An Introduction Programming Manual
Operations Research Technical Manual
The following document is taken from two sources. The first, was acquired on a website (of which I can’t remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.
We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.
If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.
The Lawful Path http://www.lawfulpath.com
This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the “National Security” by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.
Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.
We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that “War” had been declared against them, but would be able to properly identify the true enemy to Humanity.
Conspiracy theories are nothing new to history. Plots to “kill Caesar” and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.
Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the “Cold War” which called for control of the masses through manipulation of industry, peoples’ pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public’s attention from what is really going on.
The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.
Table of Contents
Descriptive Introduction of the Silent Weapon
General Energy Concepts
Mr. Rothschild’s Energy Discovery
Apparent Capital as “Paper Inductor
Application in Economics
The Economic Model
Three Industrial Classes
Inductive Factors to Consider
Time Flow Relationships and Self-destructive Oscillations
Industry Equivalent Circuits
Stages of Schematic Simplification
Final Bill of Goods
The Technical Coefficients
The Household Industry
Economic Shock Testing
Introduction to the Theory of Shock Testing
Example of Shock Testing
Introduction to Economic Amplifiers
Short List of Inputs
Short List of Outputs
Table of Strategies
Diversion, the Primary Strategy
Consent, the Primary Victory
Amplification Energy Sources
The Artificial Womb
The Political Structure of a Nation – Dependency
The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.
Silent Weapons for Quiet Wars
Operations Research Technical Manual TM-SW7905.1
This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons.”
This book contains an introductory description of this war, its strategies, and its weaponry.
May 1979 #74-1120
It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.
This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest – it must be understood that a state of domestic warfare exists between said person or group of persons and the public.
The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.
You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.
Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).
It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.
Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.
Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.
The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.
Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.
With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.
Immediately, the Rockefeller Foundation got in on the ground floor by making a four-year grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American Economy. One year later, in 1949, The United States Air Force joined in.
In 1952 the grant period terminated, and a high-level meeting of the Elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy – copyright 1953 by Wassily Leontief, International Science Press Inc., White Plains, New York).
Engineered in the last half of the decade of the 1940’s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.
With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.
The combination was irresistible.
The Quiet War was quietly declared by the International Elite at a meeting held in 1954.
Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.
This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.