USE OF THE ABJECT INDIVIDUAL

Dan T. Smith, an individual encouraged by CIA employee Ron Pandolfi to believe he is important to intelligence agency strategy, typifies in his many imbalanced emails about the "soul and the philosophical monad" (21) the deliberate use of marginal, otherwise "abject" individuals to provide a natural diversion from actual covert research and intelligence gathering.

Smith has stated, as regards alleged KGB attempts to destabilize US science, that "our direct knowledge simply does not conform to the rumors of governmental intrigue that you choose to disseminate" (7/9/00)and has also recently given an interview to the online version of PARANOIA magazine during which he describes elaborate U.S. intelligence agency strategy involving an "Aviary" and "MJ-12" motif. The following statements are taken directly from an email posted by Dan T. Smith to an extensive CC list on April 12,2000:


"My best guess is that my personal eschaton gambit has been used as a public reference point by the 'phenomenology network' to prime the pump of unconventional collections(uCC's). Ron's public (22) association with far out stuff opens him up to other off-the-wall, back-channel material that might be of interest to a serious phenomenology effort.

"A phenomenology network has got to keep an eye on all possibilities. It cannot allow itself to become theory driven like mainstream science. Eschatology and immaterialism gives the phenom boys some practice with stretching their minds to the limits of rationality, and maybe beyond. This keeps them on their toes, and on the lookout for things that would otherwise fall between the cracks of conventional collection.

"(On a more practical note, since the uCC mandate countenances domestic collections, it is useful for the agency to keep that door open as a loophole in the legislated restrictions on CC's.)

"There were three substantive influences from my 'handler':

1. A greater credibility afforded to the existence of something like MJ12.
2. The 'sunfish' remark. (23)
3. The partial opening of a political channel.

"The second & third items are most sensitive. They are in potential violation of the prime directive, and so are self-limiting. The result is a glass ceiling over the Aquarium. The aquarium/eschaton can only be given a minimal external nudge. Beyond that, everything has to be spontaneous. Having hit that rather low ceiling, the aquarium is on its own.

"The only way to break through is phenomenally or conceptually. The conceptual breakthough would be the preferred route, as it would minimize confusion. The biggest conceptual challenge is to find an immaterial alternative to astronomy. So far all I have is the feeling that quantum-string cosmology is a big step in this direction. One needs mainly to find a solid mind link to the celestial/cosmological dimension of the developing M-theory. S-P has some promising ideas in this direction, we just need some more metaphysical juice. Such a link would shed new light on the Anthropic problem and the necessary mechanism behind it. After that it is a cakewalk to the eschaton and beyond. Wisely, MJ12 and the visitors play the role of spectator."


Obviously, Smith is a person who-without this "intelligence agency" scenario-would receive very little public attention. Therefore , he can be expected to throw himself into the superficial drama of whatever roles and masques may be suggested in various situations without regard for the more sophisticated artificial consistency of actual covert scenarios.

Smith's rather droll idea of finding an "immaterial alternative" to astronomy is in obvious conflict with his role-playing identification of the MJ-12 characters as "visitors" and "spectators". If astronomy is actually immaterial, as Smith suggests, wherefrom are these "spectators" from outer space except from the conceptually-orbiting strategic office of CIA "phenom boy" Ron Pandolfi?

In this context, it could be argued that William Moore-- the "Majestic" personality who by his own admission invented the so-called "Aviary" nicknames "Falcon" and "Sparrow" for his CIA contacts in 1980 during a telephone conversation "secret name" charade (24) with partner Jaime Shandera-- also fits this "abject except when role-playing" profile. Yet Moore's confession of intelligence agency involvement published in the MUFON JOURNAL Nos. 259 & 260 **(November & December 1989 ) was a rational, and not a self-inflated gesture. He has also expressed the realization that the "Majestic Documents" as "covertly" released to himself and Shandera, are probably sophisticated disinformation. In Part II of his MUFON paper on these issues, Moore comments:


"Disinformation is a strange and bizarre game. Those who play it are completely aware that an operation's success is dependent upon dropping information upon a target, or "mark", in such a way that the person will accept it as truth and will repeat, and even defend it to others as if it were true. Once this has been accomplished, the work of the counterintelligence specialists is complete. They can simply withdraw in the confidence that the dirty work of spreading their poisonous seeds will be done by others...Every time one of you repeats an unverified or unsubstantiated bit of evidence without qualifying it as such, you are contributing to that process, and every time you do it, somebody in a need-to-know position sits back and has a horse laugh at your expense." (25)


In contrast, Dan T. Smith seems unaware of his abject role in the intelligence game, as he continues to indulge in voluminous email correspondence and fringe press interviews about covert "Aviary" and/or U.S. psy-op agents with "bird" nicknames while continuing at the same time to await a "Messiah" (perhaps himself) who will guide humanity through the final cataclysm of the "Eschaton". Note once again here that these "Aviary" names were originally invented off-the-cuff in 1980 by two journalist/investigators trying to evade possible telephone surveillance. The subsequent adoption of these very names by persons claiming there is an actual CIA "Aviary" is a lot like finding that your current email flame Jane/John Doe-whom you have called "lovey-dovey" just for fun-actually seems to be named Lovey C. Dove and denies any romantic relationship and/or use of the name Jane/John Doe, calling you a disturbed person who is making fun of his/her Baptismal name "Lovey C. Dove" into the Church in 1954 at age nine days. Lovey C. Dove will also have the Church certificate to prove that you simply are a stalker who combs the phone listings for unusual names.

