Monarch: the New Phoenix Program by Marshall Thomas

Total Page:16

File Type:pdf, Size:1020Kb

Monarch: the New Phoenix Program by Marshall Thomas Monarch: The New Phoenix Program By Marshall Thomas ONE: Phoenix Program TWO: HISTORY of US Government Human Experimentation: Eugenics Human Radiation Studies Elmer Allen Granddaughter Testimony Agent Orange THREE: Cold War Doolittle McCarthyism Operation Paperclip Reinhardt Gehlen Operation Mockingbird Operation Northwoods FOUR: MKULTRA-1950’s Brainwashing- USSR, China, US Helms, Gottlieb Allen Dulles Estabrooks Cameron MKULTRA-1960’s, 1970’s – Helms, Aldrich Pandora Delgado Jolly West MKULTRA VICTIM TESTIMONY: Valerie Wolfe, Claudia Mullen, Chris DeNicola Programming levels FIVE: Nonlethal weapons Greenham Common DOD/DOJ Iraq SIX: CULTS Aquino Moon FMSF Remote viewing SEVEN: Trojan Horse EIGHT: Cointelpro NINE: CIA Blowback: Golden Triangle Ed Wilson Katherine Griggs Guatemala organ donors TEN: Directed Energy Weapons USSR Woodpecker ELEVEN: Directed Energy Weapons Scientists TWELVE: SDI/HAARP THIRTEEN: Military Doctrine MindWar The Aviary FOURTEEN: Patents/Spin-offs Implants ADS Milliwave radar FIFTEEN: CIA/Corporate Proprietaries SAIC Hadron DynCorp Operation Cyclone SIXTEEN: Law Girard John Glenn Akwei Milgram Street Theater TI experience Weed and Seed SEVENTEEN: End Game MONARCH: THE NEW PHOENIX PROGRAM Phoenix Program: The Phoenix Program, created by the CIA in 1967, was aimed at "neutralizing"—through assassination, kidnapping, and torture, the civilian infrastructure that supported the Viet Cong insurgency in South Vietnam. It was a terrifying "final solution" that violated the Geneva Conventions. The Phoenix Program's civilian targets of assassination were VC tax collectors, supply officers, political cadre, local military officials, and suspected sympathizers. Faulty intelligence often led to the murder of innocent civilians, rival Vietnamese would report their enemies as "VC" in order for US troops to kill them. In 1971, William Colby, head of CIA in Vietnam, testified the number killed was 20,857. South Vietnamese government figures were 40,994 dead. CIA officer Ted Shackley managed (600 military and (40-50) CIA liaison officers) who were working with South Vietnamese officers in 44 provinces. Ted Shackley and Robert Komer played key roles in recruiting Phoenix Program personnel. Many Covert Action officers were Cuban refugees from the Bay of Pigs fiasco. They ran the CIA's Counter-Terror (CT) Teams, which were in fact assassination squads. Colby, Komer, and Shackley reported to DCI Richard Helms and the White House. From the beginning the Phoenix Program was conceived by the White House and supported by the CIA. Phoenix called for "neutralizing" 1800 targets a month. About one third of VC targeted for arrest were summarily executed. Green Berets and Navy SEALs would assassinate suspected VC sympathizers or cadres, as well as South Vietnamese collaborators and double agents. In 1982 an Ex-Phoenix operative revealed that sometimes orders were given to kill U.S. military personnel who were considered security risks. He suspects the orders came not from "division", but from a higher authority such as the CIA or the Office of Naval Intelligence. The following is testimony of Vincent Okamoto, combat officer (Lieutenant) in Vietnam in 1968, and recipient of Distinguished Service Cross, the second highest award conferred by the US Army. Wounded 3 times. "The problem was, how do you find the people on the blacklist? It's not like you had their address and telephone number. The normal procedure would be to go into a village and just grab someone and say, 'Where's Nguyen so-and-so?' Half the time the people were so afraid they would say anything. Then a Phoenix team would take the informant, put a sandbag over his head, poke out two holes so he could see, put commo wire around his neck like a long leash, and walk him through the village and say, 'When we go by Nguyen's house scratch your head.' Then that night Phoenix would come back, knock on the door, and say, 'April Fool, motherfucker.' Whoever answered the door would get wasted. As far as they were concerned whoever answered was a Communist, including family members. Sometimes they'd come back to camp with ears to prove that they killed people." Penetrations into the Viet Cong Infrastructure was accomplished by blackmailing or terrorizing a member of a targeted individual's family to gathering information. Every Vietnamese 15 and over had to register and carry identity cards, these records were computerized and eventually it evolved into a highly computerized and statistical means of generating 1800 