Saturday, September 23, 2017
Critical Capsule

0 322

THE STORY OF FUC U’’S MISFORTUNE

 

HI MY NAME IS FUK U.  I’M A CORPORATION.  WELL, “FUK U” IS MY NICKNAME. IT’S SHORT FOR Fukushima Daiichi,  THAT’S THE NAME OF THE PLACE WHERE MOST OF MY BODY PARTS ARE.  I KNOW, WE CORPORATIONS ARE HARD FOR MOST OF YOU HUMAN’S TO UNDERSTAND.  YOU SEE, WE’RE POTENTIALLY IMMORTAL.  SO OUR BODY PARTS AREN’T CONNECTED BY TIME AND SPACE LIKE YOU HUMANS.  BUT HECK, WE’RE ALL PEOPLE !  LIVE WITH IT.  MY REAL NAME IS TOHOKU ELECTRIC POWER. SOUNDS PRETTY IMPRESSIVE, HUH?  I KNOW I COULD’ HAVE LET YOU HUMANS COVER OF MOST OF MY BODY WITH LEAD AND CONCRETE RIGHT AFTER IT HAPPENED, JUST LIKE THOSE DARN RUSSIAN HUMANS DID TO POOR CHERY CHERNOBYL, BUT…FUCK THOSE RUSSIANS!  I KNOW, OH BUT DO I KNOW WHAT YOU’RE GOING TO SAY.   LOOK, HERE’S THE DEAL, THE HUMAN SHAREHOLDERS OVER IN TOKYO AND EVERYWHERE ELSE, WHO OWN ME…YES OWN ME!  I’LL BET THAT SOUNDS WEIRD!  SEE, THE COURTS DECIDED WE CORPORATIONS ARE PERSONS TOO A LONG TIME AGO, JUST LIKE YOU GUYS.  SO I GOT RIGHTS TOO!  THEY’VE DECIDED THAT I HAVE VIRTUALLY EVERY OTHER RIGHT YOU GUYS HAVE, EXCEPT I CAN BE A SLAVE AND YOU CAN’T.  YOU CAN BE A WAGE SLAVE AND HELP KEEP ME ALIVE, BUT NOT A REAL FULL TIME SLAVE.  I THINK THEY THOUGHT THAT IF THEY DID DIDN’T LET ME BE A SLAVE, IT WOULD CAUSE TOO MANY, LET’S SAY, “COMPLICATIONS”.  SO, NOW WE CORPORATIONS ARE BOUGHT AND SOLD ON AN ACTION BLOCK IN WHAT’S CALLED “WALL STREET” IN THE U.S.  BUT BACK TO THE STORY OF MY MISFORTUNE.  IF THOSE SHAREHOLDERS WOULDN’T HAVE GOT THEIR DIVIDENDS, MY CAPITAL WOULD LOOSE SO MUCH WEIGHT THAT MY MASTERS WOULDN’T HAVE BEEN ABLE TO BORROW ENOUGH FUNNY MONEY FROM THEIR LOCAL “ROTHSCHILD CENTRAL BANK” TO CLEAN UP MY MESS AND REBUILD MY BODY!   I’D HAVE TO DIE!  SO WHAT’S A POOR CORPORATION TO DO?  AFTER ALL, CORPORATIONS ARE PEOPLE TOO YOU KNOW?  CORPORATION LIVES MATTER!  A CORPORATION CAN’T JUST UP AND BANKRUPT ITSELF AND THEN GO OUT AND LOOK FOR AN HONEST JOB LIKE YOU HUMAN FOLKS!  YUP, WHETHER YOU’RE A HUMAN MALE OR FEMALE OR JUST ANOTHER NEUTERED CORPORATION, WE’RE ALL PEOPLE AREN’T WE?  WE ALL GOT PROBLEMS.  SHIT!  IF MY MASTERS WOULD HAVE TOLD ALL THOSE WARM HUMANS WORKING INSIDE ME TO LEAVE, AND THEN BURIED MOST OF MY BODY PARTS UNDERNEATH LEADED CEMENT, I WOULD HAVE DIED …BOO HOO, HOO.  MY CHARTER, YOU KNOW, WHAT YOU HUMANS CALL A “SOUL”, WOULD HAVE EITHER BEEN BURNED UP INTO ASHES OR IT WOULD HAVE BEEN BURIED IN AN ARCHIVE SOMEWHERE.   I DON’T REALLY BELIEVE HUMAN SOULS FLY OFF INTO A THEME PARK IN SOME OTHER DIMENSION.  SHIT, I THINK HUMAN SOULS ARE EITHER BURNED INTO ASHES TOO, OR THEIR BODIES ARE JUST ARCHIVED UNDER THE GROUND OR IN A TOMB SOME WHERE.  SO WHAT COULD I DO?  NOTHING, WHAT ELSE COULD A GOOD UPSTANDING CORPORATION DO?   WHAT WOULD YOU DO, IF Y0U KNEW THAT IF YOU DID ANYTHING, YOU’D DIE?   SO, GIVE ME A BREAK FOLKS!  KNOW, YOUR TELLING YOURSELF NOW THAT PROBABLY ALL BECOME EXTINCT BECAUSE OF ME.   WELL… AT LEAST IT WILL BE YOUR DESCENDANTS WHO BECOME EXTINCT, AND MAYBE EVEN MOST BIOLOGICAL LIFE ON THE PLANET.  BUT WHAT THE HEY HUMY,  IN JUST 30,000 YEARS ALL THAT NASTY RADIATION WILL BE ALL GONE FROM THE OCEAN AND THEN REAL GET DOWN BOOGIE TIME WILL START ALL OVER AGAIN.  FIRST FROM TINY MICROBES AND BACTERIA AND THEN IN NO TIME, PROBABLY LESS THAN A 100 MILLION YEARS YOU GUYS’LL BE BACK ON THE PLANET AGAIN SPAWNING NEW CORPORATIONS AND WE ALL CAN START FUCKING UP THE PLANET ALL OVER AGAIN.  SO’S, DON’T WORRY, ITS NO BIGGY.

0 574

By Arman Matthews

While giant corporations plunder assets and resources abroad, they use government to economically suppress the rest of us at home, Buckminster Fuller concluded in 1981. * By the 21st Century, Fuller’s observation became common knowledge by that part of humanity not asleep at the wheel. The price, each has paid for this knowledge is revulsion, but revulsion won’t stop plunder and oppression, action alone can dissolve the source of our disgust.  However, action without understanding the hows and whys is like sailing without a rudder.  If we wish to undo what’s been done, we must first understand, as Fuller suggested, how it all came about in the first place.  How could a number of businesses that share a common form of business organization, have developed the size and power to enable them in league to become the scourge of humanity?

Most scholars find the seed of corporate gigantism in the Supreme Court case of “Southern Pacific Railroad vs. Santa Clara County” in 1878. A careful examination of this case and its background will provide an invaluable first step toward understanding how this situation came about in the first place.

BACKGROUND

Imagine, for a moment, that someone attending the Constitutional Convention has suddenly shouted, in the midst of a debate, “Hey guys, after we finish debating, don’t forget to include in this constitution that corporations are persons with the same rights of citizenship as natural persons!”  Without a doubt, guff offs would fill the room and laughter would prevail. Paradoxically, however, as a result of a compromise, the framers did insert an equally absurd concept regarding personhood into the Constitution and no one laughed or chuckled. That was the denial that Negro slave’s were persons entitled to the same rights of citizenship as other citizens in the United States. The assumption of the Declaration of Independence and the Constitution was the rights of men, been a statement was inserted in the Constitution saying some men didn’t have rights. This absurdity soon became a festering flaw in the nation’s firmware and eventually metastasized and consumed the body politic in civil war.

*

The Framers, and the humans for whom they wrote, were well aware of what damages to their wellbeing and country corporations could wreak. As a result of their distrust, states chartered corporations only for specific purposes determined by their legislatures to be in the public interest (e.g. building canals). Corporations were never chartered to just make a profit.

States chartered corporations long before they formed a Union. So, the right to charter corporations as they saw fit became a right reserved to the states by the Tenth Amendment: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, Reserved to the states respectively, or to people.”  Prior restraints included in state corporate charters, included the following major limitations: duration (30 years or less), number of owners, and amount of their aggregated capital. The states also imposed other regulations as well as taxation, along with counties and cities. When a charter expired, corporate assets were distributed between shareholders, who were also responsible for any remaining liabilities, debts or wages.

        *         

Because Lincoln was a moderate abolitionist, the South walked out of Congress after his election in 1860. Without a Constitutional quorum, Congress is required to adjourn. However, according to parliamentary law, before adjourning, it first must set a date to reconvene.  This never happened, so Congress adjourned sine die* (without a day), meaning Congress no longer existed, since there was no parliamentary means of reconvening.  Lincoln, determined to hold the union together and left with no Congress to declare war, while the South readied for war, fabricated Martial Law by declaring a national emergency and issuing executive orders. This sequence of events placed the organic Constitutional government in suspended animation, and replaced it with a new de facto military government with the President as Commander in Chief. 

While, Lincoln seems to have planned on restoring the Constitutional Republic after the Civil War, he never had the chance. His death morphed a Civil War into a Revolution and, as did Rome after the assassination of Caesar, the Republic became an Imperial State. The same de facto government has remained in power over the North American union of states to this day.  With the Constitution no longer in place holding the body politic together, executive orders, legislation and the courts replaced that organic firmware and so began a process of continually remolding the nation’s legal landscape into whatever shape would preserve the existing de facto government at the moment. *

The Nation’s power center shifted, after the Civil War, from the Southern slave states to the corporate capitalist class in the Northeast. The new Congress was now dominated by a new breed of Republicans who were extremely contemptuous of the Constitution and more interested in promoting the business interests of the Eastern corporate establishment than in restoring the country to normalcy.  Congress quickly turned into a cross between a whorehouse and an auction. For instance, instead of giving 40 acres and a mule to the former slaves, they gave the railroads enough prime farmland within the states to equal two Germany’s. 

The liberal Republicans disliked Lincoln’s successor, Vice President Andrew Johnson, because he insisted on carrying on Lincoln’s compassionate policy of reintegrating the South back into the Union, rather than treating it as an occupied country.  The new Republicans, however, were receptive to Johnson’s second main objective of putting closure on the slavery issue and insuring that the freed slaves unalienable rights, as citizens, were protected from abuse by the states.  Johnson’s two new Amendments to the Constitution received a good reception.   For, while they were intended to mend the Constitution’s fatal flaw, regarding personhood, they would eventually play into the hands of the liberal Republican’s corporate masters.  Johnson’s two new Amendments were easily ratified in 1866 and 1869, and  subsequently, Johnson was impeached.

