance -- Services (the influence of the population of industry
on output). All of the mathematical theory developed in the study of one energy system, (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).

MR. ROTHSCHILD'S ENERGY DISCOVERY

What Mr. Rothschild had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is "when you assume the appearance of power, people soon give it to you".

Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes.

Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone's stock of gold as a persuader to show to his customers.

Mr. Rothschild loaned his promissory notes to individuals and to governments. These would create over-confidence. Then he would make money scarce, tighten control of the system, and collect his collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support. Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology made Mr. Rothschild all the more wealthy and all the more able to extend his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services (gross national product, GNP).

APPARENT CAPITAL AS "PAPER" INDUCTOR

In this structure, credit, presented as a pure circuit element called "currency", has the appearance of capital, but is, in fact, negative capital. Hence, it has the appearance of service, but is, in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced by the negation of population (war, genocide).

The total goods and services represents real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness.

War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and the regeneration of those resources. Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage,, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and high speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits -- (paper inductance/inflation).

BREAKTHROUGH

The aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders.

By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the negine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a reconant self-destruction of the airframe in flight as an aircraft.

From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.

APPLICATION IN ECONOMICS

To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psycho-economic structure of the economy is thus discovered.

It is by this process that partial differential and difference matricos are discovered that define the family household and make possible its evolution as an economic industry (dissipative consumer structure). Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.

Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code -- UPC -- zebra stripe pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later a permanent 'tattooed' body number invisible under normal ambient illumination.

SUMMARY

Economics is only a social extension of a natural energy system. It, also, has its three passive components. Because of the distribution of wealth and the lack of communication and consequent lack of data, this field has been the last energy field for which a knowledge of these three passive components has been developed. Since energy is the key to all activity on the face of the earth, it follows that in order to attain a monopoly of energy, raw materials, goods, and services and to establish a world system of slave labor, it is necessary to have a first strike capability in the field of economics.

In order to maintain our position, it is necessary that we have absolute first knowledge of the science of control over all economic factors and the first experience at engineering the world economy.

In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses. It is only a matter of time before the new breed of private programmer/economists will catch on to the far reaching implications of the work begun at Harvard in 1948.

[MY INSERT = BIRTH OF NEW WORLD ORDER/GLOBAL ECONOMY]

The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.

THE ECONOMIC MODEL

Economics, as a social energy science has as a first objective the description of the complex way in which any given unit of resources is used to satisfy some economic want. (Leontief Matrix)

The first objective, when it is extended to get the most product from the least or limited resources, comprises that objective of general military and industrial logistics known as Operations Research. (See simplex method of linear programming.)

The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy; at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such as proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.

To make a short story of it all, it was discovered than an economy obeyed the same, laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor in mathematically analogous to the initiation of a war.

The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge, because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.

This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry.

Why GAS Costs $2.00 Per Gallon

Finally, because problems in theoretical economics can be translated very easily into problems in theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. This makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.

INDUSTRIAL DIAGRAMS

An ideal industry is defined as a device which receives value from other industries in several forms and converts it into one specific product for sales and distribution to other industries. It has several inputs and one output. What the public normally thinks of as one industry is really an industrial complex where several industries under one roof produce one or more products. The flow of product from industry #1 (supply) to industry #2 (demand) is denoted by 112. The total flow out of industry 'K' is denoted by I k . (sales, etc.) A node is a symbol of collection and distribution of flow. Node #3 receives from industry #3 and distributes to industries #1 through #3. If industry #3 manufactures chairs, then a flow from Industry #3 back to industry #3 simply indicates that industry #3 is using part of its own output product, for example, as office furniture. Therefore, the flow may be summarized by the equations: THREE INDUSTRIAL CLASSES Industries fell into three categories or class by type of output. Class #1 - Capital (resources) Class #2 - Goods (commodities or use - dissipative) Class #3 - Services (action of population) Class # 1 Industries exist at three levels (1) Nature - sources of energy and raw materials. (2) Government - printing of currency equal to gross national product (GNP), and extension of currency in excess of GNP. (3) Banking - loaning of money for interest, and extension (counterfeiting) of economic value through deposit loan account - inflation. Class # 2 industries exist as producers of tangible or consumer (dissipated) products. This sort of activity is usually recognized and labeled by the public
as an 'industry'. Class # 3 industries are those which have service rather than a tangible product as their output. These industries are called (1) households, and (2) governments. Their output is human activity of a mechanical sort, and their basis is population.

