Archive for the 'Covert Operations' Category
U.S. Army 1983: “Be Intellectually Prepared to React to Possible Encounters with Intelligent, Non-Corporal Energy Forms When Time-Space Boundaries Are Exceeded”
October 10th, 2018This is a U.S. Army Intelligence document on Hemi-Sync and Itzhak Bentov’s Stalking the Wild Pendulum. The source document is “Analysis and Assessment of Gateway Process,” CIA-RDP96-00788R001700210016-5.pdf, which you can find on CIA’s Electronic Reading room. https://www.cia.gov/library/readingroom/document/cia-rdp96-00788r001700210016-5
GM Appoints Ex-CIA Deputy Director, Co-Vice Chair of the Council on Foreign Relations to Its Board
October 10th, 2018More connections than a switchboard, including an NSC role where, “She had oversight responsibility for covert action programs and special reconnaissance missions,” and In-Q-Tel. Via: CNBC: General Motors appointed a former deputy director of intelligence at the Central Intelligence Agency to its board on Wednesday. Jami Miscik is the chief executive and vice chair of […]
Financial Accounts May Be “Modified” to Shield Classified Programs
October 9th, 2018Not a new policy: missingmoney.solari.com Via: Federation of American Scientists: In an apparent departure from “generally accepted accounting principles,” federal agencies will be permitted to publish financial statements that are altered so as to protect information on classified spending from disclosure. The new policy was developed by the government’s Federal Accounting Standards Advisory Board (FASAB) […]
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
October 4th, 2018Update: Apple, Amazon Deny Bloomberg Report on Chinese Hardware Attack — Via: Bloomberg: In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive […]
DEF CON Report: “Grave and Undeniable” Security Issues with Electronic Voting Systems
October 1st, 2018Via: Ars Technica: Today, six prominent information-security experts who took part in DEF CON’s Voting Village in Las Vegas last month issued a report on vulnerabilities they had discovered in voting equipment and related computer systems. One vulnerability they discovered—in a high-speed vote-tabulating system used to count votes for entire counties in 23 states—could allow […]
DuckDuckGo Traffic
September 29th, 2018Via: DuckDuckGo:
Trump Planning Martial Law for War Against Deep State [???]
September 23rd, 2018I doubt it. However, I also doubt my ability to predict much with regard to Trump. I thought that the Clinton criminal enterprise would be back in the White House after the 2016 election… With all of the bans on alternative perspectives currently sweeping through the big tech/social networking companies, it does seem like something […]
9/11: What 17 Years of Lies Have Done to Us
September 12th, 2018Via: Richard Dolan:
Australia Wants to Take Government Surveillance to the Next Level
September 4th, 2018Via: New York Times: A state’s capacity to spy on its citizens has grown exponentially in recent years as new technology has meant more aspects of our lives can be observed, recorded and analyzed than ever before. At the same time, much to the frustration of intelligence agencies around the world, so has the ability […]
Russia: Unidentified Helicopters Delivering Weapons to Taliban, Islamic State in Afghanistan
August 28th, 2018Weapons in, drugs out. Via: Russian Government / TASS: Russia has recorded flights of unidentified helicopters delivering weapons to the Taliban (a movement outlawed in Russia) and the Islamic State (a terror group outlawed in Russia) units active in Afghanistan, Russian Foreign Ministry Spokeswoman Maria Zakharova said at a briefing on Thursday. “We would like […]