The Thirteenth Amendment made slavery illegal. Besides benefiting the slaves, it also benefited the Eastern corporate establishment in two important ways:  Slaves are a major capital investment in a Capitalist slave economy, and though they generated a large monetized profit for their owners, the monetized cost of maintaining them was enormous.  Each slave required food, shelter, clothing, healthcare, and other miscellaneous necessities,  for their “owners” can’t let them become ill or expire, least they lose their capital investment.  On the other hand, a wage-slave requires no maintenance except during the period he’s paid wages to be obedient. Thus the profits made from wage slaves are considerably higher than from chattel slaves.  Finally,  since the monetized market rate for a wage slave’s time is the supply of wage-slaves selling their time, relative to the number of employers bidding for that time, if the demand remains constant, and the quantity of wage slaves selling their time on the market increases, the market price for a wage-slaves time will decrease.  Thus, by turning chattel slaves into wage slaves, enormous profits were to be made.  If the wage slave isn’t paid enough to cover his own, or his family’s food, shelter, clothing, healthcare, and other miscellaneous necessities , that’s no problem for the employer for there will always be another wage slave, waiting in the wings, happy to sell his time to the employer.  The Union’s victory thus opened up a vast reservoir of new profits for the corporate establishment.

The Fourteenth Amendment, put the former chattel slaves on a level playing field with all citizens of the U.S. “A level playing field” is a metaphor for “Fairness”: When everyone plays by the same rules, everyone gets an even break. The 14th Amendment, mandated thatno state may make or enforce a law which abridged the Constitutional privileges or immunities of citizens or deprives any person of life, liberty, or property without due process of law, or denies any person within its jurisdiction equal protection of the laws.”  In spite of its noble motive, within a few years, the Fourteenth Amendment would be twisted, by subterfuge, within the Supreme Court, into a tool for corporations to escape the prior restraints enforced on them by states, and protected by the Tenth Amendment.  

Having made vast fortunes supporting the Union during the Civil War, the owners and management of the railroads, and several other corporations, were well armed, by the ‘70s and ‘80s, with batteries of lawyers, and would fight relentlessly to expand their powers, while the courts, reflecting the new era,  would give them everything they wanted.

*          *          *

In Part 2, we’ll examine the event itself (The Supreme Court case of “Southern Pacific Railroad vs. Santa Clara County”) which gave birth to the Corporate expansion and dominance.

END

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

To this day, apologists for corporate personhood, still refer to “Union Pacific Railroad vs. Santa Clara County” as the Constitutional authorization of corporate personhood. For example, we read in the Seattle Law Journal,

The subject of corporate personhood is a longstanding and recurring topic that continues to vex and excite,  as seen in the U.S. Supreme Court‘s 1886 decision confidently asserting that corporations are legal persons for purposes of the Fourteenth Amendment and in its more splintered 5–4 decision granting corporations First Amendment free speech rights in 2010. *

This is not merely a careless disregard for facts an instance of willful blindness. So many people now have vested interests in this lie that none dare rock the boat.  Nonetheless, the historical records still tell a quite different story.  

**

1388

Shortly, after ratification of the 14th Amendment, corporate lawyers for the railroads saw a way to escape state regulation and taxation.  If they convinced the Supreme Court that corporations are “persons”, they could twist the intend of the 14th Amendment into denying states the right to enforce chargers which abridge the rights of corporate person without due process of law, thus freeing their corporate masters form the 10th Amendment’s protection of state supervision. So they constructed the following argument template: (a) The 14th Amendment guarantees protection of all person’s Constitutional rights under the law. (b) A corporation is a person. (c) Therefore, corporations must receive the same protections that are accorded to all other persons in like circumstances. Although this argument makes a syllogism, its second premise is unwarranted. No previous decision by the Supreme Court has ever justified that claim.  Nevertheless, the Railroads use it as a battering ram, repeatedly using this argument over and over again, whenever possible, against different states, counties and cities.

In 1877, California ratified a new constitution that included a provision giving humans the right to deduct their debts*6 from the taxable value of their property.  Railroads weren’t given the same deduction. So, Southern Pacific wouldn’t pay San Mateo’s County its taxes.  Along with other taxpaying railroads, Southern Pacific challenged this new state law in court by using another federal statute giving them privileges inconsistent with state taxation.  San Mateo County and neighboring counties struck back and won a counter suit in the California Supreme Court.  Southern Pacific’s in turn twisted a Federal law designed, like the Fourteenth, to protect the rights of newly freed slaves denied justice by  Southern  courts, by tacitly assuming corporations were legal persons and inserted themselves as victems of state injustice and appealed the case all the way up to the Supreme Court.

Just three years before Southern Pacific’s case reached the Supreme Court, the Chief Justice gave the following explanation for the majority opinion regarding the 14th Amendment:

“One pervading purpose [for the Fourteenth Amendment] was the freedom of the slave race, the security and firm establishment of that freedom, and the protection of the newly made-made freeman and citizen from the oppression of those who had formerly exercised unlimited dominion over him.” * *Justice Samuel F. Miller

Nonetheless, before the Southern Pacific’s case reached the Supreme Court, the
Court would hear four more cases used the 14th Amendment template. Finally in 1886, the Court heard “Santa Clara County vs. Southern Pacific Railroad”.  Perhaps because the Southern Pacific’s lawyers appeal had tacitly assumed corporations are 14th Amendment persons, the new Chief Justice, Morris R. Waite, a former railroad attorney, made this prefatory remark,

The Court won’t consider the question of whether the provision in the Fourteenth Amendment to   the Constitution, which forbids a state to deny any person within its jurisdiction equal protection under the Constitution, applies to these corporations. We are all of the opinion that it does.

A year passed before Waite could announce the court’s decision in favor of Southern Pacific.  While, one of the six defenses Southern Pacific used used was standard Fourteenth Amendment template, it was ignored and the actual decision was based on an argument involving the placement of the company’s fences.  Afterwards, the Recorder of the Court, J.C.Bancroft Davis, who just happened to previously been president of the Newburgh and New York Railway, rushed up and passed Waite a note asking him if his prefatory statement, before hearing the arguments, could be inserted into the Court’s headnotes. Waite replied, “I think you’re expressing with sufficient accuracy what was said before the arguments began in the California Rail Road tax case. I leave it with you to determine whether anything need be said about it in the report inasmuch as we avoided meeting the Constitutional question in the decision.”  So while Waite’s remark seems reasonable enough, considering the nature of Southern Pacific’s appeal, this was all Bancroft needed and he rushed back to his office and inserted the following headnote:

The defendant Corporations are persons within the intent of the clause in section One of the Fourteenth Amendment to the Constitution of the United States, which forbids a State to deny to any person within its jurisdiction the equal protection of the laws.

We’ll probably never know whether Waite and Bancroft were in collusion. Waite died before Bancroft’s headnotes were published. While Headnotes are seldom followed, the Supreme Court has since, repeatedly reaffirmed them and Corporate apologists consistently gloss over Bancroft’s misrepresentation. Both take the Headnote remark as a declaration of the court ipse dixit*3. Here this means, “The Court declares this claim to be intrinsic and unchangeable.” The following contemporary statement is a typical example of this maneuver,

The subject of corporate personhood is a longstanding and reoccurring topic that continues to vex and excite as seen in the 1886 decision confidently asserting that corporations are legal persons for purposes of the 14th Amendment.*4

While this caveat is still the primary justification for Bancroft’s indiscretion, in present day legal and administrative decisions the term ipse dixit is generally used to criticize arguments based solely on the authority of the speaker. After all, “Ipse dixit” (Latin for “he himself said it”) is called in Logic an informal fallacy (“Argument to Authority). This claim is based solely on the Authority of the Speaker. In other words, regardless of the issue of Waite’s falsification, Waite’s prefatory statement is not based on a majority decision by the court, but is merely an arbitrary,  dogmatic statement.  In Bancroft’s personal notes, later discovered in the Twentieth Century, was found his own admission of falsifying the Court’s Headnotes.  After sixty years, one Supreme Court Justice (William O. Douglas) finally admitted, “There was no history, logic or reason given to support that view.”

Within a couple generations, the Supreme Court  removed all the prior restraints in state corporate charters. Corporations were no longer restricted to a limited duration, or shareholder liability, number of shareholders, nor the amount of capital aggregated.  Some corporations were even granted the power of eminent domain.  With no restraints, giant immortal super goliath corporations possessing legal personalities separate from the collective they represented, and which modern humans are compelled by their de facto government to pretend as if they are real, began emerging from the unleveled commercial playing field called America.  In the end, the old festering flaw was merely replaced by a new one and the people were turned into wage slaves serving imaginary corporate masters at the behest of a de facto government whose sovereignty derived from its military

 

  • * *

The Constitution is constructed on the premise that a government’s sovereignty derives from the consent of the governed.  A well-balanced government, it follows, is obliged to protect the unalienable rights as the benefactors to whom it owes its sovereignty.  In effect, the Bill of Rights can be seen as a contract between the government and the people, that its obliged to honor by protecting the unalienable rights of the governed from abridgement. 

 

Jefferson certainly saw the Bill of Rights as was a contractual agreement guaranteeing their government wouldn’t abridge their rights. Indeed, if you read the Declaration of Independence carefully, you’ll first see that it’s meant to apply to all governments and can be applied just as easily to the newly formed government under the Constitution. Secondly, we can discern a pattern of reasoning here called modus ponens : P implies Q, P therefore Q. The three parts of the Declaration can be understood in this manner:

 

(P) If any form of government becomes destructive of our unalienable rights of life,

liberty, and the pursuit of happiness, then (Q) it is the right of the people to alter or to abolish it, and to institute new government.

(P) The government of the king of Great Britain has shown itself to be destructive of these rights (as shown in a long list of grievances).

Therefore (Q), these United Colonies are, and of right ought to be free and independent States.

 

A contract can’t be a contract if one party is immune from the consequences of breaking it.  This is the point of the Declaration, and the justification of Jefferson’s assertion that, “If a law is unjust, a man not only has the right to disobey it, but the duty.”

