HOMEChronology of TerrorBibliographiesValuable WebsitesAbout This SiteSITE MAP
ACTIONNEWSSolutionsCandles in the darknessRevealing Quotes 1 2 3 4LettersSEARCH

“Whenever the legislators endeavor to take away and destroy the property of the people, or to reduce them to slavery under arbitrary power, they put themselves into a state of war with the people, who are thereupon absolved from any further obedience...”

— John Locke
2nd Treatise on Government
Chapter 19  paragraph 222

The Weapons of American Terrorism:
Domestic Oppression

AssassinationChemical & Biological WeaponsCluster BombsDepleted Uranium
Domestic Oppression • Fuel-Air BombsNuclear BombsSurveillanceTorture

From Rogue State:
A Guide to the World’s Only Superpower

by William Blum:

From a United States Army training manual, Terrorism and the Urban Guerilla,1960s:

Measures of Controlling the Population
and Resources

1. ID Cards. An effective system of identification is fundamental to the program...

2. Registration. A program of registering families is used to supplement the system of ID cards. This is the system of inventorying all families by house, making a list of all members of the family who live in the house along with the family’s resources. One can also note the presence of insurgent tendencies and affiliations among the population.

3. Control by block. The purpose of block-by-block control is to detect the individuals who are supporting or sympathizing with the insurgents and the type of support they are providing.

4. Police patrols. Their purpose is to detect sources of insurgent support, sympathizers, and routes used by the insurgent forces for intelligence, logistics, and routine activities...

Curfew. The purpose is to permit the authorities to identify violators and take actions based on the premise that anyone who violates the curfew is an insurgent or sympathizes with the insurgents until he can prove the contrary.

Checkpoints. It is of little use to establish a program of passes and ID cards unless there is a system of verifying these official papers. Therefore, establishing checkpoints in all travel routes is necessary once the use of passes has started.

true American flag - swastika and stripes - symbol of American state terrorism

From Derailing Democracy:
The America the Media Don’t Want You to See

by David McGowan:

National ID cards

“[The national ID card will have a] magnetic strip on it in which the bearer’s unique voice, retina pattern, or fingerprint is digitally encoded.”

— Senator Dianne Feinstein
(D) California
author of the national ID law

“[A]fter October 1, 2000, Federal agencies may only accept as proof of identity driver’s licenses that conform to standards developed by the Secretary of the Treasury.”

Public Law 104-208, Part B, Title IV, Section 656

true American flag - swastika and stripes - symbol of American state terrorism

The people are the enemy

“Many cold war military suppliers are converting to civilian law enforcement. The Department of Justice, the CIA and the Pentagon are quietly taking an active and coordinated role in marketing defense-related technologies to law enforcement agencies.”

National Criminal Justice Commission
February 1996

“Throughout the nation, paramilitary, SWAT or tactical policing — that is, law enforcement that uses the equipment, training, rhetoric and group tactics of war — is on the rise. According to a study by sociologist Peter Kraska, the nation has more than 30,000 such heavily armed, militarily trained police units...

“Between 1995 and 1997 the DOD (United States Department of Defense) gave local police departments more than 3,800 M-16 automatic assault rifles, 2,185 M-14 semiautomatic rifles, 73 M-79 grenade launchers and 112 armored personnel carriers — 1.2 million pieces of military hardware in 1997 alone.”

The Nation
“SWAT Nation”
May 31, 1999

“The Pentagon and the Justice Department have agreed on the outlines of a plan to share state-of-the-art military technology with civilian law-enforcement agencies, including exotic ‘non-lethal’ weapons such as sticky foam for immobilizing criminals and giant snares for trapping cars. Other items that will be evaluated for combating crime include infrared surveillance gear, sonar devices for pinpointing the origin of gunfire and digital information systems that could permit instantaneous transmission of photographs of crime suspects to police in the street...”

San Jose Mercury News
March 23, 1994

“On one such evening, three squads of ten police officers in combat boots, black jumpsuits, military helmets and bulletproof vests lock and load their Heckler & Koch MP-54 submachine guns (the same weapons used by the elite Navy SEALs) and fan out through the neighborhood... Since 1994 the VCSU has patrolled this city’s have-not suburbs in full military gear, with automatic assault rifles at the ready. Backed by two helicopters with infrared scopes and an Army-surplus armored personnel carrier, the unit is also equipped with attack dogs, smoke bombs, tear gas, pepper spray, metal clubs and less-than-lethal ‘blunt trauma’ projectiles.”

The Nation
“SWAT Nation”
May 31, 1999

Guatemala? El Salvador? Colombia perhaps? No, this is Fresno, California. The article above is describing the routine activities of the so-called “Violent Crime Suppression Unit” (VCSU).

Perhaps there would be a bit more truth-in-advertising if the unit were called the “Fresno Experimental Army of Repression” (FEAR).

See also:

US military trains for urban warfare

United States Marine Corps Emblems

“Clearly someone at the Pentagon has an affection for reptiles...”

