U.S. GOVERNMENT PRINTING OFFICE50-070 PDF WASHINGTON : 2009For sale by the Superintendent of Documents, U.S. Government PrintingOffice Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP,Washington, DC 20402-0001COMMITTEE ON THE JUDICIARYJOHN CONYERS, Jr., Michigan, ChairmanHOWARD L. BERMAN, California LAMAR SMITH, TexasRICK BOUCHER, Virginia F. JAMES SENSENBRENNER, Jr.,JERROLD NADLER, New YorkWisconsinROBERT C. ``BOBBY'' SCOTT, Virginia HOWARD COBLE, North CarolinaMELVIN L. WATT, North Carolina ELTON GALLEGLY, CaliforniaZOE LOFGREN, California BOB GOODLATTE, VirginiaSHEILA JACKSON LEE, Texas DANIEL E. LUNGREN, CaliforniaMAXINE WATERS, California DARRELL E. ISSA, CaliforniaWILLIAM D. DELAHUNT, Massachusetts J. RANDY FORBES, VirginiaROBERT WEXLER, Florida STEVE KING, IowaSTEVE COHEN, Tennessee TRENT FRANKS, ArizonaHENRY C. ``HANK'' JOHNSON, Jr., LOUIE GOHMERT, TexasGeorgia JIM JORDAN, OhioPEDRO PIERLUISI, Puerto Rico TED POE, TexasMIKE QUIGLEY, Illinois JASON CHAFFETZ, UtahLUIS V. GUTIERREZ, Illinois TOM ROONEY, FloridaBRAD SHERMAN, California GREGG HARPER, MississippiTAMMY BALDWIN, WisconsinCHARLES A. GONZALEZ, TexasANTHONYD. WEINER, New YorkADAM B. SCHIFF, CaliforniaLINDA T. SANCHEZ, CaliforniaDEBBIE WASSERMAN SCHULTZ, FloridaDANIEL MAFFEI, New YorkPerry Apelbaum, Majority Staff Director and Chief CounselSean McLaughlin, Minority Chief of Staff and General Counsel------Subcommittee on the Constitution, Civil Rights, and Civil LibertiesJERROLD NADLER, New York, ChairmanMELVIN L. WATT, North Carolina F. JAMES SENSENBRENNER, Jr.,ROBERT C. ``BOBBY'' SCOTT, Virginia WisconsinWILLIAM D. DELAHUNT, Massachusetts TOM ROONEY, FloridaHENRY C. ``HANK'' JOHNSON, Jr., STEVE KING, IowaGeorgia TRENT FRANKS, ArizonaTAMMY BALDWIN, Wisconsin LOUIE GOHMERT, TexasJOHN CONYERS, Jr., Michigan JIM JORDAN, OhioSTEVE COHEN, TennesseeBRADSHERMAN,CaliforniaSHEILA JACKSON LEE, TexasDavid Lachmann, Chief of StaffPaul B. Taylor, Minority CounselC O N T E N T S----------JUNE 4, 2009PageTHE BILLH.R. 984, the ``State Secret Protection Act of 2009.............. 4OPENING STATEMENTSThe Honorable Jerrold Nadler, a Representative in Congress fromthe State of New York, and Chairman, Subcommittee on theConstitution, Civil Rights, and Civil Liberties................ 1The Honorable F. James Sensenbrenner, Jr., a Representative inCongress from the State of Wisconsin,and RankingMember,Subcommittee on the Constitution, Civil Rights, and CivilLiberties...................................................... 17The Honorable John Conyers, Jr., a Representative in Congressfrom the State of Michigan, Chairman, Committee on theJudiciary, and Member, Subcommittee on the Constitution, CivilRights, and Civil Liberties.................................... 18WITNESSESThe Honorable Patricia M. Wald, retired Chief Judge, U.S. CourtoF Appeals for the District of ColumbiaOral Testimony................................................. 21Prepared Statement............................................. 24The Honorable Asa Hutchinson, Senior Partner, Hutchinson LawGroupOral Testimony................................................. 29PreparedStatement............................................. 31Mr.Andrew Grossman, Senior Legal Policy Analyst, The HeritageFoundationOral Testimony................................................. 55Prepared Statement............................................. 57Mr. Ben Wizner, National Security Project Staff Attorney,American Civil Liberties UnionOral Testimony................................................. 83Prepared Statement............................................. 85APPENDIXMaterial Submitted for the Hearing Record........................ 111STATE SECRET PROTECTION ACT OF 2009----------THURSDAY, JUNE 4, 2009House of Representatives,Subcommittee on theConstitution,Civil Rights, and Civil Liberties,Committee on the Judiciary,Washington, DC.The Subcommittee met, pursuant to notice, at 2:09 p.m., inroom 2141, Rayburn House Office Building, the Honorable JerroldNadler (Chairman of the Subcommittee) presiding.Present: Representatives Nadler, Conyers, Delahunt,Johnson, Sensenbrenner, Franks, and King.Staff Present: Heather Sawyer, Majority Counsel; and PaulTaylor, Minority Counsel.Mr. Nadler. This hearing of the Subcommittee on theConstitution, Civil Rights, and Civil Liberties will come toorder.Today's hearing will examine the state secrets privilege.The Chair recognizes himself for 5 minutes for an openingstatement.Today, the Subcommittee examines legislation that I haveintroduced, alongwith the distinguished