Terrorist Nuclear Command and Control

Total Page:16

File Type:pdf, Size:1020Kb

Terrorist Nuclear Command and Control Radiological and Nuclear Adversary Project Task 3: Terrorist Nuclear Command and Control July 25, 2012 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 3300 Symons Hall • College Park, MD 20742 • 301.405.6600 • www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A U.S. Department of Homeland Security Center of Excellence About This Report The authors of this report are Charles P. Blair and Gary A. Ackerman. Questions about this report should be directed to Gary Ackerman at [email protected]. Additional authors contributing group profiles are Jeffrey M. Bale and Jarret M. Brachman. The authors would like to thank the following individuals for their assistance: START Research Staff: Suzzette Abbasciano, William Braniff, Mila Johns, Mary Michael, Amy Pate, Lauren Pinson, and John Sawyer. START Research Assistants (for formatting and editing the final report): Richard Burns, Michael Cianfinchi, David Fu, Paul Gallo, Georg Grosse-Hohl, Christina Hesse, Emily Joseph, Anna Lepingwell, Daniel Murphy, Patrick Niceforo, Daniel Richey, and Brittany Steele. Federation of American Scientists (FAS) (for substantive research assistance and report editing): Nilsu Goren and Libby Osher. FAS Research Assistants (for report editing): Drew Beggs, Jonathan Garbose, and Elizabeth Grace. This material is based upon work done by the National Consortium for the Study of Terrorism and Responses to Terrorism (START, www.start.umd.edu) under contract HSHQDC-10-D-00023 with the Department of Homeland Security. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START. About START The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is supported in part by the Science and Technology Directorate of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state-of-the-art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. For more information, contact START at [email protected] or visit www.start.umd.edu. About the Project and Citations Co-Principal Investigators: Charles P. Blair and Gary A. Ackerman Project Managers: Lauren Pinson and John Sawyer To cite this report, please use this format: Blair, Charles P. and Gary A. Ackerman. “Terrorist Nuclear Command and Control,” College Park, MD: START, 2012. Terrorist Nuclear Command and Control National Consortium for the Study of Terrorism and Responses to Terrorism A US Department of Homeland Security Center of Excellence Executive Summary Suddenly aware of terrorist possession of a nuclear weapon, conventional wisdom assumes that US decision makers would immediately use overwhelming preemptive force against both the group’s leadership and its nuclear device. Similarly, it is widely understood that if a terrorist group detonated a nuclear weapon on US soil or its interests abroad, an overwhelming response would follow, targeting the group’s leadership and remaining nuclear devices, if any. The conventional wisdom described above—axiomatic preemption and retaliation—could easily result in the opposite outcome from that which decision makers seek: actual use of a nuclear weapon by terrorists. Preemption or retaliation could still result in one or more nuclear devices being employed against the United States. This counterintuitive outcome is dependent on how the group configures its nuclear command and control (C2). One must assess if a given terrorist group will employ, with regard to nuclear weapons, an authoritative or delegative command and control system. The former—where the decision to employ nuclear weapons is retained solely by a top leader(s)—allows the United States ―decapitation‖ options against leadership centers to prevent or respond to an attack. In contrast, a delegative system—an arrangement in which subordinate commanders are authorized to make nuclear employment decisions under certain defined circumstances—occludes decapitation opportunities; attempts to destroy a terrorist group’s top leadership, even if successful, might trigger the nuclear attack they were intended to neutralize. The implication is that, in the lead-up to a preemptive strike on a nuclear-armed terrorist group or in the immediate aftermath of an attempted or successful nuclear strike on the United States or its interests abroad, US leadership’s calculations about the authoritative or delegative nuclear command and control system employed by terrorists and other violent non-state actors (VNSAs) will be of supreme importance. Unfortunately, to date, little attention has been given to how a terrorist would implement C2 over a single nuclear weapon (or a nascent nuclear arsenal) or what their likely nuclear weapons employment policies would be. By limiting themselves to investigating only the general requirements necessary to attain a nuclear capability, contemporary scholars studying the nexus between terrorists and nuclear weapons would be remiss in assuming that information pertaining to the capability to fabricate or obtain nuclear weapons tells us something about the manner of employment of that weapon. In short, most present perceptions of the possible marriage between terrorists hostile to the United States and nuclear weapons foresee an immediate effort to use such devices against population centers within the United States; preemption or retaliation by the US is assumed. Such a myopic view ignores the very real possibility that nuclear-armed