-Caveat Lector-
http://www.elfis.net/rnr/rnrx/abject.htm
OPERATION ABJECT
The Majestic Joker Upside Down
By
E. Macer-Story
Intellectual Property Copyright 2000/2001 Eugenia Macer-Story
In a letter supposedly signed by President Harry Truman on
September 24, 1947, Secretary of Defense James Forrestal (1) was
notified that "Hereafter this matter shall be referred to only as
Operation Majestic Twelve". This rather brief memorandum, perhaps
dictated after Forrestal was safely dead, (2) then goes on to state
that only the "President, Dr. Vannevar Bush and the Director of
Central Intelligence" shall be privy to "Majestic Twelve"
operations. It is clear that the number Twelve has occult resonance
in these communications stamped "TOP SECRET/MAJIC/EYES ONLY". The
Egyptian "gods of time" were said to govern the twelve houses of
the zodiac and twelve hours of the traditional clock and to rule
these decans majestically. (3) Perhaps the designer of the
"Majestic Twelve" caper was aware of Jungian psychology and
attempted in this arcane manner to appeal to the "collective
unconscious".
It is not clear exactly why the falsified "Majestic Twelve" papers
utilize the historical persona of President Harry Truman as versus
Franklin D. Roosevelt but this tactic may simply have developed
because events within the prominent Roosevelt family would have
been more difficult to alter after the fact. However, any secret
commission on "ufos" {originally called "bogeys" or "foo fighters"}
(4) **during WWII would--like the Manhattan Project which developed
the atom bomb --have been authorized initially by President
Franklin D. Roosevelt .Secret research into the "foo fighters"
would have begun in 1944 or before (whenever they were first seen
to accompany aircraft during war maneuvers) and would not have been
initiated by President Harry Truman, as the so-called "Majestic"
documents purport to demonstrate.
BALLPARK BRIEFING
As stated by Walter R. Mears in a recent Associated Press article,
(5) "Truman, as vice president, took office in 1945 when Franklin
D. Roosevelt died, uninformed on intelligence matters and unaware
even of the project then completing the atomic bomb, which he
(Truman) ordered dropped in Japan later that year." For this
reason, the CIA now gives ballpark briefings to presidential
candidates prior to the election.
According to military records kept by both Axis and Allied forces
during World War II** anomalous aerial lights called "foo fighters"
were observed before the term "ufo" or "flying saucer" was coined
in 1947.," These mysterious balls of light were reported by the
experienced crews of American warplanes in both the European and
Pacific Theatres in 1944-5.
<http://www.abductee.net/six/foo_photo1.html> These balls of light
(flying in V-formations or as a single source) were alleged to
follow planes from both sides. (6)
Therefore, since U.S. participation in World War Two was fought
under the leadership of President Roosevelt, any "foo fighter &
unidentified aircraft" commission would also have commenced under
Roosevelt. We do not see Truman named as founding the Atomic Energy
Commission and the Manhattan Project. History sees Truman as
stepping into the shoes of Roosevelt and implementing the military
programs already in process.
For this basic reason, any rational and informed person would
conclude that the 1980 issue "Majestic" Documents and associated
"cloak & dagger" stuff supposedly set in motion by a "Harry Truman"
signature are sophisticated forgeries. There is no convincing
evidence a) that these documents are actually regular, sanctioned
U.S. Government issue or that b) President Truman founded the U.S.
ufo investigation programme. There IS evidence of use of access to
U.S. government files and stationary to fake the documents. In his
book (TOP SECRET/ MAJIC) (7) Stanton Friedman gives convincing
scholarly research which documents the similarity of the "Majestic"
documents to known U.S. classified documents and signatures on file
and available (after strenuous legal effort) to his intelligent
examination. However, Friedman has proven not that the "Majestic"
documents are genuinely the inception of the covert "unidentified
aircraft" project but simply that these MJ-12 constructions match
documents he and others have been able to scavenge from U.S.
government files. The forgers could also have scavenged these
files and/or slipped forged content into government files when
replacing files obtained for inspection.
