HOME
Chronology of Terror
Bibliographies
Valuable Websites
About This Site
SITE MAP
ACTION
NEWS
Solutions
Candles in the darkness
Revealing Quotes 1
2
3
4
Letters
SEARCH
Whenever the legislators endeavor to take away and destroy the property of the people, or to reduce them to slavery under arbitrary power, they put themselves into a state of war with the people, who are thereupon absolved from any further obedience...
John Locke
1690
2nd Treatise on Government
Chapter 19 paragraph 222
The Weapons of American Terrorism:
Domestic Oppression
Assassination
Chemical & Biological Weapons
Cluster Bombs
Depleted Uranium
Domestic Oppression
Fuel-Air Bombs
Nuclear Bombs
Surveillance
Torture
From Rogue State:
A Guide to the Worlds Only Superpower
by William Blum:From a United States Army training manual, Terrorism and the Urban Guerilla,1960s:
Measures of Controlling the Population
and Resources
1. ID Cards. An effective system of identification is fundamental to the program...
2. Registration. A program of registering families is used to supplement the system of ID cards. This is the system of inventorying all families by house, making a list of all members of the family who live in the house along with the familys resources. One can also note the presence of insurgent tendencies and affiliations among the population.
3. Control by block. The purpose of block-by-block control is to detect the individuals who are supporting or sympathizing with the insurgents and the type of support they are providing.
4. Police patrols. Their purpose is to detect sources of insurgent support, sympathizers, and routes used by the insurgent forces for intelligence, logistics, and routine activities...
Curfew. The purpose is to permit the authorities to identify violators and take actions based on the premise that anyone who violates the curfew is an insurgent or sympathizes with the insurgents until he can prove the contrary.
Checkpoints. It is of little use to establish a program of passes and ID cards unless there is a system of verifying these official papers. Therefore, establishing checkpoints in all travel routes is necessary once the use of passes has started.
From Derailing Democracy:
The America the Media Dont Want You to See
by David McGowan:
National ID cards
[The national ID card will have a] magnetic strip on it in which the bearers unique voice, retina pattern, or fingerprint is digitally encoded.
Senator Dianne Feinstein
(D) California
author of the national ID law
[A]fter October 1, 2000, Federal agencies may only accept as proof of identity drivers licenses that conform to standards developed by the Secretary of the Treasury.
Public Law 104-208, Part B, Title IV, Section 656
The people are the enemy
Many cold war military suppliers are converting to civilian law enforcement. The Department of Justice, the CIA and the Pentagon are quietly taking an active and coordinated role in marketing defense-related technologies to law enforcement agencies.
National Criminal Justice Commission
February 1996
Throughout the nation, paramilitary, SWAT or tactical policing that is, law enforcement that uses the equipment, training, rhetoric and group tactics of war is on the rise. According to a study by sociologist Peter Kraska, the nation has more than 30,000 such heavily armed, militarily trained police units...
Between 1995 and 1997 the DOD (United States Department of Defense) gave local police departments more than 3,800 M-16 automatic assault rifles, 2,185 M-14 semiautomatic rifles, 73 M-79 grenade launchers and 112 armored personnel carriers 1.2 million pieces of military hardware in 1997 alone.
The Nation
SWAT Nation
May 31, 1999
The Pentagon and the Justice Department have agreed on the outlines of a plan to share state-of-the-art military technology with civilian law-enforcement agencies, including exotic non-lethal weapons such as sticky foam for immobilizing criminals and giant snares for trapping cars. Other items that will be evaluated for combating crime include infrared surveillance gear, sonar devices for pinpointing the origin of gunfire and digital information systems that could permit instantaneous transmission of photographs of crime suspects to police in the street...
San Jose Mercury News
March 23, 1994
On one such evening, three squads of ten police officers in combat boots, black jumpsuits, military helmets and bulletproof vests lock and load their Heckler & Koch MP-54 submachine guns (the same weapons used by the elite Navy SEALs) and fan out through the neighborhood... Since 1994 the VCSU has patrolled this citys have-not suburbs in full military gear, with automatic assault rifles at the ready. Backed by two helicopters with infrared scopes and an Army-surplus armored personnel carrier, the unit is also equipped with attack dogs, smoke bombs, tear gas, pepper spray, metal clubs and less-than-lethal blunt trauma projectiles.
The Nation
SWAT Nation
May 31, 1999Guatemala? El Salvador? Colombia perhaps? No, this is Fresno, California. The article above is describing the routine activities of the so-called Violent Crime Suppression Unit (VCSU).
Perhaps there would be a bit more truth-in-advertising if the unit were called the Fresno Experimental Army of Repression (FEAR).
See also:
US military trains for urban warfare
http://www.wsws.org/articles/1999/aug1999/war-a24.shtml
United States Marine Corps Emblems
http://www.reptilianagenda.com/img/i101899b.htmlClearly someone at the Pentagon has an affection for reptiles...This page provides a look at some very strange Marine Corps emblems. These, together with a photograph of an urban warrior outfit, illustrate that the U.S. military is training its soldiers to engage in violent operations within densely populated urban environments.
