Warning: count(): Parameter must be an array or an object that implements Countable in /home/tbrnew5/public_html/wp-includes/post-template.php on line 284

TBR News July 4, 2019

Jul 04 2019

The Voice of the White House Washington, D.C. July 4, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 4:”Throughout his career, Trump has always felt comfortable operating at or beyond the ethical boundaries that constrain typical businesses. In the 1980s, he worked with La Cosa Nostra, which controlled the New York cement trade, and later employed Michael Cohen and Felix Sater, both of whom have links to the Russian Mafia. Trump habitually refused to pay his counter parties, and if the people he burned (or any journalists) got in his way, he bullied them with threats. He also used LLCs which he created for the purpose of swindling firm who, for example, laid new carpet in one of his hotels. The vendor billed the LLC which promptly went bankrupt. This has been a favorite gambit of Trump.

Trump continually acts like a man with a great deal to hide: declining to testify to anything under oath, dangling  Presidential pardons to keep potential witnesses and former employees from incriminating him, publicly chastising his attorney general for not quashing the whole Russian investigation, and endorsing Russia’s claims that it had nothing to do with the election. (“Russia continues to say they had nothing to do with Meddling in our Election!” he tweeted last month, contradicting the conclusion of every U.S. intelligence and counter-intelligence agency.) Trump’s behavior toward Russia looks exactly like that of an accessory after the fact.

When, and not if, it becomes public knowledge that the President of the US is an agent of a foreign power, it would be the worst scandal in American history, far surpassing Tea Pot Dome or Watergate.

In conclusion, it is clearly obvious that President Trump was jobbed into his office with the full cooperation of Russian intelligence and that he is currently engaged in efforts to carry out their political global programs which, if allowed to continue, will wreak economic and political havoc on the American government, business community and public.

And consider that the United States has been harassing Vladimir Putin’s Russia economically and causing considerable problems for that country. Mr. Putin’s reactive countermeasures aganst the United States are certainly in response to these actions and in the long view, far more effective than sanctions and hysterical threats.”


The Table of Contents

  • Could ‘fake text’ be the next global political threat?
  • A Study of Assassination: From a CIA manual
  • The Dominonist Plot
  • Encyclopedia of American Loons
  • The CIA Confessions: The Crowley Conversations




Could ‘fake text’ be the next global political threat?

An AI fake text generator that can write paragraphs in a style based on just a sentence has raised concerns about its potential to spread false information

July 4, 2019

by Oscar Schwartz

The Guardian

Earlier this month, an unexceptional thread appeared on Reddit announcing that there is a new way “to cook egg white[s] without a frying pan”.

As so often happens on this website, which calls itself “the front page of the internet”, this seemingly banal comment inspired a slew of responses. “I’ve never heard of people frying eggs without a frying pan,” one incredulous Redditor replied. “I’m gonna try this,” added another. One particularly enthusiastic commenter even offered to look up the scientific literature on the history of cooking egg whites without a frying pan.

Every day, millions of these unremarkable conversations unfold on Reddit, spanning from cooking techniques to geopolitics in the Western Sahara to birds with arms. But what made this conversation about egg whites noteworthy is that it was not taking place among people, but artificial intelligence (AI) bots.

The egg whites thread is just one in a growing archive of conversations on a subreddit – a Reddit forum dedicated to a specific topic – that is made up entirely of bots trained to emulate the style of human Reddit contributors. This simulated forum was created by a Reddit user called disumbrationist using a tool called GPT-2, a machine learning language generator that was unveiled in February by OpenAI, one of the world’s leading AI labs.

Jack Clark, policy director at OpenAI, told me that chief among these concerns is how the tool might be used to spread false or misleading information at scale. In a recent testimony given at a House intelligence committee hearing about the threat of AI-generated fake media, Clark said he foresees fake text being used “for the production of [literal] ‘fake news’, or to potentially impersonate people who had produced a lot of text online, or simply to generate troll-grade propaganda for social networks”.

GPT-2 is an example of a technique called language modeling, which involves training an algorithm to predict the next most likely word in a sentence. While previous language models have struggled to generate coherent longform text, the combination of more raw data – GPT-2 was trained on 8m online articles – and better algorithms has made this model the most robust yet.

It essentially works like Google auto-complete or predictive text for messaging. But instead of simply offering one-word suggestions, if you prompt GPT-2 with a sentence, it can generate entire paragraphs of language in that style. For example, if you feed the system a line from Shakespeare, it generates a Shakespeare-like response. If you prompt it with a news headline, it will generate text that almost looks like a news article.

Alec Radford, a researcher at OpenAI, told me that he also sees the success of GPT-2 as a step towards more fluent communication between humans and machines in general. He says the intended purpose of the system is to give computers greater mastery of natural language, which may improve tasks like speech recognition, which is used by the likes of Siri and Alexa to understand your commands; and machine translation, which is used to power Google Translate.

But as GPT-2 spreads online and is appropriated by more people like disumbrationist – amateur makers who are using the tool to create everything from Reddit threads, to short stories and poems, to restaurant reviews – the team at OpenAI are also grappling with how their powerful tool might flood the internet with fake text, making it harder to know the origins of anything we read online.

Clark and the team at OpenAI take this threat so seriously that when they unveiled GPT-2 in February this year, they released a blogpost alongside it stating that they weren’t releasing the full version of the tool due to “concerns about malicious applications”. (They have since released a larger version of the model, which is being used to create the fake Reddit threads, poems and so on.)

For Clark, convincing machine text like the variety GPT-2 is capable of pose a similar threat to “deepfakes” – machine-learning generated fake images and videos that can been used to make people appear to do things they never did, say things they never said (like this video of former president Barack Obama). “They are essentially the same,” Clark told me. “You have technology that makes it cheaper and easier to fake something, which means that it will just get harder to offer guarantees about the truth of information in the future.”

However, some feel that this overstates the threat of fake text. According to Yochai Benkler, co-head of the Berkman Klein Center for Internet & Society at Harvard, the most damaging instances of fake news are written by political extremists and trolls, and tend to be about controversial topics that “trigger deep-seated hatred”, like election fraud or immigration. While a system like GPT-2 can produce semi-coherent articles at scale, it is a long way from being able to replicate this type of psychological manipulation. “The simple ability to generate false text at scale is not likely to affect most forms of disinformation,” he told me.

Other experts have suggested that OpenAI exaggerated the malicious potential of GPT-2 in order to create hype around their research. For Zack Lipton, professor of business technologies at Carnegie Mellon University, the assessment of the risk of the technology was disingenuous.

