-Caveat Lector-

*Disinformation and directed-energy*
< http://www.total911.info/2007/02/disinformation-and-directed-energy.html >

[http://janedoe0911.tripod.com/disinfo.html]

Independent 9/11 scholar Dr. Judy Wood has
annotated<http://janedoe0911.tripod.com/disinfo.html>H. Michael
Sweeney's "25 rules of disinformation" (as featured
by 911truth.org<http://www.911truth.org/article.php?story=20050116064744556>)
in light of the debate over the directed-energy weapons used to destroy the
World Trade Center. Some excerpts:

"3. Create rumor mongers. Avoid discussing issues by describing all charges,
regardless of venue or evidence, as mere rumors and wild accusations. Other
derogatory terms mutually exclusive of truth may work as well. This method
which works especially well with a silent press, because the only way the
public can learn of the facts are through such 'arguable rumors'. If you can
associate the material with the Internet, use this fact to certify it a
'wild rumor' from a 'bunch of kids on the Internet' which can have no basis
in fact.
[e.g.: Use the derogatory terms 'space beams' and 'rabid no-planers', then
associate these with the terms 'wild accusations' and 'ad hominem attacks'.
(JW, 2007)]

4. Use a straw man. Find or create a seeming element of your opponent's
argument which you can easily knock down to make yourself look good and the
opponent to look bad. Either make up an issue you may safely imply exists
based on your interpretation of the opponent/opponent arguments/situation,
or select the weakest aspect of the weakest charges. Amplify their
significance and destroy them in a way which appears to debunk all the
charges, real and fabricated alike, while actually avoiding discussion of
the real issues.
[e.g.: 'But space beams don't explain the presence of sulfur', (JW, 2007)]

5. Sidetrack opponents with name calling and ridicule. This is also known as
the primary 'attack the messenger' ploy, though other methods qualify as
variants of that approach. Associate opponents with unpopular titles such as
'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy
buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual
deviates', and so forth. This makes others shrink from support out of fear
of gaining the same label, and you avoid dealing with issues.
[e.g.: Use names like 'rabid no-planers', 'space beams', 'space beamers'.
(JW, 2007)]

9. Play Dumb. No matter what evidence or logical argument is offered, avoid
discussing issues except with denials they have any credibility, make any
sense, provide any proof, contain or make a point, have logic, or support a
conclusion. Mix well for maximum effect.
[e.g.: "I haven't seen any evidence of pulverization on Judy Wood's web
site." (JW, 2007)]

12. Enigmas have no solution. Drawing upon the overall umbrella of events
surrounding the crime and the multitude of players and events, paint the
entire affair as too complex to solve. This causes those otherwise following
the matter to begin to lose interest more quickly without having to address
the actual issues.
[e.g.: 'Thermite is available on ebay and it is untracable, so I guess we'll
never know who did it." (JW, 2007)]

14. Demand complete solutions. Avoid the issues by requiring opponents to
solve the crime at hand completely.
[e.g.: 'Exactly how much energy would be required to pulverize the WTC
Towers?' The authors of the DEW paper are asked this on a regular basis as
if there is a question as to whether or not the WTC was destroyed. But,
those with other theories who ask this question feel no need to answer the
same question themselves. (JW, 2007)]

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and
you won't have to address the issue.
[e.g.: We are frequently reminded to pine for the evidence we don't have
(the missing steel) instead of looking at the evidence we do have (photos).
(JW, 2007)]

19. Ignore proof presented, demand impossible proofs. This is perhaps a
variant of the 'play dumb' rule. Regardless of what material may be
presented by an opponent in public forums, claim the material irrelevant and
demand proof that is impossible for the opponent to come by (it may exist,
but not be at his disposal, or it may be something which is known to be
safely destroyed or withheld, such as a murder weapon.) In order to
completely avoid discussing issues, it may be required that you to
categorically deny and be critical of media or books as valid sources, deny
that witnesses are acceptable, or even deny that statements made by
government or other authorities have any meaning or relevance.
[e.g.: Thermite cannot explain the cylindrical holes in WTC6 and the toasted
cars, so that data must be ignored. (JW, 2007)]

20. False evidence. Whenever possible, introduce new facts or clues designed
and manufactured to conflict with opponent presentations -- as useful tools
to neutralize sensitive issues or impede resolution. This works best when
the crime was designed with contingencies for the purpose, and the facts
cannot be easily separated from the fabrications.
[e.g.:'We have new data (from mysterious and secret samples and test
methods) that show strong evidence of possible ___'. (JW, 2007)]

22. Manufacture a new truth. Create your own expert(s), group(s), author(s),
leader(s) or influence existing ones willing to forge new ground via
scientific, investigative, or social research or testimony which concludes
favorably. In this way, if you must actually address issues, you can do so
authoritatively.
[e.g.: 'If not able to take over 'Scholars for 9/11 Truth,' then start a new
group, 'Scholars for 9/11 Truth and Justice' and establish a new "truth."
(But, isn't truth its own defense?)]

23. Create bigger distractions. If the above does not seem to be working to
distract from sensitive issues, or to prevent unwanted media coverage of
unstoppable events such as trials, create bigger news stories (or treat them
as such) to distract the multitudes.
[e.g.: Why would a group of folks want to destroy the organization, Scholars
for 9/11 Truth and drag it out for many months with multiple emails a day
proposing endless negotiations with no intention of following through on any
of them? (JW, 2007)]

24. Silence critics. If the above methods do not prevail, consider removing
opponents from circulation by some definitive solution so that the need to
address issues is removed entirely. This can be by their death, arrest and
detention, blackmail or destruction of theircharacter by release of
blackmail information, or merely by destroying them financially,
emotionally, or severely damaging their health.
[e.g.: Murder the student of a prominent 9/11 researcher.
<http://www.total911.info/2006/11/scholars-for-911-truth-timeline.html>(JW,
2007)]
-----


--

www.total411.info
www.total911.info

www.ctrl.org
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!   These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:

http://www.mail-archive.com/ctrl@listserv.aol.com/
<A HREF="http://www.mail-archive.com/ctrl@listserv.aol.com/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to