-Caveat Lector- *Disinformation and directed-energy* < http://www.total911.info/2007/02/disinformation-and-directed-energy.html >
[http://janedoe0911.tripod.com/disinfo.html] Independent 9/11 scholar Dr. Judy Wood has annotated<http://janedoe0911.tripod.com/disinfo.html>H. Michael Sweeney's "25 rules of disinformation" (as featured by 911truth.org<http://www.911truth.org/article.php?story=20050116064744556>) in light of the debate over the directed-energy weapons used to destroy the World Trade Center. Some excerpts: "3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such 'arguable rumors'. If you can associate the material with the Internet, use this fact to certify it a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis in fact. [e.g.: Use the derogatory terms 'space beams' and 'rabid no-planers', then associate these with the terms 'wild accusations' and 'ad hominem attacks'. (JW, 2007)] 4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues. [e.g.: 'But space beams don't explain the presence of sulfur', (JW, 2007)] 5. Sidetrack opponents with name calling and ridicule. This is also known as the primary 'attack the messenger' ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual deviates', and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues. [e.g.: Use names like 'rabid no-planers', 'space beams', 'space beamers'. (JW, 2007)] 9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect. [e.g.: "I haven't seen any evidence of pulverization on Judy Wood's web site." (JW, 2007)] 12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues. [e.g.: 'Thermite is available on ebay and it is untracable, so I guess we'll never know who did it." (JW, 2007)] 14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely. [e.g.: 'Exactly how much energy would be required to pulverize the WTC Towers?' The authors of the DEW paper are asked this on a regular basis as if there is a question as to whether or not the WTC was destroyed. But, those with other theories who ask this question feel no need to answer the same question themselves. (JW, 2007)] 16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue. [e.g.: We are frequently reminded to pine for the evidence we don't have (the missing steel) instead of looking at the evidence we do have (photos). (JW, 2007)] 19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the 'play dumb' rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance. [e.g.: Thermite cannot explain the cylindrical holes in WTC6 and the toasted cars, so that data must be ignored. (JW, 2007)] 20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations -- as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications. [e.g.:'We have new data (from mysterious and secret samples and test methods) that show strong evidence of possible ___'. (JW, 2007)] 22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively. [e.g.: 'If not able to take over 'Scholars for 9/11 Truth,' then start a new group, 'Scholars for 9/11 Truth and Justice' and establish a new "truth." (But, isn't truth its own defense?)] 23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes. [e.g.: Why would a group of folks want to destroy the organization, Scholars for 9/11 Truth and drag it out for many months with multiple emails a day proposing endless negotiations with no intention of following through on any of them? (JW, 2007)] 24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of theircharacter by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health. [e.g.: Murder the student of a prominent 9/11 researcher. <http://www.total911.info/2006/11/scholars-for-911-truth-timeline.html>(JW, 2007)] ----- -- www.total411.info www.total911.info www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substanceânot soap-boxingâplease! These are sordid matters and 'conspiracy theory'âwith its many half-truths, mis- directions and outright fraudsâis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://www.mail-archive.com/ctrl@listserv.aol.com/ <A HREF="http://www.mail-archive.com/ctrl@listserv.aol.com/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om