Cute, eh? But down this type of virtual mental corridor lies an immaterial astronomy and freeze of mental function. Follow the details given by the unfortunate Wm. Moore and D.T. Smith at your own peril. For the labels and code names of actual covert projects are changed frequently to prevent detection. If an actual classified document said "Majestic" in 1947, similar classified documents are not designated by the term "Majestic" in the year 2000. Yet certain strategic concepts do remain. For example: "Run it up the pole and see who salutes it."


UNCONVENTIONAL COLLECTIONS?

Is the control of the press on ufos and unexplained phenomena advocated in the Conclusions section, Part III-P, page 7 of the MJ-12 briefing entitled "Government Policy of Control and Denial" actually, therefore, the actual data-control technique of choice used by U.S. intelligence agencies? Or is Dan T. Smith correct when he mentions the strategy of "unconventional collections?"

These agencies seem to "use" the foibles of individuals such as Smith and Moore for diversion and surveillance but have not been observed exerting actual censorship upon the editors of civilian magazines and newspapers. There is no discernable "anomalies blacklist". It seems to be just the opposite. Any and all "outer space" communications are encouraged in order to gather information on maverick thinkers and interest groups. According to former Strategic Air Command personnel, military officers and enlisted persons were asked not to speak of "unexplained" objects on the SAC radar and those pilots who did speak freely of their encounters with unexplained aerial phenomena were lectured or disciplined. (26) But this is not unusual in the military when defense must be maintained. It has a personal impact on the military ufo contactees but is part of a larger strategy. In this context, rational observation assumes a covert investigation project begun under President Roosevelt when the "foo fighters" were first observed accompanying military aircraft during World War II.

In fact, might the paragraph on "control of publications" in the "Majestic" documents betray authorship by an individual or individuals more familiar with governments (Socialist or Royalist) wherein such a direct censorship policy might be more commonly possible? OR, and this is of interest because Smith claims to have been attracted to his philosophical counter-intelligence pursuits by a (female) voice called "Sophia" (wisdom) he began to perceive sometime in the late 1980's, (27) are both Smith and the unknown author(s) of the Majestic hoax actually interdimensional disinformation channels puppeted by hyper-intelligent/ diabolic "remote control"? Are these the impersonations and machinations of the archetypal Lord Ahriman, prince of darkness?

If so, might this confusion (recall that Smith cites chaos theory in his "confession" email) be generated by a force of paranormal "evil" not under the control of any earthly government at all? Perhaps the CIA hitch onto Dan T. Smith by Pentagon employee Ron Pandolfi may simply be the old-fashioned intelligence ploy of somehow getting aboard the run away vehicle simply to see in which direction the wonderland race is now pointing. If this reporter were a strategist for U.S. intelligence, and front office U.S. intelligence had not initiated the MAJESTIC TWLEVE documents, I would advise this "accompanying angel" surveillance. For one sure way for an enemy to destroy a target country or interest group is to create internal conflict. Do not confront the dupes.


Journal of Possible Paradigms - Spring 2001



OPERATION ABJECT
The Majestic Joker Upside Down

By

E. Macer-Story


Intellectual Property Copyright 2000/2001 Eugenia Macer-Story


http://www.elfis.net/rnr/rnrx/abject.htm

1 комментарий:

Kukash комментирует...

OPERATION ABJECT
The Majestic Joker Upside Down

By

E. Macer-Story


Intellectual Property Copyright 2000/2001 Eugenia Macer-Story

In a letter supposedly signed by President Harry Truman on September 24, 1947, Secretary of Defense James Forrestal (1) was notified that "Hereafter this matter shall be referred to only as Operation Majestic Twelve". This rather brief memorandum, perhaps dictated after Forrestal was safely dead, (2) then goes on to state that only the "President, Dr. Vannevar Bush and the Director of Central Intelligence" shall be privy to "Majestic Twelve" operations. It is clear that the number Twelve has occult resonance in these communications stamped "TOP SECRET/MAJIC/EYES ONLY". The Egyptian "gods of time" were said to govern the twelve houses of the zodiac and twelve hours of the traditional clock and to rule these decans majestically. (3) Perhaps the designer of the "Majestic Twelve" caper was aware of Jungian psychology and attempted in this arcane manner to appeal to the "collective unconscious".

It is not clear exactly why the falsified "Majestic Twelve" papers utilize the historical persona of President Harry Truman as versus Franklin D. Roosevelt but this tactic may simply have developed because events within the prominent Roosevelt family would have been more difficult to alter after the fact. However, any secret commission on "ufos" {originally called "bogeys" or "foo fighters"} (4) **during WWII would--like the Manhattan Project which developed the atom bomb --have been authorized initially by President Franklin D. Roosevelt .Secret research into the "foo fighters" would have begun in 1944 or before (whenever they were first seen to accompany aircraft during war maneuvers) and would not have been initiated by President Harry Truman, as the so-called "Majestic" documents purport to demonstrate.