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

* Grunch

*1 Inventor, architect, engineer, geometrician, cartographer and philosopher

*2

*3   Grunch

.*4 Sattje

* Southern capitalist slave-owners dominated the Union’s government until the mid-nineteenth century. In Presidential election of 1860, a rapidly growing anti-slave movement finally reached its boiling point. Lincoln, a moderate abolitionist Republican ran against three pro-slavery candidates. The South threatened walking out of Congress, should Lincoln become President. Lincoln won and after he took office, the South walked out of Congress and its quorum, for conducting business under the Constitution, was lost. The only lawful vote Congress could then take was to adjourn and set a date and time to reconvene. Congress, however, simply left without setting a date to reconvene. Thus, according to parliamentary law left Congress sine die.* Lincoln, determined to hold the union together and without a Congress to declare war, improvised a martial law by issuing executive orders*4 This gave the president unprecedented powers and removed the executive branch from the other branches. His first order initiated the creation of an army. His second, ordered Congress to reconvene. This was a result of a military order and not due to parliamentary procedure. Finally he ordered Congress to pass a bill justifying what he’d already done.

Unfortunately, Lincoln’s assassination prevented him from restoring his hastily created de facto government back to its original firmware. Unfortunately

Vice President Johnson’s attempt to carry on Lincoln’s policies was stopped by a new breed of Republicans that began dominating Lincoln’s Congress. No longer old school abolitionists, they were pro-capitalists representing the interests of the Eastern industrial establishment. They impeached Johnson and General Grant became the new President.

 

 

 

 

 

 

 

No one knows who, if anyone, runs it, since it’s decisions are made in back rooms. Grunch didn’t invent this world, he says, it never invents anything, but monopolizes know-where and know-how while being devoid of know-why. Today much of this information has become common knowledge and this corporate complex of giants is usually referred to as the “Oligarchy”.  

 

“The Grunch of Giants.*1 

 

*22 Fuller maintained that a complex of “giant persons” controls politicians, world banks, and world events, as well as a vast invisible empire of airwaves, satellites, factories, research laboratories and large cities

 

*Ratified in 1868All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the state wherein they reside.  No state shall make or enforce any law, which shall abridge the privilege or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law. Nor deny any person within its jurisdiction the equal protection of the laws.”

 

 

maintaince to generate monetized income to employ nonliving capital generate monetized income. in the   When we compare the non-monetized cost of chattel slave-capital maintenance is measured monetarily, is enormous in comparison to monetized cost of employing wage slaves to generate monetized income.   a monetized cost of wages is expressed in monetized terms, the cost far outweighs the monetized cost of wages.

 

0 910

By Ernest Stewart
“If you listen to the hysterics, you would think that the Statue of Liberty will shortly be under water and the polar bears are all drowning, and that we’re dying from pollution. It’s absolutely and utterly untrue.” ~~~ Rand Paul

 

Perhaps you’ve noticed over this last year, global warming deniers have been spouting phony facts and figures, saying global warming has been on a “hiatus” for the last few years. What that means is the enemy is now grasping at straws to let the polluters off the hook! The deniers are beginning to feel as Tom Lehrer said in “Send The Marines “Like a Christian scientist with appendicitis,” not a good feeling, indeed! These deniers come from two different camps. Those who know better and aren’t really deniers, but are being paid by the polluters to be deniers. The other group is Fox News viewers who are far too stupid to take the time for a little research, and like others to do the thinking for them, so they don’t have to do it for themselves! As Simon and Garfunkel explained in “The Boxer,” “Still a man hears what he wants to hear and disregards the rest!”

In the journal Climate Change journalists, Bala Rajaratnam, Joseph Romano, Michael Tsiang, Noah S. Diffenbaugh make it perfectly clear that the so called hiatus is pure bull sh*t! Here’s a brief synopsis…
The reported “hiatus” in the warming of the global climate system during this century has been the subject of intense scientific and public debate, with implications ranging from scientific understanding of the global climate sensitivity to the rate in which greenhouse gas emissions would need to be curbed in order to meet the United Nations global warming target. A number of scientific hypotheses have been put forward to explain the hiatus, including both physical climate processes and data artifacts. However, despite the intense focus on the hiatus in both the scientific and public arenas, rigorous statistical assessment of the uniqueness of the recent temperature time-series within the context of the long-term record has been limited. We apply a rigorous, comprehensive statistical analysis of global temperature data that goes beyond simple linear models to account for temporal dependence and selection effects. We use this framework to test whether the recent period has demonstrated i) a hiatus in the trend in global temperatures, ii) a temperature trend that is statistically distinct from trends prior to the hiatus period, iii) a “stalling” of the global mean temperature, and iv) a change in the distribution of the year-to-year temperature increases. We find compelling evidence that recent claims of a “hiatus” in global warming lack sound scientific basis. Our analysis reveals that there is no hiatus in the increase in the global mean temperature, no statistically significant difference in trends, no stalling of the global mean temperature, and no change in year-to-year temperature increases.
Yes the “hiatus” is just another version of the Big Lie, something the Rethuglicans have been using for years to get reelected — because the Sheeple will believe anything once it’s drilled into their tiny little heads. As old Joseph Goebbels made clear:
“If you tell a lie big enough and keep repeating it, people will eventually come to believe it.”
He then went on to explain:
“The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”
And Joseph should know as he was Hitler’s spokes-weasel and head of propaganda. Like Obama’s spokes-weasel, James “Jay” Carney’s reassurance that Barry’s Trans-Pacific Partnership won’t steal millions of American jobs like NAFTA did. They know it’s a lie; but after a while, the Sheeple start to believe it, and defend it even in the unemployment line when their jobs go to a worker in Vietnam who’ll be happy to work for 10% of what they made. The only difference between the two lies is climate denial will someday get all of us killed!

*****

0 954

 

 

We call whatever follows the Late Modern Era “Post Modern”.

All we can be sure of, however, is that it’ll be based on a Post Mortem.

 

Arman Matthews

 

Part I of this article is a necessary introduction to Part 2 and a must read.  Otherwise, Part 2 will not stand alone.  The purpose of these two articles is not to provide a prophesy but rather to lay out the dynamics that drive social arrangements in human society to a breakdown of civil order.  Such an event is the natural way a healthy society self-corrects its social arrangements to regain a more user friendly civil order.  In so doing,  it’s hoped that the reader will gain some fresh analytical tools to aid in deconstructing propaganda from the Defense Department suggesting that the  eventual civil disorder on the horizon, in the U.S., will be caused by “self-radicalized” individuals intent on undermining our so-called Constitutional protections.  This claim serves only to give the Military a moral warrant,  in such a scenario, to assassinate U.S. citizens at will.  The absurdity of such a claim is made obvious by the simple fact that most of the population of the United States are already living in what has been declared a “Constitution Free Zone” by the Department of Homeland Security, and therefore the DHS itself, has become an enemy of the Constitutional protections guaranteed to all citizens of this country.   Presumably, we’re supposed to be too stupid to catch such lapses of logic.

                   *                  *                  *

Over millions of years, our central nervous system evolved an extremely sophisticated control system that, in effect, is a biocomputer. While the central nervous system used information to process energy, the biocomputer uses energy to process information, and instead of processing low entropy matter into energy for its organism; the biocomputer processes sensible data into information for its memory. In effect, nature flipped homeostasis from operating on the entropy equation in physics, to operating in reverse,  the information equation. Nature went high tech.

 computer-brainHomeostasis is the predisposition of an organism  or a cell to regulate its internal conditions, usually by a system of feedback controls so as to stabilize  health and functioning, regardless of the outside changing conditions . The process of homeostasis in the organism animates the system and so we say it is “alive”. By flipping the equation in the biocomputer, “Homeostasis” became the predisposition of a biocomputer to regulate its internal conditions, usually by a system of feedback controls, so as to stabilize cognition, regardless of changing conditions on the outside Analogously, the process by which homeostasis animates the biocomputer, we call “Consciousness”. Consciousness is the function of the biocomputer, as life is the function of the organism. While a properly running organic system is said to be “Healthy”, a properly running biocomputer is said to be “Cognitive”.   If the organism’s health receives an “insult” or is damaged in some way, it feels feedback in the form of pain or discomfort, by which it initiates a process of mending, or healing, itself back to a whole. If the animated biocomputer’s cognition receivers an insult or is torn in some way, it feels feedback in the form of uncertainty or uneasiness, by which it initiates a process of mending, or thinking itself back to a whole. Although “pain” and “uncertainty” are forms of negative feedback, they’re positive sensations, in the sense that we feel them. In other words, as long as we aren’t feeling pain or uncertainty, we assume we’re healthy and cognitive.

 How does the biocomputer compare to the solid-state artificial computer? Just as the body is animated when it’s alive, so the brain is animated when it’s conscious.  Biocomputer intelligence is only operative in an animated biocomputer. It is therefore an attribute of consciousness. An inanimate biocomputer has no intelligence. “Artificial Intelligence” is a myth. What’s called “Intelligence” in inanimate computers is imbedded programming in an operating system. So called “A.I.” only obeys commands, it can’t question the legitimacy of its commands or be given a problem and then question why it’s a problem in the first place and then decide its not a problem and not obey its commands. Biological Intelligence in the consciousness of the animated biocomputer is a general problem solver and can, by intention, direct its own information processing.  Biological Intelligence is autonomous and is capable of reprogramming itself and even installing a new operating system. A.I is an operating system is tethered to following commands. In order to get a biocomputer to operate like an inanimate computer with artificial intelligence, the biocomputer’s body must be enslaved and or its biocomputer must be “brain washed”.  The fact that artificial intelligence in an inanimate computer can usually beat a biological intelligence in an animate biocomputer at chess has nothing to do with intelligence per se or “intuition” (which is another mythical property of Artificial Intelligence). Chess consists of a finite universe of moves. The biological computer is not equipped to hold such a large number of possible moves in short term memory and so must move at some point by intuition. The inanimate computer doesn’t have such a problem because it is not operating consciously. Therefore, storage of such a large finite universe of moves is not a problem, and because of its speed of processing, it appears to be making decisions. In other words, chess for an inanimate computer with Artificial Intelligence is nothing more than an extremely complicated game of tic tac toe. Should both computers be matched in a game involving an infinity of possible moves and variables, the inanimate computers “intuition” would fail. Ultimately, the superiority of an animated biocomputer’s intelligence over an inanimate computer’s intelligence lies in the formers ability to be disobedient.

 

brain waves

 

 300px-Ai_integrationWhile an artificial intelligence can be the operating system for several other operating systems, they can be only modules of the central intelligence.  Artificial intelligence is good for the network of a robot.  However, Biological Intelligence requires an operating system that is shared by all biocomputers who occupy a certain space in addition to their own autonomous operating system (which is homeostasis).  That way all autonomous biocomputers can share a social operating system that facilitates interaction, exchange, commerce, and all other common activities unique to animated biocomputers sharing the same physical space. This is a natural necessity since the organisms that support them tend to survive by sharing the same physical space with other organisms of the same species.