AGGREGATION

The whole economic system can be represented by a three industry model if one allows the names of the outputs to be (1) capital, (2) goods, and (3) services. The problem with this representation is that it would not show the influence of, say, the textile industry on the ferrous metal industry. This is because both the textile industry and the ferrous metal industry would be contained within a single classification called the 'goods industry' and by this process of combining or aggregating these two industries under one system block they would lose their economic individuality.

THE E-MODEL

A national economy consists of simultaneous flows of production, distribution, consumption, and investment. If all of these elements including labor and human functions are assigned a numerical value in like units of measure, say, 1939 dollars, on this flow can be further represented by a current flow in an electronic circuit, and its behavior can be predicted and manipulated with useful precision. The three ideal passive energy components of electronics, the capacitor, the resistor, and the inductor correspond to the three ideal passive energy components of economics called the pure industries of capital, goods, and services, resp.. Economic capacitance represents the storage of capital in one form or another. Economic conductance represents the level of conductance of materials for the production of goods. Economic inductance represents the inertia of economic value in motion. This is a population phenomenon known as services.

ECONOMIC INDUCTANCE

An electrical inductor (e.g., a coil of wire) has an electric current as its primary phenomenon and a magnetic field as its secondary phenomenon (inertia). Corresponding to this, an economic inductor has a flow of economic value as its primary phenomenon and a population field as its secondary phenomenon of inertia. When the flow of economic value (e.g., money) diminishes, the human population field collapses in order to keep the economic value (money) flowing (extreme case - war). The public inertia is a result of consumer buying habits, expected standard of living, etc., and is generally a phenomenon of self-preservation.

INDUCTIVE FACTORS TO CONSIDER

(1) Population

(2) magnitude of the economic activities of the government.

(3) the method of financing these government activities (see Peter-Paul Principle-inflation of the currency)

TRANSLATION (A few examples will be given.)

CHARGE -- coulombs -- dollars (1939).
FLOW/CURRENT -- amperes (coulombs per second) -- dollars of flow per year.
MOTIVATING FORCE -- volts -- dollars (output) demand.
CONDUCTANCE -- amperes per volt. -- dollars of flow per year per dollar demand. CAPITANCE -- coulombs per volt. -- dollars of production inventory/stock per dollar demand.

TIME-FLOW RELATIONSHIPS AND SELF-DESTRUCTIVE OSCILLATIONS

An ideal industry may be symbolized electronically in various ways. The simplest way is to represent a demand by a voltage and a supply by a current. When this is done, the relationship between the two becomes what is called an admittance, which can result from three economic factors: (1) hindsight flow, (2) present flow, and (3) foresight flow.

Foresight flow is the result of that property of living entities to cause energy (food) to be stored for a period of low energy (e.g., a winter season). It consists of demands made upon an economic system for that period of low energy (winter season).

In a production industry it takes several forms, one of which is known as production stock or inventory. In electronic symbology this specific industry demand (a pure capital industry) is represented by capacitance and the stock or resource is represented by a stored charge. Satisfaction of an industry demand suffers a lag because of the loading effect of inventory priorities. Present flow ideally involves no delays. It is, so to speak, input today for output today, a 'hand to mouth' flow. In electronic symbology, this specific industry demand (a pure use industry) is represented by a conductance which is then a simple economic valve (a dissipative element).

Hindsight flow is known as habit or inertia. In electronics, this phenomenon is the characteristic of an inductor (economic analog = a pure service industry) in which a current flow (economic analog = flow of money) creates a magnetic field (economic analog = active human population) which, if the current (money flow) begins to diminish, collapses (war) to maintain the current (flow of money -- energy). Other large alternatives to war as economic inductors or economic flywheels are an open-ended social welfare program, or enormous (but fruitful) open-ended space program. The problem with stabilizing the economic system is that there is too much demand on account of (1) too much greed and (2) too much population. This creates excessive economic inductance which can only be balanced with economic capacitance (true resources or value - e.g. in goods or services).

The social welfare program is nothing more than an open-ended credit balance system which creates a false capital industry to give non-productive people a roof over their heads and food in their stomachs. This can be useful, however, because the recipients become state property, in return for the 'gift' , a standing array for the elite. For he who pays the piper, picks the tune.