BALLPARK BRIEFING

As stated by Walter R. Mears in a recent Associated Press article, (5) "Truman, as vice president, took office in 1945 when Franklin D. Roosevelt died, uninformed on intelligence matters and unaware even of the project then completing the atomic bomb, which he (Truman) ordered dropped in Japan later that year." For this reason, the CIA now gives ballpark briefings to presidential candidates prior to the election.

According to military records kept by both Axis and Allied forces during World War II** anomalous aerial lights called "foo fighters" were observed before the term "ufo" or "flying saucer" was coined in 1947.," These mysterious balls of light were reported by the experienced crews of American warplanes in both the European and Pacific Theatres in 1944-5. http://www.abductee.net/six/foo_photo1.html These balls of light (flying in V-formations or as a single source) were alleged to follow planes from both sides. (6)

Therefore, since U.S. participation in World War Two was fought under the leadership of President Roosevelt, any "foo fighter & unidentified aircraft" commission would also have commenced under Roosevelt. We do not see Truman named as founding the Atomic Energy Commission and the Manhattan Project. History sees Truman as stepping into the shoes of Roosevelt and implementing the military programs already in process.

For this basic reason, any rational and informed person would conclude that the 1980 issue "Majestic" Documents and associated "cloak & dagger" stuff supposedly set in motion by a "Harry Truman" signature are sophisticated forgeries. There is no convincing evidence a) that these documents are actually regular, sanctioned U.S. Government issue or that b) President Truman founded the U.S. ufo investigation programme. There IS evidence of use of access to U.S. government files and stationary to fake the documents. In his book (TOP SECRET/ MAJIC) (7) Stanton Friedman gives convincing scholarly research which documents the similarity of the "Majestic" documents to known U.S. classified documents and signatures on file and available (after strenuous legal effort) to his intelligent examination. However, Friedman has proven not that the "Majestic" documents are genuinely the inception of the covert "unidentified aircraft" project but simply that these MJ-12 constructions match documents he and others have been able to scavenge from U.S. government files. The forgers could also have scavenged these files and/or slipped forged content into government files when replacing files obtained for inspection.

Does anyone seriously think that, after the lessons taught by elite "moles" such as British art historian Anthony Blunt, (8) covert Soviet KGB asset in the Oxford/Cambridge intellectual scene during World War II and the 1950's Cold War, any sane administrator of a program designed to enhance U.S. national security would place in available record any really "sensitive" covert documents or format? Friedman has probably proven that the fakes match "up front" written records which actually do not have significant covert format. Sir Anthony Blunt, by the way, was never detected in his stratagems. His role as KGB mole was revealed by a colleague who had a sudden change of orientation when applying for a job with the FBI. If these matters did not involve the fate of nations and the probable death and disappearance of a number of individuals, the situation would be downright funny. Because Blunt, a homosexual art critic, was part of a demimonde regarded by the general public as being "eccentric" no one checked him carefully. No one took his possible role beyond the art world very seriously until it was revealed that he had been the key KGB operative in the UK for over forty years. Blunt, stripped of his British knighthood but granted immunity for his description of covert Soviet espionage, died in 1983. But people who worked with Blunt in the British KBB-linked spy network are still very much alive (9) and still may be covertly laughing. But amid all the covert jokes, a mistake may sometimes occur.


WRONG KEY

For several weeks, your perplexed correspondent had been accumulating a pile of reference material on the "working table" beside the computer keyboard but did not have the exact "entry" into this study of the "Majestic" on "MJ-12" enigma. Then while searching for a downloaded file in a folder used primarily to "fast dump" reference material from email correspondence, an unfamiliar icon met the investigative eye.

For some reason, the jpg file of swastika graffiti sent on August 11, 2000 to Alex Burns of Temple of Set for expert identification was presenting itself in two forms, the customary jpg icon-which I had emailed to Alex-and another icon from which a cartoon key was dangling. This looked to me to be a "secure" designation, something which I did not use on the transmission. I clicked on this and it fetched a secure adobe image file. I was fascinated. Either my computer hard drive had been covertly entered by a computer wizard who copied the jpg and accidentally left a duplicate in my folder OR restless poltergeists were active, securing the "black magick" symbols in exact pdf form. I later identified a similar "key" cartoon icon in one mode of the Ipswitch FTP program while saving my play THE OLD GAFFER FROM BOISE from website to disk on Labor Day Weekend 2000.

Well, come on now. I research the paranormal but this was evidently some peculiar intrusion into my hard drive by an individual who recognized the name of the Stockholm, Sweden road given on the file designation and/or knew I had sent the file to Alex Burns.

