[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Woman with walker, 69, fatally shot in face on New York City street:

Paul Joseph Watson: Bournemouth 1980 Vs 2025

FDA Revokes Emergency Authorization For COVID-19 Vaccines

NATO’s Worst Nightmare Is Happening Right Now in Ukraine - Odessa is Next To Fall?

Why do men lose it when their chicky-poo dies?

Christopher Caldwell: How Immigration Is Erasing Whites, Christians, and the Middle Class

SSRI Connection? Another Trans Shooter, Another Massacre – And They Erased His Video

Something 1/2 THE SIZE of the SUN has Entered our Solar System, and We Have NO CLUE What it is...

Massive Property Tax Fraud Exposed - $5.1 Trillion Bond Scam Will Crash System

Israel Sold American Weapons to Azerbaijan to Kill Armenian Christians

Daily MEMES YouTube Hates | YouTube is Fighting ME all the Way | Making ME Remove Memes | Part 188

New fear unlocked while stuck in highway traffic - Indian truck driver on his phone smashes into

RFK Jr. says the largest tech companies will permit Americans to access their personal health data

I just researched this, and it’s true—MUST SEE!!

Savage invader is disturbed that English people exist in an area he thought had been conquered

Jackson Hole's Parting Advice: Accept Even More Migrants To Offset Demographic Collapse, Or Else

Ecuador Angered! China-built Massive Dam is Tofu-Dreg, Ecuador Demands $400 Million Compensation

UK economy on brink of collapse (Needs IMF Bailout)

How Red Light Unlocks Your Body’s Hidden Fat-Burning Switch

The Mar-a-Lago Accord Confirmed: Miran Brings Trump's Reset To The Fed ($8,000 Gold)

This taboo sex act could save your relationship, expert insists: ‘Catalyst for conversations’

LA Police Bust Burglary Crew Suspected In 92 Residential Heists

Top 10 Jobs AI is Going to Wipe Out

It’s REALLY Happening! The Australian Continent Is Drifting Towards Asia

Broken Germany Discovers BRUTAL Reality

Nuclear War, Trump's New $500 dollar note: Armstrong says gold is going much higher

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today


Resistance
See other Resistance Articles

Title: Silent Weapons for Quiet Wars -- An Introduction Programming Manual -- Operations Research Technical Manual TW-SW7905.1
Source: The Lawful Path
URL Source: http://www.lawfulpath.com/ref/sw4qw/index.shtml
Published: Jan 1, 2008
Author: None
Post Date: 2008-01-01 14:55:02 by richard9151
Ping List: *9-11*     Subscribe to *9-11*
Keywords: None
Views: 124
Comments: 6

The following document is taken from two sources. The first, was acquired on a website (of which I can't remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.

If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.

The Lawful Path www.lawfulpath.com


Forward

This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the "National Security" by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.

Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.

We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that "War" had been declared against them, but would be able to properly identify the true enemy to Humanity.

Delamer Duverus


Preface

Conspiracy theories are nothing new to history. Plots to "kill Caesar" and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the "Cold War" which called for control of the masses through manipulation of industry, peoples' pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public's attention from what is really going on.

The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.

Table of Contents

Forward

Preface

Security

Historical Introduction

Political Introduction

Energy

Descriptive Introduction of the Silent Weapon

Theoretical Introduction

General Energy Concepts

Mr. Rothschild's Energy Discovery

Apparent Capital as "Paper Inductor

Breakthrough

Application in Economics

The Economic Model

Industrial Diagrams

Three Industrial Classes

Aggregation

The E-model

Economic Inductance

Inductive Factors to Consider

Translation

Time Flow Relationships and Self-destructive Oscillations

Industry Equivalent Circuits

Stages of Schematic Simplification

Generalization

Final Bill of Goods

The Technical Coefficients

The Household Industry

Household Models

Economic Shock Testing

Introduction to the Theory of Shock Testing

Example of Shock Testing

Introduction to Economic Amplifiers

Short List of Inputs

Short List of Outputs

Table of Strategies

Diversion, the Primary Strategy

Diversion Summary

Consent, the Primary Victory

Amplification Energy Sources

Logistics

The Artificial Womb

The Political Structure of a Nation - Dependency

Action/Offense

Responsibility

Summary

System Analysis

The Draft

Enforcement


The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.

TOP SECRET

Silent Weapons for Quiet Wars

Operations Research Technical Manual TM-SW7905.1

Welcome Aboard

This publication marks the 25th anniversary of the Third World War, called the "Quiet War", being conducted using subjective biological warfare, fought with "silent weapons."

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120


Security

It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide. This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest - it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today's problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.


And etc. I would urge everyone to copy this manual to their computer, and see to it that it is distributed far and wide. Please. Of course, it goes without saying that you should also read it!

Click for Full Text! Subscribe to *9-11*

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 6.

#1. To: richard9151 (#0)

...which called for control of the masses through manipulation of industry, peoples' pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public's attention from what is really going on.

Psychic Drive (Repeat message continously applying all mass-media formats), Divide-and-Conquer (Sow discord, exploit all avenues: Rich v poor, male v female, old v young, cult v cult, race v race, parents v children, police state v people, educated v uneducated...).

The techniques defined in the manual appear to have been intended for foreign application however was turned around for domestic use.

Split  posted on  2008-01-01   15:53:07 ET  Reply   Untrace   Trace   Private Reply  


#2. To: Split (#1)

The techniques defined in the manual appear to have been intended for foreign application however was turned around for domestic use.

They took the lessons learned in subverting foreign nations/people and DELIBERATELY turned those lessons against the people of America.

But then, until you learn that the people doing this were not Americans, it seems to be too strange to possibly be true. For reference, see the Post; Tidbits from the Talmud.

richard9151  posted on  2008-01-01   16:03:21 ET  Reply   Untrace   Trace   Private Reply  


#6. To: richard9151 (#2)

They took the lessons learned in subverting foreign nations/people and DELIBERATELY turned those lessons against the people of America.

And mass-media control made it all possible.

Split  posted on  2008-01-01   17:41:02 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 6.

        There are no replies to Comment # 6.


End Trace Mode for Comment # 6.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]