Those who get hooked on the economic drug, must go to the elite for a fix. In this, the method of introducing large amounts of stabilizing capacitance is by borrowing on the future 'credit' of the world. This is a fourth law of motion -- onset, and consists of performing an action and leaving the system before the reflected reaction returns to the point of action -- a delayed reaction. The means of surviving the reaction is by changing the system before the reaction can return. By this means, politicians become popular in their own time and the public pays for it later. In fact the measure of such a politician is the delay time. The same thing is achieved by a government by printing money beyond the limit of the gross national product, an economic process called inflation. This puts a large quantity of money into the hands of the public and maintains a balance against their greed, creates a false self-confidence in them and, for a while, stays the wolf from the door. They must eventually resort to war to balance the account, because war ultimately is merely the act to keep the responsibility and blood off the public conscience. (See section on consent factors and social-economic structuring.)

If the people really cared about their fellow man, they would control their appetites (greed, procreation, etc.) so that they would not have to operate on a credit or welfare social system which steals from this worker to satisfy the bum. Since most of the general public will not exercise restraint, there are only two alternatives to reduce the economic inductance of the system. (1) Let the populace bludgeon each other to death in war, which will only result in a total destruction of the living earth. (2) Take control of the world by the use of economic 'silent weapons' in a form of 'quiet warfare', and reduce the economic inductance of the world to a safe level by a process of benevolent slavery and genocide.

The latter option has been taken as the obviously better option. At this point it should be crystal clear to the reader why absolute secrecy about the silent weapons is necessary. The general public refuses to improve its own mentality and its faith in its fellow man. It has become a herd of proliferating barbarians, and, so' to speak, a blight upon the fate of the earth. They do not care enough about economic science to learn why they have not been able to avoid war despite religious morality, and their religious or self-gratifying refusal to deal with earthly problems renders the solution of the earthly problem unreachable by them. It is left to those few who are truly willing to think and survive as the fittest to survive, to solve the problem for themselves as the few who really care. Otherwise, exposure of the silent weapon would destroy our only hope of preserving the seed of future true humanity.

THE HOUSEHOLD INDUSTRY

The industries of finance (banking), manufacturing, and government, real counterparts of the pure industries of capital, goods, and services, are easily defined because they are generally logically structured. Because of this their processes can be described mathematically and their technical coefficients can be easily deduced. This, however, is not the case with the service industry known as the household industry.

HOUSEHOLD MODELS

When the industry flow diagram is represented by a 2-block system of households on the right and all other industries on the left, the following results. (labor, etc.) The arrows from left to right labeled A, B, C, etc., denote flow of economic value from the industries in the left hand block to the industry in the right hand block called 'households'. These may be thought of as the monthly consumer flows of the following commodities. A - alcoholic beverages, B - beef, C - coffee, ..., U - unknown, etc.. The problem which a theoretical economist faces is that the consumer preferences of any household is not easily predictable and the technical coefficients of any one household tend to be a non-linear, very complex, and variable function income, prices, etc. Computer information derived from the use of the universal product code in conjunction with credit card purchase as an individual household identifier could change this state of affairs. But the U.P.C. method is not yet available on a national or even a significant regional scale. To compensate for this data deficiency, an alternate indirect approach of analysis has been adopted known as economic shock testing. This method, widely used in the aircraft manufacturing industry develops an aggregate statistical sort of data.

Applied to economics, this means that all of the households in one region or in the whole nation are studied as a group or class rather than individually, and the mass behavior rather than individual behavior is used to discover useful estimates of the technical coefficients governing the economic structure of the hypothetical single household industry. Notice in the industry flow diagram that the values for the flows A,B,C, etc., are accessible to measurement in terms of selling prices and total sales of commodities. One method of evaluating the technical coefficients of the household industry depends upon shocking the prices of a commodity and noting the changes in the sales of all of the commodities.

ECONOMIC SHOCK TESTING

In recent times, the application of Operations Research to the study of the public economy has been obvious for anyone who understands the principles of shock testing. In the shock testing of an aircraft airframe, the recoil impulse of firing a gun mounted on that airframe causes shock waves in that structure which tell aviation engineers the conditions under which parts of the airplane or the whole airplane or its wings will start to vibrate or flutter like a guitar string, a flute reed, or a tuning fork, and disintegrate or fall apart in flight.