Chairman of the fullCommittee, with Representative TomPetri, and with severalother Members of the Committee, that would codify uniformstandards for dealing with claims of the state secretsprivilege by the government in civil litigation.In the last Congress, we had an oversight hearing on thestate secrets privilege and a hearing on this legislation. Thebill was reported favorably to the full Committee.Our experience has demonstrated the destructive impact thatsweeping claims of privilege and secrecy can have on ourNation. In order for the rule of law to have any meaning,individual liberties and rights must be enforceable in ourcourts. Separation-of-powers concerns are at their highest withregard to secret executive branch conduct, and the governmentsimply cannot be allowed to hide behind unexamined claims ofsecrecy and become the final arbiter ofits own conduct.Yet, claims of secrecy have been used to conceal mattersfrom Congress even though Members have the security clearancenecessary to be briefed in an appropriately secure setting.That has been the case with respect to the use of torture, withthe use of illegal spying on Americans, and other matters oftremendous national importance.And let me add here that this issue is perhaps the mostimportant issue, in my judgment, this Committee will face,because this Committee is charged with enforcing civil rightsand civil liberties under our Constitution. And there is anancient maxim of law that says there is no right without aremedy. And if the government violates your rights, if itkidnaps you, it tortures you, it deliberately burns down yourhouse, it wiretaps you without a warrant, whatever, how do youenforce your right against the government?Well, theAdministration could criminally prosecute its ownmembers who have done so; that isunlikely. Congress couldexercise oversight; that is hit or miss. Or the victim can suein tort, he can sue the government for illegal wiretapping, forkidnapping, for intentional infliction of mental distress, forassault, whatever.But if the government can eliminate that lawsuit on thepleadings simply by coming into court and using the magicincantation of the words ``state secrets,'' and say, ``Thiscase should be dismissed because we say, in our unexaminedassertion, that trying the case would necessitate therevelation of state secrets, case dismissed,'' then there is norecourse to the courts and there is no enforcement of rights.And rights without a remedy are illusory and we have no rights.Therefore, we must put some limits on this use of the statesecret doctrine.The same pattern ofresorting to extravagant state secretsclaims has been evident in the courts. While theBushadministration did not invent the use of the state secretsprivilege to conceal wrongdoing, it certainly perfected theart. The state secrets privilege has been abused by priorAdministrations to protect officials who have behaved illegallyor improperly or simply in an embarrassing manner, rather thanto protect the safety and security of the Nation.The landmark case in the field, U.S. v. Reynolds, is aperfect case in point. The widows of three civilian engineerssued the government for negligence stemming from a fatal aircrash. The government refused to produce the accident report,even refusing to provide it to the court to review, claiming itwould reveal sensitive state secrets that would endangernational security. The Supreme Court concurred without everlooking behind the government'sunsupported assertion thatnational security was involved.Half a century later, thereport was found, nowdeclassified, online by the daughter of one of the engineers,and it clearly revealed no state secrets. It clearly could havebeen made available in a form that would have enabled thosefamilies to vindicate their rights in court. It did, however,reveal that the crash was caused by government negligence,which I suspect was the real reason for the invocation, or theinvention in that case, of the state secrets doctrine.Protecting the government from embarrassment and civilliability, not protecting national security, was the realreason for withholding the accident report. Yet these familieswere denied justice because the Supreme Court never lookedbehind the government's false claim to determine whether it wasvalid.Similarly, in the Pentagon Papers case,then-SolicitorGeneral Erwin Griswold warned the Supreme Court thatpublication of the information wouldpose a grave and immediatedanger to national security. Eighteen years later, heacknowledged that he had never seen, quote, ``any