Burns himself had been actively protesting my designation of Temple of Set as neo-Nazi in a previous article. (10) He did not respond to my request that he identify the swastika graffiti. But ironically the fact that I had openly sent the jpg to Burns for identification indicates that the covert intruder into my hard drive was NOT Temple of Set. Since I had given them the information, they would have no reason to steal it. Alex Burns in his correspondence (11) with this reporter had made the point that "magickal workings" in Germany by Michael Aquino of Temple of Set were not "neo-Nazi" but attempted to place the Nazi phenomenon within the perspective of German occult history. This reporter agrees that U.S. Lt.Col. Michael Aquino's Temple of Set workings, while perhaps misguided, are obviously not the only works of Nordic sorcery now possible in ancient German castles open to the public as monuments.

Later in the day there was a reversion of the entire computer system to hardware coding for a previous monitor . This shift meant that the intrusion into the system had affected more than the single icon. After the system had been rebooted, the cartoon key on the rescued Adobe icon containing the swastika grafitti had vanished and it was manifesting as a normal photo icon like other sized files on my hard drive.So whatever cyber wizardry had entered my system had briefly corrupted the files as does a virus.

As this rebooting event was processing I recalled another, similar event which I had dismissed without comment. One of my text files about Highlander information is labeled "Scots" . Shortly after I had created this file, it fetched with an odd icon which then vanished. It occurred to me then that an intruder might have thought that this was a file containing material on Scott Corrales, a controversial Hispanic ufologist. A few years ago I had discovered unusual messages in Spanish in my laptop computer cache while corresponding with Corrales and thought that if these were not "cyber spirits" there might be email monitoring which was leaving a trace in the cache records.

Additionally, it is interesting that the vintage of software in my laptop-which I had recently used on several business trips-is the same vintage as my more recent desktop monitor had manifested at the time the odd "key" icon caught my attention. Could the intruder have assumed that both machines had the same Windows vintage? Or was the telltale icon simply a product of the intruder's different duplication system?


THE REALCYPHER

Beyond considerations of relative verbal coding-by typewriter or word processing program--there is no way that Stanton Friedman, the Woods duo or any other scholastic researcher working strictly from documents or library materials could serve to "validate" or "in-validate" documents alleged to be "top secret" or "classified". This is simply because-particularly since the days of electronic surveillance and computer cryptography-the actual "top secret" communications of "black world" or highly sensitive documents may not have been stored in any standard cyber-written or simply visual form. A phrase at the top of a "Memorandum For The President" about future communications on some unspecified matter to then General Twining typed by an executive secretary on September 25, 1947, just one day after the supposed signing of the Truman directive to Forrestal, reads simply:"Cryptographic security does not apply". This refers only to the letter of memorandum typed by a secretary as allegedly dictated "over the secret telephone". (12) No statement about "cryptographic security" appears at the head of the MAJESTIC TWELVE PROJECT report. Therefore these documents, if genuine, may contain cryptographic coding, cipher or other privy signals.

The "Eyes Only" stamp on the "Majestic" or "MJ-12" documents is suspect as rogue falsification. With "MAJIC" stamped beside TOP SECRET, the entire shebang looks like a "Dr.Who" stage prop. Or does the "EYES ONLY" stamp on Majestic Twelve context actually refer to the Egyptian "Eye of Horus"?

Actual non-occult classified government documents will be designated with some sober label such as: "Not For Public Inspection", as written at the top of the Index of the 1st Annual Majestic Twelve Project report. However, the stamp "For Official Use Only" at the bottom of the MJ-12 Index would be more appropriate on a product label or "designated area" parking sign.

There is one marking on the Majestic documents supposedly given to William Moore and Jaime Shandera* by covert U.S. government agents in 1980 which actually may be significant as a coded intelligence agency communication. This is the definite "Z" marking used to cross out the words "top secret" on the page headings of the "First Annual Briefing of MJ-12". (13)

During World War II, a hard line covert commission within the U.S. intelligence services was called "the Z organization" and, headed by Claude Dansey, was able to function outside the ordinary uses of cryptography. At that time, the Allied cryptographic codes had been broken by Axis code adepts and, along with the famous Navajo Code Talkers, Dansey's innovative collection of professional artists, playwrights, performers and the like were able to use a variety of creative techniques to circumvent detection by the enemy.

These techniques departed from ordinary written communications into the area of "signal" talk sometimes similar to the "telegraphic" gestures used by actors and shamans. The broad "Z" crossing out "Top Secret" on the original; Majestic document headings conveyed to Moore and Shandera is definitely such a "signal" to those who might be aware of the lore of the "Z organization". What might this overt signal actually mean to informed, intelligence professionals?

After careful consideration, this reporter takes the "Z" marking to be a signal of distress, an esoteric "SOS" accomplished by -in effect-flying the "Majestic Charade" flag upside down by crossing out the words "Top Secret". So what might this survivor of the "Z Org" of fifty-five years ago, a person who may be quite elderly at this time if not an initiated, younger protégé, be trying to signal exactly?

Certainly, first of all, that the documents released as "Majestic" are not "straight" and that no amount of library research is going to do more than validate or invalidate the type-face of a machine from the 1940's which is currently available in attics and antique stores throughout the world. Recall the participation of British art historian Sir Anthony Blunt in espionage and note the participation by playwright Noel Coward (14) in Claude Dancey's "Z Organization" during World War Two. Note also that the employment of these and other creative professionals by intelligence agencies was successful. The "Majestic" documents may seem to be a farce because they are, in inception, constructed by a farceur who could not resist crossing out "Top Secret" on a few of the briefings with a "Z" for Zorro or "Z" for Zed.(Zero).


