Archive for the 'Covert Operations' Category

« Previous PageNext Page »

U.S. Army 1983: “Be Intellectually Prepared to React to Possible Encounters with Intelligent, Non-Corporal Energy Forms When Time-Space Boundaries Are Exceeded”

October 10th, 2018

This is a U.S. Army Intelligence document on Hemi-Sync and Itzhak Bentov’s Stalking the Wild Pendulum. The source document is “Analysis and Assessment of Gateway Process,” CIA-RDP96-00788R001700210016-5.pdf, which you can find on CIA’s Electronic Reading room. https://www.cia.gov/library/readingroom/document/cia-rdp96-00788r001700210016-5

GM Appoints Ex-CIA Deputy Director, Co-Vice Chair of the Council on Foreign Relations to Its Board

October 10th, 2018

More connections than a switchboard, including an NSC role where, “She had oversight responsibility for covert action programs and special reconnaissance missions,” and In-Q-Tel. Via: CNBC: General Motors appointed a former deputy director of intelligence at the Central Intelligence Agency to its board on Wednesday. Jami Miscik is the chief executive and vice chair of […]

Financial Accounts May Be “Modified” to Shield Classified Programs

October 9th, 2018

Not a new policy: missingmoney.solari.com Via: Federation of American Scientists: In an apparent departure from “generally accepted accounting principles,” federal agencies will be permitted to publish financial statements that are altered so as to protect information on classified spending from disclosure. The new policy was developed by the government’s Federal Accounting Standards Advisory Board (FASAB) […]

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

October 4th, 2018

Update: Apple, Amazon Deny Bloomberg Report on Chinese Hardware Attack — Via: Bloomberg: In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive […]

DEF CON Report: “Grave and Undeniable” Security Issues with Electronic Voting Systems

October 1st, 2018

Via: Ars Technica: Today, six prominent information-security experts who took part in DEF CON’s Voting Village in Las Vegas last month issued a report on vulnerabilities they had discovered in voting equipment and related computer systems. One vulnerability they discovered—in a high-speed vote-tabulating system used to count votes for entire counties in 23 states—could allow […]

DuckDuckGo Traffic

September 29th, 2018

Via: DuckDuckGo:

Trump Planning Martial Law for War Against Deep State [???]

September 23rd, 2018

I doubt it. However, I also doubt my ability to predict much with regard to Trump. I thought that the Clinton criminal enterprise would be back in the White House after the 2016 election… With all of the bans on alternative perspectives currently sweeping through the big tech/social networking companies, it does seem like something […]

9/11: What 17 Years of Lies Have Done to Us

September 12th, 2018

Via: Richard Dolan:

Australia Wants to Take Government Surveillance to the Next Level

September 4th, 2018

Via: New York Times: A state’s capacity to spy on its citizens has grown exponentially in recent years as new technology has meant more aspects of our lives can be observed, recorded and analyzed than ever before. At the same time, much to the frustration of intelligence agencies around the world, so has the ability […]

Russia: Unidentified Helicopters Delivering Weapons to Taliban, Islamic State in Afghanistan

August 28th, 2018

Weapons in, drugs out. Via: Russian Government / TASS: Russia has recorded flights of unidentified helicopters delivering weapons to the Taliban (a movement outlawed in Russia) and the Islamic State (a terror group outlawed in Russia) units active in Afghanistan, Russian Foreign Ministry Spokeswoman Maria Zakharova said at a briefing on Thursday. “We would like […]

« Previous PageNext Page »