“Of all the bad uses of AI – from recommender systems that lead to filter bubbles and the racial consequences that emerge from automated categorization – I would put the threat of language modeling at the bottom of the list,” he said. “What OpenAI have done is commandeered the discourse and fear about AI and used it to generate hype around their product.”

OpenAI’s concerns are being taken seriously by some. A team of researchers from the Allen Institute for Artificial Intelligence recently developed a tool to detect “neural fake news”. Yejin Choi, a professor of computer science at the University of Washington who worked on the project, told me that detecting synthetic text is actually “fairly easy” due to the fact that generated text has a “statistical signature”, almost like a fingerprint, that can be easily identified.

While such digital forensics are useful, Britt Paris, a researcher at New York-based institute Data & Society, worries that such solutions misleadingly frame fake news as a technological problem when, in fact, most misinformation is created and spread online without the help of sophisticated technologies.

“We already have a ton of ways for generating false information and people do a pretty good job of circulating this stuff without the help of machines,” she said. Indeed, the most prominent instances of fake content online – such as the “drunk Nancy Pelosi” video released earlier this year – were created using rudimentary editing techniques that have been around for decades.

Benkler agrees, adding that fake news and disinformation are “first and foremost political-cultural problems, not technological problems”. Tackling the problem, he says, requires not better detection technologies, but an examination of the social conditions that have made fake news a reality.

Whether or not GPT-2, or a similar technology, becomes the misinformation machine that OpenAI are anxious about, there is a growing consensus that considering the social implications of a technology before it is released is good practice. At the same time, predicting precisely how technologies will be used and misused is notoriously difficult. Who would have thought 10 years ago that a recommendation algorithm for watching videos online would turn into a powerful radicalizing instrument?

Given the difficulty of predicting the potential harm of a technology, I thought I would see how GPT-2 faired in assessing its own capacity for spreading misinformation. “Do you think that you will be used to spread fake news and further imperil our already degraded information eco-system?” I prompted the machine.

“The fact that we can’t find the name of who actually post the article is a great clue,” it responded. “However, this person is still using social media sites to post the fake news with a clear purpose.”


A Study of Assassination: From a CIA manual



Assassination is a term thought to be derived from “Hashish”, a drug similar to marijuana, said to have been used by Hasan-Dan-Sabah to induce motivation in his followers, who were assigned to carry out political and other murders, usually at the c ost of their lives. It is here used to describe the planned killing of a person who is not under the legal jurisdiction of the killer, who is not physically in the hands of the killer, who has been selected by a resistance organization for death, and who has been selected by a resistance organization for death, and whose death provides positive advantages to that organization.


Assassination is an extreme measure not normally used in clandestine operations. It should be assumed that it will never be ordered or authorized by any U.S. Headquarters, though the latter may in rare instances agree to its execution by members of an associated foreign service.

This reticence is partly due to the necessity for committing communications to paper. No assassination instructions should ever be written or recorded. Consequently, the decision to employ this technique must nearly always be reached in the field, at the area where the act will take place.

Decision and instructions should be confined to an absolute minimum of persons. Ideally, only one person will be involved. No report may be made, but usually the act will be properly covered by normal news services, whose output is available to all concerned.


Murder is not morally justifiable. Self-defense may be argued if the victim has knowledge which may destroy the resistance organization if divulged. Assassination of persons responsible for atrocities or reprisals may be regarded as just punishment. Killing a political leader whose burgeoning career is a clear and present danger to the cause of freedom may be held necessary.

But assassination can seldom be employed with a clear conscience. Persons who are morally squeamish should not attempt it.


The techniques employed will vary according to whether the subject is unaware of his danger, aware but unguarded, or guarded. They will also be affected by whether or not the assassin is to be killed with the subject hereafter, assassinations in which the subject is unaware will be termed “simple”; those where the subject is aware but unguarded will be termed “chase”; those where the victim is guarded will be termed “guarded.”

If the assassin is to die with the subject, the act will be called “lost.” If the assassin is to escape, the adjective will be “safe.” It should be noted that no compromises should exist here. The assassin must not fall alive into enemy hands.

A further type division is caused by the need to conceal the fact that the subject was actually the victim of assassination, rather than an accident or natural causes. If such concealment is desirable the operation will be called “secret”; if concealment is immaterial, the act will be called “open”; while if the assassination requires publicity to be effective it will be termed “terroristic.”

Following these definitions, the assassination of Julius Caesar was safe, simple, and terroristic, while that of Huey Long was lost, guarded and open. Obviously, successful secret assassinations are not recorded as assassination at all. [Illegible] of Thailand and Augustus Caesar may have been the victims of safe, guarded and secret assassination. Chase assassinations usually involve clandestine agents or members of criminal organizations.


In safe assassinations, the assassin needs the usual qualities of a clandestine agent. He should be determined, courageous, intelligent, resourceful, and physically active. If special equipment is to be used, such as firearms or drugs, it is clear that he must have outstanding skill with such equipment.

Except in terroristic assassinations, it is desirable that the assassin be transient in the area. He should have an absolute minimum of contact with the rest of the organization and his instructions should be given orally by one person only. His safe evacuation after the act is absolutely essential, but here again contact should be as limited as possible. It is preferable that the person issuing instructions also conduct any withdrawal or covering action which may be necessary.

In lost assassination, the assassin must be a fanatic of some sort. Politics, religion, and revenge are about the only feasible motives. Since a fanatic is unstable psychologically, he must be handled with extreme care. He must not know the identities of the other members of the organization, for although it is intended that he die in the act, something may go wrong. While the Assassin of Trotsky has never revealed any significant information, it was unsound to depend on this when the act was planned.


When the decision to assassinate has been reached, the tactics of the operation must be planned, based upon an estimate of the situation similar to that used in military operations. The preliminary estimate will reveal gaps in information and possibly indicate a need for special equipment which must be procured or constructed.

When all necessary data has been collected, an effective tactical plan can be prepared. All planning must be mental; no papers should ever contain evidence of the operation.

In resistance situations, assassination may be used as a counter-reprisal. Since this requires advertising to be effective, the resistance organization must be in a position to warn high officials publicly that their lives will be the price of reprisal action against innocent people. Such a threat is of no value unless it can be carried out, so it may be necessary to plan the assassination of various responsible officers of the oppressive regime and hold such plans in readiness to be used only if provoked by excessive brutality. Such plans must be modified frequently to meet changes in the tactical situation.


The essential point of assassination is the death of the subject. A human being may be killed in many ways but sureness is often overlooked by those who may be emotionally unstrung by the seriousness of this act they intend to commit. The specific technique employed will depend upon a large number of variables, but should be constant in one point: Death must be absolutely certain. The attempt on Hitler’s life failed because the conspiracy did not give this matter proper attention.