THE GAME BIT

Getting into the dramatic and farcical mental modality was quite helpful. This reporter began to consider the possibility of a sophisticated disinformation charade and it became obvious that since in many systems of witchcraft "foul is fair" and "fair is foul" (15) a trickster familiar with occult systems might try to reverse terms in some way. As a brainstorming exercise Macer-Story wrote down a list of "opposites" for "Majestic", finally coming up with the word "abject", a term which also contains the central syllable "je".

When "abject" was web-searched, Macer-Story found that there was a Canadian firm ABJECT MODERNITY which manufactures a role-playing game titled "The Stone". In several on-line catalogs this product is described as:" Your link to a person somewhere on this planet. Through Fate, Chaos or Destiny this person was meant to be your Stonemate. There is a sequence of symbols on each Stone that only matches one other. The person who has that Stone was meant to be your partner, your Other in the on-line puzzle called the Enigma."

The similarity between the "enigma" aspect of the role-playing game designed by the firm ABJECT MODERNITY and the "de-coding" of the MAJESTIC DOCUMENTS by various individuals who then play roles as "investigators" of historical paperwork is significant.

When queried, (16) a representative of the company ABJECT.COM made the following statement:


"No, this is not a cult. We can assure you The Stone is an Internet mystery game, and not related to any specific cult or religious group. The company that created The Stone is Abject.com, an Internet company creating toys and games for the web (www.abject.com). The Stone does have puzzles related to 'conspiracy-minded' topics akin to the X-files, so it would not be recommended for younger children. Beyond that, its a great computer game. I've included a press release below describing the dynamics within the site. Please let us know if you require any further information. I would be very grateful if you could inform me as to what sort of referral this was. If there are *questionable* sites linking to our games without proper permissions we would request they be removed. I certainly hope this clears up any confusion!"


Any alert person browsing ads for the role-playing game "The Stone" can detect that-as a game-this product does cross certain interesting interpersonal boundaries. The Stonemate of any player is not necessarily anyone in the neighborhood or even in the same country where the game was purchased. The "clues" given to each player are created or "fictional" but the situation of using these crafted symbols to locate a real, unknown person who also happens to have bought the same game is truly an identification enigma.

The "Enigma" of this role-playing game exactly matches the enigma of the "Majestic" documents. By the use of these created MJ-12 ciphers, available to the players free via Internet download, those engaging in "investigator" role-playing may access and re-interpret historical, technical and news archive material without leaving the comfort of their familiar surroundings. During this process they may find a matching connection with another game-playing individual who shares their viewpoint and may even have stumbled across similar references.

In this way, perhaps, the U.S. National Security is preserved at the expense of fooling only those gullible enough to spend long days and nights in front of supposedly "historical" documents instead of long days and nights walking the real-time line in search of new, original and conventionally-documented data.

But was this Majestic charade actually perpetrated by U.S. government operatives? Or are U.S. operatives now engaged in fielding a role-playing game of uncertain origin which has taken hold of the public imagination?


CELESTRIAL ERROR (17)

Throughout the Oppenhiemer-Einstein paper of the MJ-12 ensemble the word "celestial" is spelled "celestrial". This is fascinating. For when the word is pronounced with an "r" in the third syllable a British pronunciation is obtained. If a typist was taking the scenario from taped dictation, which is quite likely, the person who devised the charade may have been speaking either with a British accent or using "stage English" pronunciation.

Did you really believe that stuff about the significance of the extra "r" in celestrial? If so, you may also believe the statement, made by authors Robert M. Wood & Ryan S.Wood in the "Oppenheimer-Einstein Draft" section of the Index page of their website http://www.majesticdocuments.com , that the spelling errors in the Majestic documents, being natural human mistakes, tend to validate the documents as genuine.

Following this line of reasoning, the sections of the MAJESTIC TWELVE PROJECT 1st Annual Report (undated) which are obviously borrowed from reference works and news articles are completely valid as evidence of covert government documentation of ufo sightings because it is completely natural for a researcher to consult books and magazines and make internally-altered copies of such items for a report.

As this reporter was speed-reading the MAJESTIC document mentioned above, which had been downloaded as a printed scan from the Art Bell net archives, a statement about the legendary disappearance of Flight 19 flying from Fort Lauderdale Naval Air Station in Florida on December 5, 1945 stopped that quick-take process dead cold. There is a significant alteration of data in the second paragraph on page 13 of Annex C from renditions published elsewhere.

In the MAJESTIC version, the "last known radio communication from the instructor pilot was described as heard by a ham operator: "Don't come after me...they look like they are from outer space..." In both the book INVISIBLE RESIDENTS (18) by Ivan T. Sanderson and The book ENIGMAS AND MYSTERIES (19) of the Grolier Encyclopedia of the Supernatural series, the last known communication received by Fort Lauderdale Naval land base from this ill-fated flight of five TBM "Avenger" torpedo bombers was: "We don't know where we are. We think we must be 225 miles northeast of base...it looks like we are..." Sanderson also reports that previous radio transmissions from Flight 19 had indicated gross directional disorientation among the pilots.