Does anyone seriously think that, after the lessons taught by
elite "moles" such as British art historian Anthony Blunt, (8)
covert Soviet KGB asset in the Oxford/Cambridge intellectual scene
during World War II and the 1950's Cold War, any sane
administrator of a program designed to enhance U.S. national
security would place in available record any really "sensitive"
covert documents or format? Friedman has probably proven that the
fakes match "up front" written records which actually do not have
significant covert format. Sir Anthony Blunt, by the way, was never
detected in his stratagems. His role as KGB mole was revealed by a
colleague who had a sudden change of orientation when applying for
a job with the FBI. If these matters did not involve the fate of
nations and the probable death and disappearance of a number of
individuals, the situation would be downright funny. Because Blunt,
a homosexual art critic, was part of a demimonde regarded by the
general public as being "eccentric" no one checked him carefully.
No one took his possible role beyond the art world very seriously
until it was revealed that he had been the key KGB operative in the
UK for over forty years. Blunt, stripped of his British knighthood
but granted immunity for his description of covert Soviet
espionage, died in 1983. But people who worked with Blunt in the
British KBB-linked spy network are still very much alive (9) and
still may be covertly laughing. But amid all the covert jokes, a
mistake may sometimes occur.
WRONG KEY
For several weeks, your perplexed correspondent had been
accumulating a pile of reference material on the "working table"
beside the computer keyboard but did not have the exact "entry"
into this study of the "Majestic" on "MJ-12" enigma. Then while
searching for a downloaded file in a folder used primarily to "fast
dump" reference material from email correspondence, an unfamiliar
icon met the investigative eye.
For some reason, the jpg file of swastika graffiti sent on August
11, 2000 to Alex Burns of Temple of Set for expert identification
was presenting itself in two forms, the customary jpg icon-which I
had emailed to Alex-and another icon from which a cartoon key was
dangling. This looked to me to be a "secure" designation, something
which I did not use on the transmission. I clicked on this and it
fetched a secure adobe image file. I was fascinated. Either my
computer hard drive had been covertly entered by a computer wizard
who copied the jpg and accidentally left a duplicate in my folder
OR restless poltergeists were active, securing the "black magick"
symbols in exact pdf form. I later identified a similar "key"
cartoon icon in one mode of the Ipswitch FTP program while saving
my play THE OLD GAFFER FROM BOISE from website to disk on Labor Day
Weekend 2000.
Well, come on now. I research the paranormal but this was evidently
some peculiar intrusion into my hard drive by an individual who
recognized the name of the Stockholm, Sweden road given on the file
designation and/or knew I had sent the file to Alex Burns.
Burns himself had been actively protesting my designation of Temple
of Set as neo-Nazi in a previous article. (10) He did not respond
to my request that he identify the swastika graffiti. But
ironically the fact that I had openly sent the jpg to Burns for
identification indicates that the covert intruder into my hard
drive was NOT Temple of Set. Since I had given them the
information, they would have no reason to steal it. Alex Burns in
his correspondence (11) with this reporter had made the point that
"magickal workings" in Germany by Michael Aquino of Temple of Set
were not "neo-Nazi" but attempted to place the Nazi phenomenon
within the perspective of German occult history. This reporter
agrees that U.S. Lt.Col. Michael Aquino's Temple of Set workings,
while perhaps misguided, are obviously not the only works of Nordic
sorcery now possible in ancient German castles open to the public
as monuments.
Later in the day there was a reversion of the entire computer
system to hardware coding for a previous monitor . This shift meant
that the intrusion into the system had affected more than the
single icon. After the system had been rebooted, the cartoon key on
the rescued Adobe icon containing the swastika grafitti had
vanished and it was manifesting as a normal photo icon like other
sized files on my hard drive.So whatever cyber wizardry had entered
my system had briefly corrupted the files as does a virus.
As this rebooting event was processing I recalled another, similar
event which I had dismissed without comment. One of my text files
about Highlander information is labeled "Scots" . Shortly after I
had created this file, it fetched with an odd icon which then
vanished. It occurred to me then that an intruder might have
thought that this was a file containing material on Scott Corrales,
a controversial Hispanic ufologist. A few years ago I had
discovered unusual messages in Spanish in my laptop computer cache
while corresponding with Corrales and thought that if these were
not "cyber spirits" there might be email monitoring which was
leaving a trace in the cache records.