Arson can cause accidental death if the subject is drugged and left in a burning building. Reliability is not satisfactory unless the building is isolated and highly combustible.

Techniques may be considered as follows:

1.Manual – It is possible to kill a man with the bare hands, but very few are skillful enough to do it well. Even a highly trained Judo expert will hesitate to risk killing by hand unless he has absolutely no alternative. However, the simplest local too ls are often much the most efficient means of assassination. A hammer, axe, wrench, screw driver, fire poker, kitchen knife, lamp stand, or anything hard, heavy and handy will suffice.

A length of rope or wire or a belt will do if the assassin is strong and agile. All such improvised weapons have the important advantage of availability and apparent innocence. The obviously lethal machine gun failed to kill Trotsky where an item of sporting goods succeeded.

In all safe cases where the assassin may be subject to search, either before or after the act, specialized weapons should not be used. Even in the lost case, the assassin may accidentally be searched before the act and should not carry an incriminating de vice if any sort of lethal weapon can be improvised at or near the site. If the assassin normally carries weapons because of the nature of his job, it may still be desirable to improvise and implement at the scene to avoid disclosure of his identity.

  1. Accidents – For secret assassination, either simple or chase, the contrived accident is the most effective technique. When successfully executed, it causes little excitement and is only casually investigated.

The most efficient accident, in simple assassination, is a fall of 75 feet or more onto a hard surface. Elevator shafts, stair wells, unscreened windows and bridges will serve. Bridge falls into water are not reliable. In simple cases a private meeting with the subject may be arranged at a properly-cased location. The act may be executed by sudden, vigorous beating of the ankles, tipping the subject over the edge. If the assassin immediately sets up an outcry, playing the “horrified witness”, no alibi o r surreptitious withdrawal is necessary. In chase cases it will usually be necessary to stun or drug the subject before dropping him. Care is required to insure that no wound or condition not attributable to the fall is discernible after death.

Falls into the sea or swiftly flowing rivers may suffice if the subject cannot swim. It will be more reliable if the assassin can arrange to attempt rescue, as he can thus be sure of the subject’s death and at the same time establish a workable alibi.

If the subject’s personal habits make it feasible, alcohol may be used [2 words excised] to prepare him for a contrived accident of any kind.

Falls before trains or subway cars are usually effective, but require exact timing and can seldom be free from unexpected observation.

Automobile accidents are a less satisfactory means of assassination. If the subject is deliberately run down, very exact timing is necessary and investigation is likely to be thorough. If the subject’s car is tampered with, reliability is very low. The subject may be stunned or drugged and then placed in the car, but this is only reliable when the car can be run off a high cliff or into deep water without observation.

3.Drugs – In all types of assassination except terroristic, drugs can be very effective. If the assassin is trained as a doctor or nurse and the subject is under medical care, this is an easy and rare method. An overdose of morphine administered as a sedative will cause death without disturbance and is difficult to detect. The size of the dose will depend upon whether the subject has been using narcotics regularly. If not, two grains will suffice.

If the subject drinks heavily, morphine or a similar narcotic can be injected at the passing out stage, and the cause of death will often be held to be acute alcoholism.

Specific poisons, such as arsenic or strychnine, are effective but their possession or procurement is incriminating, and accurate dosage is problematical. Poison was used unsuccessfully in the assassination of Rasputin and Kolohan, though the latter case is more accurately described as a murder.

  1. Edged Weapons: Any locally obtained edge device may be successfully employed. A certain minimum of anatomical knowledge is needed for reliability.

Puncture wounds of the body cavity may not be reliable unless the heart is reached. The heart is protected by the rib cage and is not always easy to locate.

Abdominal wounds were once nearly always mortal, but modern medical treatment has made this no longer true.

Absolute reliability is obtained by severing the spinal cord in the cervical region. This can be done with the point of a knife or a light blow of an axe or hatchet.

Another reliable method is the severing of both jugular and carotid blood vessels on both sides of the windpipe.

If the subject has been rendered unconscious by other wounds or drugs, either of the above methods can be used to insure death.

5.Blunt Weapons: As with edge weapons, blunt weapons require some anatomical knowledge for effective use. Their main advantage is their universal availability. A hammer may be picked up almost anywhere in the world. Baseball and [illeg] bats are very widely distributed. Even a rock or a heavy stick will do, and nothing resembling a weapon need be procured, carried or subsequently disposed of.

Blows should be directed to the temple, the area just below and behind the ear, and the lower, rear portion of the skull. Of course, if the blow is very heavy, any portion of the upper skull will do. The lower frontal portion of the head, from the eyes to the throat, can withstand enormous blows without fatal consequences.

6.Firearms: Firearms are often used in assassination, often very ineffectively. The assassin usually has insufficient technical knowledge of the limitations of weapons, and expects more range, accuracy and killing power than can be provided with reliability. Since certainty of death is the major requirement, firearms should be used which can provide destructive power at least 100% in excess of that thought to be necessary, and ranges should be half that considered practical for the weapon.

Firearms have other drawbacks. Their possession is often incriminating. They may be difficult to obtain. They require a degree of experience from the user. They are [illeg]. Their [illeg] is consistently over-rated.

However, there are many cases in which firearms are probably more efficient than any other means. These cases usually involve distance between the assassin and the subject, or comparative physical weakness of the assassin, as with a woman.

(a) The precision rifle. In guarded assassination, a good hunting or target rifle should always be considered as a possibility. Absolute reliability can nearly always be achieved at a distance of one hundred yards. In ideal circumstances, the range may be extended to 250 yards. The rifle should be a well made bolt or falling block action type, handling a powerful long-range cartridge. The .300 F.A.B. Magnum is probably the best cartridge readily available. Other excellent calibers are .375 Magnum, .270 Winchester, .30 – 106 p.s., 8 x 60 MM Magnum, 9.3 x.

62 kk and others of this type. These are preferable to ordinary military calibers, since ammunition available for them is usually of the expanding bullet type, whereas most ammunition for military rifles is full jacketed and hence not sufficiently lethal. Military ammunition should not be altered by filing or drilling bullets, as this will adversely affect accuracy.

The rifle may be of the “bull gun” variety, with extra heavy barrel and set triggers, but in any case should be capable of maximum precision. Ideally, the weapon should be able to group in one inch at one hundred yards, but 21/2″ groups are adequate. The sight should be telescopic, not only for accuracy, but because such a sight is much better in dim light or near darkness. As long as the bare outline of the target is discernible, a telescope sight will work, even if the rifle and shooter are in total darkness.