terrorists, utilizing complex and effective nuclear command and control configurations, could still succeed in using nuclear weapons against the United States or its interests abroad. This project challenges these assumptions and seeks to develop a more nuanced understanding of how a variety of VNSAs would likely approach and actualize the command, control and employment of nuclear weapons. Ultimately, it creates a functional model that acts, with proper data input, as a tool for determining the likely command and control configuration of any VNSA—extant or nascent. Construction of such a model and tool involved a multi-method approach that necessitated identifiying the various elements influencing command and control in its a variety of manifestations. The first step was to conduct an exhaustive survey and analysis of relevant literature from three separate domains: First, findings from the disciplines of social and organizational psychology revealed important clues about the universal variables inherent in how organizations are structured and maintained. Of specific concern was how dominion and delegation—the extension of authority over distance— are balanced in complex and critical human interactions. Terrorist Nuclear Command and Control National Consortium for the Study of Terrorism and Responses to Terrorism A US Department of Homeland Security Center of Excellence Second, researchers studied states’ perception of optimal nuclear command and control configurations as well as their actual manifestation from the closing salvos of World War II through the Cold War. This part of the literature assessment identified specific variables influencing known and implied configurations relating directly to nuclear weapons. Third, researchers reviewed VNSA command and control configurations demonstrated during actual attacks. Several incidents were carefully selected to account for command and control configurations in a variety of complex operations involving a spectrum of group traits and attack environments. In sum, all three elements of the literature assessments informed the development of an initial set of potential contributing factors with respect to VNSA nuclear command and control. However, despite the breadth of this analysis, it still presented a static, and perhaps occasionally even outdated, view of what are undoubtedly highly dynamic actors and environments. The second method employed was therefore to augment the analysis of existing knowledge with a structured elicitation of recognized subject matter experts (SMEs), in order to provide more dynamic insights and innovative connections between the plentitude of variables informing the model. The elicitation had as its primary goal to validate and, where necessary, supplement the previously developed set of variables potentially influencing nuclear command and control, by drawing on the collective expertise of the assembled experts, while at the same time controlling insofar as possible for the biases that attend any judgmental analysis. SMEs were drawn from a variety of professions and academic disciplines. Appropriate techniques were selected and designed to fit the needs of the project, including cognitive structuring (debiasing techniques), structured and semi-structured brainstorming session, red teaming, and micro- and macro-model development and subsequent evaluation. Ultimately, the project team extracted a vast number of variables and several models for use in informing the previously developed C2 framework. The resulting integrated framework was then utilized by the project team to produce a model and assessment tool that
Recommended publications
  • The Microscopic Threat to the United States: Biological Weapons, Biological Terrorism, and Their Multifaceted Implications for U.S
    “THE MICROSCOPIC THREAT TO THE UNITED STATES: BIOLOGICAL WEAPONS, BIOLOGICAL TERRORISM, AND THEIR MULTIFACETED IMPLICATIONS FOR U.S. SECURITY” by Angelina Camacho A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts in Global Security Studies Baltimore, Maryland May, 2014 © 2014 Angelina Camacho All Rights Reserved ABSTRACT From 1943 to 1969 the United States had a thriving biological weapons program to develop new ways of targeting its adversaries. With the 1972 creation of the Biological Weapons Convention, the United States relinquished its program and sought to prevent other countries from possessing these lethal weapons. While previously the United States mainly worked with other states and the international community to minimize the threat from biological weapons, the 2001 anthrax attacks changed this landscape by adding a domestic dimension. This thesis explores three major aspects of the biological threat to the United States: domestic lone wolf actors, possible future state threats, and the failing aspects of the Biological Weapons Convention. An analysis of each aspect of the biological threat is performed to identify the role they each may play in future U.S. security decisions. Among the multitude of threats that can arise from biological terrorism and weapons, these particular threats are the most likely to shape future U.S. decision making, both domestically and at the international level. Through an analysis of a specific aspect of the biological threat towards the United States, each chapter illustrates the biological threat to the United States is real, menacing, and must be addressed for the future of U.S.