trace of athreat to the national security,'' unquote, from thepublication of the information and further admitted that,quote, ``The principle concern is not with national securitybut rather with government embarrassment of one sort oranother,'' close quote.It is important to protect national security, and sometimesour courts have to balance the need for individual justice withnational security considerations. Congress has in the pastbalanced these important, albeit sometimes competing, demands.In the criminal context, we enacted the Classified InformationsProcedure Act. In FISA, we set up procedures for the courts toexamine sensitivematerials. Through the Freedom of InformationAct, we sought to limit any withholding of information from thepublic whom the government is supposed to serve.We can and should do the same in civil cases. Our system ofgovernment and our legal system have never relied on takingassurances at face value. The courts and the Congress have aduty to look behind what this Administration or anyAdministration says to determine whether or not thoseassurances are well-founded.Presidents and other government officials have been knownnot to tell the truth on occasion, especially when it is intheir interest to conceal something. The founders of thisNation knew that there needed to be checks in each branch ofthe government to prevent such abuses from taking the place.Or, in the words of the Ninth Circuit in the recent Jeppesendecision, ``The executive cannot be its own judge.'' To allowthat--and these are now my words--to allow that is to abandonall the protections against tyranny that ourFounding Fathersestablished.Courts have a duty to protect national security secrets,but they also have a duty to make an independent judgment as towhether state secrets claims have any merit. When thegovernment itself is a party, the court cannot allow it tobecome the final arbiter of its own case. The purpose of thislegislation is to ensure that the correct balance is struck.I would just add that I am extremely disappointed that theDepartment of Justice has declined to provide a witness todiscuss this very important issue at this hearing. I have metwith the Attorney General, and I understand that a review ofthis policy is currently under way. Nonetheless, the Departmentcontinues to go into court while this review is under way andtake positions that areremarkably similar to positions takenby the last Administration.While I greatly appreciate the Attorney General'swillingness to work with us, I believe that it should bepossible to send someone to provide us with theAdministration's views and to answer our questions to theextent that they are able. I hope this is not a sign of thingsto come.I look forward to the testimony of our witnesses.I would now recognize the distinguished Ranking minorityMember, the gentleman from Wisconsin, Mr. Sensenbrenner, forhis opening statement.[The bill, H.R. 984, follows:][GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]Mr. Sensenbrenner. Thank you, Mr. Chairman.The state secrets privilege is a longstanding legaldoctrine the Supreme Court most recently described in a casecalled U.S. v. Reynolds. In that case, the court made it clearthat if the court,after giving appropriate deference to theexecutive branch, determines that public disclosure ofinformation would harmnational security, the court is obligedto either dismiss the case or limit the public disclosure ofnational security information as necessary.Under this doctrine, people with legitimate claims are notdenied access to court review. Rather, the doctrine allowsjudges to personally review any sensitive information. Whilethis doctrine may occasionally disadvantage someone suing incourt, it is vital to protecting the safety of all Americans.The roots of the state secrets privilege extend all the wayback to Chief Justice Marshall, the author of Marbury v.Madison, who held that the government need not provide anyinformation that would endanger public safety.In the modern era, Congress debated the issue of the statesecrets privilege under Federal law in the1970's butultimately chose to maintain the status quo, including elementsof the privilege put in place by the Supreme Courtin itsReynolds decision. The Fourth Circuit Court of Appeals recentlyemployed the doctrine in affirming the dismissal of the case,including that the state secrets privilege has a firmfoundation in the Constitution.Not surprisingly, the privilege has played a significantrole in the Justice Department's response to civil