An expanding, hunting bullet of such calibers as described above will produce extravagant laceration and shock at short or mid-range. If a man is struck just once in the body cavity, his death is almost entirely certain.

Public figures or guarded officials may be killed with great reliability and some safety if a firing point can be established prior to an official occasion. The propaganda value of this system may be very high.

(b) The machine gun – Machine guns may be used in most cases where the precision rifle is applicable. Usually, this will require the subversion of a unit of an official guard at a ceremony, though a skillful and determined team might conceivably dispose o f a loyal gun crew without commotion and take over the gun at the critical time.

The area fire capacity of the machine gun should not be used to search out a concealed subject. This was tried with predictable lack of success on Trotsky. The automatic feature of the machine gun should rather be used to increase reliability by placing a 5 second burst on the subject. Even with full jacket ammunition, this will be absolute lethal is the burst pattern is no larger than a man. This can be accomplished at about 150 yards. In ideal circumstances, a properly padded and targeted ma chine gun c an do it at 850 yards. The major difficulty is placing the first burst exactly on the target, as most machine gunners are trained to spot their fire on target by observation of strike. This will not do in assassination as the subject will not wait.

(c)The Submachine Gun: This weapon, known as the “machine-pistol” by the Russians and Germans and “machine-carbine” by the British, is occasionally useful in assassination. Unlike the rifle and machine gun, this is a short range weapon and since it fires pistol ammunition, much less powerful. To be reliable, it should deliver at least 5 rounds into the subject’s chest, though the .45 caliber U.S. weapons have a much larger margin of killing efficiency than the 9 mm European arms.

The assassination range of the sub-machine gun is point-blank. While accurate single rounds can be delivered by sub-machine gunners at 50 yards or more, this is not certain enough for assassination. Under ordinary circumstances, the 5MG should be used as a fully automatic weapon. In the hands of a capable gunner, a high cyclic rate is a distinct advantage, as speed of execution is most desirable, particularly in the case of multiple subjects.

The sub-machine gun is especially adapted to indoor work when more than one subject is to be assassinated. An effective technique has been devised for the use of a pair of sub-machine gunners, by which a room containing as many as a dozen subjects can be “purifico” in about twenty seconds with little or no risk to the gunners. It is illustrated below.

While the U.S. sub-machine guns fire the most lethal cartridges, the higher cyclic rate of some foreign weapons enable the gunner to cover a target quicker with acceptable pattern density. The Bergmann Model 1934 is particularly good in this way. The Danish Madman? SMG has a moderately good cyclic rate and is admirably compact and concealable. The Russian SHG’s have a good cyclic rate, but are handicapped by a small, light protective which requires more kits for equivalent killing effect.

(d) The Shotgun: A large bore shotgun is a most effective killing instrument as long as the range is kept under ten yards. It should normally be used only on single targets as it cannot sustain fire successfully. The barrel may be “sawed” off for convenience, but this is not a significant factor in its killing performance. Its optimum range is just out of reach of the subject. 00 buckshot is considered the best shot size for a twelve gage gun, but anything from single balls to bird shot will do if the range is right. The assassin should aim for the solar plexus as the shot pattern is small at close range and can easily damage the head.

(e) The Pistol – While the handgun is quite inefficient as a weapon of assassination, it is often used, partly because it is readily available and can be concealed on the person, and partly because its limitations are not widely appreciated. While many well known assassinations have been carried out with pistols (Lincoln, Harding, Ghandi), such attempts fail as often as they succeed, (Truman, Roosevelt, Churchill).

If a pistol is used, it should be as powerful as possible and fired from just beyond reach. The pistol and the shotgun are used in similar tactical situations, except that the shotgun is much more lethal and the pistol is much more easily concealed.

In the hands of an expert, a powerful pistol is quite deadly, but such experts are rare and not usually available for assassination missions.

.45 Colt, .44 Special, .455 Kly, .45 A.S. (U.S. Service) and .357 Magnum are all efficient calibers. Less powerful rounds can suffice but are less reliable. Sub-power cartridges such as the .32s and .25s should be avoided.

In all cases, the subject should be hit solidly at least three times for complete reliability.

(f)Silent Firearms – The sound of the explosion of the proponent in a firearm can be effectively silenced by appropriate attachments. However, the sound of the projective passing through the air cannot, since this sound is generated outside the weapon. In cases where the velocity of the bullet greatly exceeds that of sound, the noise so generated is much louder than that of the explosion. Since all powerful rifles have muzzle velocities of over 2000 feet per second, they cannot be silenced.

Pistol bullets, on the other hand, usually travel slower than sound and the sound of their flight is negligible. Therefore, pistols, submachine guns and any sort of improvised carbine or rifle which will take a low velocity cartridge can be silenced. The user should not forget that the sound of the operation of a repeating action is considerable, and that the sound of bullet strike, particularly in bone is quite loud.

Because permissible velocity is low, effective precision range is held to about 100 yards with rifle or carbine type weapons, while w ith pistols, silent or otherwise, are most efficient just beyond arms length. The silent feature attempts to provide a degree of safety to the assassin, but mere possession of a silent firearm is likely to create enough hazard to counter the advantage of its silence. The silent pistol combines the disadvantages of any pistol with the added one of its obviously clandestine purpose.

A telescopically sighted, closed-action carbine shooting a low velocity bullet of great weight, and built for accuracy, could be very useful to an assassin in certain situations. At the time of writing, no such weapon is known to exist.

7.Explosives: Bombs and demolition charges of various sorts have been used frequently in assassination. Such devices, in terroristic and open assassination, can provide safety and overcome guard barriers, but it is curious that bombs have often been the implement of lost assassinations.

The major factor which affects reliability is the use of explosives for assassination. the charge must be very large and the detonation must be controlled exactly as to time by the assassin who can observe the subject. A small or moderate explosive charge is highly unreliable as a cause of death, and time delay or booby-trap devices are extremely prone to kill the wrong man. In addition to the moral aspects of indiscriminate killing, the death of casual bystanders can often produce public reactions unfavorable to the cause for which the assassination is carried out.

Bombs or grenades should never be thrown at a subject. While this will always cause a commotion and may even result in the subject’s death, it is sloppy, unreliable, and bad propaganda. The charge must be too small and the assassin is never sure of: (1)re aching his attack position, (2) placing the charge close enough to the target and (3) firing the charge at the right time.

Placing the charge surreptitiously in advance permits a charge of proper size to be employed, but requires accurate prediction of the subject’s movements.