    [Show full text]
  • Acts Marseille 2015
    Deliberately planned and encouraged confusion between cults and religion Saturday, May 16, 2015 Radisson BLU Hotel Marseille, Vieux Port 38-40 Quai Rive Neuve, 13007 Marseille, France organised by the European Federation of Centres of Research and Information on Cults and Sects (FECRIS) and GEMPPI 1 - Sectes: aide, information, prévention http://www.gemppi.org/accueil/ 1 Groupe d’Etude des Mouvements de Pensée en vue de la Protection de l’Individu, Marseille Index Daniele Muller-Tulli, President of FECRIS (Switzerland -Representative in the CoE ) Thematic approach through the spectrum of FECRIS' experience in the Council of Europe, OSCE, FRA and UN………………………………………………………………………………………………………… 4 Rudy Salles, MP and member of the Committee on Legal Affairs and Human Rights of the Council of Europe (France) Analysis of the situation that led to the failure of Rudy Salles' report on "excesses of sects" in the Council of Europe 2 (read by Danièle Muller-Tulli)……………………………………. 6 Didier Pachoud, président du GEMPPI, co-organising association, (France) Introduction of the topic…………………………………………………………………………………………………………….. 7 Serge Blisko, President of MIVILUDES, ( Office of the Prime Minister - France). Secularism………………………………………………………………………………………………………………………………………. 8 Bertrand Chaudet, (CCMM, France) The collective of victims of psycho-spiritual excesses ……………………………………………………… 13 Friedrich Griess (GSK, Austria) and XXXX (France) Testimonials about Smith Friends (ACFF 3) …………………………………………………………………………… 18 Alexey Voat , researcher (CSR, Russian Federation)
    [Show full text]
  • Unclassified 1 House Armed Services Committee On
    UNCLASSIFIED HOUSE ARMED SERVICES COMMITTEE ON STRATEGIC FORCES STATEMENT OF CHARLES A. RICHARD COMMANDER UNITED STATES STRATEGIC COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON STRATEGIC FORCES 21 APRIL 2021 HOUSE ARMED SERVICES COMMITTEE ON STRATEGIC FORCES 1 UNCLASSIFIED INTRODUCTION United States Strategic Command (USSTRATCOM) is a global warfighting command, and as the Commander, I am privileged to lead the 150,000 Sailors, Soldiers, Airmen, Marines, Guardians, and Civilians who dedicate themselves to the Department of Defense’s highest priority mission. I thank the President, Secretary of Defense Austin, and Chairman of the Joint Chiefs Milley for their continued leadership in this vital mission area. The command is focused on and committed to the Secretary of Defense priorities to defend the nation, take care of our people, and succeed through teamwork. I also thank Congress for your continued support to ensure USSTRATCOM is equipped with the required resources necessary to achieve strategic deterrence in any situation on behalf of the nation. USSTRATCOM enables Joint Force operations and is the combatant command responsible for Strategic Deterrence, Nuclear Operations, Nuclear Command, Control, and Communications (NC3) Enterprise Operations, Joint Electromagnetic Spectrum Operations, Global Strike, Missile Defense, Analysis and Targeting, and Missile Threat Assessment. Our mission is to deter strategic attack and employ forces as directed, to guarantee the security of the nation and assure our allies and partners. The command has three priorities. First, above all else, we will provide strategic deterrence for the nation and assurance of the same to our allies and partners. Second, if deterrence fails, we are prepared to deliver a decisive response, decisive in every possible way.