 

capacity_of_wireless_channels_and_networks

In insects such as ants, bees, termites and so on, the social operating system is dominant and the individual operating system is basically programed by the social operating system. In more complex animals, herding animals, such as sheep, cows, horses, etc. still have a dominant social operating system, where as other animals such as lions, elephants, and apes the relation between the individual and the social is more balanced. Lions tend to have prides, with a few males and multiple females, yet male lions without prides will go off on their own. With humans, neither is dominate by nature. Humans can exhibit herd like behavior, or live in relative seclusion. Tribal behavior usual has social operating systems called “Mores”, but built into these systems is punishment for organisms whose biocomputers lead them to break the mores.

Primitive biocomputers had multiple “I”s. This made it easier for the social operating system to dominate the individual biocomputers. Primitive peoples would often hear voices talking to them and identify those voices with gods. As they consolidated their gods into one, so their self-development as biocomputers correspondingly centralized control of the animated biocomputer into one single super consistent self-programmer. Thus conscious directed, or volitional, programming became “I” actions, and social directed programming became “Me” actions. By this time in human development, a common biocomputer dysfunction is to display multiple “I”s and is considered a “sickness” and is called “schizophrenia”, or “multiple personality disorder.”

Once self-control was achieved through consolidation of “I”s and the biocomputer became relatively autonomous, mores weakened. However, the need for social operating systems still existed more than ever. Human behavior had become a mix between “I” driven actions deriving from conscious volition of animated biocomputers, and “Me” driven actions derived from social programming.  No human can escape this dual nature and so human behavior becomes a dialectic between the two. Multiple biocomputers that share a common space must have a common operating system to solve common problems. The common operating system not only facilitates mutual interactions, transactions, commerce, and norms but also limits the inferences that can be drawn, the problems that can be solved and even the statements that can be made about such problems that make sense.   Insofar as humans share a common operating system, they must play by the rules or the system won’t work.

Since biocomputers achieved autonomy, their common history has consisted of changes in social operating systems over the ages. We tend to map our history like geological eras, or archeological eras, where in find certain commonalities between shared operating systems over centuries, with certain variations downloaded progressively over the years, until there is a major shift, which we sometimes called a “Paradigm Shift”, in which a completely fresh social operating system takes hold and a new era begins.  For instance, our own era can be broken down into early Modern times, or “Modernity 1.0”, Middle Modern Times or “Modernity 2.0”, and late Modern times, or “Modernity 3.0. This has era of the Modern social operating system has about run its course after a period of around 600 years.

In Part 2 we will attempt to understand the dynamic that drives the continual change of social operating systems over the millennia and why it is happening now.

 

 

 

To be continued

 

 

 

 

 

 

 

 

2 1299

Arman Matthews

TRUE BELIEVER NOTICE:        

THIS IS NOT A “THEORY”,  THIS IS AN INFERENCE BASED ON  AVAILABLE EVIDENCE

Jade Helm is a part of a larger military scheme that was included in the 2014 NDAA Budget. (The NDAA Budget is the National Defense Authorization Act that funds the US military). This operation covering Jade Helm is the largest one for involving military operations. Sit rep Phase 0 is about identifying potential threats.  Its funding is found in the following part of the budget:

Section 1074—Pilot Program for the Human Terrain System. This section would require the Secretary of the Army to conduct. a pilot program to utilize Human Terrain System assets in the U.S. Pacific Command area of responsibility to support Phase 0 shaping operations and to support the theater security cooperation plans of the geographic combatant commander.  

Phase 0 gets disproportionately the most funding.  In combat operations there’s usually 5 phases of combat. However, Phase 0 operations is relatively new.   The NDAA 2014 Budget provides for increasing the budget for phase 0 operation.   Here are some of the corporations participating:

 

List of Corbs good Phase 0 operation involves employing infiltration techniques to identify who’ll be a problem before fighting even begins. This is why special ops dressed as civilians will be moving around in local populations. The cover story, Mark Lastoria, Army Special Operation Command spokesman gave the press and public meetings is that some Special Ops will be testing to see if they’ll be identified. The Psy-Op twist is that it is they who’ll be doing the identifying. They’ll be looking for individuals and groups who they assess as possible “non-state actors”.  By “non-state actors” the Military includes people who support social unrest but are not participating in any disturbance. This falls under their definition of “Terrorist”. It was on these grounds Anwar al-Awlaki an American citizen noncombatant was targeted and murdered by a U.S. Drone. Another U.S. drone also murdered his son two weeks later

Identifying “terrorists” for later elimination is a primary objective of the opening “tickling phase” of a war. “Tickling” is a CIA concept that consists of using military force to excite the enemy and prompt him to respond.  This was the rational behind the CIA’s demented tactic of using predator missiles to murder en mass innocent Pakistani citizens and therefore provoke retaliation by their relatives.  By extracting these so-called “Terrorists” the Army thinks they’re severely limiting organized resistance.  In so far as appropriations that included JADE HELM were approved in the NDAA budget at a Phase 0  sit rep, this is what JADE Helm is all about. It also bears an insidious Psy-ops twist:  First, by extracting these trumped up “terrorist”, they hope to generate mutual distrust within hostile organizations.  Second, people who show up to protest will be added to the extraction list. As we’ve mentioned Lastoria story is that that the “exercise” is for overseas, but zero phase requires the operation occur at a specific place and due to the nature of Net Centric warfare the place must be specific to where the ops takes place? So we’re talking about U.S. soil.

(Phase 1) – the run-up to hostilities – Deter. The intent of this phase is to deter
undesirable adversary action by demonstrating the capabilities and resolve of the joint force. It includes activities to prepare forces and set conditions for deployment and employment of forces in the event that deterrence is not successful.

(Phase 2) – the onset of military action – Seize Initiative. Joint Force Capabilities seek to seize the initiative through the application of appropriate JFC’s

(Phase 3) – major combat – Dominate. The dominate phase focuses on breaking the enemy’s will for organized resistance or, in non combat situations, control of the operational environment.

(Phase 4) – “post-conflict” stabilization – Stabilize. The stabilize phase is required when there is no fully functional, legitimate civil governing authority present. The joint force may be required to perform limited local governance, integrating the efforts of other supporting/ contributing multinational, IGO, NGO, or USG department and agency participants until legitimate local entities are functioning.

(Phase 5) – the shift to civilian control – Enable Civil Authority. This phase is
predominantly characterized by joint force support to legitimate civil governance in theater. The goal is for the joint force to enable the viability of the civil authority and its provision of essential services to the largest number of people in the region.

Within the last three years or so, the military has been operating/training on civilian soil.  A lot of it has involved flying helicopter gun ships into large cities and firing blanks with machine guns.  It’s reported that there’s a quick turnover rate of participants engaged in these operations. That means the military has already trained a lot of people. It follows that there must be something they’re planning on in the not too distant future.

Now what would worry the government about civil unrest to this degree?  Why would the Federal Government have to be breaking into its own citizens homes and taking mom or dad away in the middle of the night like the CIA Death Squads did in Iran, after the U.S. installed a puppet Shah?   What could possibly be a legitimate reason for such extremes?  There’s no Constitutionally legitimate reason.  One can imagine a scenario in which the monetary system collapses and everyone’s money becomes worthless. There would be people very upset with the system and the danger of civil disturbances and instability would spike.   This is possible, but it implies a foreknowledge on the part of the Federal government beyond our keen to speculate.  However, in 2008 after the economic meltdown, the U.S. government made no secret of its intent to plant armed troops on American soil and the Pentagon announced that 20,000 uniformed troops would be stationed inside the U.S. by 2011, to help bolster domestic security and assist state and local authorities in responding to terrorist attacks.  At the time, Paul McHale, then-assistant defense secretary for homeland defense, said that this sevenfold increase in domestic troop strength marked a “fundamental change in military culture” that “would have been extraordinary to the point of unbelievable” prior to the events of September 11, 2001.  That same year the U.S. Army War College Strategic Studies Institute warned the U.S. government that it was being too complacent to domestic threats and encouraged the Department of Defense to play a more active role in homeland security.  “Widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security,”  Lieutenant Colonel Nathan Freir wrote and went on to say that the “DOD might be forced by circumstances to put its broad resources at the disposal of civil authorities to contain and reverse violent threats to domestic tranquility.  Under the most extreme circumstances, this might include use of military force against hostile groups inside the United States.”

In an article in the New York Times, titled “US Defense Department organizing covert operations against the general public”, November 19th, 2014, Thomas Gaist reported that the Department of Defense is developing domestic espionage and covert operations targeting “the general public” in coordination with the intelligence establishment and police agencies. Gaist’s analysis showed that the “military and its investigative agencies have almost as many undercover agents working inside the United States as the FBI…While most of them are involved in internal policing of service members and defense contractors, a growing number are focused in part, on part of joint federal task forces that include military intelligence and law enforcement specialist.”

Phase 0 is where the fabled “Red List” comes into play with the information provided from JADE, the artificial intelligence, operating banks of the DOD’s super quantum computers. It will provide the whereabouts of each individual defined as a non-state actor/”terrorist”, with a little flag on its holographic projection of the battle space.  The victims will, of course, be identified as “militants” in the corporate media. The story from the military will be that the victims demonstrated willingness to take-up arms and resist the authority of the Federal Government.  For now, these future victims are still just simple folk facing a low-level invasion, and haven’t yet made a conscious decision to resist.  This is how the war against terrorism works. Probably the best thing to do, for any community, having to put up with this two month imposition, is simply see nothing, say nothing, write nothing, and just go about living normal lives.  Eventually, the boys will pick up their toys and go home claiming to have had a nice exercise.

The function of “Terrorism” for the Late Modern Imperial State is analogous to the function of the “Devil” for the Papacy in the Middle Ages.  A “non-state actor” has an operational role akin to “Heretic” with the Catholic Church. “Heresy” comes from the Latin meaning “To chose”.  Just as “Satan” empowered the empire of the Roman Church, so “Terrorism” empowers the empire of the United States Inc.  One need not do devilish things to be in the employ of Satan, it’s only necessary to speak heretical things.  In a similar manner, for the America Inc. empire, whoever says things that allegedly causes social instability, is a “terrorist.”  Civilians who resist invasion, as well, are classified as “terrorists”, just as those who resisted Papal troops were enemies of God.  It’s the nature of pys-war (psychological warfare) that each small operation builds upon the previous one like an inverted pyramid, so all the building blocks rest upon one original faulty foundation stone.  In the case of the global war on terror, everything rests upon the U.S. government’s use of the vague, ambiguous and ill-defined word “terrorism”, just as everything rested on the Papacy’s use of the vague, ambiguous and ill defined word “Devil.”