According to the Grolier Encyclopedia:" This was confirmed shortly afterward when control overheard conversations between the planes in which crew members refered to instruments in all the planes as 'going crazy'....The planes seemed unable to hear the base transmitter and it became increasingly difficult for control to hear them..."

It seems obvious that a "ham radio" transmission about "outer space" is less relevant in the context of a supposed military strategy report than exact, disoriented transmissions recorded by the Fort Lauderdale Naval Base. If the MAJESTIC TWELVE PROJECT documents are genuine, the United States is in serious danger from inept, internal intelligence-gathering.

Flagged by this information discrepancy in paragraph 3 of page 13 of Annex C of the MAJESTIC TWELVE PROJECT, this reporter back-tracked slightly and took a look at paragraph 2. Upon inspection, it was ascertained that the last two examples of unexplained disappearance of large numbers of military troops during wartime given in this paragraph 2 are exactly the same as the two lead examples in the chapter "Strange Disappearances" (20) which is included in the Grolier ENIGMAS AND MYSTERIES, published in 1976 in England and distributed both in the UK and the USA. The wording is not exactly congruent and one date is transposed by two years from Grolier to Majestic but the substantive content is exactly the same.

The first example of "disappearance of soldiers and their equipment" given in this same paragraph 2-page 13 of Annex C refers the reader to an incident which occurred in the eighteenth century during The War of the Spanish Succession. (1701-14) What significance does this event have to a contemporary resident of the United States of America concerned with unexplained aerial vehicles and national security? Absolutely none. The incident occurred at an unspecified place during the war between European powers which sought to control the Hapsburg succession to the Spanish throne. The closest the U.S. gets to these proceedings is to notice that rights to Newfoundland and Labrador were partitioned as a result by the Peace of Utrecht treaty in 1713.

Following initial mention of the War of the Spanish Succession there is an example given of the unexplained disappearance of French colonial soldiers near Saigon, French Indo-China in 1885. Obviously, the concerns of the individual who wrote paragraph 2-Annex C of this MAJESTIC document were basically formed by an acquaintance with European history and European colonialism. The individual also had access to the Grolier Encyclopedia or other English language "pot boilers of the strange" and filled in the final sentences of the reference with details acceptable to readers of popular English language anomalies literature.

Since this MAJESTIC TWELVE PROJECT "report" actually contains no real, detailed military analysis( pro or con the "ufo" hypothesis) of-for example-the technical performance of the ill-fated Flight 19 aircraft or other such situations, it is wise to dismiss any possibility that the MAJESTIC documents actually functioned as part of a top secret briefing prepared by military analysts during the Cold War. What, then, are these documents?


USE OF THE ABJECT INDIVIDUAL

Dan T. Smith, an individual encouraged by CIA employee Ron Pandolfi to believe he is important to intelligence agency strategy, typifies in his many imbalanced emails about the "soul and the philosophical monad" (21) the deliberate use of marginal, otherwise "abject" individuals to provide a natural diversion from actual covert research and intelligence gathering.

Smith has stated, as regards alleged KGB attempts to destabilize US science, that "our direct knowledge simply does not conform to the rumors of governmental intrigue that you choose to disseminate" (7/9/00)and has also recently given an interview to the online version of PARANOIA magazine during which he describes elaborate U.S. intelligence agency strategy involving an "Aviary" and "MJ-12" motif. The following statements are taken directly from an email posted by Dan T. Smith to an extensive CC list on April 12,2000:


"My best guess is that my personal eschaton gambit has been used as a public reference point by the 'phenomenology network' to prime the pump of unconventional collections(uCC's). Ron's public (22) association with far out stuff opens him up to other off-the-wall, back-channel material that might be of interest to a serious phenomenology effort.

"A phenomenology network has got to keep an eye on all possibilities. It cannot allow itself to become theory driven like mainstream science. Eschatology and immaterialism gives the phenom boys some practice with stretching their minds to the limits of rationality, and maybe beyond. This keeps them on their toes, and on the lookout for things that would otherwise fall between the cracks of conventional collection.

"(On a more practical note, since the uCC mandate countenances domestic collections, it is useful for the agency to keep that door open as a loophole in the legislated restrictions on CC's.)

"There were three substantive influences from my 'handler':

1. A greater credibility afforded to the existence of something like MJ12.
2. The 'sunfish' remark. (23)
3. The partial opening of a political channel.

"The second & third items are most sensitive. They are in potential violation of the prime directive, and so are self-limiting. The result is a glass ceiling over the Aquarium. The aquarium/eschaton can only be given a minimal external nudge. Beyond that, everything has to be spontaneous. Having hit that rather low ceiling, the aquarium is on its own.

"The only way to break through is phenomenally or conceptually. The conceptual breakthough would be the preferred route, as it would minimize confusion. The biggest conceptual challenge is to find an immaterial alternative to astronomy. So far all I have is the feeling that quantum-string cosmology is a big step in this direction. One needs mainly to find a solid mind link to the celestial/cosmological dimension of the developing M-theory. S-P has some promising ideas in this direction, we just need some more metaphysical juice. Such a link would shed new light on the Anthropic problem and the necessary mechanism behind it. After that it is a cakewalk to the eschaton and beyond. Wisely, MJ12 and the visitors play the role of spectator."