    [Show full text]
  • Next-Gen Technology Transformation in Financial Services
    April 2020 Next-gen Technology transformation in Financial Services Introduction Financial Services technology is currently in the midst of a profound transformation, as CIOs and their teams prepare to embrace the next major phase of digital transformation. The challenge they face is significant: in a competitive environment of rising cost pressures, where rapid action and response is imperative, financial institutions must modernize their technology function to support expanded digitization of both the front and back ends of their businesses. Furthermore, the current COVID-19 situation is putting immense pressure on technology capabilities (e.g., remote working, new cyber-security threats) and requires CIOs to anticipate and prepare for the “next normal” (e.g., accelerated shift to digital channels). Most major financial institutions are well aware of the imperative for action and have embarked on the necessary transformation. However, it is early days—based on our experience, most are only at the beginning of their journey. And in addition to the pressures mentioned above, many are facing challenges in terms of funding, complexity, and talent availability. This collection of articles—gathered from our recent publishing on the theme of financial services technology—is intended to serve as a roadmap for executives tasked with ramping up technology innovation, increasing tech productivity, and modernizing their platforms. The articles are organized into three major themes: 1. Reimagine the role of technology to be a business and innovation partner 2. Reinvent technology delivery to drive a step change in productivity and speed 3. Future-proof the foundation by building flexible and secure platforms The pace of change in financial services technology—as with technology more broadly—leaves very little time for leaders to respond.
    [Show full text]
  • Conference Handbook ICSA 2010 Annual International Conference: Psychological Manipulation, Cultic Groups, and Harm
    Conference Handbook ICSA 2010 Annual International Conference: Psychological Manipulation, Cultic Groups, and Harm With the collaboration of Info-Cult/Info-Secte, Montreal, Canada July 1-3, 2010 Doubletree at George Washington Bridge 2117 Route 4 East, Fort Lee, NJ International Cultic Studies Association PO Box 2265 Bonita Springs, FL 34133 239-514-3081 www.icsahome.com Welcome Welcome to the 2010 International Cultic Studies Association (ICSA) conference, Psychological Manipulation, Cultic Groups, and Harm. Speakers have given much of their time in order to present at this conference. Many attendees have come long distances and have diverse backgrounds. Hence, please help us begin sessions on time and maintain a respectful tone during the sometimes lively and provocative discussions. This is a public conference. If you have matters that are sensitive or that you prefer to keep confidential, you should exercise appropriate care. Private audio- or videotaping is not permitted. We hope to make some videos and/or audios available after the conference. Press who attend the conference may come from mainstream and nonmainstream, even controversial, organizations. If a journalist seeks to interview you, exercise appropriate care. If you desire to refuse an interview request, feel free to do so. Remember, if you give an interview, you will have no control over what part of the interview, if any, will be used. ICSA conferences try to encourage dialogue and are open to diverse points of view. Hence, opinions expressed at the conference or in books and other materials available in the bookstore should be interpreted as opinions of the speakers or writers, not necessarily the views of ICSA or its staff, directors, or advisors.