This page provides a look at some very strange Marine Corps emblems. These, together with a photograph of an “urban warrior” outfit, illustrate that the U.S. military is training its soldiers to engage in violent operations within densely populated urban environments.

true American flag - swastika and stripes - symbol of American state terrorism

Related pages

The United States Government Committed the September 11 Attacks

The CIA, Insider Trading and the World Trade Center Terror Attack

Fake Terror: the Road to Dictatorship

Operation 911: NO SUICIDE PILOTS

America’s Techno-Fascist Future

Surveillance in America

Mumia Abu-Jamal: Political Prisoner in America

Police-State Brutality and the Battle of Seattle

Terrorism Begins at Home: Police Brutality in America

Taking Action Against American Terrorism


War At Home:
Covert Action Against U.S. Activists and What We Can Do About It
by Brian Glick

Derailing Democracy:
The America the Media Don’t Want You to See
by David McGowan

Body of Secrets:
Anatomy of the Ultra-Secret National Security Agency
by James Bamford

In 1962, U.S. military leaders had a top-secret plan for committing terrorist attacks on Americans in Miami and Washington D.C., while blaming Cuba. Codenamed “Operation Northwoods”, the plan was intended to provide the propaganda necessary to create popular support for an invasion of Cuba.

The Beast Reawakens
by Martin A. Lee

Globalize This!
The Battle Against the World Trade Organization and Corporate Rule
edited by Kevin Danaher and Roger Burbach; multiple authors

Blackshirts and Reds:
Rational Fascism and the Overthrow of Communism
by Michael Parenti

Books and videos by and about Mumia Abu-Jamal

What Uncle Sam Really Wants
by Noam Chomsky

The Decline and Fall of the American Empire
by Gore Vidal

The Habits of Highly Deceptive Media:
Decoding Spin and Lies in Mainstream News
by Norman Solomon

Inventing Reality:
The Politics of News Media
by Michael Parenti

Corporate Media and the Threat to Democracy
by Robert W. McChesney

Manufacturing Consent:
The Political Economy of the Mass Media
by Edward S. Herman and Noam Chomsky

Pirates and Emperors, Old and New:
International Terrorism in the Real World
by Noam Chomsky

Against Empire
by Michael Parenti

Apocalypse 1945:
The Destruction of Dresden
by David Irving

A People’s History of the United States:
1492 — Present
by Howard Zinn

Lies My Teacher Told Me:
Everything Your American History Textbook Got Wrong
by James Loewen

Censored 2000:
The Year’s Top 25 Censored Stories
by Peter Phillips & Project Censored

Market Elections:
How “Democracy” Serves the Rich
by Vince Copeland

Democracy for the Few
by Michael Parenti

Corporate Predators:
The Hunt for Mega-Profits and the Attack on Democracy
by Russell Mokhiber and Robert Weissman

Dumbing Us Down:
The Hidden Curriculum of Compulsory Schooling
by John Taylor Gatto

The Hidden Persuaders:
What makes us buy, believe – and even vote – the way we do?
by Vance Packard

Deadly Deceits:
My 25 years in the CIA
by Ralph W. McGehee

Toxic Sludge is Good for You!:
Lies, Damn Lies and the Public Relations Industry
by John Stauber and Sheldon Rampton

War, Lies & Videotape:
How media monopoly stifles truth
edited by Lenora Foerstel; multiple authors

true American flag - swastika and stripes - symbol of American state terrorism

The Weapons of American State Terrorism


Chemical & Biological Weapons

Cluster Bombs

Depleted Uranium

Domestic Oppression

Fuel-Air Bombs

Nuclear Bombs



[Blue Ribbon Campaign icon]
Join the Blue Ribbon Online Free Speech Campaign!

“If you want free speech you can go down to a street corner and shout.”

— Jim Olson
owner of Humboldt Internet
September 26, 2001

On September 14, 2001, three days after the WTC attack, the owner of the humboldt1.com ISP summarily deleted the original American Terrorism website. When informed that he was suppressing online free speech, he offered the helpful advice above.

Launched: May, 2000  —  Torpedoed: September 14, 2001   R.I.P.

To spare my vocal chords I offer this remaining mirror site:


http://www.AmericanStateTerrorism.com/ (Germany)
AWOL: October 24, 2003 – no response to email inquiries

http://americanterrorism.afedwards.com/ (U.K.)
Missing In Action: May 27, 2002
entire afedwards.com site vanished, email inquiries bounced back

Efficient FTP access terminated for all free sites: April 1, 2002

Axed by Angelfire.com: December 13, 2001 (see note below)

Torpedoed by Tripod.com: October 18, 2001 (see note below)

“Lycos [Tripod and Angelfire]... reserves the right to terminate any user’s access to the Lycos Network...for any reason or for no reason at all, in Lycos’ sole discretion, without prior notice, or any notice.”

...or without any discretion, or, after September 11, 2001, for a hypocrite, patriot-idiot, police-state censorship reason.

HOME Chronology of Terror Bibliographies Valuable Websites

ACTION Solutions Candles in the darkness About This Site

NEWS Revealing Quotes 1 2 3 4 Letters SEARCH SITE MAP