Related pages
The United States Government Committed the September 11 Attacks
The CIA, Insider Trading and the World Trade Center Terror Attack
Fake Terror: the Road to Dictatorship
Operation 911: NO SUICIDE PILOTS
Americas Techno-Fascist Future
Mumia Abu-Jamal: Political Prisoner in America
Police-State Brutality and the Battle of Seattle
Terrorism Begins at Home: Police Brutality in America
Taking Action Against American Terrorism
Bibliography
War At Home:
Covert Action Against U.S. Activists and What We Can Do About It
by Brian Glick
Derailing Democracy:
The America the Media Dont Want You to See
by David McGowan
Body of Secrets:
Anatomy of the Ultra-Secret National Security Agency
by James BamfordIn 1962, U.S. military leaders had a top-secret plan for committing terrorist attacks on Americans in Miami and Washington D.C., while blaming Cuba. Codenamed Operation Northwoods, the plan was intended to provide the propaganda necessary to create popular support for an invasion of Cuba.
The Beast Reawakens
by Martin A. Lee
Globalize This!
The Battle Against the World Trade Organization and Corporate Rule
edited by Kevin Danaher and Roger Burbach; multiple authors
Blackshirts and Reds:
Rational Fascism and the Overthrow of Communism
by Michael Parenti
Books and videos by and about Mumia Abu-Jamal
What Uncle Sam Really Wants
by Noam Chomsky
The Decline and Fall of the American Empire
by Gore Vidal
The Habits of Highly Deceptive Media:
Decoding Spin and Lies in Mainstream News
by Norman Solomon
Inventing Reality:
The Politics of News Media
by Michael Parenti
Corporate Media and the Threat to Democracy
by Robert W. McChesney
Manufacturing Consent:
The Political Economy of the Mass Media
by Edward S. Herman and Noam Chomsky
Pirates and Emperors, Old and New:
International Terrorism in the Real World
by Noam Chomsky
Against Empire
by Michael Parenti
Apocalypse 1945:
The Destruction of Dresden
by David Irving
A Peoples History of the United States:
1492 Present
by Howard Zinn
Lies My Teacher Told Me:
Everything Your American History Textbook Got Wrong
by James Loewen
Censored 2000:
The Years Top 25 Censored Stories
by Peter Phillips & Project Censored
Market Elections:
How Democracy Serves the Rich
by Vince Copeland
Democracy for the Few
by Michael Parenti
Corporate Predators:
The Hunt for Mega-Profits and the Attack on Democracy
by Russell Mokhiber and Robert Weissman
Dumbing Us Down:
The Hidden Curriculum of Compulsory Schooling
by John Taylor Gatto
The Hidden Persuaders:
What makes us buy, believe and even vote the way we do?
by Vance Packard
Deadly Deceits:
My 25 years in the CIA
by Ralph W. McGehee
Toxic Sludge is Good for You!:
Lies, Damn Lies and the Public Relations Industry
by John Stauber and Sheldon Rampton
War, Lies & Videotape:
How media monopoly stifles truth
edited by Lenora Foerstel; multiple authors
The Weapons of American State Terrorism
Domestic Oppression
Join the Blue Ribbon Online Free Speech Campaign!
If you want free speech you can go down to a street corner and shout. Jim Olson
owner of Humboldt Internet
September 26, 2001On September 14, 2001, three days after the WTC attack, the owner of the humboldt1.com ISP summarily deleted the original American Terrorism website. When informed that he was suppressing online free speech, he offered the helpful advice above.
http://www.humboldt1.com/~016910/Amerikan_Terrorism.html
Launched: May, 2000 Torpedoed: September 14, 2001 R.I.P.
To spare my vocal chords I offer this remaining mirror site:
http://free.freespeech.org/americanstateterrorism/
http://www.AmericanStateTerrorism.com/ (Germany)
AWOL: October 24, 2003 no response to email inquiries
http://americanterrorism.afedwards.com/ (U.K.)
Missing In Action: May 27, 2002
entire afedwards.com site vanished, email inquiries bounced back
http://www.geocities.com/americanterrorism/
Efficient FTP access terminated for all free sites: April 1, 2002
http://www.angelfire.com/dc/americanterrorism/
Axed by Angelfire.com: December 13, 2001 (see note below)
http://americanterrorism.tripod.com/
Torpedoed by Tripod.com: October 18, 2001 (see note below)
Lycos [Tripod and Angelfire]... reserves the right to terminate any users access to the Lycos Network...for any reason or for no reason at all, in Lycos sole discretion, without prior notice, or any notice.
...or without any discretion, or, after September 11, 2001, for a hypocrite, patriot-idiot, police-state censorship reason. |
HOME Chronology of Terror Bibliographies Valuable Websites
ACTION Solutions Candles in the darkness About This Site
NEWS Revealing Quotes 1 2 3 4 Letters SEARCH SITE MAP