    [Show full text]
  • Equity Crowdfunding: All Regulated but Not Equal
    DePaul Business and Commercial Law Journal Volume 13 Issue 3 Spring 2015 Article 2 Equity Crowdfunding: All Regulated but Not Equal Garry A. Gabison Follow this and additional works at: https://via.library.depaul.edu/bclj Recommended Citation Garry A. Gabison, Equity Crowdfunding: All Regulated but Not Equal, 13 DePaul Bus. & Com. L.J. 359 (2015) Available at: https://via.library.depaul.edu/bclj/vol13/iss3/2 This Article is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Business and Commercial Law Journal by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. Equity Crowdfunding: All Regulated but Not Equal Garry A. Gabison* This Article describes how different countries have approached eq- uity crowdfunding. It focuses on countries or regulatory authorities that either expressed their awareness of the phenomenon but decided to adopt a holding pattern (monitoring and investigating) or new laws and regulations. Countries like Australia have opted to reaffirm how their current set of regulations applies to crowdfunding whereas others like the United States, Italy, the United Kingdom, and France have elected to create new exemptions in an effort to facilitate equity crowdfunding. This Article compares how each country decided to regulate the different participantsin the crowdfunding process. While the results of these various efforts are still mostly unseen, this Article takes an early look at the regulatory impact using one U.K. based platform as an example of how regulations can boost investment. CONTENTS I. INTRODUCTION ...........................................
    [Show full text]
  • Medical Management of Biological Casualties Handbook
    USAMRIID’s MEDICAL MANAGEMENT OF BIOLOGICAL CASUALTIES HANDBOOK Sixth Edition April 2005 U.S. ARMY MEDICAL RESEARCH INSTITUTE OF INFECTIOUS DISEASES FORT DETRICK FREDERICK, MARYLAND Emergency Response Numbers National Response Center: 1-800-424-8802 or (for chem/bio hazards & terrorist events) 1-202-267-2675 National Domestic Preparedness Office: 1-202-324-9025 (for civilian use) Domestic Preparedness Chem/Bio Helpline: 1-410-436-4484 or (Edgewood Ops Center – for military use) DSN 584-4484 USAMRIID’s Emergency Response Line: 1-888-872-7443 CDC'S Emergency Response Line: 1-770-488-7100 Handbook Download Site An Adobe Acrobat Reader (pdf file) version of this handbook can be downloaded from the internet at the following url: http://www.usamriid.army.mil USAMRIID’s MEDICAL MANAGEMENT OF BIOLOGICAL CASUALTIES HANDBOOK Sixth Edition April 2005 Lead Editor Lt Col Jon B. Woods, MC, USAF Contributing Editors CAPT Robert G. Darling, MC, USN LTC Zygmunt F. Dembek, MS, USAR Lt Col Bridget K. Carr, MSC, USAF COL Ted J. Cieslak, MC, USA LCDR James V. Lawler, MC, USN MAJ Anthony C. Littrell, MC, USA LTC Mark G. Kortepeter, MC, USA LTC Nelson W. Rebert, MS, USA LTC Scott A. Stanek, MC, USA COL James W. Martin, MC, USA Comments and suggestions are appreciated and should be addressed to: Operational Medicine Department Attn: MCMR-UIM-O U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) Fort Detrick, Maryland 21702-5011 PREFACE TO THE SIXTH EDITION The Medical Management of Biological Casualties Handbook, which has become affectionately known as the "Blue Book," has been enormously successful - far beyond our expectations.
    [Show full text]
  • Archons (Commanders) [NOTICE: They Are NOT Anlien Parasites], and Then, in a Mirror Image of the Great Emanations of the Pleroma, Hundreds of Lesser Angels
    A R C H O N S HIDDEN RULERS THROUGH THE AGES A R C H O N S HIDDEN RULERS THROUGH THE AGES WATCH THIS IMPORTANT VIDEO UFOs, Aliens, and the Question of Contact MUST-SEE THE OCCULT REASON FOR PSYCHOPATHY Organic Portals: Aliens and Psychopaths KNOWLEDGE THROUGH GNOSIS Boris Mouravieff - GNOSIS IN THE BEGINNING ...1 The Gnostic core belief was a strong dualism: that the world of matter was deadening and inferior to a remote nonphysical home, to which an interior divine spark in most humans aspired to return after death. This led them to an absorption with the Jewish creation myths in Genesis, which they obsessively reinterpreted to formulate allegorical explanations of how humans ended up trapped in the world of matter. The basic Gnostic story, which varied in details from teacher to teacher, was this: In the beginning there was an unknowable, immaterial, and invisible God, sometimes called the Father of All and sometimes by other names. “He” was neither male nor female, and was composed of an implicitly finite amount of a living nonphysical substance. Surrounding this God was a great empty region called the Pleroma (the fullness). Beyond the Pleroma lay empty space. The God acted to fill the Pleroma through a series of emanations, a squeezing off of small portions of his/its nonphysical energetic divine material. In most accounts there are thirty emanations in fifteen complementary pairs, each getting slightly less of the divine material and therefore being slightly weaker. The emanations are called Aeons (eternities) and are mostly named personifications in Greek of abstract ideas.