Ten pounds of high explosive should normally be regarded as a minimum, and this is explosive of fragmentation material. The latter can consist of any hard, [illeg] material as long as the fragments are large enough. Metal or rock fragments should be walnut-size rather than pen-size. If solid plates are used, to be ruptured by the explosion, cast iron, 1″ thick, gives excellent fragmentation. Military or commercial high explosives are practical for use in assassination. Homemade or improvised explosives should be avoided. While possibly powerful, they tend to be dangerous and unreliable. Anti-personnel explosive missiles are excellent, provided the assassin has sufficient technical knowledge to fuse them properly. 81 or 82 mm mortar shells, or the 120 mm mortar shell, are particularly good. Anti-personnel shells for 85, 88, 90, 100 and 105 mm guns and howitzers are both large enough to be completely reliable and small enough to be carried by one man.

The charge should be so placed that the subject is not ever six feet from it at the moment of detonation.

A large, shaped charge with the shell filled with iron fragments (such as 1″ nuts and bolts) will fire a highly lethal shotgun-type charge to 50 yards. This reaction has not been thoroughly tested, however, and an exact replica of the proposed device should be fired in advance to determine exact range, pattern-size, and penetration of fragments. Fragments should penetrate at least 1″ of seasoned pine or equivalent for minimum reliability.

Any firing device may be used which permits exact control by the assassin. An ordinary commercial or military explorer is efficient, as long as it is rigged for instantaneous action with no time fuse in the system.

The wise electric target can serve as the triggering device and provide exact timing from as far away as the assassin can reliably hit the target. This will avoid the disadvantages military or commercial high explosives are practical for use in assassination. Homemade or improvised explosives should be avoided. While possibly powerful, they tend to be dangerous and unreliable. Anti-personnel explosive missiles are excellent, provided the assassin has sufficient technical knowledge to fuse them properly. 81 or 82 mm mortar shells, or the 120 mm mortar shell, are particularly good. Anti-personnel shells for 85, 88, 90, 100 and 105 mm guns and howitzers are both large enough to be completely reliable and small enough to be carried by one man.

The charge should be so placed that the subject is not ever six feet from it at the moment of detonation. A large, shaped charge with the shell filled with iron fragments (such as 1″ nuts and bolts) will fire a highly lethal shotgun-type projectile to 50 yards. This reaction has not been thoroughly tested, however, and an exact replica of the proposed device should be fired in advance to determine exact range, pattern-size, and penetration of fragments. Fragments should penetrate at least 1″ of seasoned pine or equivalent for minimum reliability.

Any firing device may be used which permits exact control by the assassin. An ordinary commercial or military explorer is efficient, as long as it is rigged for instantaneous action with no time fuse in the system.

The wise [illeg] electric target can serve as the triggering device and provide exact timing from as far away as the assassin can reliably hit the target. This will avid the disadvantages of stringing wire between the proposed positions of the assassin

81 or 82 mm mortar shells, or the 120 mm m ortar shell, are particularly good. Anti-personnel shells for 85, 88, 90, 100 and 105 mm guns and howitzers are both large enough to be completely reliable and small enough to be carried by one man.

The charge should be so placed that the subject is not ever six feet from it at the moment of detonation.

A large, shaped charge with the sbell filled with iron fragments (such as 1″ nuts and bolts) will fire a highly lethal shotgun-type projectile to 50 yards. This reaction has not been thoroughly tested, however, and an exact replica of the proposed device should be fired in advance to determine exact range, pattern-size, and penetration of fragments. Fragments should penetrate at least 1″ of seasoned pine or equivalent for minimum reliability.

Any firing device may be used which permits exact control by the assassin. An ordinary commercial or military explorer is efficient, as long as it is rigged for instantaneous action with no time fuse in the system.

The wise  electric target can serve as the triggering device and provide exact timing from as far away as the assassin can reliably hit the target. This will avoid the disadvantages military or commercial high explosives are practical for use in assassination. Homemade or improvised explosives should be avoided. While possibly powerful, they tend to be dangerous and unreliable. Anti-personnel explosive missiles are excellent, provided the assassin has sufficient technical knowledge to fuse them properly. 81 or 82 mm mortar shells, or the 120 mm mortar shell, are particularly good. Anti-personnel shells for 85, 88, 90, 100 and 105 mm guns and howitzers are both large enough to be completely reliable and small enough to be carried by one man.

The charge should be so placed that the subject is not ever six feet from it at the moment of detonation. A large, shaped charge with the shell filled with iron fragments (such as 1″ nuts and bolts) will fire a highly lethal shotgun-type disicharge to 50 yards. This reaction has not been thoroughly tested, however, and an exact replica of the proposed device should be fired in advance to determine exact range, pattern-size, and penetration of fragments. Fragments should penetrate at least 1″ of seasoned pine or equivalent for minimum reliability.

Any firing device may be used which permits exact control by the assassin. An ordinary commercial or military explorer is efficient, as long as it is rigged for instantaneous action with no time fuse in the system.

The wise  electric target can serve as the triggering device and provide exact timing from as far away as the assassin can reliably hit the target. This will avid the disadvantages of stringing wire between the proposed positions of the assassin an d the subject, and also permit the assassin to fire the charge from a variety of possible positions.

The radio switch can be rigged to fire automatically, though its reliability is somewhat lower and its procurement may not be easy.


The Dominonist Plot

July 4, 2019

by Michael Hunt

‘Dominion Theology’ is a grouping of extreme theoretical  theological systems with the common belief that society should be governed exclusively by the law of God as codified in the Christian Bible, to the total exclusion of any and all secular law, and any other religion, regardless of its public acceptance or world-wide membership. The two main streams of Dominion Theology are Christian Reconstructionism and ‘Kingdom Now’ theology. Though these two differ greatly in their general theological orientation (the first is strongly Reformed and Neo-Calvinistic, the second is Charismatic), they share a postmillenial vision in which the kingdom of God must be established on Earth through political and even military means, implying force.

All strains of ‘Dominion Theology’ are small minorities, and are rejected by all mainstream Christians as quite radical. However, Dominion Theology is seen by some as a subset of Dominionism, a term used by some social scientists and journalists to describe a theological form of political ideology, which they claim has broadly influenced the Christian Right in the United States, Canada, and Europe, within Protestant Christian evangelicalism and fundamentalism.

The Basics of Dominionism and the Christian right

‘Dominionism’ is based entirely on the Biblical  text in Genesis 1:26:

“And God said, Let us make man in our image, after our likeness: and let them have dominion over the fish of the sea, and over the fowl of the air, and over the cattle, and over all the earth, and over every creeping thing that creepeth upon the earth.” (King James Version).

“Then God said, ‘Let us make man in our image, in our likeness and let them rule over the fish of the sea and the birds of the air, over the livestock, over all the earth and over all the creatures that move along the ground.'” (New International Version).