Additionally, it is interesting that the vintage of software in my
laptop-which I had recently used on several business trips-is the
same vintage as my more recent desktop monitor had manifested at
the time the odd "key" icon caught my attention. Could the intruder
have assumed that both machines had the same Windows vintage? Or
was the telltale icon simply a product of the intruder's different
duplication system?
THE REALCYPHER
Beyond considerations of relative verbal coding-by typewriter or
word processing program--there is no way that Stanton Friedman, the
Woods duo or any other scholastic researcher working strictly from
documents or library materials could serve to "validate" or
"in-validate" documents alleged to be "top secret" or "classified".
This is simply because-particularly since the days of electronic
surveillance and computer cryptography-the actual "top secret"
communications of "black world" or highly sensitive documents may
not have been stored in any standard cyber-written or simply
visual form. A phrase at the top of a "Memorandum For The
President" about future communications on some unspecified matter
to then General Twining typed by an executive secretary on
September 25, 1947, just one day after the supposed signing of the
Truman directive to Forrestal, reads simply:"Cryptographic security
does not apply". This refers only to the letter of memorandum typed
by a secretary as allegedly dictated "over the secret telephone".
(12) No statement about "cryptographic security" appears at the
head of the MAJESTIC TWELVE PROJECT report. Therefore these
documents, if genuine, may contain cryptographic coding, cipher or
other privy signals.
The "Eyes Only" stamp on the "Majestic" or "MJ-12" documents is
suspect as rogue falsification. With "MAJIC" stamped beside TOP
SECRET, the entire shebang looks like a "Dr.Who" stage prop. Or
does the "EYES ONLY" stamp on Majestic Twelve context actually
refer to the Egyptian "Eye of Horus"?
Actual non-occult classified government documents will be
designated with some sober label such as: "Not For Public
Inspection", as written at the top of the Index of the 1st Annual
Majestic Twelve Project report. However, the stamp "For Official
Use Only" at the bottom of the MJ-12 Index would be more
appropriate on a product label or "designated area" parking sign.
There is one marking on the Majestic documents supposedly given to
William Moore and Jaime Shandera* by covert U.S. government agents
in 1980 which actually may be significant as a coded intelligence
agency communication. This is the definite "Z" marking used to
cross out the words "top secret" on the page headings of the "First
Annual Briefing of MJ-12". (13)
During World War II, a hard line covert commission within the U.S.
intelligence services was called "the Z organization" and, headed
by Claude Dansey, was able to function outside the ordinary uses of
cryptography. At that time, the Allied cryptographic codes had been
broken by Axis code adepts and, along with the famous Navajo Code
Talkers, Dansey's innovative collection of professional artists,
playwrights, performers and the like were able to use a variety of
creative techniques to circumvent detection by the enemy.
These techniques departed from ordinary written communications into
the area of "signal" talk sometimes similar to the "telegraphic"
gestures used by actors and shamans. The broad "Z" crossing out
"Top Secret" on the original; Majestic document headings conveyed
to Moore and Shandera is definitely such a "signal" to those who
might be aware of the lore of the "Z organization". What might this
overt signal actually mean to informed, intelligence professionals?
After careful consideration, this reporter takes the "Z" marking to
be a signal of distress, an esoteric "SOS" accomplished by -in
effect-flying the "Majestic Charade" flag upside down by crossing
out the words "Top Secret". So what might this survivor of the "Z
Org" of fifty-five years ago, a person who may be quite elderly at
this time if not an initiated, younger prot�g�, be trying to signal
exactly?
Certainly, first of all, that the documents released as "Majestic"
are not "straight" and that no amount of library research is going
to do more than validate or invalidate the type-face of a machine
from the 1940's which is currently available in attics and antique
stores throughout the world. Recall the participation of British
art historian Sir Anthony Blunt in espionage and note the
participation by playwright Noel Coward (14) in Claude Dancey's "Z
Organization" during World War Two. Note also that the employment
of these and other creative professionals by intelligence agencies
was successful. The "Majestic" documents may seem to be a farce
because they are, in inception, constructed by a farceur who could
not resist crossing out "Top Secret" on a few of the briefings with
a "Z" for Zorro or "Z" for Zed.(Zero).
THE GAME BIT
Getting into the dramatic and farcical mental modality was quite
helpful. This reporter began to consider the possibility of a
sophisticated disinformation charade and it became obvious that
since in many systems of witchcraft "foul is fair" and "fair is
foul" (15) a trickster familiar with occult systems might try to
reverse terms in some way. As a brainstorming exercise Macer-Story
wrote down a list of "opposites" for "Majestic", finally coming up
with the word "abject", a term which also contains the central
syllable "je".
When "abject" was web-searched, Macer-Story found that there was a
Canadian firm ABJECT MODERNITY which manufactures a role-playing
game titled "The Stone". In several on-line catalogs this product
is described as:" Your link to a person somewhere on this planet.
Through Fate, Chaos or Destiny this person was meant to be your
Stonemate. There is a sequence of symbols on each Stone that only
matches one other. The person who has that Stone was meant to be
your partner, your Other in the on-line puzzle called the Enigma."
The similarity between the "enigma" aspect of the role-playing game
designed by the firm ABJECT MODERNITY and the "de-coding" of the
MAJESTIC DOCUMENTS by various individuals who then play roles as
"investigators" of historical paperwork is significant.
When queried, (16) a representative of the company ABJECT.COM made
the following statement:
"No, this is not a cult. We can assure you The Stone is an Internet
mystery game, and not related to any specific cult or religious
group. The company that created The Stone is Abject.com, an
Internet company creating toys and games for the web
(www.abject.com). The Stone does have puzzles related to
'conspiracy-minded' topics akin to the X-files, so it would not be
recommended for younger children. Beyond that, its a great
computer game. I've included a press release below describing the
dynamics within the site. Please let us know if you require any
further information. I would be very grateful if you could inform
me as to what sort of referral this was. If there are
*questionable* sites linking to our games without proper
permissions we would request they be removed. I certainly hope this
clears up any confusion!"
Any alert person browsing ads for the role-playing game "The Stone"
can detect that-as a game-this product does cross certain
interesting interpersonal boundaries. The Stonemate of any player
is not necessarily anyone in the neighborhood or even in the same
country where the game was purchased. The "clues" given to each
player are created or "fictional" but the situation of using these
crafted symbols to locate a real, unknown person who also happens
to have bought the same game is truly an identification enigma.
The "Enigma" of this role-playing game exactly matches the enigma
of the "Majestic" documents. By the use of these created MJ-12
ciphers, available to the players free via Internet download, those
engaging in "investigator" role-playing may access and re-interpret
historical, technical and news archive material without leaving the
comfort of their familiar surroundings. During this process they
may find a matching connection with another game-playing individual
who shares their viewpoint and may even have stumbled across
similar references.
In this way, perhaps, the U.S. National Security is preserved at
the expense of fooling only those gullible enough to spend long
days and nights in front of supposedly "historical" documents
instead of long days and nights walking the real-time line in
search of new, original and conventionally-documented data.
But was this Majestic charade actually perpetrated by U.S.
government operatives? Or are U.S. operatives now engaged in
fielding a role-playing game of uncertain origin which has taken
hold of the public imagination?
CELESTRIAL ERROR (17)
Throughout the Oppenhiemer-Einstein paper of the MJ-12 ensemble the
word "celestial" is spelled "celestrial". This is fascinating. For
when the word is pronounced with an "r" in the third syllable a
British pronunciation is obtained. If a typist was taking the
scenario from taped dictation, which is quite likely, the person
who devised the charade may have been speaking either with a
British accent or using "stage English" pronunciation.
Did you really believe that stuff about the significance of the
extra "r" in celestrial? If so, you may also believe the statement,
made by authors Robert M. Wood & Ryan S.Wood in the
"Oppenheimer-Einstein Draft" section of the Index page of their
website <http://www.majesticdocuments.com> , that the spelling
errors in the Majestic documents, being natural human mistakes,
tend to validate the documents as genuine.
Following this line of reasoning, the sections of the MAJESTIC
TWELVE PROJECT 1st Annual Report (undated) which are obviously
borrowed from reference works and news articles are completely
valid as evidence of covert government documentation of ufo
sightings because it is completely natural for a researcher to
consult books and magazines and make internally-altered copies of
such items for a report.
As this reporter was speed-reading the MAJESTIC document mentioned
above, which had been downloaded as a printed scan from the Art
Bell net archives, a statement about the legendary disappearance of
Flight 19 flying from Fort Lauderdale Naval Air Station in Florida
on December 5, 1945 stopped that quick-take process dead cold.
There is a significant alteration of data in the second paragraph
on page 13 of Annex C from renditions published elsewhere.
In the MAJESTIC version, the "last known radio communication from
the instructor pilot was described as heard by a ham operator:
"Don't come after me...they look like they are from outer space..."
In both the book INVISIBLE RESIDENTS (18) by Ivan T. Sanderson and
The book ENIGMAS AND MYSTERIES (19) of the Grolier Encyclopedia of
the Supernatural series, the last known communication received by
Fort Lauderdale Naval land base from this ill-fated flight of five
TBM "Avenger" torpedo bombers was: "We don't know where we are. We
think we must be 225 miles northeast of base...it looks like we
are..." Sanderson also reports that previous radio transmissions
from Flight 19 had indicated gross directional disorientation among
the pilots.
According to the Grolier Encyclopedia:" This was confirmed shortly
afterward when control overheard conversations between the planes
in which crew members refered to instruments in all the planes as
'going crazy'....The planes seemed unable to hear the base
transmitter and it became increasingly difficult for control to
hear them..."
It seems obvious that a "ham radio" transmission about "outer
space" is less relevant in the context of a supposed military
strategy report than exact, disoriented transmissions recorded by
the Fort Lauderdale Naval Base. If the MAJESTIC TWELVE PROJECT
documents are genuine, the United States is in serious danger from
inept, internal intelligence-gathering.
Flagged by this information discrepancy in paragraph 3 of page 13
of Annex C of the MAJESTIC TWELVE PROJECT, this reporter
back-tracked slightly and took a look at paragraph 2. Upon
inspection, it was ascertained that the last two examples of
unexplained disappearance of large numbers of military troops
during wartime given in this paragraph 2 are exactly the same as
the two lead examples in the chapter "Strange Disappearances" (20)
which is included in the Grolier ENIGMAS AND MYSTERIES, published
in 1976 in England and distributed both in the UK and the USA. The
wording is not exactly congruent and one date is transposed by two
years from Grolier to Majestic but the substantive content is
exactly the same.
The first example of "disappearance of soldiers and their
equipment" given in this same paragraph 2-page 13 of Annex C refers
the reader to an incident which occurred in the eighteenth century
during The War of the Spanish Succession. (1701-14) What
significance does this event have to a contemporary resident of the
United States of America concerned with unexplained aerial vehicles
and national security? Absolutely none. The incident occurred at an
unspecified place during the war between European powers which
sought to control the Hapsburg succession to the Spanish throne.
The closest the U.S. gets to these proceedings is to notice that
rights to Newfoundland and Labrador were partitioned as a result by
the Peace of Utrecht treaty in 1713.
Following initial mention of the War of the Spanish Succession
there is an example given of the unexplained disappearance of
French colonial soldiers near Saigon, French Indo-China in 1885.
Obviously, the concerns of the individual who wrote paragraph
2-Annex C of this MAJESTIC document were basically formed by an
acquaintance with European history and European colonialism. The
individual also had access to the Grolier Encyclopedia or other
English language "pot boilers of the strange" and filled in the
final sentences of the reference with details acceptable to readers
of popular English language anomalies literature.
Since this MAJESTIC TWELVE PROJECT "report" actually contains no
real, detailed military analysis( pro or con the "ufo" hypothesis)
of-for example-the technical performance of the ill-fated Flight 19
aircraft or other such situations, it is wise to dismiss any
possibility that the MAJESTIC documents actually functioned as part
of a top secret briefing prepared by military analysts during the
Cold War. What, then, are these documents?
USE OF THE ABJECT INDIVIDUAL
Dan T. Smith, an individual encouraged by CIA employee Ron Pandolfi
to believe he is important to intelligence agency strategy,
typifies in his many imbalanced emails about the "soul and the
philosophical monad" (21) the deliberate use of marginal, otherwise
"abject" individuals to provide a natural diversion from actual
covert research and intelligence gathering.