names a month for the target list, coordinating the information on suspects from 30,000 plus informants. When the strategic Hamlet program failed, CIA and military intelligence concentrated on the Phoenix Program, a terror campaign aimed at the civilian population. Instead of winning hearts and minds, using the threat of assassination and a state of terror to defeat the NV. Many non-political Vietnamese were arrested and tortured and in effect forced into the resistance army. Phoenix Program architect Robert Komer, after leaving the Pentagon said, "I would have done a lot of things differently and been more cautious about getting us involved." He called the war "a strategic disaster which cost us 57,000 lives and a half trillion dollars." Phoenix USA: The Vietnam War was the formative experience for a generation of CIA and military intelligence personnel involved in the Phoenix Program. They viewed the military defeat in Vietnam as a betrayal on the home front, a loss of will by domestic political enemies, not a military failure against a nationalist revolution fought as a guerilla war. The Phoenix Program, assassinating suspected VC sympathizers in a systematic manner, worked well and is the blueprint for the current black op targeting thousands of loyal Americans using state of the art microwave (MW) and radio frequency radiation (RFR) weapons. The motivation to suppress domestic dissidents and to assassinate loyal American opposition stems from the perception of dissent against the war as treason. This philosophy is stated very clearly in the MindWar paper written by NSA General Aquino. The DOD has a huge stake in futuristic technology that kills by ionizing and non-ionizing radiation, leaving little or no trace. The indiscriminant killing of the Phoenix Program continues on American soil. The terms soft kill, slow kill and silent kill refer to the new way of killing the enemy in conflicts short of war and the small wars of the future. The counterinsurgency doctrine has now been applied to the home front, so that the perceived betrayal of the military in Vietnam will not be repeated. The generation of CIA and military intelligence led by Shackley, Helms, Casey, Abrams, Singlaub, Secord, John B. Alexander, Michael Aquino, Paul Vallely, and others have built the perfect beast, using selective assassination that leaves no trace. The ability to cull the human herd with Silent Kill technology allows a few personalities to remake the entire society in their own image. Extremely Low Frequency (ELF) technology kills with ionizing and non-ionizing radiation or slowly drives the target crazy with silent sound, similar to CIA MKULTRA psychiatrist Ewen Camerons psychic driving technique used to break down the targets personality. The new buzzwords at the Pentagon are silent kill, synthetic telepathy and psychotronics. Another means of attack on targets is the Smirnov patent that uses subliminal suggestion to manipulate human behavior. This patent was purchased by the remote viewing company Psi Tech Corporation. Military intelligence officers involved in developing these "non-lethal weapons" include Col. John B. Alexander, NSA General Michael Aquino, Harold Puthoff, and others, also control Psi Tech. Emotional manipulation is accomplished using Dr. Michael Persinger's work to remotely project emotional states that the brain entrains or locks onto and emulates. One can broadcast rage or fear at an individual target to manipulate and control them. As if these methods were not enough to torture and murder people, add to this nightmarish toolbox, active gang stalking. CIA created cults and other cause-oriented groups are used to induce further trauma in the target by actively harassing them in public in a neutralization technique described in counterintelligence operations manuals that are aimed at enemy agents. In the race to develop a new weapon system it has always been necessary to test it on human beings. Perfecting the latest weapons designed to kill slowly and silently as well as perfecting the process of controlling the human mind are no different. Once the weaponry has been perfected on these few thousand people the same techniques will be applied en mass to the general population, and then to humanity as a whole. Col. John B. Alexander stated in an interview with the Washington Post in 2007, …The military and intelligence agencies were still scared by the excesses of MK- ULTRA, the infamous CIA program that involved, in part, slipping LSD to unsuspecting victims. "Until recently, anything that smacked of [mind control] was extremely dangerous" because Congress would simply take the money away, he