Silent Weapons for Quiet Wars
An Introduction Programming Manual
Operations Research Technical ManualTW-SW7905.1
The following document is taken from two sources. The first, was acquired on a website(of which I can't remember the address) listing as its source the book titled Behold A PaleHorse
by William Cooper; Light Technology Publishing, 1991.
The second source is acrudely copied booklet which does not contain a copyright notice, or a publishers name.With the exception of the
, the main thing that was missing from thefirst source was the illustrations. As we began comparing the two, we realized that theillustrations, and the accompanying text (also missing from the first) made up asignificant part of the document. This has now been restored by The Lawful Path, and sofar as I know, is the only internet copy available complete with the illustrations.We have no first-hand knowledge that this document is genuine, however many of theconcepts contained herein are certainly reasonable, important, and bear strongconsideration.If anyone has additional knowledge about the source of this document; has better copiesof the illustrations than the ones posted here; has any missing pieces to this document, orhas any comments which can improve upon the quality of this document, we willappreciate your comments.
The Lawful Path
This manuscript was delivered to our offices by an unknown person. We did not steal thedocument, nor are we involved with any theft from the United States Government, andwe did not get the document by way of any dishonest methods. We feel that we are notendangering the "National Security" by reproducing this document, quite the contrary; ithas been authenticated and we feel that we are not only within our rights to publish it, butmorally bound to do so.Regarding the training manual, you may have detected that we had to block out themarginal notes made by the selectee at the C.I.A. Training Center, but I can assure youthat the manual is authentic, and was printed for the purpose of introducing the selectee tothe conspiracy. It has been authenticated by four different technical writers for Military