Smith has stated, as regards alleged KGB attempts to destabilize US
science, that "our direct knowledge simply does not conform to the
rumors of governmental intrigue that you choose to disseminate"
(7/9/00)and has also recently given an interview to the online
version of PARANOIA magazine during which he describes elaborate
U.S. intelligence agency strategy involving an "Aviary" and "MJ-12"
motif. The following statements are taken directly from an email
posted by Dan T. Smith to an extensive CC list on April 12,2000:
"My best guess is that my personal eschaton gambit has been used as
a public reference point by the 'phenomenology network' to prime
the pump of unconventional collections(uCC's). Ron's public (22)
association with far out stuff opens him up to other off-the-wall,
back-channel material that might be of interest to a serious
phenomenology effort.
"A phenomenology network has got to keep an eye on all
possibilities. It cannot allow itself to become theory driven like
mainstream science. Eschatology and immaterialism gives the phenom
boys some practice with stretching their minds to the limits of
rationality, and maybe beyond. This keeps them on their toes, and
on the lookout for things that would otherwise fall between the
cracks of conventional collection.
"(On a more practical note, since the uCC mandate countenances
domestic collections, it is useful for the agency to keep that door
open as a loophole in the legislated restrictions on CC's.)
"There were three substantive influences from my 'handler':
1. A greater credibility afforded to the existence of something
like MJ12.
2. The 'sunfish' remark. (23)
3. The partial opening of a political channel.
"The second & third items are most sensitive. They are in potential
violation of the prime directive, and so are self-limiting. The
result is a glass ceiling over the Aquarium. The aquarium/eschaton
can only be given a minimal external nudge. Beyond that,
everything has to be spontaneous. Having hit that rather low
ceiling, the aquarium is on its own.
"The only way to break through is phenomenally or conceptually. The
conceptual breakthough would be the preferred route, as it would
minimize confusion. The biggest conceptual challenge is to find an
immaterial alternative to astronomy. So far all I have is the
feeling that quantum-string cosmology is a big step in this
direction. One needs mainly to find a solid mind link to the
celestial/cosmological dimension of the developing M-theory. S-P
has some promising ideas in this direction, we just need some more
metaphysical juice. Such a link would shed new light on the
Anthropic problem and the necessary mechanism behind it. After
that it is a cakewalk to the eschaton and beyond. Wisely, MJ12 and
the visitors play the role of spectator."
Obviously, Smith is a person who-without this "intelligence agency"
scenario-would receive very little public attention. Therefore , he
can be expected to throw himself into the superficial drama of
whatever roles and masques may be suggested in various situations
without regard for the more sophisticated artificial consistency of
actual covert scenarios.
Smith's rather droll idea of finding an "immaterial alternative" to
astronomy is in obvious conflict with his role-playing
identification of the MJ-12 characters as "visitors" and
"spectators". If astronomy is actually immaterial, as Smith
suggests, wherefrom are these "spectators" from outer space except
from the conceptually-orbiting strategic office of CIA "phenom boy"
Ron Pandolfi?
In this context, it could be argued that William Moore-- the
"Majestic" personality who by his own admission invented the
so-called "Aviary" nicknames "Falcon" and "Sparrow" for his CIA
contacts in 1980 during a telephone conversation "secret name"
charade (24) with partner Jaime Shandera-- also fits this "abject
except when role-playing" profile. Yet Moore's confession of
intelligence agency involvement published in the MUFON JOURNAL Nos.
259 & 260 **(November & December 1989 ) was a rational, and not a
self-inflated gesture. He has also expressed the realization that
the "Majestic Documents" as "covertly" released to himself and
Shandera, are probably sophisticated disinformation. In Part II of
his MUFON paper on these issues, Moore comments:
"Disinformation is a strange and bizarre game. Those who play it
are completely aware that an operation's success is dependent upon
dropping information upon a target, or "mark", in such a way that
the person will accept it as truth and will repeat, and even defend
it to others as if it were true. Once this has been accomplished,
the work of the counterintelligence specialists is complete. They
can simply withdraw in the confidence that the dirty work of
spreading their poisonous seeds will be done by others...Every time
one of you repeats an unverified or unsubstantiated bit of evidence
without qualifying it as such, you are contributing to that
process, and every time you do it, somebody in a need-to-know
position sits back and has a horse laugh at your expense." (25)
In contrast, Dan T. Smith seems unaware of his abject role in the
intelligence game, as he continues to indulge in voluminous email
correspondence and fringe press interviews about covert "Aviary"
and/or U.S. psy-op agents with "bird" nicknames while continuing at
the same time to await a "Messiah" (perhaps himself) who will guide
humanity through the final cataclysm of the "Eschaton". Note once
again here that these "Aviary" names were originally invented
off-the-cuff in 1980 by two journalist/investigators trying to
evade possible telephone surveillance. The subsequent adoption of
these very names by persons claiming there is an actual CIA
"Aviary" is a lot like finding that your current email flame
Jane/John Doe-whom you have called "lovey-dovey" just for
fun-actually seems to be named Lovey C. Dove and denies any
romantic relationship and/or use of the name Jane/John Doe, calling
you a disturbed person who is making fun of his/her Baptismal name
"Lovey C. Dove" into the Church in 1954 at age nine days. Lovey C.