Economic engineers achieve the same result in studying the behavior of the economy and the consumer public by carefully selecting a staple commodity such as beef, coffee, gasoline, or sugar and then causing a sudden change or shock in its price or availability, thus kicking everybody's budget and buying habits out of shape. They then observe the shock waves which result by monitoring the changes in advertising, prices, and sales of that and other commodities. The objective of such studies is to acquire know-how to set the public economy into a predictable state of motion or change, even a controlled self-destructive state of motion which will convince the public that certain "expert" people should take control of the money system and reestablish security (rather than liberty and justice) for all. When the subject citizens are rendered unable to control their financial affairs, they of course, become totally enslaved, a source of cheap labor. Not only the prices of commodities, but also the availability of labor can be used as the means of shock testing. Labor strikes deliver excellent test shocks to an economy, especially in the critical service areas of trucking (transportation), communication, public utilities (energy, water, garbage collection), etc. By shock testing, it is found that there is a direct relationship between the availability of money flowing in an economy and the psychological outlook and response of masses of people dependent upon that availability. For example, there is a measurable, quantitative relationship between the price of gasoline, and the probability that a person would experience a headache, feel a need to watch a violent movie, smoke a cigarette, or go to a tavern for a mug of beer.

It is most interesting that, by observing and measuring the economic modes by which the public tries to run from their problems and escape from reality, and by applying the mathematical theory of Operations Research, it is possible to program computers to predict the most probable combination of created events (shocks) which will bring about a complete control and subjugation of the public through a subversion of the public economy (by shaking the plum tree).

INTRODUCTION TO THE THEORY OF ECONOMIC SHOCK TESTING

Let the prices and total sales of commodities be given and symbolized as follows. Let us assume a simple economic model in which the total number of important (staple) commodities are represented as beef, gasoline, and an aggregate of all other staple commodities which we will call the hypothetical miscellaneous staple commodity 'M'. (e.g., M is an aggregate of C, S, T, U, etc..)

INTRODUCTION TO ECONOMIC AMPLIFIERS

Economic amplifiers are the active components of economic engineering. The basic characteristic of any amplifier, (mechanical, electrical, or economic) is that it receives an input control signal and delivers energy from an independent energy, source to a specified output terminal in a predictable relationship to that input control signal. The simplest form of economic amplifier is a device called advertising. If a person is spoken to by a T.V. advertiser as if he were a twelve year old, then, due to suggestibility, he will, with a certain probability, respond or react to that suggestion with the uncritical response of a twelve year old and will reach into his economic reservoir and deliver its energy to buy that product on impulse when he passes it in the store. An economic amplifier may have several inputs and outputs. Its response might be instantaneous or delayed. Its circuit symbol might be a rotary switch if its options are exclusive, qualitative, 'go' or 'no go', or it might have its parametric input/output relationships specified by a matrix with internal energy sources represented. Whatever its form might be, its purpose is to govern the flow of energy from a source to an output sink in direct relationship to an input control signal. For this reason, it is called an active circuit element or component.

Economic Amplifiers fall into classes called strategies, and in comparison with electronic amplifiers, the specific internal functions or an economic amplifier are called logistical instead of electrical. Therefore, economic amplifiers not only deliver power gain, but also, in effect, are used to cause changes in the economic circuitry. In the design of an economic amplifier we must have some idea of at least five functions, which are:
(1) the available input signals, (2) the desired output control objectives, (3) the strategic objective, (4) the available economic power sources, (5) the logistical options. The process of defining and evaluating these factors and incorporating the economic amplifier into an economic system has been popularly called game theory. The design of an economic amplifier begins with a specification of the power level of the output, which can range from personal to national. The second condition is accuracy of response, i.e., how accurately the output action is a function of the input commands. High gain combined with strong feedback helps to deliver the required precision. Most of the error will be in the input data signal. Personal input data tends to be specific, while national input data tends to be statistical.