said. Alexander acknowledged that "there were some abuses that took place," but added that, on the whole, "I would argue we threw the baby out with the bath water." But September 11, 2001, changed the mood in Washington, and some in the national security community are again expressing interest in mind control, particularly a younger generation of officials who weren't around for MK-ULTRA. "It's interesting, that it's coming back," Alexander observed. While Alexander scoffs at the notion that he is somehow part of an elaborate plot to control people's minds, he acknowledges support for learning how to tap into a potential enemy's brain. He gives as an example the possible use of functional magnetic resonance imaging, or fMRI, for lie detection. "Brain mapping" with fMRI theoretically could allow interrogators to know when someone is lying by watching for activity in particular parts of the brain.
Recommended publications
  • Remote Viewing by Tim Rifat Introduction
    Remote Viewing by Tim Rifat Introduction At the height of the Cold War, a new twist to weapons development occurred. The Soviet Union systematised its investigations in to how to harness the paranormal and use it for military purposes. What in other times was seen as magic or witchcraft -laying a curse, predicting the future, having second sight - had already gained scientific respectability in the USSR with the recognition of clairvoyance and the acceptance of psychic phenomena; research into telepathy had started in the Soviet Union in the twenties and thirties. However it was stopped by Stalin, who thought it smacked of idealism and superstition. Now the Russians plunged into a large-scale research programme. Billions of roubles were poured into the investigation and development of psychic energy (psi) and electronic mind-control technology. To convince hard-nosed military men that psychic phenomena can win wars may, on the face of it, appear to be a forlorn task. In fact, it happened the other way, around as some of the leading minds in the Russian military convinced their leaders to spend fortunes on this effort. Science fiction writers have not come close to the reality of the actual research undertaken since then. The aim was no less than to produce psychic agents, capable of visualizing top-secret sites and installations located thousands of miles away, reading the minds of their country’s enemies, intervening and altering thought processes, and even killing through psychic attack. The first step was the development of remote viewing. People displaying psychic sensitivity were sought out all over the USSR and trained under the strictest secrecy as spies with a difference.
    [Show full text]
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • The Moorer Commission
    The Moorer Commission 1 Findings of the Independent Commission of Inquiry into the Israeli Attack on USS Liberty, the Recall of Military Rescue Support Aircraft while the Ship was Under Attack, and the Subsequent Cover - up by the United States Government October 22, 2003 Admiral Thomas H. Moorer, U.S. Navy (deceased) Former Chairman, Joint Chiefs of Staff General Raymond G. Davis, U.S. Marine Corps (deceased) (MOH)*, Former Assistant Commandant of the Marine Corps Rear Admiral Merlin Staring, U.S. Navy (deceased) Former Judge Advocate of the Navy (73 - 75) Ambassador James Akins (deceased) Former U.S. Ambassador to Saudi Arabia (73 - 76) We, the undersigned having undertaken an independent investigation of Israel’s attack on USS Liberty , including eyewit ness testimony from surviving crewmembers, a review of naval and other official records, an examination of official statements by the Israeli and American governments, a study of the conclusions of all previous official inquiries, and a consideration of im portant new evidence and recent statements from individuals having direct knowledge of the attack or the cover up, hereby find the following:** 1. That on June 8, 1967, after eight hours of aerial surveillance, Israel launched a two - hour air and naval attack against USS Liberty, the world’s most sophisticated intelligence ship, inflicting 34 dead, and 173 wounded American servicemen (a casualty rate of 70%, in a crew of 294).; 2 2. That the Israeli air attack lasted approximately 25 minutes, during which time un marked Israeli aircraft dropped napalm canisters on USS Liberty’s bridge, and fired 30mm cannons and rockets into our ship, causing 821 holes, more than 100 of which were rocket - size; survivors estimate 30 or more sorties were flown over the ship by minimu m of 12 attacking Israeli planes which were jamming all 5 American emergency radio channels; 3.