    [Show full text]
  • Graphic No Vels & Comics
    GRAPHIC NOVELS & COMICS SPRING 2020 TITLE Description FRONT COVER X-Men, Vol. 1 The X-Men find themselves in a whole new world of possibility…and things have never been better! Mastermind Jonathan Hickman and superstar artist Leinil Francis Yu reveal the saga of Cyclops and his hand-picked squad of mutant powerhouses. Collects #1-6. 9781302919818 | $17.99 PB Marvel Fallen Angels, Vol. 1 Psylocke finds herself in the new world of Mutantkind, unsure of her place in it. But when a face from her past returns only to be killed, she seeks vengeance. Collects Fallen Angels (2019) #1-6. 9781302919900 | $17.99 PB Marvel Wolverine: The Daughter of Wolverine Wolverine stars in a story that stretches across the decades beginning in the 1940s. Who is the young woman he’s fated to meet over and over again? Collects material from Marvel Comics Presents (2019) #1-9. 9781302918361 | $15.99 PB Marvel 4 Graphic Novels & Comics X-Force, Vol. 1 X-Force is the CIA of the mutant world—half intelligence branch, half special ops. In a perfect world, there would be no need for an X-Force. We’re not there…yet. Collects #1-6. 9781302919887 | $17.99 PB Marvel New Mutants, Vol. 1 The classic New Mutants (Sunspot, Wolfsbane, Mirage, Karma, Magik, and Cypher) join a few new friends (Chamber, Mondo) to seek out their missing member and go on a mission alongside the Starjammers! Collects #1-6. 9781302919924 | $17.99 PB Marvel Excalibur, Vol. 1 It’s a new era for mutantkind as a new Captain Britain holds the amulet, fighting for her Kingdom of Avalon with her Excalibur at her side—Rogue, Gambit, Rictor, Jubilee…and Apocalypse.
    [Show full text]
  • “Why So Serious?” Comics, Film and Politics, Or the Comic Book Film As the Answer to the Question of Identity and Narrative in a Post-9/11 World
    ABSTRACT “WHY SO SERIOUS?” COMICS, FILM AND POLITICS, OR THE COMIC BOOK FILM AS THE ANSWER TO THE QUESTION OF IDENTITY AND NARRATIVE IN A POST-9/11 WORLD by Kyle Andrew Moody This thesis analyzes a trend in a subgenre of motion pictures that are designed to not only entertain, but also provide a message for the modern world after the terrorist attacks of September 11, 2001. The analysis provides a critical look at three different films as artifacts of post-9/11 culture, showing how the integration of certain elements made them allegorical works regarding the status of the United States in the aftermath of the attacks. Jean Baudrillard‟s postmodern theory of simulation and simulacra was utilized to provide a context for the films that tap into themes reflecting post-9/11 reality. The results were analyzed by critically examining the source material, with a cultural criticism emerging regarding the progression of this subgenre of motion pictures as meaningful work. “WHY SO SERIOUS?” COMICS, FILM AND POLITICS, OR THE COMIC BOOK FILM AS THE ANSWER TO THE QUESTION OF IDENTITY AND NARRATIVE IN A POST-9/11 WORLD A Thesis Submitted to the Faculty of Miami University in partial fulfillment of the requirements for the degree of Master of Arts Department of Communications Mass Communications Area by Kyle Andrew Moody Miami University Oxford, Ohio 2009 Advisor ___________________ Dr. Bruce Drushel Reader ___________________ Dr. Ronald Scott Reader ___________________ Dr. David Sholle TABLE OF CONTENTS ACKNOWLEDGMENTS .......................................................................................................................... III CHAPTER ONE: COMIC BOOK MOVIES AND THE REAL WORLD ............................................. 1 PURPOSE OF STUDY ...................................................................................................................................
