Tuesday, October 12, 2010

Roller Coaster

The Roller Coaster

Dear Gentle Readers: We are engaged in a process, a mutual journey of discovery. A play both, tragic, and comic. The opening act is exaltation and celebration. The process like an extreme roller coaster ride. It will start with a climb to a great height, a pinnacle, awe inspiring. A new definition of what it means to be a human being, of human potentiality, virtually no limits to what human beings can accomplish. Beginnings are delicate times, the honeymoon will be very short. Serious charges made against the most powerful men in the world. A campaign of attack will start from the beginning. Audio and video tapes that depict violent rages, racist rants. Photos designed to discredit and humiliate. Some fabricated and some real. Like the second part of the roller coaster the rider plunges straight down in an instant. From Winston Churchill to Adolf Hitler overnight. The target email, websites, and cell phones all hacked and passwords changed. The blog posts, tweets, and emails will now, in many cases, be coming from someone else. The press screams for destruction of the vile creature. Apologies are made and explanations offered. Eventually disaster may be diverted and truth may come like sunshine through the clouds after a storm. The roller coaster at bottom now rises back up. This gentle readers is the journey we are on. Do not be the victims of euphoria and expectation of instant freedom. Do not become despondent when there are set backs and temporary ups and downs. There will be good days and bad days and this may take a year to finish. Believe in each other, work together. Don't give up, freedom will come. Evil men who are armed with weapons of incredible power, and will stop at nothing to win, and are not going to surrender. You must win. Do not be fooled into working against each other. You will win in the end. It is not for the faint of heart but by the end of the chaotic ride we will have accomplished some of what we have all set out to do... the four goals. God speed
Marshall Gregory Thomas