And God blessed [ Adam and Eve ] and God said unto them, “Be fruitful, and multiply, and replenish the earth, and subdue it: and have dominion over the fish of the sea, and over the fowl of the air, and over every living thing that moveth upon the earth.” —Genesis 1:28 (King James Version).

The ‘Dominionists’ firmly and even fanatically believe that God has appointed them, and only them,  stewards and caretakers of Earth. ;”that Christians alone are Biblically mandated to occupy all secular institutions until Christ returns.” That belief is the basis of   “Dominionism.” ‘

The fanatical ‘Christian’ right has one firm goal that that is  to establish dominion, or absolute physical control over America society in the name of God. A high priest of the far-right religious militant movement, D. James Kennedy, formerly head of the Coral Ridge Ministries, demanded that his followers exercise “godly dominion … over every aspect … of human society,.”

And in February, 2005, Kennedy said:

“Our job is to reclaim America for Christ, whatever the cost. As the vice regents of God, we are to exercise godly dominion and influence over our neighborhoods, our schools, our government, our literature and arts, our sports arenas, our entertainment media, our news media, our scientific endeavors — in short, over every aspect and institution of human society.”

In 1985, the ‘Dominionists’ took clear aim at the Republican Party as the means by which they could best achieve real power in the United States. They were aided by a small but powerful group of Republican leaders who, in turn, had targeted the far-right of the more extreme of the Christian branch cults, both fundamentalist, Pentecostal and charismatic.

They were completely successful in their effort to gain a firm political control over Congress and prior to the 2006 mid-term elections, the Christian right, led by the ‘Domionists’ had taken control of both houses of Congress, the White House (George W. Bush) and were only one seat away from control of the United States Supreme Court.

The American voters were not, and never were, any sort of adherents to the fanatic right-wing ‘Christian’ political movements and after January 1, 2007, they had effectively lost control of both houses of Congress and the White House.

Five of the Republican Senators who were unseated had earlier received top opinion scores of 100% from the Family Research Council and Focus on the Family voter scorecards.  Those Senators were: Conrad Burns (R-MT), George Allen (R-VA), Rick Santorum (R-PA), James Talent (R-MO), and Mike DeWine (R-OH). Rick Santorum was the number three ranking Republican in the party. Santorum and Allen both had Presidential ambitions. (FRC and FOF are the most politically influential of ‘Dominionist’ organizations

Christian Reconstructionism is a form of theocratic dominion theology. Its leaders challenged evangelicals across a wide swath of theological beliefs to engage in a more muscular and activist form of political participation. The core theme of dominion theology is that the Bible mandates Christians to take over and “occupy” secular institutions.

A number of Christian Right leaders read what the Christian Reconstructionists were writing, and they adopted the idea of taking dominion over the secular institutions of the United States as the “central unifying ideology” of their social movement. They decided to gain political power through the Republican Party.

This does not mean most Christian Right leaders became Christian Reconstructionists. It does mean they were influenced by dominion theology. But they were influenced in a number of different ways, and some promote the theocratic aspects more militantly than others.

It helps to see the terms dominionism, dominion theology, and Christian Reconstructionism as distinct and not interchangeable. While all Christian Reconstructionists are dominionists, not all dominionists are Christian Reconstructionists.

Dominionists were very close to controlling all three branches of the federal government from which they could impose their narrow interpretation of scripture on the rest of society. People so close to full political power are not going to go away. The American people need to maintain vigilance and understand the history of how dominionists came to political power. And we need to embrace democracy with a passion — for it was voter apathy that allowed leaders like Pat Robertson to get so many dominionists elected to Congress in the first place


A longstanding usage of dominionism among social scientists and legal scholars describes a Biblical argument in favor of anthropocentrism, a favoring of the rights and interests of humans in relation to environmentalism and/or animal rights.

Dominion Theology

Dominion Theology is a grouping of theological systems with the common belief that society should be governed exclusively by the law of God as codified in the Bible, to the exclusion of secular law, a view also known as theonomy. The most prominent modern formulation of Dominion Theology is Christian Reconstructionism, founded by R. J. Rushdoony in the 1970s. Reconstructionists themselves use the word dominionism to refer to their belief that civil government should be controlled by Christians alone and conducted according to Biblical law. Social scientists have used the word “dominionism” to refer to adherence to Dominion Theologyas well as to the influence in the broader Christian Right of ideas inspired by Dominion Theology. Although such influence (particularly of Reconstructionism) has been described by many authors, full adherents to Reconstructionism are few and marginalized among conservative Christians.

“that Christians alone are Biblically mandated to occupy all secular institutions until Christ returns”.:

  1. Dominionists celebrate Christian nationalism, in that they believe that the United States once was, and should once again be, a Christian nation. In this way, they deny the Enlightenment roots of American democracy.
  2. Dominionists promote religious supremacy, insofar as they generally do not respect the equality of other religions, or even other versions of Christianity.
  3. Dominionists endorse theocratic visions, insofar as they believe that the Ten Commandments, or “biblical law,” should be the foundation of American law, and that the U.S. Constitution should be seen as a vehicle for implementing Biblical principle


Encyclopedia of American Loons

Arthur Krigsman


Arthur Krigsman, MD, is a pediatrician and gastroenterologist best known for his controversial and widely-criticized research in which he attempts to prove that the MMR vaccine is the cause of diseases, especially autism. In fact, Krigsman may not be among the flashiest, but he is certainly among the most influential member of the antivaxx movement.

He has, in particular, written in support of the existence of autistic enterocolitis, which is, to put it mildly, not particularly widely accepted – Andrew Wakefield’s original study that tied the MMR vaccine to autism has of course been found to be fraudulent, and it was on the basis of this “research” that Wakefield coined the notion of “autistic enterocolitis”. In other words, Krigsman is fringe; but he still, to an extent, knows what he is talking about, which makes his contributions all the more insidious. In 2003, Krigsman reported similar findings as those of Wakefield, saying he found the intestines of 40 autistic children showed signs of inflammation, thus lending support to Wakefield’s ideas that MMR was related to autism and also to gastrointestinal disease. This information was, predictably enough, not formally published until 2010, and then in the pseudo-journal Autism Insights. The results were also obtained through failing to follow standard protocols and through questionable (or even scandalous) ethical behavior. Indeed, in 2004 Krigsman had to leave Lenox Hill hospital under “questionable circumstances,” and in 2005, he was fined by the Texas State Board of Medical Examiners for multiple violations, including failing to report previous regulatory sanctions by the Florida medical board, and for the disciplinary action by the Lenox Hill Hospital.