SHORT LIST OF INPUTS

Questions to be answered: (1) what (3) where (5) why (2) when (4) how (6) who General sources of information: (1) telephone taps (3) analysis of garbage (2) surveillance (4) behavior of children in school Standard of living by: (1) food (3) shelter (2) clothing (4) transportation Social contacts: (1) telephone - itemized record of calls (2) family - marriage certificate, birth certificates, etc. (3) friends, associates, etc. (4) memberships in organizations (5) political affiliation

THE PERSONAL PAPER TRAIL

Personal buying habits, i.e., Personal consumer preferences:

(1) checking accounts

(2) credit card purchases

(3) ' tagged' credit card purchases - the credit card purchase of products bearing the U.P.C. (Universal Product Code)

Assets:

(1) checking accounts

(2) savings accounts

(3) real estate

(4) business

(5) automobile, etc.

(6) safety deposit at bank

(7) stock market

Liabilities:

(1) creditors

(2) enemies (see legal)

(3) loans

(4) consumer credit

Government sources (ploys)*:

(1) Welfare

(2) Social Security

(3) U.S.D.A. surplus food

(4) doles

(5) grants

(6) subsidies

Government sources (via intimidation)

(1) Internal Revenue Service

(2) OSHA

(3) Census

(4) etc. * Principle of this ploy -- the citizen will almost always make the collection of information easy if he can operate on the 'free sandwich principle' of 'eat now, and pay later'.

Other Government sources -- surveillance of U.S. Mail.

HABIT PATTERNS -- PROGRAMMING

Strengths and weaknesses:

(1) activities (sports, hobbies, etc.)

(2) see 'legal' (fear, anger, etc. - crime record)

(3) hospital records (drug sensitivities, reaction to pain, etc.)

(4) psychiatric records (fears, angers, disgusts, adaptability, reactions to stimuli, violence, suggestibility or hypnosis, pain, pleasure, love and sex)

Methods of coping -- adaptability -- behavior:

(1) consumption of alcohol

(2) consumption of drugs

(3) entertainment

(4) religious factors influencing behavior

(5) other methods of escaping from reality.

Payment modus operandi (MO) -- pay on time, etc.:

(1) payment of telephone bills

(2) energy purchases (electric, gas...)

(3) water purchases

(4) repayment of loans

(5) house payments

(6) automobile payments

(7) payments on credit cards

Political sensitivity:

(1) beliefs

(2) contacts

(3) position

(4) strengths/weaknesses

(5) projects/activities

Legal inputs - behavior control
(Excuses for investigation, search, arrest, or employment of force to modify behavior.)

(1) court reports

(2) police records - NCIC

(3) driving record

(4) reports made to police

(5) insurance information

(6) anti-establishment acquaintances


NATIONAL INPUT INFORMATION

Business sources (via I.R.S., etc.):

(1) prices of commodities

(2) sales

(3) investments in
(a) stocks/inventory
(b) production tools and machinery
(c) buildings and improvements
(d) the stock market

Banks and credit bureaus:

(1) credit information

(2) payment information

Miscellaneous Sources:

(1) polls and surveys

(2) publications

(3) telephone records

(4) energy and utility purchases


SHORT LIST OF OUT PUTS

Outputs - create controlled situations - manipulation of the economy. hence society - control by control of compensation and losses.

Sequence:

(1) allocates opportunities.

(2) destroys opportunities.

(3) controls the economic industry.

(4) controls the availability of raw materials

(5) controls capital.

(6) controls bank rates.

(7) controls the inflation of the currency.

(8) controls the possession of property.

(9) controls the industrial capacity.

(10) controls manufacturing.

(11) controls the availability of goods (commodities).

(12) controls the prices of commodities.

(13) controls services, the labor force, etc.

(14) controls payments to government officials.

(15) controls the legal functions

(16) controls the personal data file uncorrectable - by the party slandered.

(17) controls advertising.

(18) controls media content.

(19) controls material available for T.V. viewing.

(20) disengages attention from real issues.

(21) engages emotions.

(22) creates disorder, chaos, and insanity.

(23) controls design of more probing tax forms.

(24) controls surveillance.

(25) controls the storage of information.

(26) develops psychological analyses and profiles of individuals.

(27) controls legal functions (repeat of 15).

(28) controls sociological factors.

(29) controls health options.

(30) preys on weaknesses.

(31) cripples strengths.

(32) leaches wealth and substance.