In 2008 the DOD also initiated the Minerva Initiative. It partnered with universities in a variety of projects “to improve DOD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of strategic importance in the world to the US.”  While the idea of the DOD being interested in “culture” may sound something like a joke, there was big money in it for the universities.   So, Cornell University, for instance, led a study, managed by the US Air Force Office of Scientific Research.  Its aim was to develop a model “of the dynamics of social movement mobilization and contagions.” The Pentagon and Cornell hoped they would be able to determine “the critical mass (tipping point)” of social contagions by studying “digital traces” for instance “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey. “The study and program looks at Twitter and Face book posts and conversations in order “to identify individuals mobilized in a social contagion and when they become mobilized.” Note here the use of the word “contagions”. This word suggests an infection or virus. By talking about social movements as if they’re diseases, the DOD is putting a spin on the conclusion in advance of the research. This tweaking of the conclusion in advance of the research could be done in like manner had the Papacy asked a university to help it develop a model of the dynamics of social movements and the spread of evil. The idea is that any social movement challenging Imperial authority is a “disease” is no different than claiming its the work of the devil. “Terrorism” like “Evil” can be contagious and spread, so it must be stamped out before an epidemic occurs.   The DOD’s Minerva Initiative funded another project in 2012 to determine “Who Does Not Become a Terrorist, and Why?” In this study, the DOD conflates peaceful activists with “supporters of political violence”. We read the following: “In every context we find many individuals who share the demographic, family, cultural, and/or socioeconomic background of those who decide to engage in terrorism, and yet refrained themselves from taking up armed militancy, even though they were sympathetic to the end goals of armed groups. The field of terrorism studies has not, until recently, attempted to look at this control group. This project is not about terrorists, but about supporters of political violence.”  Okay, what’s the difference between this and saying that people who support the works of the devil are committing sin just as much as the ones who actually do the devils work? Once again, the DOD’s pseudo scientific objectivity can’t hide the fact that its manner of framing the problem insures the desired spin in the results of its “research”.

The DOD’s choice of words clearly reflects a military in denial of the imperial role it presumes. Hence, it feigns objectivity by carefully selecting a language that its spinners trust gives the appearance of “science.”   However, the imperial aim, for which the DOD serves as enforcer, has an authoritarian, monocultural agenda.  This absurd paradox is underscored by its Marvel Comics mottoes like “Masters of the Human Domain”.  Frank Lloyd Wright once remarked that some people are schooled but not educated and other people are educated but not schooled.  Of course, some people are both, but once one reads the DOD literature regarding how Special Ops are supposed to “Master the Human Domain”, it’s abundantly clear that none of their commanders are educated and few are schooled beyond what one might pick up at San Quentin after a few years.  Thus the DOD boasts that its Special Ops will display their cultural sensitivity by approaching healthy social dialog by intellectuals as a “Contest of wills” between it and the other participants.  In any such contest they crow, they’ll surely dominate by being the first to murder all the other contestants.  It doesn’t matter how many stars and bars, medals and fringe they wear on their neatly pressed brown apparel, anyone who sees the process of democracy as a war to be won by any means necessary, bears the low grade mentality of a thug.  Of course these “Masters of the human domain” have an excuse for murdering the present participants in an ongoing social dialog that students of humanity have carried on for thousands of years: “They’ll be extracted”, they say, “because they’re provoking ‘social instability.’”  It’s a grave misfortune that these dimwits have never realized that in civilized society’s ongoing democratic dialog, it’s the cause of social instability that’s always at issue!  The joke is, no dialog over the causes of social instability is ever resolved by assassinating the participants in the dialog.  Like tickling, it only insures the wholesale slaughter of more and more innocent people, the very people from which the Military itself has sprung.   Certainly the only real terrorist in the whole human domain thing is the Department of Defense; otherwise the word “terrorism” has absolutely no meaning.  Instead of doing the appropriate job of a military in a free democracy, or a democratic republic, i.e. support the Constitution while the dialog of a free people proceeds to weed out the causes of their nations social instability.  On the contrary, the U.S. Department of Defense assumes the preposterous posture of enforcer of social instability, on behalf of its corporate criminal sponsors, by eliminating the dialog, while all the while pretending its doing a noble thing.  All things being equal, the DOD alone will some day stand atop the rubble and ruins of what once was a pretty cool planet.

 

END

Part 1  JADE HELM The Empires New Clothes

 

 

                                                                          Twisted Facts

Arman Matthews

The apologists for the Department of Defense claim that Jade Helm 15 is an extension of what the military has been doing for a long time.  This is, for the most part, true.  However, it differs in that it covers close to 20% of the country and lasts two months, and it focuses on mostly rural and small town populations.  We established, in Part 1, that the army’s explanations regarding what Jade Helm is all about are lies, and from this we inferred that the true nature of the operation must be a secret. This has now been reinforced by the news, from the Washington Post, that “Embedded reporters won’t be permitted at any point during the exercise.”  This is very peculiar since the same reporters have accompanied Special Forces in overseas operations.  So the question arises, if this is a routine exercise, why is its nature of the operation secret?

One could argue that prepping for Net centric warfare in the United States is reason enough to keep the actual operation secret.  If Net centric warfare conducted by special forces is being practiced and programmed into an artificial intelligence driven by quantum computers, we can conclude that this would only be done because the military sees a real possibility for social unrest and even rebellion on the horizon.  Since, standard practice for a military invasion is to first scope out the terrain and for JADE to be at the helm, it must be able to project that battle space, a major part of this exercise would be to upload enormous amounts of data into JADE”S memory.  This type of operation would certainly be kept a secret.  While this could be glossed over as speclation, there’s another detail missing from the military’s narrative that is not speculation.

spokes man miltIn an effort to quell the uproar caused by the Army’s blundering  JADE Helm public relations fiasco,  the Military has published a JADE Helm “Fact Sheet”.  Anyone who’s done a modicum of research on the matter would be apt to rename  this “Fact Sheet” the “Twisted Fact Sheet.”  While we’ve already exposed many of these “twisted facts” in our previous two articles, there’s one twisted fact that needs to be addressed.  The Military even thought it was such an important point that they mentioned it twice in their list of twelve facts:  “We must remember that our military has conducted unconventional warfare exercises like JADE HELM for over 40 years.”  The reference to “ over 40 years”, however, reveals more unmentioned information buried within this otherwise innocuous claim that JADE HELM is just the same old same old.

The unmentioned information regarding the 40 years of exercises like Jade Helm is that they were all based on a master plan devloped between 1968 and 1972. It is called the Department of Defense Civil Disturbance Plan 55-2. It’s code-name is “Operation Garden Plot”.   1974 was exactly 40 years ago and “over 40 years” takes us to the early ’70s.  As a reaction to the anti-establishment urban rebellions of the ‘60s and ‘70s, regarding civil rights and the Viet Nam war, the Pentagon ordered a directorate of military planers to draw up a series of blueprints addressing instances of civil disturbance that the military might have to put down. The United States Air Force then drew up an implementation plan for Civil Disturbance Plan 55-2.  It goes into detail over every aspect of military “suppression” of “rebellion against the authority of the United States”, including who pays, who bills and how to secure “loans” to cover the costs “attributable to GARDEN PLOT.”  Ominously, under “Resources Employed Without Presidential Directive”, the document states that when the “immediate employment of military resources is required in cases of sudden and unexpected civil disturbances or other emergencies endangering life or federal property, or disrupting the normal processes of Government, expenses incurred will be financed as a mission responsibility of the DOD component employing the military resources.”  In other words, in certain situations the military can take actionwithout a Presidential directive.

According to the plan, the military will attempt “to suppress rebellion whenever the President considers that unlawful obstructions, combinations, or assemblages, or rebellion against the authority of the United States, makes it impractical to enforce the laws of the United States in any state or territory by the ordinary course of judicial proceedings.”  A caveat is thrown in here to justify military intervention. In such a case, the military would be intervening to protect the constitutional guarantees of the people.  Thus, by a linguistic slight of hand, a military intervention in a civilian rebellion regarding the abrogation of their Constitutional rights, is justified because it’s being done to protect their constitutional rights!

The United States Army Training and Doctrine Command (TRADOC), “provides training programs and doctrine for civil disturbance operations to military services.”  The US Army Force Command (FORSCOM), “organizes, trains, and maintains in readiness Army forces for civil disturbance operations”, while the Director of Military Support (DOMS), “conducts, on a no-notice basis, exercises which direct headquarters of uniformed services, appropriate CONUS command, and other DOD components, having GARDEN PLOT responsibilities to assume a simulated increased preparedness for specified forces.” In addition, the DOMS, “maintains an around-the-clock civil disturbance command center to monitor incipient and on-going disturbances.”

This “operational plan” has grown over the years, as the interests of corporate sponsored social control have broadened. The U.S. military now trains police as well as troops to suppress the right of free people to democratic opposition. Garden Plot has been updated three times. Its last up-date was in 1991. The plan was activated during the Los Angeles “riots” of 1992, and because of the obvious convergence of the military and the police, it was probably activated during the “Battle for Seattle” and the “Occupy Wall Street” movement.

Training, under [U.S. Army Field Manual] FM 19-15/Garden Plot, must be “continuous” and “must develop personnel who are able to perform distasteful and dangerous duties with discipline and objectivity.”  Some of the simulation exercises participants are trained to preform with “discipline and objectivity” are the suspension of civil liberties, the rounding up of dissidents and their incarceration in detention camps for the duration of an (unspecified) “crisis.”  Under the heading “civil disturbance planning”,  soldiers and police are trained to perform these unpleasant and dangerous duties, as well as how to use weaponry and tactics that could be dangerous to the local citizenry.: “…every member of the control force must be trained to use his weapon and special equipment (including) riot batons, riot control agent dispersers and CS grenades, grenade launchers, shotguns, sniper rifles, cameras, portable videotape recorders, portable public address systems, night illumination devices, fire fighting apparatus, grappling hooks, ladders, ropes, bulldozers, Army aircraft, armored personnel carriers, and roadblock and barricade materials.” [1] These exercises have been continuous for over 40 years and have incorporated local police in their training.   This aspect of the Jade Helm15 operation, as well as previous similar operations, usually preformed under the guise of “urban warfare training”, and is now part of their hidden operation package not mentioned in the JADE HELM Fact Sheet.  It further explains why reporters already embedded with Special Ops troops are not allowed to witness these “exercises.”

Of course, there’s a psy-ops angle to this as well.  If each time these exercises are preformed and claims resonate across the Internet and news media that this is a precursor to Martial Law, and then nothing happens, the public is expected to become numbed into believing that what’s going on is no more than what the Military tells them is going on.  Further more, all the while the public is becomming accustomed to soldiers and military equipment in their communities. This is the boiling frog syndrome.  In another light, watching these exercises over time is like playing the old shell game. The eye tires of watching the switching movements of the shells back and forth, back and forth until finally when the movement stops, one is forced to guess which shell holds the “prize.”.