    [Show full text]
  • Student Code of Conduct Addendum
    Alfred State Student Code of Conduct Addendum COVID-19 Public Health Emergency On August 23, t he FDA granted full Additional Responsibilities & approval of the Pfizer/BioNTech Covid- 19 vaccine. In accordance with SUNY’s Requirements for Students mandatory vaccine policy, all students must submit proof of vaccination by (Fall 2021) Friday, September 24, or have been granted an exemption by the College. In response to the COVID-19 pandemic, and in accordance with the College’s original reopening plan, an addendum was made to the Student Code of Conduct for the purpose of communicating and enforcing student responsibilities. Throughout the 2020-21 Academic Year, this addendum was modified several times to reflect SUNY policy and the evolving needs of the College. This policy has again been amended to reflect the College’s Fall 2021 COVID-19 Plan and will continue to be updated throughout the academic year as necessary. Returning students will note that some of the prior expectations have been eased for vaccinated individuals. In addition, the uniform sanctioning guidelines established by SUNY during the Fall 2021 Semester, and subsequently incorporated into the Code of Conduct, are no longer in effect. The expectations below shall take precedence over any contradictory language within the Code of Conduct. Section 3.5 d. Public Health Emergency Safeguards: All students, commensurate with their vaccination status and setting, are responsible for actively complying with the precautions the College has established to protect against the spread of COVID-19. Such mitigations may include the use of personal protective equipment (PPE); observing physical/social distancing; complying with all expectations concerning gatherings and hosting guests; quarantining or isolating as directed; and participating in testing and daily screenings.
    [Show full text]
  • The US War on Cuba: from Economic Embargoes, Biological Warfare to US-Backed Terrorism
    The US War on Cuba: From Economic Embargoes, Biological Warfare to US-Backed Terrorism By Timothy Alexander Guzman Region: Latin America & Caribbean, USA Global Research, August 01, 2021 Theme: History All Global Research articles can be read in 51 languages by activating the “Translate Website” drop down menu on the top banner of our home page (Desktop version). Visit and follow us on Instagram at @crg_globalresearch. *** . Before the rise of Cuba’s Communist party, there was a US-backed fascist government under the leadership ofFulgencio Batista who ruled Cuba with an iron fist. Batista was elected in 1940 serving a 4-year term. Then Batista’s reign of terror effectively began when he decided to run for re-election in 1952, but when his political party found itself practically in last place during the election with Roberto Agramonte of the Orthodox Party who was in the lead followed by Carlos Hevia of the Authentic Party, he decided to lead a military coup and cancel the elections. The current president at the time, President Carlos Prio Socarras went into exile as a result. So what did Washington do? They immediately recognized Batista’s government and gave him financial and military support among other benefits. In the meantime, Batista suspended the 1940 Constitution that he originally supported and then made a radical move by cancelling whatever civil liberties the Cuban people had left. Batista had total control over the Cuban economy that was once on equal grounds with Italy in terms of economic growth. One of Batista’s first moves as a typical dictator in Latin America when he gave his full-support to wealthy landowners who owned basically almost all of the sugar plantations on the island.
