NWO REVELATION DOCUMENTS



Pay close attention to anything underlined!
I have sub-titled some of the underlined 
paragraphs to bring attention to the intent 
of the wording! 


 Silent Weapons for Quiet Wars
An Introduction Programming Manual 
Operations Research Technical
Manual  TW-SW7905.1 


The following document is taken from two sources. The first, was acquired on a website (of which I can't remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. 

The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. 

As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.
  
If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.
  

Forward

This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the "National Security" by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so. 
 
Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy.

MILITARY DESIGNED CONTROL

It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. 

One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators. 

We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. 

The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that "War" had been declared against them, but would be able to properly identify the true enemy to Humanity.   Delamer Duverus  

Preface 
Conspiracy theories are nothing new to history. Plots to "kill Caesar" and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.
  
PROPAGANDA MACHINERY

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the "Cold War" which called for control of the masses through manipulation of industry, peoples' pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public's attention from what is really going on.
  
The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.  

Table of Contents
• Forward  
• Preface  
• Security  
• Historical Introduction  
• Political Introduction  
• Energy  
• Descriptive Introduction of the Silent Weapon  
• Theoretical Introduction  
• General Energy Concepts  
• Mr. Rothschild's Energy Discovery  
• Apparent Capital as "Paper Inductor  
• Breakthrough  
• Application in Economics  
• The Economic Model  
• Industrial Diagrams  
• Three Industrial Classes  
• Aggregation  
• The E-model  
• Economic Inductance  
• Inductive Factors to Consider  
• Translation  
• Time Flow Relationships and Self-destructive Oscillations  
• Industry Equivalent Circuits  
• Stages of Schematic Simplification
• Generalization
• Final Bill of Goods  
• The Technical Coefficients  
• The Household Industry  
• Household Models  
• Economic Shock Testing  
• Introduction to the Theory of Shock Testing  
• Example of Shock Testing  
• Introduction to Economic Amplifiers  
• Short List of Inputs  
• Short List of Outputs  
• Table of Strategies  
• Diversion, the Primary Strategy  
• Diversion Summary  
• Consent, the Primary Victory  
• Amplification Energy Sources  
• Logistics  
• The Artificial Womb  
• The Political Structure of a Nation - Dependency  
• Action/Offense  
• Responsibility  
• Summary  
• System Analysis  
• The Draft
• Enforcement
 
The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.  

TOP SECRET Silent Weapons for Quiet Wars Operations Research Technical Manual TM SW7905.1 

Welcome Aboard
TO WW3  
This publication marks the 25th anniversary of the Third World War, called the "Quiet War", being conducted using subjective biological warfare, fought with "silent weapons."

This book contains an introductory description of this war, its strategies, and its weaponry.  
May 1979 #74-1120  

Security 
SOCIAL ENGINEERING
It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide. 
 
This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest - it must be understood that a state of domestic warfare exists between said person or group of persons and the public.
  
The solution of today's problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values. 
 
You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. 

Do not deviate from them.  Historical Introduction Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics). 
 
It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.
  
Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.
  
Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.
  
The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.  

Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.


  
Document link:

Direct PDF access:



MAy 14th 2020 Revision - 2
Comments