Obviously, Smith is a person who-without this "intelligence agency" scenario-would receive very little public attention. Therefore , he can be expected to throw himself into the superficial drama of whatever roles and masques may be suggested in various situations without regard for the more sophisticated artificial consistency of actual covert scenarios.

Smith's rather droll idea of finding an "immaterial alternative" to astronomy is in obvious conflict with his role-playing identification of the MJ-12 characters as "visitors" and "spectators". If astronomy is actually immaterial, as Smith suggests, wherefrom are these "spectators" from outer space except from the conceptually-orbiting strategic office of CIA "phenom boy" Ron Pandolfi?

In this context, it could be argued that William Moore-- the "Majestic" personality who by his own admission invented the so-called "Aviary" nicknames "Falcon" and "Sparrow" for his CIA contacts in 1980 during a telephone conversation "secret name" charade (24) with partner Jaime Shandera-- also fits this "abject except when role-playing" profile. Yet Moore's confession of intelligence agency involvement published in the MUFON JOURNAL Nos. 259 & 260 **(November & December 1989 ) was a rational, and not a self-inflated gesture. He has also expressed the realization that the "Majestic Documents" as "covertly" released to himself and Shandera, are probably sophisticated disinformation. In Part II of his MUFON paper on these issues, Moore comments:


"Disinformation is a strange and bizarre game. Those who play it are completely aware that an operation's success is dependent upon dropping information upon a target, or "mark", in such a way that the person will accept it as truth and will repeat, and even defend it to others as if it were true. Once this has been accomplished, the work of the counterintelligence specialists is complete. They can simply withdraw in the confidence that the dirty work of spreading their poisonous seeds will be done by others...Every time one of you repeats an unverified or unsubstantiated bit of evidence without qualifying it as such, you are contributing to that process, and every time you do it, somebody in a need-to-know position sits back and has a horse laugh at your expense." (25)


In contrast, Dan T. Smith seems unaware of his abject role in the intelligence game, as he continues to indulge in voluminous email correspondence and fringe press interviews about covert "Aviary" and/or U.S. psy-op agents with "bird" nicknames while continuing at the same time to await a "Messiah" (perhaps himself) who will guide humanity through the final cataclysm of the "Eschaton". Note once again here that these "Aviary" names were originally invented off-the-cuff in 1980 by two journalist/investigators trying to evade possible telephone surveillance. The subsequent adoption of these very names by persons claiming there is an actual CIA "Aviary" is a lot like finding that your current email flame Jane/John Doe-whom you have called "lovey-dovey" just for fun-actually seems to be named Lovey C. Dove and denies any romantic relationship and/or use of the name Jane/John Doe, calling you a disturbed person who is making fun of his/her Baptismal name "Lovey C. Dove" into the Church in 1954 at age nine days. Lovey C. Dove will also have the Church certificate to prove that you simply are a stalker who combs the phone listings for unusual names.

Cute, eh? But down this type of virtual mental corridor lies an immaterial astronomy and freeze of mental function. Follow the details given by the unfortunate Wm. Moore and D.T. Smith at your own peril. For the labels and code names of actual covert projects are changed frequently to prevent detection. If an actual classified document said "Majestic" in 1947, similar classified documents are not designated by the term "Majestic" in the year 2000. Yet certain strategic concepts do remain. For example: "Run it up the pole and see who salutes it."


UNCONVENTIONAL COLLECTIONS?

Is the control of the press on ufos and unexplained phenomena advocated in the Conclusions section, Part III-P, page 7 of the MJ-12 briefing entitled "Government Policy of Control and Denial" actually, therefore, the actual data-control technique of choice used by U.S. intelligence agencies? Or is Dan T. Smith correct when he mentions the strategy of "unconventional collections?"

These agencies seem to "use" the foibles of individuals such as Smith and Moore for diversion and surveillance but have not been observed exerting actual censorship upon the editors of civilian magazines and newspapers. There is no discernable "anomalies blacklist". It seems to be just the opposite. Any and all "outer space" communications are encouraged in order to gather information on maverick thinkers and interest groups. According to former Strategic Air Command personnel, military officers and enlisted persons were asked not to speak of "unexplained" objects on the SAC radar and those pilots who did speak freely of their encounters with unexplained aerial phenomena were lectured or disciplined. (26) But this is not unusual in the military when defense must be maintained. It has a personal impact on the military ufo contactees but is part of a larger strategy. In this context, rational observation assumes a covert investigation project begun under President Roosevelt when the "foo fighters" were first observed accompanying military aircraft during World War II.

In fact, might the paragraph on "control of publications" in the "Majestic" documents betray authorship by an individual or individuals more familiar with governments (Socialist or Royalist) wherein such a direct censorship policy might be more commonly possible? OR, and this is of interest because Smith claims to have been attracted to his philosophical counter-intelligence pursuits by a (female) voice called "Sophia" (wisdom) he began to perceive sometime in the late 1980's, (27) are both Smith and the unknown author(s) of the Majestic hoax actually interdimensional disinformation channels puppeted by hyper-intelligent/ diabolic "remote control"? Are these the impersonations and machinations of the archetypal Lord Ahriman, prince of darkness?