litigationarising out of our counterterrorism efforts following 9/11.The state secrets doctrine remains strongly supported bytoday's Supreme Court. Even in its Boumediene decision grantinghabeas litigation rights to terrorists, Justice Kennedy, in hismajority opinion, acknowledged the government's legitimateinterest in protecting sources and methods of intelligencegathering and stated, ``We expect the district court will useitsdiscretion to accommodate this interest to the greatestextent possible,'' while citing the Reynolds state secrets caseImentioned earlier in doing so.I oppose any efforts, including this bill, that invite thecourts to deviate from the sound procedures they currentlyfollow to protect vital national security information. H.R. 984would preclude judges from giving weight to the executivebranch's assessment of national security. And it wouldauthorize courts not to use ex parte proceedings in conductinga review of privileged claims. And it would prevent courts frombeing able to dismiss a case when the government cannot defenditself without using privileged information.The Obama administration is clearly not enamored with theapproach of this legislation and has adhered in court to thedoctrine as asserted by the previous Administration in at leastthree cases already. Accordingto The Washington Post editorialpage, the Obama administration's position on state secretsmakes it hard to distinguish fromits predecessor. AnthonyRomero, the executive director of the ACLU, has written thatthe new Administration has embraced policies held over from theBush era, including the use of the state secrets claim.Last Congress, legislation essentially the same as H.R. 984was cosponsored in the Senate by Senators Joe Biden and HillaryClinton, who are now President Obama's Vice President andSecretary of State. But this year, President Obama, VicePresident Biden, and Secretary of State Clinton have gonesilent on the bill. When asked about it recently, the VicePresident's communications director said, quote, ``No commenton this one here.''http://mcvictimsworld.ning.com/profiles/blogs/abc-news-1979-special-missionABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs.ABC News 1979 Special: Mission Mind Control (29 mins)
All Posts (12237)
U.S. GOVERNMENT PRINTING OFFICE50-070 PDF WASHINGTON : 2009For sale by the Superintendent of Documents, U.S. Government PrintingOffice Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP,Washington, DC 20402-0001COMMITTEE ON THE JUDICIARYJOHN CONYERS, Jr., Michigan, ChairmanHOWARD L. BERMAN, California LAMAR SMITH, TexasRICK BOUCHER, Virginia F. JAMES SENSENBRENNER, Jr.,JERROLD NADLER, New YorkWisconsinROBERT C. ``BOBBY'' SCOTT, Virginia HOWARD COBLE, North CarolinaMELVIN L. WATT, North Carolina ELTON GALLEGLY, CaliforniaZOE LOFGREN, California BOB GOODLATTE, VirginiaSHEILA JACKSON LEE, Texas DANIEL E. LUNGREN, CaliforniaMAXINE WATERS, California DARRELL E. ISSA, CaliforniaWILLIAM D. DELAHUNT, Massachusetts J. RANDY FORBES, VirginiaROBERT WEXLER, Florida STEVE KING, IowaSTEVE COHEN, Tennessee TRENT FRANKS, ArizonaHENRY C. ``HANK'' JOHNSON, Jr., LOUIE GOHMERT, TexasGeorgia JIM JORDAN, OhioPEDRO PIERLUISI, Puerto Rico TED POE, TexasMIKE QUIGLEY, Illinois JASON CHAFFETZ, UtahLUIS V. GUTIERREZ, Illinois TOM ROONEY, FloridaBRAD SHERMAN, California GREGG HARPER, MississippiTAMMY BALDWIN, WisconsinCHARLES A. GONZALEZ, TexasANTHONYD. WEINER, New YorkADAM B. SCHIFF, CaliforniaLINDA T. SANCHEZ, CaliforniaDEBBIE WASSERMAN SCHULTZ, FloridaDANIEL MAFFEI, New YorkPerry Apelbaum, Majority Staff Director and Chief CounselSean McLaughlin, Minority Chief of Staff and General Counsel------Subcommittee on the Constitution, Civil Rights, and Civil LibertiesJERROLD NADLER, New York, ChairmanMELVIN L. WATT, North Carolina F. JAMES SENSENBRENNER, Jr.,ROBERT C. ``BOBBY'' SCOTT, Virginia WisconsinWILLIAM D. DELAHUNT, Massachusetts TOM ROONEY, FloridaHENRY C. ``HANK'' JOHNSON, Jr., STEVE KING, IowaGeorgia TRENT FRANKS, ArizonaTAMMY BALDWIN, Wisconsin LOUIE GOHMERT, TexasJOHN CONYERS, Jr., Michigan JIM JORDAN, OhioSTEVE COHEN, TennesseeBRADSHERMAN,CaliforniaSHEILA JACKSON LEE, TexasDavid Lachmann, Chief of StaffPaul B. Taylor, Minority CounselC O N T E N T S----------JUNE 4, 2009PageTHE BILLH.R. 984, the ``State Secret Protection Act of 2009.............. 4OPENING STATEMENTSThe Honorable Jerrold Nadler, a Representative in Congress fromthe State of New York, and Chairman, Subcommittee on theConstitution, Civil Rights, and Civil Liberties................ 