Like a virus, “Garden Plot” Duplicated, divided and mutated over the years.  In fact, its become a metaphor for the anti-democratic, mean-spirited authoritarianism that characterizes the Department of Defense.  Under the rubric of “Internal Security” its Directives, Doctrines and training manuals harbor one common goal and that is to silence and suppress the rights of a free people. And when those people see a need to refresh the operating system under which they live, because it’s no longer working for them, the military will be their to combat the will of the people.  Is Jade Helm a precursor to Martial Law? Yes, the problem is when will it happen?  The time, however, seems to be drawing near and any of a number of things could trigger a need in this country to reset and download an improved operating system.

Garden Plot reveals, to all who care to care, the true disposition of the military mind and those officers who assume the responsiblity for molding the attitudes of the young men and women who enlisted believing they had done something good for their country.   Soon they’ll be trained to embrace the idea that within the civilian body politic, from which they sprung, lurks an enemy, an enemy that they may one day be ordered to fight in the name of obedience to authority.  These new recruits  son must learn to live with the knowledge that the people, of their nation, who paid billions of dollars in protection money to the institution which they have sworn loyalty, may someday be attacked by their protectors in the service of a cabal of corporate suits united only by their common unfettered greed and gluttony.

In Part 4, we’ll see how Garden Plot evolved in the Administration of the Federal Government and the institutions that determine public policy.

 

 

To Be Continued

[1] .” (Frank Morales, “U.S. Military Civil Disturbance Planning: The War at Home,” in Police State America, ed. Tom Burghardt, ATS/Solidarity, Toronto, Montreal, 2002, p. 73)

 

By Arman Matthews

The Jade Helm Logo also includes the phrase “Master of the human domain.” What does this mean?  In November 2012, General Odierno, a member of the Council on Foreign Relations, announced plans to create the Strategic Landpower Task Force. The first major policy offering from the task force was a white paper titled “Strategic Landpower: Winning the Clash of Wills”. It emphasized the “human domain” as the key determining factor in future conflicts. “In a word, the success of future strategic initiatives and the ability of the U.S. to shape a peaceful and prosperous global environment will rest more and more on our ability to understand, influence, or exercise control within the ‘human domain.”   First of all, isn’t “shape a …..global environment” simply a euphemism for “control the world”? To rephrase what this white paper is saying is, “For the U.S. to control the world, it must be able to understand, influence and control the human domain.”   Well duh! This is no more than a simple-minded tautology: “For the U.S. to control the world it must control the human domain.”   What is so remarkable about this statement, besides the fact that its conclusion is no different than what any third grader would consider obvious, is the blatant admission that the U.S. is bent on controlling the world.

The white paper, defined the “human domain” as the “physical, cultural and social environments” that exist within a conflict. It was adopted as a “doctrinal term” signifying the ground forces own unique perspective and ability to shape the human domain in future conflicts.  Now it is not only their training as Special Ops that is supposed to make them “Master of the human domain”, but the type of warfare they will be engaged in. This type of warfare is called “Network centric warfare”. In order to fully comprehend what Jade Helm is all about, we’ll have to understand the history building up to the Jade Helm 15 exercises.

*          *          *

The idea of a “revolution in military affairs”, or “Transformation”, based on new information technology was kicked around in military circles even before the ‘90s. In the new Century, “Military Transformation” found its way into George W. Bush’s Presidential campaign rhetoric in 2000. The Bush’s belonged to the Neocon “think” tank, the Project for a New American Century and it had taken up “Transformation” as a major theme. Many PNAC members would soon hold the highest level positions in theGeorge W. Bush administration. Two months before George Bush took office PNAC released a report entitled ‘Rebuilding America’s Defenses‘. According to the PNAC report, “The American peace has proven itself peaceful, stable, and durable. Yet no moment in international politics can be frozen in time…” To preserve this “Americana peace” through the 21st century, it called for (1) a massive increase in defense spending and (2) the fighting of several major theater wars in order to establish American dominance. The first was achieved in Bush’s first budget plan. It called for the exact dollar amount to be spent on defense that was requested by PNAC in 2000. Donald Rumsfeld, a member of the PNAC, had become Secretary of Defense and a vocal advocate of “Transformation”. He argued that the development and deployment of a truly modern, effective command, control, communication and intelligence system was fundamental to the transformation of U.S. military forces. Rumsfeld also believed that Transformation meant fewer troops needed to fight wars. The latter stirred up bitter disagreement within the military and so Transformation remained only a theory. The PNAC report also observed, “the process of transformation is likely to be a long one, absent some catastrophic and catalyzing event –like a new Pearl Harbor.”  Like clockwork, the Godzilla of False Flags, 9-11 happened less than a year after George Bush took office and once Bush stupidly even compared the event to Pearl Harbor.

After 9-11, the “Transformation” Rumsfeld advocated was suddenly taken seriously by the Military. Another serendipitous event that has been woven into the 9-11 myth came from Former astronaut Ron Sega, who oversaw the Pentagon’s more than $60 billion annual budget for research, development and testing. Sega reports that he arrived for work at the Pentagon, on September 12th, with a skeleton crew. “We, uh, came together and asked the question, ‘What can we do?’”, he reported. “What can the research and engineering community within the Department of Defense do to support what we were about to engage in?” The skeleton crew of scientists, analysts, and engineers became the “Combating Terrorism Technology Task Force”. Subsequently, members of the F.B.I., C.I.A., and other defense and intelligence agencies met in a secure conference room, deep within the Pentagon, thinking, tinkering, and devising solutions. In just three days, the story goes, they produced a list of 150 technologies that could be fast-tracked in the war against terror. No sooner had they miraculously produced this list then phones started ringing throughout the military industry …requests for, “How fast? How many? What would it take to get there?” Suddenly the GDP started reeving up…Raytheon, Textron Inc., Lockheed-Martin, and countless other corporations started gearing R&D, and production, towards the new military demands. The orders flooding in were for precision weapons, lots of them. Throughout his tenure, Rumsfeld never missed an opportunity to remind the American people of the 9/11 attacks and threats against Americans. He even noted in a 2006 memo to “make the American people realize they are surrounded in the world by violent extremists.”

As Secretary of Defense, Rumsfeld was deliberate in crafting the public message from the Department of Defense. People will “rally” to the word “sacrifice”, Rumsfeld noted after a meeting. “They are looking for leadership. Sacrifice = Victory.” Rumsfeld also ordered specific public Pentagon attacks on and responses to U.S. newspaper columns that reported the negative aspects of the war.

The global war on terrorism, the operation in Afghanistan, later on, the operation in Iraq, all served as a great catalyst for “Transformation” to sharply accelerate. Just as Mussolini used a war with Abyssinia (now Ethiopia)  to upgrade his military machine, so the U.S. military machine used Iraq and Afghanistan as real time war laboratories to test new high tech, information dominant technology and transform the military into a new fighting machine.

The war in Afghanistan enabled the military to test its ability to bring special ops together very quickly in a Theater of operations and it provided an opportunity to blend old and new technologies together.   For instance, in the Persian Gulf War, about seven percent of the munitions were precision guided, and none were all-weather. They required a laser beam shone on the target, so things like smoke would interfere with the beam. By Afghanistan, the military had satellite-guided munitions that could pierce through clouds or oil field fires or anything else, and the military had a lot more precision weapons in its arsenal.

The advocates of Transformation pointed to the war in Afghanistan as laboratory proof of their ideas.   Rumsfeld had been waiting for an opportunity to demonstrate how transformational concepts involved more than just the ability to develop new high tech weapons, but proof, as well, that a relatively small number of American forces could be employed on the ground and rapidly defeat an enemy and that military’s had the ability to fight a joint campaign  featuring co-operation rather than competition between the services.

Conducting joint campaigns required a new concept of acquiring and sharing information, a concept called network-centric warfare. In theory, everyone would be electronically connected from the top down. Information once known only to generals and admirals would be shared all the way to the frontlines. Network-centric warfare’s central nervous system is the military’s battlefield internet.  Jade ( acronym for “Joint Assistant For Development and Execution) is an Artificial Intelligence software used for a Network Centric Warfare System adapted to quantum computer technology. Raytheon developed it in conjunction with DARPA. Jade 1, developed around 2000, produces “Battle space” simulations. These simulations are in the form of holograms and virtual reality. Net centric warfare “Battle Space” accouterments for sale to the DOD is a booming business.   Jade “has the ability to use vast amounts of data being collected from the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels, or whatever labels that can be flagged as targets.

Holographic battle space   Jade II is a battle space system that is allegedly “cognitive” and “intuitive”. This is just what the Department of Defense desires, intelligence that’s not intelligent: It can follow orders and examine prior executed battle plans and solve problems like devising “new and better’ strategies to increase the ‘kill chain’”, but it can’t evaluate the orders and their source or ask “why are these problems, problems in the first place?” Jade II also has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations into the system.” In as much as, DARPA has developed land drones with kill capacity and is working on soldier robots, its only a matter of time before they too will be hooked up with JADE.

 

Virtual reality battlespace

The enormous cost of the Iraq and Afghanistan wars forced the DOD to scale back while still being able to maintain its planetary military superiority. Between 2008 and 2010 the DOD designed a high-capacity strategic communication control system. A Network Centric Warfare Control system was first installed in Afghanistan in 2008. In 2010, the Department of Defense announced that its goal, or template, for 2020 would be to obtain “Full spectrum dominance.” (“Joint vision for 2020”). “Full spectrum dominance” means dominance in n dimensions of the battle space (Land, sea, air, electromagnetic, and cyber).

 

Gig_ov1To achieve Transformational goal would require heavy investment and development of new military capabilities.  The four capabilities needing development were: dominate maneuverability, precision engagement, focused logistics, and full-dimensional protection. The DODs first move to enhance military capabilities was to condense and upgrade the Global information grid with a Global Information Grid for Network Centric Warfare environments. The grid was connected together and to the White House by fiber optic cable. It provided an integrated, seamless, network-centric framework for commanding air, sea and land warfare. At the helm of this network centric warfare system are banks of super computers with the JADE 1 & 2 artificial intelligence operating systems, in place, to address battlespace areas in complete packages. Instead, of taking weeks to package a plan involving joint maneuvers and stratagems within a battlespace, or change tactical battle plans, JADE could do it in an hour. Special Ops, instead of the regular army, will be the primary players in these operation packages.