DIVERSION, THE PRIMARY STRATEGY

Experience has proven that the simplest method of securing a silent weapon and gaining control of the public is to keep the public undisciplined and ignorant of basic systems principles on the one hand, while keeping them confused, disorganized, and distracted with matters of no real importance on the other hand. This is achieved by: (1) Disengaging their minds, sabotaging their mental activities, by providing a low quality program of public education in mathematics, logic, systems design, and economics, and by discouraging technical creativity. (2) Engaging their emotions, increasing their self-indulgence and their indulgence in emotional and physical activities, by: (a) unrelenting emotional affrontations and attacks (mental and emotional rape) by way of a constant barrage of sex, violence, and wars in the media - especially the T.V. and the newspapers. (b) giving them what they desire - in excess - "junk food for thought" and depriving them of what they really need. (3) Rewriting history and law and subjecting the public to the deviant creation, thus being able to shift their thinking from personal needs to highly fabricated outside priorities. These preclude their interest in and discovery of the silent weapons of social automation technology. The general rule is that there is profit in confusion; the more confusion, the more profit. Therefore, the best approach is to create problems and then offer the solutions.

DIVERSION SUMMARY MEDIA:

Keep the adult public attention diverted away from the real social issues, and captivated by matters of no real importance. SCHOOLS: Keep the young public ignorant of real mathematics, real economics, real law, and real history.

ENTERTAINMENT:

Keep the public entertainment below a sixth grade level.

WORK:

Keep the public busy, busy, busy, with no time to think; back on the farm with the other animals.

CONSENT, THE PRIMARY VICTORY

A silent weapon system operates upon data obtained from a docile public by legal (but not always lawful) force. Much information is made available to silent weapon systems programmers through the Internal Revenue Service . (See "Studies In The Structure Of The American Economy" for an I.R.S. source list.) This information consists of the enforced delivery of well organized data contained in federal and state tax forms collected, assembled, and submitted by slave labor provided by taxpayers and employers. Furthermore, the number of such forms submitted to the I.R.S. is a useful indicator of public consent, an important factor in strategic decision making. Other data sources are given in the "Short List Of Inputs. Consent Coefficients: numerical feedback indicating victory status. Psychological basis: When the government is able to collect tax and seize private property without just compensation, it is an indication that the public is ripe for surrender and is consenting to enslavement and legal encroachment. A good and easily quantified indicator of harvest time is the number of public citizens who pay income tax.

AMPLIFICATION ENERGY SOURCES

The next step in the process of designing as economic amplifier is discovering the energy sources. The energy sources which support any primitive economic system are, of course, a supply of raw materials, and the consent of the people to labor and consequently assume a certain rank, position, level, or class in the social structure; i.e., to provide labor at various levels in the pecking order. Each class, in guaranteeing its own level of income, controls the class immediately below it, hence preserves the class structure. This provides stability and security, but also government from the top. As time goes on and communication and education improve, the lower class elements of the social labor structure become knowledgeable and envious of the good things that the upper class members have. They also begin to attain a knowledge of energy systems and the ability to enforce their rise through the class structure. This threatens the sovereignty of the elite. If this rise of the lower classes can be postponed long enough, the elite can achieve energy dominance, and labor by consent no longer will hold a position of an essential economic energy source. Until such energy dominance is absolutely established, the consent of people to labor and let others handle their affairs must be taken into consideration, since failure to do so could cause the people to interfere in the final transfer of energy sources to the control of the elite. It is essential to recognize that at this time, public consent is still an essential key to the release of energy in the process of economic amplification. Therefore, consent as an energy release mechanism will now be considered.

LOGISTICS

The successful application of a strategy requires a careful study of inputs, outputs, the strategy connecting the inputs and the outputs, and the available energy sources to fuel the strategy. This study is called logistics. A logistical problem is studied at the elementary level first, and then levels of greater complexity are studied as a synthesis of elementary factors. This means that a given system is analyzed, i.e., broken down into its sub-systems, and these in turn are analyzed, until, by this process, one arrives at the logistical 'atom', the individual. This is where the process of syntheses properly begins, at the time of the birth of the individual.

THE ARTIFICIAL WOMB

From the time a person leaves its mother's womb, its every effort is directed toward building, maintaining, and withdrawing into artificial wombs, various sorts of substitute protective devices or shells. The objective of these artificial wombs is to provide a stable environment for both stable and unstable activity; to provide a shelter for the evolutionary processes of growth, and maturity - i.e., survival; to provide security for freedom and to provide defensive protection for offensive activity.