1The Honorable F. James Sensenbrenner, Jr., a Representative inCongress from the State of Wisconsin,and RankingMember,Subcommittee on the Constitution, Civil Rights, and CivilLiberties...................................................... 17The Honorable John Conyers, Jr., a Representative in Congressfrom the State of Michigan, Chairman, Committee on theJudiciary, and Member, Subcommittee on the Constitution, CivilRights, and Civil Liberties.................................... 18WITNESSESThe Honorable Patricia M. Wald, retired Chief Judge, U.S. CourtoF Appeals for the District of ColumbiaOral Testimony................................................. 21Prepared Statement............................................. 24The Honorable Asa Hutchinson, Senior Partner, Hutchinson LawGroupOral Testimony................................................. 29PreparedStatement............................................. 31Mr.Andrew Grossman, Senior Legal Policy Analyst, The HeritageFoundationOral Testimony................................................. 55Prepared Statement............................................. 57Mr. Ben Wizner, National Security Project Staff Attorney,American Civil Liberties UnionOral Testimony................................................. 83Prepared Statement............................................. 85APPENDIXMaterial Submitted for the Hearing Record........................ 111STATE SECRET PROTECTION ACT OF 2009----------THURSDAY, JUNE 4, 2009House of Representatives,Subcommittee on theConstitution,Civil Rights, and Civil Liberties,Committee on the Judiciary,Washington, DC.The Subcommittee met, pursuant to notice, at 2:09 p.m., inroom 2141, Rayburn House Office Building, the Honorable JerroldNadler (Chairman of the Subcommittee) presiding.Present: Representatives Nadler, Conyers, Delahunt,Johnson, Sensenbrenner, Franks, and King.Staff Present: Heather Sawyer, Majority Counsel; and PaulTaylor, Minority Counsel.Mr. Nadler. This hearing of the Subcommittee on theConstitution, Civil Rights, and Civil Liberties will come toorder.Today's hearing will examine the state secrets privilege.The Chair recognizes himself for 5 minutes for an openingstatement.Today, the Subcommittee examines legislation that I haveintroduced, alongwith the distinguished Chairman of the fullCommittee, with Representative TomPetri, and with severalother Members of the Committee, that would codify uniformstandards for dealing with claims of the state secretsprivilege by the government in civil litigation.In the last Congress, we had an oversight hearing on thestate secrets privilege and a hearing on this legislation. Thebill was reported favorably to the full Committee.Our experience has demonstrated the destructive impact thatsweeping claims of privilege and secrecy can have on ourNation. In order for the rule of law to have any meaning,individual liberties and rights must be enforceable in ourcourts. Separation-of-powers concerns are at their highest withregard to secret executive branch conduct, and the governmentsimply cannot be allowed to hide behind unexamined claims ofsecrecy and become the final arbiter ofits own conduct.Yet, claims of secrecy have been used to conceal mattersfrom Congress even though Members have the security clearancenecessary to be briefed in an appropriately secure setting.That has been the case with respect to the use of torture, withthe use of illegal spying on Americans, and other matters oftremendous national importance.And let me add here that this issue is perhaps the mostimportant issue, in my judgment, this Committee will face,because this Committee is charged with enforcing civil rightsand civil liberties under our Constitution. And there is anancient maxim of law that says there is no right without aremedy. And if the government violates your rights, if itkidnaps you, it tortures you, it deliberately burns down yourhouse, it wiretaps you without a warrant, whatever, how do youenforce your right against the government?Well, theAdministration could criminally prosecute its ownmembers who have done so; that isunlikely. Congress couldexercise oversight; that is hit or miss. Or the victim can suein tort, he can sue the government for illegal wiretapping, forkidnapping, for intentional infliction of mental distress, forassault, whatever.But if the government can eliminate that lawsuit on thepleadings simply by coming into court and using the magicincantation of the words ``state secrets,'' and say, ``Thiscase should be dismissed because we say, in our unexaminedassertion, that trying the case would