To Be Continued

0 700

By Arman Matthews

 

The Republican Capitalists in the Northeast part of the United States weren’t opposed to slavery. They supported the abolitionist’s because it was cheaper to hire wage slaves than own chattel slaves. Chattel slaves required medical assistance when they were ill, food when they were hungry and clothing and shelter. You have to protect your capital stock, it was an investment. However, with wage slaves it was no bother. All you had to do was pay the market price for labor, which was a hell of a lot cheaper than owning slaves. They would have opted fror slavery, had it been the reverse. The same process is going on now between wage slaves and robots. It’s a lots cheaper to own a robot than to hire a wage slave. So robots are replacing wage slaves.

The South had dominated the Federal Government almost since the birth of the Republic. While a capitalist economy had developed in the Northeast, and a slave economy had developed in the South, a subsistence economy had developed in the West. The Republican Capitalists in the Northeast saw a chance to reverse the tables on the South, by pushing anti-slavery. The South said that if Lincoln was elected, they would secede from the Union. The Republican Capitalists backed Lincoln and he was elected. The South walked out of Congress, and everyone else walked as well, leaving Congress permanently out of session. The Constitutional government was broken, Lincoln, took upon himself to act as if Martial law was in effect and started writing Presidential Orders. At this point, the Organic government, which started in 1776, died and we have had a de facto government ever since. Lincoln issued an executive order requiring Congress to go into session. When it did, Congress was now filled with Republican pro-capitalists and the Northeastern Capitalist class now owned the government. One of their first orders of business was to write out a document permitting Lincoln to do what he had already done.  This was the equivalent in U.S.History of Caesar crossing the Rubicon.  Lincoln had promised to restore the Republic after the war, but, like Caesar he was assassinated.  So we’ll never know.  However, every President since Lincoln has seen it fit to have a “national emergency” so that he may retain Imperial power and write executive orders to his hearts content.  Unbeknown to the American public, it has been under a “soft” martial law ever since.  It is only in present times that “softness” has hardened.

The Civil War was not really a “Civil War” but a revolution. There was nothing in the Constitution disallowing secession.  Anyway. the South would have folded eventually.  However, it was in the interest of the Commercial Class to have a war, not only to replace the South’s domination of the Federal government, but great fortunes were to be made from this war and the subsequent gains in corporate political power. The subsistence economy in the West was wiped out, what was once a society of self-sufficient small farmers was turned into an indebted class of wage slaves and monoculture farmers. Their self-sufficiency was stolen from them and they were forced to eat out of the corporate trough. The “Wild West” wasn’t so much a bunch of “lawless” psychopaths, as it was a rebellion. The vets went home to discover  that they had no homes left to go to. The Banks and Railroads owned everything. So what’s one going to do,  if he’s had to live by the gun for years and years only to come back to find his livelihood gone?  Rob banks and railroads, of course!  The dreaded Pinkerton’s were Masons who happened to be hit men for the Corporations at the time.  “Law and order” in the West meant submission to the banksters and tycoons. Even Frederick Douglass said, years later after the Civil War, that wage slavery was as demeaning as chattel slavery and that there had to be another way.

By Arman Matthews

 

What’s “Jade Helm 15” all about? The official explanation is:

Jade Helm 15 will be carried out in 7 states and will run from July 15 to September 15, 2015. Personnel participating in Jade Helm or units participating in Jade Helm will come from U.S. Army Special Forces Command at Fort Bragg. They’ll be on the ground for about eight weeks, and we’ll have some Navy SEALs participating for about two weeks. United States Air Force Special Operations Command will take part in it at varying points in time throughout the eight weeks. And there will be a small amount of U.S. Marine Force Special Operations Command participating for about two weeks. And then for about five days, 82nd Airborne Division will have a battalion participating with about 600 soldiers, 600 paratroopers.”

Some people claim its a surprise Martial Law or an Obama invasion of Texas, others don’t understand what the brouhaha is all about and shine it on with “That’s Texas for you.” Meanwhile, the Department of Defense calls anyone skeptical of their intentions “Alarmists!” The Army Special Operations Command released an article in Stars and Stripes with the by line: “Army Special Operations Command pushes back against alarmist claims about upcoming exercise.” Apparently, not there are not only “conspiracy theorists” running amuck, but “alarmist” as well.” I suppose, according to the current spin, an “alarmist” is a “conspiracy theorist” who’s irresponsibly predicting the future. We can’t have that! However, “preemptive strikes” seem to be exempt from such accusations. They must not be basing their ill advised invasions on “conspiracy theories.” Perhaps the Pentagon employs fortune-tellers. Meanwhile, the corporate media has done their part to deflect the whole issue. Poor John Steward had to laugh it off over the air as just another case of crazy Texas right-winger paranoia, They think they’re being invaded, he said, but they forget “they’re already part of the United States.” All the while, the man on the street is deciding, “It’s much ado about nothing”, and turns to the sports page.

Mark Lastoria, Army Special Operation Command spokesman, told the Houston Chronicle, soldiers would practice “emerging concepts in special operations warfare” in Texas…. Training exercise Jade Helm is going to assist our Special Operations Soldiers in refining the skills needed against an ever changing foreign threat,” he said….There’s good reason to be skeptical regarding Lastoria’s candor. He didn’t mention what those “emerging concepts” or what an “ever changing foreign threat” means.

The Special Ops are “special” because they’re the guys that do the dirty tricks. In the glossary for Special Forces Operations 2015 is listed “clandestine operation”. “An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the source of the operation.” Now, how are we supposed to know whether or not Lastoria is forthright or covering up a clandestine operation?   Aren’t the people who laugh at such a suggestion simply relying on blind faith? Sometimes a guffaw is nothing more than whistling in the dark.  Lastoria, told the Houston Chronicle “Unofficial sources providing inaccurate information on Jade Helm want people to believe that it’s something other than a training exercise.” But, isn’t this just what we’d expect to hear from someone covering a clandestine operation? How are we to know? If I told you “I’m a liar, but I’m not lying about this.” What would or could you believe?  The headline on the blog “Courthouse News”, March 27, 2015 read, “No Black Helicopters, Army Tells Texans”. In mid March, a very reliable contact, who’d never heard of “Jade Helm”, told me he saw three black helicopters land at night in a schoolyard in Houston, Texas, “A van pulled up and some people boarded the van and they all left.” That’s sounds pretty “clandestine ” to me! This isn’t a smoking gun, but an anomaly. However, the more frequent the anomalies one finds, the more difficult it is to sweep them under the rug. Another indirect test of veracity often employed in interrogations is noting how many times a person contradicts himself. The more times, the more likely it is he’s lying. In a court of law, the testimony of a witness is thrown out if it has inconsistencies. Let’s look at a few of Army Special Operation Command spokesperson Lastoria’s inconsistencies

In a packed County Commissioner’s Court in Bastrop County Texas, Lastoria told the audience that the “exercise would be held on private property and in some instances on public property, such as a state park” He said that landowners had volunteered their private property for the Jade Helm exercise. Later in the presentation, Lastoria contradicted his original explanation and said “a lot of” rather than “all” the training in Texas will take place on private land.” “Okay”, you say, “give the guy a break, after all he’s facing a skeptical crowd of concerned citizens worried about the military taking over their community and he’s merely a soldier.”   Let’s move on.  Another major component”, he said, “would be soldiers training to blend in with the local community.” Several people ask how they could be blending in with the local community, if they were going to be on private land? Lastoria replied that “role players’” would be involved in simulating communities in rural land.” There will be “roll players.” I’ve found advertising on the Internet near Lastoria’s Special Op base for role players for this assignment. There’s even a video on YouTube of a roll player meeting. However, Roy Boyd, chief deputy with the Victoria County Sheriff’s Office said that county law enforcement officials were briefed by the Army and were told, “Among the planned exercises, soldiers will try to operate undetected amongst civilian populations in some towns and cities where residents will be advised to report any suspicious activity they notice as a means of testing the military’s effectiveness, …They’re going to set up cells of people and test how well they’re able to move around without getting too noticed in the community…They’re testing their abilities to basically blend in with the local environment and not stand out and blow their cover.” While Lastoria has not contradicted himself here, we have testimony from a credible witness that contradicts Lastoria’s assertions and a fortiori indicates Lastoria is prevaricating.

Mark Lastoria, also told the public during his presentation, at the Bastrop Courthouse, that the name “Jade Helm” meant nothing. “They’re just completely random, pointless words”, he said, “so don’t read too much into it or try to associate it with China’s rising economy and military or the blue helmets of UN’s peacekeeping forces.” Again, Lastoria did not contradict himself, but within less than a week after Lastoria made this vacuous remark, the real meaning of “Jade Helm” was revealed on the Internet.  “JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: Prodigy-Analogy (a combined case-based and generative planner developed by Carnegie Mellon University); ForMAT (Force Management and Analysis Tool) that supports case-based force deployment planning developed by BBN Technologies); and PARKA (a highly-indexed knowledge based management system developed by the University of Maryland).  With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaption is supported through remindings, e.g., each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes.”  Another reason Lastoria has given in other contexts for why the seven state areas was chosen is because the terrain is similar to areas in the Middle East. However, in the above explanation it is said that every time a “force module is created”, which translates into a strategic plan, “the user is automatically reminded of the need for geographical changes.” This means, that war games can be played any where, but whenever the program is ask to apply a particular strategy to a particular situation, the user must also provide data on the geographical changes involved in that military action. That means that the geography in which war games are played and uploaded into their computers is irrelevant.  Furthermore, practicing blending in to a small town Texas community would be quite different from blending in to a Middle Eastern Islamic community. Again, the rational for picking this seven state area appears to be concealed from the public. Jade Helm has a very specific meaning, which Lastoria hides by insulting the audience with silly imagined interpretations.

We know what “Jade” means, but what about “Helm”?   Initially, some people thought it might be an acronym that stood for: “Homeland Eradication of Local Militants.” While that was a good guess, there’s nothing to substantiate this. We need, however, to once again remember that this is a Special Forces operation.  “Helm” in “Jade Helm” is not an acronym. Special Ops people usually refer to the place of control or command as “at the helm”. The helm was the place where sailing ships were steered.  In Special Ops jargon when so and so is “at the helm” that means he is in command.   “Jade Helm” simply means “Jade is at the helm” or in command. There will be no general or human commander determining battle plans in this exercise but only the artificial intelligence “Jade”. “15” of course means 2015. This suggests that this exercise is perhaps unrolling one of many.