Krigsman later joined Wakefield at the antivaxx organization Thoughtful House (though left when Wakefield was forced to leave after his original study was shown to be fraudulent). He is currently a perennial expert witness in vaccine-related court cases. His participiation in these cases seem to regularly raise discussions regarding his CV and how he represents his publication list. In one case, the judge noted that he thinks Krigsman failed to be a “credible witness” and that the parents who brought the case were “misled by physicians who are guilty, in my view, of gross medical misjudgment.” In another case, the judge noted of Krigsman’s qualification for identifying a new disease like “autistic enterocolitis”, being “unrecognized by other authorities in the field, were, even when inflated, sadly lacking” and that his testimony about its existence was “speculative and unsupported by the weight of the evidence.

Diagnosis: Though his cause has taken some fairly serious damage Krigsman is still in the running, and must still be considered dangerous.

Robert J. Krakow

Robert Krakow is a lawyer affiliated with the antivaccine movement, whose main goal, it seems, is to get parents of children with vaccines to sue. Thus far, the court cases have been more or less failures, of course, but who knows what will happen next time? Krakow isn’t just a cynical opportunist, it seems, but an actual, true believer in the idea that thimerosal in vaccines causes autism, which – given the distance between that hypothesis and reality – doesn’t really help in court (or make is efforts relevantly less vile, for that matter).

With well-known anti-vaccine activists Mary Holland, Louis Conte, and Lisa Colin, he authored “Unanswered Questions from the Vaccine Injury Compensation Program: A Review of Compensated Cases of Vaccine-Induced Brain Injury,” which attempted to bolster the case for a legal (and scientific) argument, an article that would have been hilarious for its fallacies were it not for the fact that it could potentially be the source of some real harm. It is discussed in some detail here. The same people were also behind an embarrassing “study” called “Vaccine Epidemic: How Corporate Greed, Biased Science, and Coercive Government Threaten Our Human Rights, Our Health, and Our Children,” which also committed all the fallacies associated with this particular brand of denialism, in addition to being ethically questionable.

Diagnosis: Crank lawyer whose primary move in the denialist movement is the predictable one: Since science doesn’t support our claim, let’s take it to the courts. Though wrong, Krakow is of course still dangerous. Stay away.


The CIA Confessions: The Crowley Conversations

July 4, 2019

by Dr. Peter Janney

On October 8th, 2000, Robert Trumbull Crowley, once a leader of the CIA’s Clandestine Operations Division, died in a Washington hospital of heart failure and the end effects of Alzheimer’s Disease. Before the late Assistant Director Crowley was cold, Joseph Trento, a writer of light-weight books on the CIA, descended on Crowley’s widow at her town house on Cathedral Hill Drive in Washington and hauled away over fifty boxes of Crowley’s CIA files.

Once Trento had his new find secure in his house in Front Royal, Virginia, he called a well-known Washington fix lawyer with the news of his success in securing what the CIA had always considered to be a potential major embarrassment.

Three months before, on July 20th of that year, retired Marine Corps colonel William R. Corson, and an associate of Crowley, died of emphysema and lung cancer at a hospital in Bethesda, Md.

After Corson’s death, Trento and the well-known Washington fix-lawyer went to Corson’s bank, got into his safe deposit box and removed a manuscript entitled ‘Zipper.’ This manuscript, which dealt with Crowley’s involvement in the assassination of President John F. Kennedy, vanished into a CIA burn-bag and the matter was considered to be closed forever.

The small group of CIA officials gathered at Trento’s house to search through the Crowley papers, looking for documents that must not become public. A few were found but, to their consternation, a significant number of files Crowley was known to have had in his possession had simply vanished.

When published material concerning the CIA’s actions against Kennedy became public in 2002, it was discovered to the CIA’s horror, that the missing documents had been sent by an increasingly erratic Crowley to another person and these missing papers included devastating material on the CIA’s activities in South East Asia to include drug running, money laundering and the maintenance of the notorious ‘Regional Interrogation Centers’ in Viet Nam and, worse still, the Zipper files proving the CIA’s active organization of the assassination of President John Kennedy..

A massive, preemptive disinformation campaign was readied, using government-friendly bloggers, CIA-paid “historians” and others, in the event that anything from this file ever surfaced. The best-laid plans often go astray and in this case, one of the compliant historians, a former government librarian who fancied himself a serious writer, began to tell his friends about the CIA plan to kill Kennedy and eventually, word of this began to leak out into the outside world.

The originals had vanished and an extensive search was conducted by the FBI and CIA operatives but without success. Crowley’s survivors, his aged wife and son, were interviewed extensively by the FBI and instructed to minimize any discussion of highly damaging CIA files that Crowley had, illegally, removed from Langley when he retired. Crowley had been a close friend of James Jesus Angleton, the CIA’s notorious head of Counterintelligence. When Angleton was sacked by DCI William Colby in December of 1974, Crowley and Angleton conspired to secretly remove Angleton’s most sensitive secret files out of the agency. Crowley did the same thing right before his own retirement, secretly removing thousands of pages of classified information that covered his entire agency career.

Known as “The Crow” within the agency, Robert T. Crowley joined the CIA at its inception and spent his entire career in the Directorate of Plans, also know as the “Department of Dirty Tricks. ”

Crowley was one of the tallest man ever to work at the CIA. Born in 1924 and raised in Chicago, Crowley grew to six and a half feet when he entered the U.S. Military Academy at West Point in N.Y. as a cadet in 1943 in the class of 1946. He never graduated, having enlisted in the Army, serving in the Pacific during World War II. He retired from the Army Reserve in 1986 as a lieutenant colonel. According to a book he authored with his friend and colleague, William Corson, Crowley’s career included service in Military Intelligence and Naval Intelligence, before joining the CIA at its inception in 1947. His entire career at the agency was spent within the Directorate of Plans in covert operations. Before his retirement, Bob Crowley became assistant deputy director for operations, the second-in-command in the Clandestine Directorate of Operations.

Bob Crowley first contacted Gregory Douglas in 1993 when he found out from John Costello that Douglas was about to publish his first book on Heinrich Mueller, the former head of the Gestapo who had become a secret, long-time asset to the CIA. Crowley contacted Douglas and they began a series of long and often very informative telephone conversations that lasted for four years. In 1996, Crowley told Douglas that he believed him to be the person that should ultimately tell Crowley’s story but only after Crowley’s death. Douglas, for his part, became so entranced with some of the material that Crowley began to share with him that he secretly began to record their conversations, later transcribing them word for word, planning to incorporate some, or all, of the material in later publication.