necessitate therevelation of state secrets, case dismissed,'' then there is norecourse to the courts and there is no enforcement of rights.And rights without a remedy are illusory and we have no rights.Therefore, we must put some limits on this use of the statesecret doctrine.The same pattern ofresorting to extravagant state secretsclaims has been evident in the courts. While theBushadministration did not invent the use of the state secretsprivilege to conceal wrongdoing, it certainly perfected theart. The state secrets privilege has been abused by priorAdministrations to protect officials who have behaved illegallyor improperly or simply in an embarrassing manner, rather thanto protect the safety and security of the Nation.The landmark case in the field, U.S. v. Reynolds, is aperfect case in point. The widows of three civilian engineerssued the government for negligence stemming from a fatal aircrash. The government refused to produce the accident report,even refusing to provide it to the court to review, claiming itwould reveal sensitive state secrets that would endangernational security. The Supreme Court concurred without everlooking behind the government'sunsupported assertion thatnational security was involved.Half a century later, thereport was found, nowdeclassified, online by the daughter of one of the engineers,and it clearly revealed no state secrets. It clearly could havebeen made available in a form that would have enabled thosefamilies to vindicate their rights in court. It did, however,reveal that the crash was caused by government negligence,which I suspect was the real reason for the invocation, or theinvention in that case, of the state secrets doctrine.Protecting the government from embarrassment and civilliability, not protecting national security, was the realreason for withholding the accident report. Yet these familieswere denied justice because the Supreme Court never lookedbehind the government's false claim to determine whether it wasvalid.Similarly, in the Pentagon Papers case,then-SolicitorGeneral Erwin Griswold warned the Supreme Court thatpublication of the information wouldpose a grave and immediatedanger to national security. Eighteen years later, heacknowledged that he had never seen, quote, ``any trace of athreat to the national security,'' unquote, from thepublication of the information and further admitted that,quote, ``The principle concern is not with national securitybut rather with government embarrassment of one sort oranother,'' close quote.It is important to protect national security, and sometimesour courts have to balance the need for individual justice withnational security considerations. Congress has in the pastbalanced these important, albeit sometimes competing, demands.In the criminal context, we enacted the Classified InformationsProcedure Act. In FISA, we set up procedures for the courts toexamine sensitivematerials. Through the Freedom of InformationAct, we sought to limit any withholding of information from thepublic whom the government is supposed to serve.We can and should do the same in civil cases. Our system ofgovernment and our legal system have never relied on takingassurances at face value. The courts and the Congress have aduty to look behind what this Administration or anyAdministration says to determine whether or not thoseassurances are well-founded.Presidents and other government officials have been knownnot to tell the truth on occasion, especially when it is intheir interest to conceal something. The founders of thisNation knew that there needed to be checks in each branch ofthe government to prevent such abuses from taking the place.Or, in the words of the Ninth Circuit in the recent Jeppesendecision, ``The executive cannot be its own judge.'' To allowthat--and these are now my words--to allow that is to abandonall the protections against tyranny that ourFounding Fathersestablished.Courts have a duty to protect national security secrets,but they also have a duty to make an independent judgment as towhether state secrets claims have any merit. When thegovernment itself is a party, the court cannot allow it tobecome the final arbiter of its own case. The purpose of thislegislation is to ensure that the correct balance is struck.I would just add that I am extremely disappointed that theDepartment of Justice has declined to provide a witness todiscuss this very important issue at this hearing. I have metwith the Attorney General, and I understand that a review ofthis policy is currently under way. Nonetheless, the Departmentcontinues to go into court while this review is under way andtake positions that areremarkably similar to positions takenby the last Administration.While I greatly appreciate the Attorney General'swillingness to work with us, I believe that it should bepossible to send someone to provide us with theAdministration's views and to answer our questions to theextent that they are able. I hope this is not a sign of thingsto come.I look forward to the testimony of our witnesses.I would now recognize the distinguished Ranking minorityMember, the gentleman from Wisconsin, Mr. Sensenbrenner, forhis opening statement.