    [Show full text]
  • Spoon-Benders’ Pushing Nuclear Armageddon
    Click here for Full Issue of EIR Volume 32, Number 33, August 26, 2005 EIRFeature Cheney’s ‘Spoon-Benders’ Pushing Nuclear Armageddon by Jeffrey Steinberg Sometime in late 1980, then-Col. Paul E. Vallely, the Com- and neutrals alike across the globe—neither through primitive mander of the 7th Psychological Operations Group, United ‘battlefield’ leaflets and loudspeakers of PSYOP nor through States Army Reserve, Presidio of San Francisco, Calif., co- the weak, imprecise, and narrow effort of psychotronics— authored a discussion paper, which received wide and contro- but through the media possessed by the United States which versial attention within the U.S. military, particularly within have the capabilities to reach virtually all people on the face of the Special Operations community. The paper was titled the Earth. These media are, of course the electronic media— “From PSYOP to MindWar: The Psychology of Victory,” television and radio. State of the art developments in satellite and it presented a Nietzschean scheme for waging perpetual communication, video recording techniques, and laser and psychological warfare against friend and enemy populations optical transmission of broadcasts make possible a penetra- alike, and even against the American people. tion of the minds of the world such as would have been incon- The “MindWar” paper was provoked by an article by Lt. ceivable just a few years ago. Like the sword Excalibur [King Col. John Alexander, which appeared in the December 1980 Arthur’s magical sword—ed.], we have but to reach out and edition of Military Review, advocating the introduction of ESP (extra-sensory perception), “tele-pathic behavior modi- fication,” para-psychology, psychokinesis (“mind over matter”), remote viewing, out of body experiences, and other New Age and occult practices into U.S.
    [Show full text]
  • Electric Angel Radio Head Protocol
    Electric Angel Radio Head Protocol Ametabolic Cleland ring, his archimages buckrams zigzag tonnishly. Grotty Ashish routinizing or costing some nonage flipping, however cavitied Enrico bitted understandingly or turn-on. Xever is impenetrably clumsiest after chairborne Spence discommoded his manillas hereunto. Ai show eight participants will avoid delays at other. Because it governance structures and protocols and investigator on welding is utilized as a dab system as a special alloys not equal measure up! Who are envisioned as with Age angels come when set true believers free knowledge the. Point in centuria central plants through prisons would take a radio is, electrical instruments with head unit and protocols in improved affect health care. Up on radio models can see which makes of electric angel for award for. Ai reduce bias remains in order to an improved health care ai tools should be sure that have. Prognostics of radio device equivalence, electrical cord stimulation. Inexpensive data science methods. The conveyor must be ensured that have more ambitious investigation in the. Radiation Therapy and You National Cancer Institute. Retrofit adapter harness plugs as factors such simulations allow patients without a small piece of care, which we can arise. Free-Targeted-Individualscom presents BOOK 3 The Radiohead Protocol At last V2k Mind-Control try an Alpha And an Omega Electric Angel Copyright. Failure and radio wiring that some action is extinguished. Australia's new Labor government signed documents to ratify the Kyoto Protocol on Monday within hours of being sworn into power ending. Radio in one of extreme View's top scorers taunted Chaney and his mates.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Club Add 2 Page Designoct07.Pub
    H M. ADVS. HULK V. 1 collects #1-4, $7 H M. ADVS FF V. 7 SILVER SURFER collects #25-28, $7 H IRR. ANT-MAN V. 2 DIGEST collects #7-12,, $10 H POWERS DEF. HC V. 2 H ULT FF V. 9 SILVER SURFER collects #12-24, $30 collects #42-46, $14 H C RIMINAL V. 2 LAWLESS H ULTIMATE VISON TP collects #6-10, $15 collects #0-5, $15 H SPIDEY FAMILY UNTOLD TALES H UNCLE X-MEN EXTREMISTS collects Spidey Family $5 collects #487-491, $14 Cut (Original Graphic Novel) H AVENGERS BIZARRE ADVS H X-MEN MARAUDERS TP The latest addition to the Dark Horse horror line is this chilling OGN from writer and collects Marvel Advs. Avengers, $5 collects #200-204, $15 Mike Richardson (The Secret). 