THE POLITICAL STRUCTURE OF A NATION - DEPENDENCY

The primary reason why the individual citizens of a country create a political structure is a subconscious wish or desire to perpetuate their own dependency relationship of childhood. Simply put, they want a human god to eliminate all risk from their life, pat them on the head, kiss their bruises, put a chicken on every dinner table, clothe their bodies, tuck them into bed at night, and tell them that everything will be alright when they wake up in the morning. This public demand is incredible, so the human god, the political, meets incredibility with incredibility by promising the world and delivering nothing. So who is the bigger liar?, the public?, or the 'godfather'? This public behavior is surrender born of fear, laziness and expediency. It is the basis of the welfare state as a strategic weapon, useful against a disgusting public.

ACTION/OFFENSE

Most people want to be able to subdue and/or kill other human beings which disturb their daily lives, but they do not want to have to cope with the moral and religious issues which such an overt act on their part might raise. Therefore, they assign the dirty work to others (including their own children) so as to keep the blood off their own hands. They rave about the humane treatment of animals and then sit down to a delicious hamburger from a whitewashed slaughterhouse down the street and out of sight. But even more hypocritical, they pay taxes to finance a professional association of hit men collectively called politicians, and then complain about corruption in government.

RESPONSIBILITY

Again, most people want to be free to do things (to explore, etc.) but they are afraid to fail. The fear of failure is manifested in irresponsibility, and especially in delegating those personal responsibilities to others where success is uncertain or carries possible or created liabilities (law) which the person is not prepared to accept. They want authority (root word - 'author'), but they will not accept responsibility or liability. They hire politicians to face reality for them.

SUMMARY

The people hire the politicians so that the people can:

(1) obtain security without managing it.

(2) obtain action without thinking about it.

(3) inflict theft, injury, and death upon others without having to contemplate either life or death.

(4) avoid responsibility for their own intentions.

(5) obtain the benefits of reality and science without exerting themselves in the discipline of facing or learning either of these things.

They give the politicians the power to create and manage a war machine to:

(1) provide for the survival of the NATION/WOMB.

(2) prevent encroachment of anything of anything upon the NATION/WOMB.

(3) destroy the enemy who threatens the NATION/WOMB.

(4) destroy those citizens of their own country who do not conform for the sake of stability of the NATION/WOMB.

Politicians hold many quasi-military jobs, the lowest being the police which are soldiers, the attorneys and the C.P.A.s next who are spies and saboteurs (licensed), and the judges who shout the orders and run the closed union military shop for whatever the market will bear. The generals are industrialists. The 'presidential' level of commander-in-chief is shared by the international bankers. The people know that they have created this farce and financed it with their own taxes (consent), but they would rather knuckle under than be the hypocrite.

Thus, a nation becomes divided into two very distinct parts, a DOCILE SUB-NATION and a POLITICAL SUB-NATION.

The political sub-nation remains attached to the docile sub-nation, tolerates it, and leaches its substance until it grows strong enough to detach itself and devour its parent.

SYSTEM ANALYSIS

In order to make meaningful computerized economic decisions about war, the primary economic flywheel, it is necessary to assign concrete logistical values to each element of the war structure -- personnel and material alike. This process begins with a clear and candid description of the sub-systems of such a structure.

THE DRAFT (As military service)

Few efforts of human behavior modification are more remarkable or more effective than that of the socio-military institution known as the draft. A primary purpose of a draft or other such institution is to instill, by intimidation, in the young males of a society the uncritical conviction that the government is omnipotent. He is soon taught that a prayer is slow to reverse what a bullet can do in an instant.

Thus, a man trained in a religious environment for eighteen years of his life can, by this instrument of the government, be broken down, be purged of his fantasies and delusions in a matter of mere months. Once that conviction is instilled, all else becomes easy to instill.

Even more interesting is the process by which a young man's parents, who purportedly love him, can be induced to send him off to war to his death. Although the scope of this work will not allow this matter to be expanded in full detail, nevertheless, a course overview will be possible and can serve to reveal those factors which must be included in some numerical form in a computer analysis of social and war systems. We begin with a tentative definition of the draft.