[The bill, H.R. 984, follows:][GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]Mr. Sensenbrenner. Thank you, Mr. Chairman.The state secrets privilege is a longstanding legaldoctrine the Supreme Court most recently described in a casecalled U.S. v. Reynolds. In that case, the court made it clearthat if the court,after giving appropriate deference to theexecutive branch, determines that public disclosure ofinformation would harmnational security, the court is obligedto either dismiss the case or limit the public disclosure ofnational security information as necessary.Under this doctrine, people with legitimate claims are notdenied access to court review. Rather, the doctrine allowsjudges to personally review any sensitive information. Whilethis doctrine may occasionally disadvantage someone suing incourt, it is vital to protecting the safety of all Americans.The roots of the state secrets privilege extend all the wayback to Chief Justice Marshall, the author of Marbury v.Madison, who held that the government need not provide anyinformation that would endanger public safety.In the modern era, Congress debated the issue of the statesecrets privilege under Federal law in the1970's butultimately chose to maintain the status quo, including elementsof the privilege put in place by the Supreme Courtin itsReynolds decision. The Fourth Circuit Court of Appeals recentlyemployed the doctrine in affirming the dismissal of the case,including that the state secrets privilege has a firmfoundation in the Constitution.Not surprisingly, the privilege has played a significantrole in the Justice Department's response to civil litigationarising out of our counterterrorism efforts following 9/11.The state secrets doctrine remains strongly supported bytoday's Supreme Court. Even in its Boumediene decision grantinghabeas litigation rights to terrorists, Justice Kennedy, in hismajority opinion, acknowledged the government's legitimateinterest in protecting sources and methods of intelligencegathering and stated, ``We expect the district court will useitsdiscretion to accommodate this interest to the greatestextent possible,'' while citing the Reynolds state secrets caseImentioned earlier in doing so.I oppose any efforts, including this bill, that invite thecourts to deviate from the sound procedures they currentlyfollow to protect vital national security information. H.R. 984would preclude judges from giving weight to the executivebranch's assessment of national security. And it wouldauthorize courts not to use ex parte proceedings in conductinga review of privileged claims. And it would prevent courts frombeing able to dismiss a case when the government cannot defenditself without using privileged information.The Obama administration is clearly not enamored with theapproach of this legislation and has adhered in court to thedoctrine as asserted by the previous Administration in at leastthree cases already. Accordingto The Washington Post editorialpage, the Obama administration's position on state secretsmakes it hard to distinguish fromits predecessor. AnthonyRomero, the executive director of the ACLU, has written thatthe new Administration has embraced policies held over from theBush era, including the use of the state secrets claim.Last Congress, legislation essentially the same as H.R. 984was cosponsored in the Senate by Senators Joe Biden and HillaryClinton, who are now President Obama's Vice President andSecretary of State. But this year, President Obama, VicePresident Biden, and Secretary of State Clinton have gonesilent on the bill. When asked about it recently, the VicePresident's communications director said, quote, ``No commenton this one here.''http://mcvictimsworld.ning.com/profiles/blogs/abc-news-1979-special-missionABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs.ABC News 1979 Special: Mission Mind Control (29 mins)
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?