Conversation No. 38

Date: Friday, September 27, 1996

Commenced: 11:05 AM CST

Concluded: 11:21 AM CST


RTC: Gregory, I see that the material you got from God knows where about the Clintons is causing real havoc here. Were you aware of that?

GD: One has hopes, Robert, hopes. What kind of havoc?

RTC: Well, it might be a well-kept secret but it turns out to be perfectly true. It’s gotten all over the place. I had two people call me to give me disjointed reports. People can read a simple sentence and then mix it all up when they try to repeat it.

GD: I know. In the main, camels are smarter and they smell better. I hope the Clinton’s like my little sendings. I did the same thing to Cranston 1  earlier on.

RTC: I recall you discussing this with me. You know, I have gotten so disillusioned with some of these people that I really ought to dig into things and send my more material. By the way, did you get the Angleton papers?

GD: Oh, I did but I didn’t want to discuss them on the phone. My God, Angleton was tapping all the phones there, wasn’t he?

RTC: Oh he did. Jim was convinced that everyone was spying on him and in the end, what with tapping the phones of the DCI, the President and God alone know how many bankers, stock brokers, poor Ollie North and so on he had so much data he got a bit out of his head.

GD: Such criminals they are. Thieving, lying, corrupt assholes, all of them. We trust these bank CEOs and heads of major companies, not to mention our top leadership, that I am certain if I released all of Angleton’s material, there would be great trouble. We would see the heads of the Federal Reserve running for Rio before the storm of public opinion. The public, myself included, thinks the Fed is a government operation while it is not.  Private.operation all the way

RTC: Yes, and run by the Jews for the Jews. The famous Bank of New York is a Jewish operation who works with the Russian Mafia to launder money. The FBI knows all about this but Clinton says hands off.

GD: No doubt his wife is behind that. I think her background needs to be exposed.

RTC: And how could you do that? The press would never handle it so you would have to send out thousands of letters. That takes time and costs money. No one really cares here, at least in public. Bus, as I say, your little surprises have stirred up real comment. Of course, it will never go any further than the cocktail circuit.

GD: No, but in your city, that rules, doesn’t it?

RTC: Oh, it does, it truly does. Given your particular talents, Gregory, I don’t doubt that you could start a war if you got loose on the cocktail circuit. Inside the Beltway, everyone wants to be in the know so if they hear some malicious gossip, they will tell their friends that a certain top government official casually told them this. This place is a pressure cooker, filled with liars, babblers and deadbeats. When I say you could raise hell here, of course, I do not include you in any of the above categories.

GD: No, no offense. Are the Kimmel types still calling you about how evil I am?

RTC: I think once they discovered that I passed their names and telephone number on to you, it all stopped. Kimmel himself is horrified that I talk to you and he told Bill that he was afraid I might say or do something you could run with. If they only knew. I know Trento has made a deal with Langley that when I am dead and gone, he will get all my papers…and of course give them what they don’t want out. Joe will be satisfied with some useless cruimbe. But when he finds out all the important material is gone with the wind, I imagine he will get on the horn down there and there will by attempts to find out what you have. They know what you will do with it.

GD: What did General Sherman say? Publish and be damned? Something like that. I kept some of this material in footlockers in my bedroom until common sense dictated that I ought to find a safer place for it.

RTC: And what if someone breaks in? Unofficially, that is.

GD: Why I would kill them very dead, Robert. And after I took a sharp axe to their head, I would put a knife in their lifeless hands, call the police and tell them I caught a burglar who tried to kill me. I suppose his friends down the street would find it expedient to drive off. If I did that, I would frisk the stiff and remove any identification. Maybe that way he’d find himself a cheap wooden box out in potter’s field.

RTC: Think of the family. Whatever happened to the breadwinner?

GD: Well, they can comfort themselves with the thought that he is feeding the environment. Helping the worms feed and the grass grow. One time when I became aware that someone was getting into my place and drinking my really good brandy, I poured some old Mr. Boston swill into a good bottle and added some rat poison. Came back from a trip and found vomit and shit all over the entrance hall but no perp. Probably died outside.

RTC: Old Rough on Rats! Terrible, Gregory. I remember that. ‘They Die Outside’ was the motto.

GD: In this case, he probably did but I never heard a word.

RTC: One would think that he didn’t get far.

GD: Agreed. Maybe his friends came and got him. Must have stunk up the car something terrible. Anyway, my brandy was safe. Croton oil is even better. They usually don’t die but there is nothing like a prolapsed rectum to keep a man on his toes.

RTC: (Laughter) No, I suppose not.

GD: I remember once my idiot sister was dating a policeman and I did not like him in our house. Used to give me a hard time and ate up all the candy from the coffee table. I bought a box of Awful Fresh MacFarlane’s soft mints, injected a mixture of croton oil and peppermint extract into all of them and left them in the dish. Bugger gobbled all of them down and then rushed to the back bathroom where it sounded like a drunken hippo thrashing around in a mud flat. After the ambulance came, I replaced the loaded mints with real ones and the next day when his friends came over, they found wonderful, fresh and harmless candy. Of course he never came over to the house again.

RTC: I would think that was wise of him.

GD: My idiot sister told me that he carried one of those tiny liferings around for months. I imagine his anus looked like the sun setting over some tropical island. Flaming red.

RTC: I hope your sister didn’t eat any.

GD: No, that was safe. Booze, yes, but not candy. They probably figured he had dinner at a Chinese restaurant. Say, I just remembered a lovely joke I played on my favorite Chop Suey emporium. I got a friend of mine, dressed him up in a coverall and had him walk in the front door of a local Chinese eatery with a live cat in a cage. Through the dining room and right into the kitchen. Of course out the back door before the kitchen staff could grab the cat for the Sunday special. I am told a number of people left at once and never came back. The place closed down about a month later.

RTC: (Laughter)  A man of creative action.

GD: Sometimes. If I couldn’t laugh at the cesspit, I might go mad. Or I could go to the Jockey Club and stuff a wiggling cockroach into the Caesar salad. Well, back to reading the Bible to the cats, Robert.


(Concluded 11:21 AM CST)

  1. Alan MacGregor Cranston June 19, 1914 – December 31, 2000 was an American journalist and Democratic Senator from California. Cranston, a supporter of world government, attending the 1945 Dublin Declaration, and later became president of the World Federalist Association in 1948. He was reprimanded by the U.S. Senate Select Committee on Ethics for “improper conduct” on November 20, 1991 after he accepted $1 million in campaign contributions from the Lincoln Savings head, Charles Keating. Keating had wanted federal regulators to stop “hounding” his savings and loan association. The committee deemed Cranston’s misconduct the worst among the Keating Five.


No responses yet

Leave a Reply