The draft: (selective service, etc.) is an institution of compulsory collective sacrifice and slavery, devised by the middle aged and the elderly for the purpose of pressing the young into doing the public dirty work. It further serves to make the youth as guilty as the elders, thus making criticism of the elders by the youth less likely (Generational Stabilizer). It is marketed and sold to the public under the label of "patriotic - national" service. Once a candid economic definition of the draft is achieved, that definition is used to outline the boundaries of a structure called a Human Value System, which in turn is translated into the terms of game theory. The value of such a slave laborer is given in a Table of Human Values, a table broken down into categories by intellect, experience, post service job demand, etc.. Some of these categories are ordinary and can be tentatively evaluated in terms of the value of certain jobs for which a known fee exists. Some jobs are harder to value because they are unique to the demands of social subversion, for an extreme example: the value of a mother's instruction to her daughter causing that daughter to put certain behavioral demands upon a future husband, ten or fifteen years hence, thus, by suppressing his resistance to a perversion of a government, making it easier for a banking cartel to buy the State of New York in, say, twenty years. Such a problem leans heavily upon the observations and the data of wartime espionage and many types of psychological testing. But crude mathematical models (algorithms, etc.) can be devised, if not to predict, at least to predetermine theme events with maximum certainty. What does not exist by natural cooperation is thus enhanced by calculated compulsion. Human beings are machines, levers which may be grasped and turned, and there is little real difference between automating a society and automating a shoe factory. These derived values are variable. (It is necessary to use a current Table of Human Values for computer analysis.) These values are given in true measure rather than U.S. dollars, since the latter is unstable, being presently inflated beyond the production of national goods and services so as to give the economy a false kinetic energy ('paper' inductance). The silver value is stable, it being possible to buy the same amount with a gram of silver today as could be bought in 1920. Human value measured in silver units changes slightly due to changes in production technology.

ENFORCEMENT FACTOR I

As in every social system approach, stability is achieved only by understanding and accounting for human nature (action/reaction patterns). A failure to do so can be, and usually is, disastrous. As in other human social schemes, one for or another of intimidation (or incentive) is essential to the success of the draft. Physical principles of action and reaction must be applied to both internal and external sub-systems. To secure the draft, individual brainwashing/programming and both the family unit and the peer group must be engaged and brought under control.

FACTOR II FATHER

The man of the household must be house-broken to ensure that junior will grow up with the right social training and attitudes. The advertising media, etc., are engaged to see to it that father-to-be is pussy-whipped before or by the time he is married. He is taught that he either conforms to the social notch out for him or his sex life will be hobbled and his tender companionship will be zero. He is made to see that women demand security more than logical, principled, or honorable behavior. By the time his son must go to war, father (with jelly for a back bone) will slam a gun into junior's hand before father will risk the censure of his peers, or make a hypocrite of himself by crossing the investment he has in his own personal opinion or self-esteem. Junior will go to war or father will be embarrassed. So junior will go to war, the true purpose of the war notwithstanding.

FACTOR III MOTHER

The female element of human society is ruled by emotion first and logic second. In the battle between logic and imagination, imagination always wins, fantasy prevails, maternal instinct dominates so that the child comes first and the future comes second. A woman with a newborn baby is too starry-eyed to see a wealthy man's cannon fodder or a cheap source of slave labor. A woman must, however, be conditioned to accept the transition to "reality" when it comes, or sooner. As the transition becomes more difficult to manage, the family unit must be carefully disintegrated, and state controlled public education and state operated child care centers must become more common and legally enforced so as to begin the detachment of the child from the mother and the father at an earlier age. Inoculation of behavioral drugs can speed the transition for the child (mandatory).

CAUTION: A woman's impulsive anger can override her fear. An irate woman's power must never be underestimated, and her power over a pussy-whipped husband must likewise never be underestimated. It got women the vote in 1920.

FACTOR IV JUNIOR

The emotional pressure for self-preservation during time of war and the self-serving attitude of the common herd that have an option to avoid the battlefield -- if junior can be persuaded to go -- is all of the pressure finally necessary to propel Johnny off to war. Their quiet black mailings of him are the threats: "No sacrifice, no friends; no glory, no girlfriends."

FACTOR V SISTER

And what about junior's sister? She is given all the good things of life by her father, and taught to expect the same from her future husband regardless of the price.

FACTOR VI CATTLE

Those who will not use their brains are not better off than those who have no brains, and so this mindless school of jellyfish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.”

This concludes what is available (and what was found) of this government document.