Dove will also have the Church certificate to prove that you simply
are a stalker who combs the phone listings for unusual names.
Cute, eh? But down this type of virtual mental corridor lies an
immaterial astronomy and freeze of mental function. Follow the
details given by the unfortunate Wm. Moore and D.T. Smith at your
own peril. For the labels and code names of actual covert projects
are changed frequently to prevent detection. If an actual
classified document said "Majestic" in 1947, similar classified
documents are not designated by the term "Majestic" in the year
2000. Yet certain strategic concepts do remain. For example: "Run
it up the pole and see who salutes it."
UNCONVENTIONAL COLLECTIONS?
Is the control of the press on ufos and unexplained phenomena
advocated in the Conclusions section, Part III-P, page 7 of the
MJ-12 briefing entitled "Government Policy of Control and Denial"
actually, therefore, the actual data-control technique of choice
used by U.S. intelligence agencies? Or is Dan T. Smith correct when
he mentions the strategy of "unconventional collections?"
These agencies seem to "use" the foibles of individuals such as
Smith and Moore for diversion and surveillance but have not been
observed exerting actual censorship upon the editors of civilian
magazines and newspapers. There is no discernable "anomalies
blacklist". It seems to be just the opposite. Any and all "outer
space" communications are encouraged in order to gather information
on maverick thinkers and interest groups. According to former
Strategic Air Command personnel, military officers and enlisted
persons were asked not to speak of "unexplained" objects on the SAC
radar and those pilots who did speak freely of their encounters
with unexplained aerial phenomena were lectured or disciplined.
(26) But this is not unusual in the military when defense must be
maintained. It has a personal impact on the military ufo contactees
but is part of a larger strategy. In this context, rational
observation assumes a covert investigation project begun under
President Roosevelt when the "foo fighters" were first observed
accompanying military aircraft during World War II.
In fact, might the paragraph on "control of publications" in the
"Majestic" documents betray authorship by an individual or
individuals more familiar with governments (Socialist or Royalist)
wherein such a direct censorship policy might be more commonly
possible? OR, and this is of interest because Smith claims to have
been attracted to his philosophical counter-intelligence pursuits
by a (female) voice called "Sophia" (wisdom) he began to perceive
sometime in the late 1980's, (27) are both Smith and the unknown
author(s) of the Majestic hoax actually interdimensional
disinformation channels puppeted by hyper-intelligent/ diabolic
"remote control"? Are these the impersonations and machinations of
the archetypal Lord Ahriman, prince of darkness?
If so, might this confusion (recall that Smith cites chaos theory
in his "confession" email) be generated by a force of paranormal
"evil" not under the control of any earthly government at all?
Perhaps the CIA hitch onto Dan T. Smith by Pentagon employee Ron
Pandolfi may simply be the old-fashioned intelligence ploy of
somehow getting aboard the run away vehicle simply to see in which
direction the wonderland race is now pointing. If this reporter
were a strategist for U.S. intelligence, and front office U.S.
intelligence had not initiated the MAJESTIC TWLEVE documents, I
would advise this "accompanying angel" surveillance. For one sure
way for an enemy to destroy a target country or interest group is
to create internal conflict. Do not confront the dupes.
PROPAGANDA DROP
In this case, the "propaganda drop" onto a "mark" cited by Wm.
Moore in his "confession" (28) may not actually be the Majestic
papers as handed to Moore and Shandera but Moore's confession
itself, during which he lambastes the unfortunate Paul Bennewitz.
Incredibly, physicist Bennewitz was derided by Moore during this
1989 "confession" for maintaining an abduction/implant scenario
which is-in fact-vitally similar to the scenario now being put
forward by abduction researchers David M.Jacobs and John Mack.