Battle Plan: week of 4/22/13 Roll out scenario to take place on the 4th week of the month. Failing the order to roll out, this operation will proceed automatically on 04/25/2013. ONE: Whistleblower Rollout 04/22/13 The Whistleblower comes forward with news and evidence of crimes against humanity. The strategy of publicity may or may not succeed. If the whistleblower is quickly neutralized, the next stage begins that weekend. If the whistleblower rolls out successfully but does not succeed in proving the case in the public domain, the next step will proceed May 5th. Protesters may volunteer at this stage. TWO: Mass Protest 05/05/13 Mass demonstrations against (704th MI Brigade) begin at a predetermined time in many different locations. Protestors shall surround the units involved. The initial purported reason for protesting may take a different form, such as protests against economic conditions and social policies. Protestors should wear white and display white banners and flags. The protests will proceed for a set period (until the weekend of the 13th of the following month). The protest will demand the 704th MI Brigade stand down and the officers be replaced by the President. If success is not achieved in a reasonable time period, the next stage begins. Optional part two of the mass protest strategy is to withhold all transfer payments to the Federal Government including income taxes (04/15/13) and sales taxes (04/31/13) for a minimum of 2-3 years until collapse of the military formations engaged in hostilities. Instigate home rule at the state level. This strategy is designed to force the government to end all support of the 704th MI Brigade and related units, including salary and infrastructure such as Ft. Meade, particularly the headquarters unit. THREE: Kill or Capture: week of 7/14/13 A Special Forces kill or capture operation focusing on the commanding officer and large scale military envelopment of the 704th MI Brigade by designated forces. This operation can only go forward upon orders of the President who will give nonverbal assent to the Director of the DOD, who will then give the verbal order to commence hostilities. (Call sign: “OBL, Osama Bin Ladin”). If perpetrators respond by using mass attacks, the next stage begins immediately. During stage three, limited missile attacks should be directed at the infrastructure supporting the offensive capabilities of the units involved without causing casualties among personnel. This includes communications complexes and satellites. FOUR: Missile Strike: Upon initiation of a mass attack using WMD by the perpetrators. The President shall give nonverbal assent to the Secretary of Defense and the signal shall proceed as before, “OBL, Osama Bin Ladin Four”. The main targets designated previously are attacked with strategic conventional weapons (missiles) in order to halt mass attacks on civilians and military formations. Since hostile forces possess military technology uniquely suited to attacking command and control it is essential that units in the field take the initiative and determine how best to proceed in battle without depending solely upon political or military command to dictate sequential actions. The units involved and their targets have been designated. Effort to Avert Conflict: The dates are deadlines to take the offers. A new CO and Exec will be appointed by the chairman of the Joint Chiefs. A reward exists for $100 million to neutralize the main protagonist. Roll Out scenario: Whistleblower goes public: send the crews to me, use skype, local affiliates, less travel is better, pre-recorded is better. Avoid hit pieces by editorial feedback contract, show me product so I can rebuttal prior to air. Trust no one. I can kill the piece prior to print or broadcast contract. Not editorial control. Interviews on all networks and Sunday morning talk shows (the full Ginzburg). Entertainment shows late night tv on all networks, prepared recorded skits, not live generally, recorded songs. Write good humor. Story line: apology, forgiveness, serious issues, humor, debunk smear (with humor), music, playful Revelations: 5 aspects ONE: The past is prologue, examples of a similar past: learning about human guinea pigs and the war on activists. Criminal military leaders of the past. TWO: The suspicious present, borderline personalities, their careers, statements, connections, cover up. THREE: People in power, high crimes and misdemeanors, how the rules were bent and laws broken. FOUR: The truth about technology, creeping realizations of the creepy kind, mosaic of what is possible. FIVE: It might be true, it could be true, good chance it is true, It’s all true, process and 4 stages of proof. Revelations should be brought out by multiple parties (4+) at the same time, the wire services that feed all major networks, the spectrum of print media emerges with stories simultaneously, the internet blogs and social media drive stories into the open via mass distribution, foreign press and sources cross pollenate to US press, safety in numbers, people in the public eye, veracity, gravitas, sources. ONE: Repeat existing stories about past crimes of MKULTRA, Cointelpro, human guinea pigs, crimes of not just CIA etc but of foreign intelligence services and militaries during and after the Cold War. TWO: Run past interviews that feature perps and examine the psyop cover stories a la remote viewing. Borderline personalities and their professional links guilt by association. Begin in depth stories on systematic abuse by intelligence agencies a la the Finders and Aquino, link weapons development to the cover up. Reveal the link between using goats for nonlethal weapons experiments and movie. THREE: Criminality in office, fiscal crimes, abuse of power by overreach, reading all emails etc, misuse of government funds, overstaying tenure, industrial espionage, lying to Congress, other transgressions. FOUR: Rerun existing shows on existing and near term technology, slow strip tease on unclassified and classified operations and methods and technology. Interviews with scientists and insiders. Demonstrations of weapons and how they can be used and not detected. Past use to attack in USSR. FIVE: The pace to maintain safety from mass attack. The glide path to landing. 100 days or 200 days or 300 days? Birth, nine months from start to finish. If the process is endangered by going too slow then cut the process to 6 months, emergency go to 100 days, final proof should be government documents. Rules for force protection: Safety in numbers, simultaneous actions in media to inform public Rules under threat: Third time’s the charm: delay once, twice, then deliver the goods. Loose it, but don’t destroy it: misplace electronic data, documents, later to be found or replaced. I know nothing: plead ignorance, uncertainty, do no harm. Go slow: delay, delay, it’s coming, it gets there eventually. Rules for resistance: Sabotage infrastructure: break it, cut it off, attack inanimate objects, hardware, software, money, utilities, information flow, Sick out: stay home, protest, slow the wheels, Civil disobedience: force political figures to act through direct pressure, demonstrations, tax revolt. Encirclement: cut off the physical movement at Fort Meade headquarters etc. through mass action. Rules for enemy forces: Go slow: 3 days to accomplish one day’s work. Head East: Go in the wrong direction. Too many variables: wealth of too much data. The Third Man: Person unknown, mis-identification Erase, Delete, Hide: lost data Sick out: Stay home Sabotage: infrastructure break down, computer viruses, hardware failures Leaks: Damaging information made available to go public, personnel crimes, organizational crimes small and large, financial data, personal data. Procedures and guidelines: 5 rules for resistance forces on the attack: One: Safety in numbers, media information operations use 3-4 outlets for going public at the same time to spread the risk of counter attack. Revelations shall concern hostile leaders and organizations. Two: Sick out, once a month, on the last Friday of the month, the public shall stay home in protest and shelter in place at home. Three: Encirclement, once a month, on the first Weekend of the month, the public shall physically cut off the location of hostile forces and personnel. Public mass demonstrations shall spontaneously occur. Four: Government pressure, force political action through civil disobedience, demonstrations and tax revolts to force government actions against hostile persons and organizations. Five: Sabotage resources and infrastructure, break it, cut it off. Attack inanimate objects , hardware, software, electricity, water, bank accounts, deny services, deny aid and comfort. Rules for resistance under threat: One: Third time’s the charm, delay once, twice, then deliver the goods. Two: Lose it but don’t destroy it, websites, bank accounts, omit but conserve friendly assets. Three: Do no harm, “I don’t know”, plead ignorance, uncertainty, create a temporary void. Four: Go slow, delay, “It’s coming”. Rules for hostile forces on the attack: One: Go slow, 3 days to do 1 day’s work. Two: Head East: go in the wrong direction Three: Too many variables, wealth of too much data Four: The Third Man: misidentification, person unknown Five: Erase, delete, hide: lost data Six: Sick out, stay home for three days at the outset Seven: Sabotage, break it, software, hardware, assets lost or destroyed. Schedule: Roll out will commence in the Spring and take between 100 and 180 days to complete. Initial roll out of whistleblower Allow two weeks for initial public roll out to gain traction. Information operations (mosaic) Multiple outlets for revelations of criminal activity released to the public at the same time. New revelations should occur every 2-3 weeks to maintain constant pressure. Misuse of government funds, abuse of power, violations of code of conduct, lying to Congress, excess time in office, other more severe criminality by persons and organizations. Past, present. Mass protests Protests shall take place on the last on the last Friday of the month (sick out) and on the first Saturday of the month (demonstrations). Tax revolt Withhold all transfer payments to the Federal authority to force dismissal and or arrest of suspects and to bring organizations into compliance, including future reforms. Government hearings A special prosecutor, a Congressional Commission, and Congressional Hearings shall commence and call whistleblower. Separate hearings at municipal level in the form of truth and reconciliation hearings. Whistleblower roll out methodology and timetable: Full court press in the media to dispel smear, no appearances to exceed 45 minutes. Press conferences: Daily press briefings, Q & A, use of standard format, structured controlled environment, moderator network sponsor, multimedia using photos, video, overhead projector, documents displayed, expert panels available to support and reinforce the message. Television interviews: The full Ginzburg during week one and two on national and local news media. Entertainment shows: morning shows, late night shows, supply humorous anecdotes, jokes, scripted and light, moments of seriousness and advocacy. Government hearings: testimony aired live in entirety, allow submission and display of multimedia photos, video, documents, power point, other information assets to reinforce verbal testimony. Concerts and events: musical events and entertainment featuring various artists where whistleblower makes a surprise appearance. Sings, humor, controlled environment, small to medium sized crowds.

No comments:

Post a Comment