    [Show full text]
  • The Annals of Unsolved Crime by Edward Jay Epstein Isbn: 9781612190488
    THE ANNALS OF UNSOLVED CRIME BY EDWARD JAY EPSTEIN ISBN: 9781612190488 Available at mhpbooks.com and wherever books are sold. THE ANNALS OF UNSOLVED CRIME BY EDWARD JAY EPSTEIN MELVILLE HOUSE BROOKLYN • LONDON CONTENTS PREFACE 5 PART ONE “LONERS”: BUT WERE THEY ALONE? 1. The Assassination of President Lincoln 21 2. The Reichstag Fire 29 3. The Lindbergh Kidnapping 35 4. The Assassination of Olof Palme 43 5. The Anthrax Attack on America 47 6. The Pope’s Assassin 59 PART TWO SUICIDE, ACCIDENT, OR DISGUISED MURDER? 7. The Mayerling Incident 65 8. Who Killed God’s Banker? 69 9. The Death of Dag Hammarskjöld 97 10. The Strange Death of Marilyn Monroe 103 11. The Crash of Enrico Mattei 109 12. The Disappearance of Lin Biao 113 13. The Elimination of General Zia 117 14. The Submerged Spy 131 PART THREE COLD CASE FILE 15. Jack the Ripper 139 16. The Harry Oakes Murder 145 17. The Black Dahlia 151 18. The Pursuit of Dr. Sam Sheppard 155 19. The Killing of JonBenet Ramsey 161 20. The Zodiac 165 21. The Vanishing of Jimmy Hoffa 169 2 EDWARD JAY EPSTEIN PART FOUR CRIMES OF STATE 22. Death in Ukraine: The Case of the Headless Journalist 177 23. The Dubai Hit 189 24. The Beirut Assassination 195 25. Who Assassinated Anna Politkovskaya? 201 26. Blowing Up Bhutto 205 27. The Case of the Radioactive Corpse 209 28. The Godfather Contract 231 29. The Vanishings 237 PART FIVE SOLVED OR UNSOLVED? 30. The Oklahoma City Bombing 245 31. The O. J.
    [Show full text]
  • Paradism Appendix Official
    Paradism – A Project for Society 1 1 Canadian Raelian Church (2014) We are rapidly approaching a Canadian society – and a world society too – in which human work will be unnecessary! We call that new society paradism. "Paradism is the essential key to the future of humanity. And it's possible now... It can be done in a few weeks, not in a few years... just a few weeks!"- Rael Introduction This document is intended primarily for politicians and the media, since the former have the power to change things and the latter to influence them. (That is, as long as they have the will to do it.) But this text also speaks to all who know that work can soon be rapidly eliminated through science and the cutting edge technologies available today, especially robotics. Those who become unemployed through this change need not lack for anything. Instead, they can blossom and thrive in a leisure society, where the arts, sports, mutual aid and collaboration will prevail. Robot workers will meet all material needs. That is paradism! Those who rightly question the current functioning of our society can help bring about the profound changes essential to create the just, 2 idyllic society just described. By actively contributing to those changes, they will be able to leave a positive heritage for the entire world. Under the current system, a few people are using technology selfishly, impoverishing the majority (many of whom have already lost or are about to lose their jobs due to technological advances) to enrich only themselves. Technological progress is inevitable, but it should be used for the good of everyone, not just the few who currently profit from it.
    [Show full text]