In addition, Moore at that time derided Paul Bennewitz' scenario
involving the unexplained cattle mutilations of the early 1980's as
being "alien" while at the same historical (hysterical?) moment
Linda Moulton Howe was revving up and poised to deliver her public
accusations against army information officer Richard Doty, a person
she claims led her on with statements about U.S. military
involvement with the mutilations, extreme statements which Doty
later denied making to Ms. Howe. It is common to "believe"
Moulton-Howe over Doty. But should we continue to credit this exact
scenario? Unexplained animal mutilations have occurred on Long
Island (29) and (30) in locations such as Puerto Rico and Chile
over a period of twenty years since the first "mutilation flap" in
the early 1980's.
During the Spring of 2000 in Chile, there was rumor spread that
NASA had come to spirit away certain mutilated animal carcasses
which were a result of U.S. genetic experimentation. O yeah? Why
should U.S. geneticists experiment in Chile? Isn't this just a bit
too neat a game-playing transferal from Majestic to Abject-ick?
What about all those provincial people who had boiling goo dumped
onto them from "ufo craft" in the rural areas of Brazil? (31) Are
the troublesome "MK-12 "documents originally of standard U.S.
intelligence agency origin? Or do these brilliantly-forged
documents originate with South American and/or UK-based
counter-espionage sources perhaps connected to the mercenary black
leather and/or drug subculture?
It is possible that in 1980, when U.S. Air Force Security Officer
Richard Doty learned he was being nicknamed "Sparrow" by two fringe
journalists engaged in inventing "Aviary" nicknames, he also
laughed and exclaimed: "OK, I'll play along with it." Moore remarks
in his "confession" that Doty (who retired from the Air Force in
1988) seemed to be remarkably flexible and neutral, taking no
original stances and following all cues given to him. Most
probably, this is because-like actors performing improvisational
theater-Doty and other officers were uptaking the scenarios
generated by abject disinformants Moore, Moulton-Howe and others
and feeding them back their own stuff. As a matter of fact,
Security Officer Richard Doty was actually detected generating a
false memorandum which was basically a "role-playing" addition to
the ongoing "Majestic" scenario being generated by civilians. (32)
Why would Doty do this crazy thing? Was he hypnotized by some
arcane brainwashing technique? Or was this "unconventional
collections", a feeding back into the Majestic hopper of material
which might elicit telltale responses from the ufo disinformants?
It is very likely that front office U.S. government intelligence
did not set out to block physicist Paul Bennewitz so overtly and
most probably did not drop the original "Majestic "document
microfilm on Moore and Shandera. So part of Security Officer Doty's
now legendary task most probably was to elicit information from
reporter Linda Moulton Howe which might illumine the "cattle
mutilation" disinformation situation for the front office U.S.
military. But it was necessary to accomplish this delicate task
without harming the abjectly-mistaken disinformers in any way--lest
internal conflict be generated in the United States. The U.S.
government has not subsequently acted directly to censor even the
wildest "disclosures" in the implant/abduction arena. After all,
there are laws guaranteeing freedom of speech and of the press in
the United States. But these freedoms are not as completely assured
in the colonial UK and in certain South American countries where
wealthy elitists have sought refuge. Who first actually suggested
the "military deception" scenario to reporter Linda Moulton-Howe
and her associates before she visited Air Force Security Officer
Richard Doty's office? Who might, actually, have wanted to block
physicist Paul Bennewitz in 1980? There are three basic
possibilities : a) genuine interdimensional and/or extraterrestrial
intelligence b) persons committed to a covert drug-oriented and/or
electronically-implemented black magickal practice threatened by
the disclosures & observations of Bennewitz c) rival corporate
electronics wizards developing an electronic implant & control
system (33) which they intended to vend internationally to the
highest bidder. These possibilities are not mutually-exclusive.
Stay tuned.
511 Avenue of the Americas-PMB 173
New York,N.Y. 10011-8436
212-727-0002
__________________________________________________
Do You Yahoo!?
Send FREE video emails in Yahoo! Mail!
http://promo.yahoo.com/videomail/
<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please! These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.
Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
<A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>
http:[EMAIL PROTECTED]/
<A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om