JADE-HELM-photoshop-study2 clog_master_screen_split

Another rather bizarre aspect of the Jade Helm logo is the blur where the arrows cross.  By photo-shopping that blur it can be brought out to be a pair of wooden shoes.  Wooden shoe means “sabot.”  The word “sabot” means “wooden shoe” and is where the term “sabotage” comes from. One theory is that the shoe symbol is an illustration of what “they” will do to the humans as they “master the human domain.” Another theory is that wooden shoes are what the Nazis had their prisoners wear in their internment camps.    This is certainly inconclusive, however, the fact that it is obscured in the logo indicates that it bears a hidden meaning. Clearly, there are a lot of things concealed from the public concerning the Jade Helm 15 exercises than either Mark Lastoria or the Department of defense wants to reveal.  In part 2 we will investigate the Net Centric Warfare background of Jade Helm 15 to better understand the full implications of this “exercise”.

 

To Be Continued

0 776

APE AND ARCHETYPE

ARMAN MATTHEWS

Jung defines “Archetype” as “a universal and recurring image, pattern, or motif representing a typical human experience…the primordial image or archetype is a figure, be it a daemon, a human being, or a process, that constantly recurs in the course of history …” Archetypes reside in the “collective unconscious” each of us inherits. While “Collective unconscious” might sound mystical, its imprint is quite real. Certainly every species inherits an unconscious memory through its DNA. In animals it’s often called “instinct.”

When a chick inside an egg is ready to hatch, it starts pecking on the shell until it’s broken open. This isn’t learned behavior, no one told it to do so, its wired in or programed. Turtles come from the sea and lay their eggs on the beach. Later the eggs hatch and the little turtles scurry back toward the water, jump in and start swimming. When human children reach a certain age, they begin to speak, knowing how to put words together, while the language they learn depends on their location. No one taught them to do this; it was in them from the start. If we only look for the “how” in these things, without knowing “why”, we’ll never understand what we’re observing. The pursuit of the “how” is never-ending.

For Jung, archetypes are both dispositional and situational influences upon personality. By “dispositional he means the type of personality, and by “situational” he means the human experiences that is reoccurring as well as the specific environment expressing the archetype at a particular moment. When a canine, for instance, senses danger, the hair on its back raises and its whole behavior pattern changes. Here we have the same kind “Situational” and “Dispositional” influence from what we call “Instinct” that Jung attributes to archetypes in humans.  Jung would have to admit that the archetype’s dispositional influence on personality varies according to the type of personality possessed by an individual.

Let’s call the object of the situational archetype a “Field”. Each field varies according to the landscape of the environment in which it occurs (archetypes are influenced by “a person’s culture, setting, and time in history.”)[1] We’ll call the actualized “Field” a “Theater.” Any theater has at least two players, real or imagined, whose “roles” depend of the personality types those players represent. There’s always an historical irony involved in every “dramatization” within an archetypal theater, for the players are always unaware that they’re playing roles and everyone else is doing the same. Thus, there’s an illusion of spontaneity and happenstance, which heightens the dramatic tension of each event. The outcome of the “Play”, however, is never determined. That is what makes each “Play” truly real, for it all depends on how the players play their roles.

In the first example of the invisible politics within a situational archetypal field, we find two theaters in which the same play is dramatized. One, is a secular theater, wherein there’s a written constitution, upon which the laws and regulatory structure of a nation are supposed to be built. In the other, there’s a theological theater, wherein a book is supposed to contain all the dogma, scriptures, history, laws, and morals pertaining to a particular religion. The primary antagonists are two pairs of types, the sensibles playing one role, and the intuitives playing the other.

In the secular theater there’s an ongoing issue between players who want to follow the Constitution literally, without interpretation and players who want to interpret the constitution within the context of the present time, e.g. in lieu of advances in technology, transportation and such. The issue is impossible to resolve: First, because the reason for the divergence is not rational and second, the necessary information for understanding the issue is hidden from all parties. Yet, we can predict on which side each type of humanoid will fall.  Sensate types believe they’re being perfectly reasonable to insist on taking the Constitution literally, because the truth of the matter is that, that is all they’re equipped to do. Intuitive types believe that it is perfectly obvious that you can’t interpret the Constitution literally in this day and age, because the truth of the matter is they interpret everything that enters their senses. All the while both players believe they’re speaking for everyone, because they think everyone is just like them, while, the truth of the issue is hidden from both.  In the theological theater, the sensates call their side “fundamentalists”, while the intuitives interpret “The Book” in tune with present day knowledge.  The play, is the same in this theater.

In our second example, we’ve one theater and a play that’s repeated over and over for 20 years. The two main antagonists are NFs (intuitive feeling types) and SJs ( sensible judging types). The other two types NTs and SPs play supporting roles. The theater is the California K-12 school system.

Meyers-Briggs made a study of the California school system over 20 years. During that time, two players fought over school curriculum.  The largest personality population in the system was SJs and the second largest were NFs. The NFs, who interpret information received from their sensory screen more in terms of imagery, insisted on including the arts (drawing, painting, dance, music) in education in order to prepare for life and appreciate culture. The SJs, get information directly from their sensory screens and require rules, codes etc. to manipulate that information. They believe that teaching the arts is a waste of money and that all the funds should go on subjects that “really matter” like reading, writing, and arithmetic.  This struggle went back and forth in this theater for 20 years and probably still goes on uninterrupted.  All the while, both groups believe they’re speaking for everyone because they think everyone is just like them. However, the true depth of the issue is hidden beneath the surface.

We’ve demonstrated that an implied politics inheres within certain archetypal fields. However, the dispositional roles of cognitive personality types alone[2] won’t provide us with tools sufficient to analyze the dynamics of every archetypal theater. For example, claims are made that the new “litmus test” for military leaders is whether or not they’ll obey an order to fire on U.S. citizens. In this day and age, such a claim cannot be dismissed out of hand. However, the question of its veracity isn’t necessary in order to point out a weakness in the analytical tools we’ve made available. Within the military theater, the following scenario is not only conceivable, but also inevitable:  Some players answering in the affirmative will be of the same cognitive personality type as others answering in the negative.  In other words, there’s no way of predicting which side of the divide different cognitive types will fall. Thus, we’re either forced to either abandon this train of thought, or upgrade our tools of analysis. Fortunately, our previous investigations concerning a second set of ape personality types will enables us to make accurate predictions regarding the roles of the personalities involved in this archetypal theater.

An international team of psychologists and animal research scientists have settled the issue of whether humans display traits inherited from apes once and for all.  In a paper published in the journal Animal Behavior, the team says that their study shows that yes, some apes do display different kinds of personality traits, and that chimpanzees in particular have some that are very nearly the same as us humans.[3]Specifically, chimpanzees, gorillas, and orangutans are mentioned as differentiated by their behavioral repertoires. There’s a 2% genetic difference between orangutans and humans. Undoubtedly, we’re all linked by common ancestors, but if we’re going to suggest that humans have personality types that can be differentiated by their similarity to different types of ape behavior and consistently we seem to type humans four ways, bonobos definitely belong with the other three, since their genetic difference is the same as chimpanzees.

A.M. Benis, Sc.D., M.D. [4] is suggesting a correspondence of ape types to human personality types. He says that “it is becoming increasingly clear that the human personality is determined primarily by a number of genetic traits… We identify three traits that are posited to be transmitted in humans in a Mendelian fashion… DNA analyses in the near future could allow one to trace personality traits — and even “personality types” — in ancestral hominid lineages. Here is a break down of the three characteristics Benis thinks significant.  He applies them to three different apes.

New monkey tableSince typical humanoids divide into four types, making the necessary addition of bonobos and clearly bonobos are NP types.[5] How does this complication to personality type theory enable us to analyze more complex play in archetypal theaters? Note, while we’ve four types that show variations in their behavioral repertoires, we find basically two kinds of dispositions: NAs and NPs. This is similar to Jungian typology as there are four types, but they can be divided into Sensibles and Intuitives.

Research and study are still in their infancy stage regarding the politics of personality types within certain archetypal theaters. Nonetheless, with the crude theoretical tools we’ve developed, we’re able to have insight into an area of human life that has hitherto been opaque. Now, instead of glossing the awful spectacle of daily human mayhem and murder with a vague “Killer ape” claim applying to humans in general, we’re able to account for anomalies such as we found in our example of the military officer litmus test. The reason that we could not predict the answers from people sharing the same cognitive personality type is because we didn’t know whether they were also Na (aggressive killer ape) or Np (non-aggressive]. Now, if we know that if two ENFJs, for instance, are asked the same question, the answer depends on whether they’re ENFJ-na or ENFJ-np.

Finally, in comparing the social behavior of chimpanzee na-societies with the social behavior of members of certain human communities, we see that certain human communities exhibit na-behavioe exceptionally similar to na-ape social behavior. The military provides a striking example of a society composed entirely of a killer ape hierarchy. We see narcissistic chimpanzees on steroids frantically struggling to get to the top of the heap inorder to command and control their competitors, expressing their dominance everywhere by creating wars, destroying whole populations, raping innocent women and pillaging small villages, while spreading mayhem and destruction wherever their rage takes them.  The corporate establishment is built on the same model and also is in a state of continual low intensive warfare, as the males fight with each other over becoming “chief officer” at the top of one of their corporate pyramids, while competing for trophy wives as they claw and struggling, tooth and nail for dominance.  NA types on Wall Street (and similar environments) also maintain ongoing low intensive warfare in their desperate battle to get to the top of the heap and express their dominance by sitting behind elegant desks intimating their underlings and copulating with their mates whenever convenient.  Little difference can be said of politicians, albeit their vulnerability forces them into secrecy. These different realms of human na-society are all marked by a lust for dominance and an obsessive preoccupation with climbing on the backs of their own kind to satisfy their narcissistic drives.  In these na-subgroups, different personality types play different roles than their analogues in np-societies, although all the subgroups play in their own ways within the big theater.

————————————————

[1] 2 Pearson & Marr, 2002

[2] Jungian typology

[3] http://phys.org/news/2012-05-apes-human-like-personalities.html#jCp

 

[4] Benis A.M. (1985, 2008):  “Toward Self & Sanity:  On the genetic origins of the human character”, Psychological Dimensions Publishers, New York.

 

Benis A.M. and Rand J.R. (1986):  A model of human personality traits based on Mendelian genetics.  American Assn. for the Advancement of Science, Pub. 86-5, Washington D.C., p.124 (abstract).

 

Benis A.M. (1990) :  A theory of personality traits leads to a genetic model for borderline types and schizophrenia.  Speculations in Science and Technology 13, No. 3, 167-175.

[5] See Part 2, “The Real War is Monkey Business”

Authors

Arman Matthews
35 POSTS1 COMMENTS
0 POSTS0 COMMENTS
Rafael Chavez
13 POSTS1 COMMENTS
Robert
375 POSTS135 COMMENTS

STAY CONNECTED

LATEST