If so, might this confusion (recall that Smith cites chaos theory in his "confession" email) be generated by a force of paranormal "evil" not under the control of any earthly government at all? Perhaps the CIA hitch onto Dan T. Smith by Pentagon employee Ron Pandolfi may simply be the old-fashioned intelligence ploy of somehow getting aboard the run away vehicle simply to see in which direction the wonderland race is now pointing. If this reporter were a strategist for U.S. intelligence, and front office U.S. intelligence had not initiated the MAJESTIC TWLEVE documents, I would advise this "accompanying angel" surveillance. For one sure way for an enemy to destroy a target country or interest group is to create internal conflict. Do not confront the dupes.


PROPAGANDA DROP

In this case, the "propaganda drop" onto a "mark" cited by Wm. Moore in his "confession" (28) may not actually be the Majestic papers as handed to Moore and Shandera but Moore's confession itself, during which he lambastes the unfortunate Paul Bennewitz. Incredibly, physicist Bennewitz was derided by Moore during this 1989 "confession" for maintaining an abduction/implant scenario which is-in fact-vitally similar to the scenario now being put forward by abduction researchers David M.Jacobs and John Mack.

In addition, Moore at that time derided Paul Bennewitz' scenario involving the unexplained cattle mutilations of the early 1980's as being "alien" while at the same historical (hysterical?) moment Linda Moulton Howe was revving up and poised to deliver her public accusations against army information officer Richard Doty, a person she claims led her on with statements about U.S. military involvement with the mutilations, extreme statements which Doty later denied making to Ms. Howe. It is common to "believe" Moulton-Howe over Doty. But should we continue to credit this exact scenario? Unexplained animal mutilations have occurred on Long Island (29) and (30) in locations such as Puerto Rico and Chile over a period of twenty years since the first "mutilation flap" in the early 1980's.

During the Spring of 2000 in Chile, there was rumor spread that NASA had come to spirit away certain mutilated animal carcasses which were a result of U.S. genetic experimentation. O yeah? Why should U.S. geneticists experiment in Chile? Isn't this just a bit too neat a game-playing transferal from Majestic to Abject-ick? What about all those provincial people who had boiling goo dumped onto them from "ufo craft" in the rural areas of Brazil? (31) Are the troublesome "MK-12 "documents originally of standard U.S. intelligence agency origin? Or do these brilliantly-forged documents originate with South American and/or UK-based counter-espionage sources perhaps connected to the mercenary black leather and/or drug subculture?

It is possible that in 1980, when U.S. Air Force Security Officer Richard Doty learned he was being nicknamed "Sparrow" by two fringe journalists engaged in inventing "Aviary" nicknames, he also laughed and exclaimed: "OK, I'll play along with it." Moore remarks in his "confession" that Doty (who retired from the Air Force in 1988) seemed to be remarkably flexible and neutral, taking no original stances and following all cues given to him. Most probably, this is because-like actors performing improvisational theater-Doty and other officers were uptaking the scenarios generated by abject disinformants Moore, Moulton-Howe and others and feeding them back their own stuff. As a matter of fact, Security Officer Richard Doty was actually detected generating a false memorandum which was basically a "role-playing" addition to the ongoing "Majestic" scenario being generated by civilians. (32) Why would Doty do this crazy thing? Was he hypnotized by some arcane brainwashing technique? Or was this "unconventional collections", a feeding back into the Majestic hopper of material which might elicit telltale responses from the ufo disinformants? It is very likely that front office U.S. government intelligence did not set out to block physicist Paul Bennewitz so overtly and most probably did not drop the original "Majestic "document microfilm on Moore and Shandera. So part of Security Officer Doty's now legendary task most probably was to elicit information from reporter Linda Moulton Howe which might illumine the "cattle mutilation" disinformation situation for the front office U.S. military. But it was necessary to accomplish this delicate task without harming the abjectly-mistaken disinformers in any way--lest internal conflict be generated in the United States. The U.S. government has not subsequently acted directly to censor even the wildest "disclosures" in the implant/abduction arena. After all, there are laws guaranteeing freedom of speech and of the press in the United States. But these freedoms are not as completely assured in the colonial UK and in certain South American countries where wealthy elitists have sought refuge. Who first actually suggested the "military deception" scenario to reporter Linda Moulton-Howe and her associates before she visited Air Force Security Officer Richard Doty's office? Who might, actually, have wanted to block physicist Paul Bennewitz in 1980? There are three basic possibilities : a) genuine interdimensional and/or extraterrestrial intelligence b) persons committed to a covert drug-oriented and/or electronically-implemented black magickal practice threatened by the disclosures & observations of Bennewitz c) rival corporate electronics wizards developing an electronic implant & control system (33) which they intended to vend internationally to the highest bidder. These possibilities are not mutually-exclusive. Stay tuned.


511 Avenue of the Americas-PMB 173
New York,N.Y. 10011-8436
212-727-0002