An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249

Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.
Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.
Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.
In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.
In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.
A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."
The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.
Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.
The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm
http://www.google.com/#hl=en&q=gilead+sciences+tamiflu+rumsfeld&aq=f&oq=&aqi=&fp=azWfBBCvguAhttp://www.google.com/#hl=en&ei=J4eBSsCYIJaBtweHpvjVCg&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=gilead+sciences+World+health+organization&spell=1&fp=azWfBBCvguAhttp://www.dailymail.co.uk/news/article-1205705/GMTV-host-Andrew-Castle-lost-daughter-swine-flu-drug.html
Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.
Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.
Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.
In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.
In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.
A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."
The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.
Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.
The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm



I'm positing that Morgellon's is a fast mutating, Mycorrhial type fungi attempting to form a symbiotic relationship with humans. The key to thisprocess is to exist within the human body without causing harm and without alerting the immune system. No small feat. Ultimately the fungal systemwill exist as sort of a second nervous system. What is termed Morgellon's is primarily the erradication of fungal cells that for one reason oranother aren't working - i.e. damaging the person's body or activating the immune system. If a given sore is open and active (i.e. infected), ifsubmerged in isopropyl alcohol, the alcohol will draw the offending fungi from the sore - a black sinewy substance/strands. As I will explain later,this is not the only function of the sores.
There are other pointers... One of the many primary symptoms is a periodic, intense craving for sweets. This would align with providing thecarbohydrates the fungi needs (and receives from the relationship) for sustenance.
Mycorrhial fungi often will attract and kill springtails as a source of nitrogen - for itself and the plant. I believe it is this type of mechanismthat is occurring and attracting other organisms resulting in the confusing cross-infection appearance of Morgellon's. This is one of theadditional functions of the sores (i.e. the attraction of specific other organisms as nutrient sources). This process is a small portion of thevitamin/mineral absorption assistance the fungi will provide.
Also occurring at the sores is the alteration of RNA and subsequent DNA as a corrective response to the offending cells being eradicated from thesystem. I am not knowledgeable with regards to genetics and such or how such a mechanism might work. So I'm gonna skip faking it. However, thereare specific details regarding the sores' process that support them being a part of fungal development and production. (concentration is at apremium...)
Additional connections and evidence: basically the dysfunctional symptoms of Morgellon's (e.g. brain fog, various digestive, etc...) are the resultof improper fungal cells being introduced into that area of the body (brain, intestines, etc. respectively) and then corrected.
So the fungi are getting a stable existence out of the symbiosis, what are the people getting? Once the process is complete (up to 10 years) theperson will have enhanced water, vitamin, and mineral absorption, heightened intelligence, expanded perception (mild cross-dimensional and telepathiccommunicative abilities), strengthened immune response, extended life-expectancy, likely among others.
Brain is tired. Well, what do you think?
copyright & usage | |
Click here for more ATS Skunk Works topics Hot Topics|Top Topics|This Week|Subscribe|Home | |
reply posted on 8-8-2008 @ 01:23 PM by prevenge | |
very interesting. see the 2012 link in my signature for some extra goodies. - | |
copyright & usage | |
![]() | |
reply posted on 8-8-2008 @ 03:14 PM by Kruel | |
Very interesting indeed. I'll be keeping tabs on this possibility. It seems more likely an explanation for morgellon's than a nanotech infection. If this is the case, then I hope a harmonious symbiotic relationship can be found between fungi and human biology. It may be quite an "upgrade",just as long as I don't have to deal with mushrooms sprouting from my skin! | |
copyright & usage | |
![]() | |
reply posted on 8-8-2008 @ 06:55 PM by verbal kint | |
reply to post by Kruel your comment about mushrooms sprouting from your skin reminded me of this:
|