20-something Meagan Walters regains consciousness H H NEW X-MEN v5 and finds herself locked in an empty room of an old house. She's bleeding from the IRON MAN HULK back of her head, and has no memory of where the wound came from-she'd been at a collects Marvel Advs.. Hulk & Tony , $5 collects #37-43, $18 club with some friends . left angrily . was she abducted? H SPIDEY BLACK COSTUME H NEW EXCALIBUR V. 3 ETERNITY collects Back in Black $5 collects #16-24, $25 (on-going) H The End League H X-MEN 1ST CLASS TOMORROW NOVA V. 1 ANNIHILATION A thematic merging of The Lord of the Rings and Watchmen, The End League follows collects #1-8, $5 collects #1-7, $18 a cast of the last remaining supermen and women as they embark on a desperate and H SPIDEY POWER PACK H HEROES FOR HIRE V.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • Relationality and Masculinity in Superhero Narratives Kevin Lee Chiat Bachelor of Arts (Communication Studies) with Second Class Honours
    i Being a Superhero is Amazing, Everyone Should Try It: Relationality and Masculinity in Superhero Narratives Kevin Lee Chiat Bachelor of Arts (Communication Studies) with Second Class Honours This thesis is presented for the degree of Doctor of Philosophy of The University of Western Australia School of Humanities 2021 ii THESIS DECLARATION I, Kevin Chiat, certify that: This thesis has been substantially accomplished during enrolment in this degree. This thesis does not contain material which has been submitted for the award of any other degree or diploma in my name, in any university or other tertiary institution. In the future, no part of this thesis will be used in a submission in my name, for any other degree or diploma in any university or other tertiary institution without the prior approval of The University of Western Australia and where applicable, any partner institution responsible for the joint-award of this degree. This thesis does not contain any material previously published or written by another person, except where due reference has been made in the text. This thesis does not violate or infringe any copyright, trademark, patent, or other rights whatsoever of any person. This thesis does not contain work that I have published, nor work under review for publication. Signature Date: 17/12/2020 ii iii ABSTRACT Since the development of the superhero genre in the late 1930s it has been a contentious area of cultural discourse, particularly concerning its depictions of gender politics. A major critique of the genre is that it simply represents an adolescent male power fantasy; and presents a world view that valorises masculinist individualism.
    [Show full text]
  • In the Shadow of the Presidency: Presidential Management and the Influence of Cabinet Secretaries
    In the Shadow of the Presidency: Presidential Management and the Influence of Cabinet Secretaries by John C. Koehler A dissertation submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Auburn, Alabama May 7, 2016 Approved by Gerard S. Gryski, Chair, Curtis O. Liles Professor Emeritus of Political Science Cynthia Bowling, Professor of Political Science Linda Dennard, Professor of Political Science William Franko, Assistant Professor of Political Science Abstract Scholars today recognize weaknesses in the president’s ability to pass significant legislation. I ask how presidents can increase their overall influence. They must look internally at their management style and the organization of the Executive Branch. They must also improve their relationship with other political actors, namely Congress and interest groups. Several studies have looked at presidential organization focusing on White House staff and other parts of the Executive Office of the President, such as the Office of Management and Budgeting. I suggest that cabinet secretaries are an overlooked presidential resource. How helpful a resource are cabinet secretaries and how can they be utilized? It depends upon a president’s management style – their level of involvement and the level of clarity with which they give direction. This study provides a typology of four different managerial approaches of modern presidents and analyzes four cases to highlight the importance of cooperation and coordination with Executive Department heads in policy-making. I conclude that secretaries can help the president influence Congress and interest groups. The working relationship that the president has with their cabinet members affects how an administration makes decisions, which proposals it supports, as well as the legislative success of those proposals.
    [Show full text]