![]() ![]() It shoots situations, instead of bullets propelled by data processing, instead of chemical reaction (explosion) originating from bits of data, instead of grains of gunpowder from a computer, instead of a gun operated by a computer programmer, instead of a marksman under the orders of a banking magnate. It it reproduced here without alteration to the content outside of formatting:ĭESCRIPTIVE INTRODUCTION OF THE SILENT WEAPONĮverything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning. The passage from the publication relevant to this particular essay is one at the beginning that defines what a “silent weapon” is. ![]() Because of this, it has been frequently referenced by conspiracy theorists (like myself) as an example of theoretical social engineering methods. While the document’s veracity has never truly been confirmed, the concepts it describes seem to hold a lot of water, and the techniques could theoretically be implemented for the purpose of subverting and subduing the population of a country. #STUCK ON PART 3 OF THE SILENT AGE MANUAL#Allegedly found in a surplus copier purchased from Boeing Aircraft in 1986, the manual “Silent Weapons for Quiet Wars: An introductory programming manual“ describes the concept of a “silent weapon,” as well as the various weapons of this variety which had been developed in secret by powerful institutions since the onset of the Cold War between America and the USSR. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |