Andrija
Puharich and the CIA
Download
and read this FREE BOOK... a VERY
INTERESTING READ!:
Memories
of a Maverick A biography of
Andrija Puharich, M.D. LLD. internationally
acclaimed American scientist, inventor,
researcher, physicist, theorist, and
author. Editor of "THE ICELAND
PAPERS" (Select Papers on
Experimental and Theoretical Research on
the Physics of Consciousness) 1979. Dr.
Puharich was a leader in the field of
psychical research, merging quantum
mechanics and relativity into a new
scientific world-view to examine the way
in which brain/mind function gives rise to
a focused consciousness.
An
excerpt from Memories of a Maverick
where it recounts what Andrija believed to
be the reaction of the CIA to the imminent
publication of a new book:
"Then
in July 1978 Andrija got some very
disturbing news. One of his scientific
colleagues in California was approached by
a CIA agent who showed him a xerox copy of
Andrija's manuscript. When he informed his
colleague that the editor had assured him
that no one had been given a copy, they
both suspected that the manuscript had
been surreptitiously Xeroxed, and they
began to get concerned about the kind of
game the CIA was possibly playing.
"It
became very obvious to Andrija, after two
more scientists called him wite same
story of an approach by the CIA with his
manuscript, that the CIA wanted him to
know that they had a copy of the
manuscript. However, as he said, he had no
way of knowing what the nature of the
message was.
"A
few weeks later Andrija understood the
message loud and clear.
"On
August 7, 1978, while in California, he
got a telephone call from one of his
assistants from Ossining with the
devastating news that fire had been set to
his beautiful home.
"Andrija's
account of what happened is rather
dramatic and emotional: "I returned
to my 'home', and after a week of
discussions with the local police, the
fire chief, the insurance company's fire
investigator, and eyewitnesses, the
following picture emerged: One or more
persons had entered the house between 9.30
a.m. to 10.20 a.m. They had liberally
soaked the front entrance hall (carpets
and furniture) and the back entrance porch
(particularly a hemp mat) with a highly
flammable and smoke-producing liquid. They
turned on all the gas burners in the
kitchen, even let the dog in, before they
left the house. Then the front and back
porches were ignited separately, and
probably simultaneously....."
Plan
Nine from Outer Space
Teslar
Watches
|
The
CIA
CIA
Take
a Virtual Tour of the CIA
The
CIA and the Media
CIA
Instructions to Media Assets Concerning the Warren
Report
"This
document caused quite a stir when it was
discovered in 1977. Dated 4/1/67, and marked
"DESTROY WHEN NO LONGER NEEDED", this
document is a stunning testimony to how concerned
the CIA was over investigations into the Kennedy
assassination. Emphasis has been added to
facilitate scanning."
Did
Bob Woodward Have CIA Connections?
Parapsychology
in Intelligence: The Rise and Fall of the CIA's
Psychic Spies
Operation
Stargate: US Intelligence and Psychic Spies
The
CIA and Drug Trafficking
CIA
Admits Contra-Cocaine Trafficking in the
'80's
Oliver
North's Notebooks Reconstructed
Forty
Five Years of CIA Drug Trafficking
Personal
Site of U.S. Custom's Whistle Blower:
Corruption at the Border
The
CIA and Drugs
"...
this narrative attempts to bring to light,
to anyone willing to spend a few hours of
their time, one of the most disturbing
facets of the Cold War and post-Cold War
eras." This is a very thoughtful
and thorough site, with a fascinating
number of corroborating quotes like this
one: "For decades, the CIA, the
Pentagon, and secret organizations like
Oliver North's Enterprise have been
supporting and protecting the world's
biggest drug dealers.... The Contras and
some of their Central American allies ...
have been documented by DEA as supplying
... at least 50 percent of our
national cocaine consumption. They were
the main conduit to the United States for
Colombian cocaine during the 1980's. The
rest of the drug supply ... came from
other CIA-supported groups, such as DFS
(the Mexican CIA) ... [and] other groups
and/or individuals like Manual Noriega."
(Ex-DEA agent
Michael
Levine: The Big White Lie: The CIA and
the Cocaine/Crack Epidemic)
The
Duplicity of the War on Drugs
Cocaine
Import Agency
"This web site is part of a
long-standing research project of mine. As
a scholar working at the interstices of
speech communication and cultural studies,
I have been investigating the public
discourse surrounding the 'war on drugs'
as an exercise in disciplinary social
control. This site is a database of
information, evidence, and other resources
that have helped guide me in this research
project, and will hopefully help others
working along the same lines."
The
Train Deaths
"August
23, 1987, in a rural community just south
of Little Rock, police officers murdered
two teenage boys because they witnessed a
police-protected drug drop. The drop was
part of a drug smuggling operation based
at a small airport in Mena, Arkansas. The
Mena operation was set up in the early
1980's by the notorious drug smuggler,
Barry Seal. Facing prison after a drug
conviction in Florida, Seal flew to
Washington, D.C., where he put together a
deal that allowed him to avoid prison by
becoming an informant for the government.
As a government informant against drug
smugglers, Seal testified he worked for
the CIA and the DEA...."
Hacking
the CIA
The
CIA is Up to Its Eyeballs in Cocaine Deals
Congressional
Reports on Drug Corruption in the Federal
Government
DEA's
Finest Details Corruption
"Celerino
Castillo III, one of the Drug Enforcement
Agency's most prolific agents, who netted
record busts in New York, Peru, Guatemala,
El Salvador and San Francisco, was ordered
not to investigate US-sponsored drug
trafficking operations supervised by
Oliver North. After twelve years of
service, Castillo has retired from the
agency, "amazed that the US
government could get away with drug
trafficking for so long." In his book
Powderburns: Cocaine, Contras, and the
Drug War [Mosaic Press, 1994], Castillo
details the US role in drug and weapons
smuggling, money laundering, torture, and
murder, and includes Oliver North's drug
use and dealing, and the training of death
squads in El Salvador and Guatemala by the
DEA." see also
DEA
Agent's Decade Long Battle to Expose CIA-
Contra- Crack Story
The
Cocaine Underground Sounding the Depths
Where Traffickers, Governments Meet
CIA
Kept Ties with Alleged Traffickers
The
CIA and Opium
Dick
Gregory's Article: "Report Says the
CIA Knew of Contra Drug Links"
|
The
Public's Rights of Access to CIA
Information
Five
Avenues of Access
The
Freedom of Information Act (FOIA)
&
Electronic
FOIA (E-FOIA) Amendment
The FOIA provides access to
"reasonably described"
government records, and E-FOIA provides
access to electronic government records.
The
Privacy Act (PA)
The PA provides access to government
records concerning you (that is, records
indexed to your name) and regulates the
government's collection, maintenance, and
dissemination of your information.
The
Executive Order (EO)
The EO on classification (12958) provides
for the review of classified, typically
historical, documents as might be found at
a Presidential Library or the National
Archives. The EO also provides access on a
much more limited basis for historians and
former presidential appointees.
Popular
Document Collection
or
Search
Agency records already declassified under
the FOIA or the EO made available
electronically to the public without cost
at this site or prepared as unclassified
and intended for public distribution.
Alternative
Sources of CIA information
CIA information is available at other
Internet sites or mail addresses. In
addition, reference-type material from
CIA's library deposits and federal
publication services available
individually or by subscription. |
Secret
Codes and Cyphers
Protect
Your Privacy by Disguising Your Email As Spam
Shortwave
Espionage includes
a FREE download of
Secret
Signals: The Euronumbers Mystery "....Other
explanations suggested over the years include
coded information for drug smugglers, lottery
numbers, weather data, commodity prices and so on.
The most likely explanation is that these
transmissions are coded messages sent to espionage
agents....."
ENIGMA
Codes European
Numbers Information Gathering & Monitoring
Association.
National
Security Agency
"employs the
country's premier codemakers and codebreakers. It
is said to be the largest employer of
mathematicians in the United States and perhaps
the world. Its mathematicians contribute directly
to the two missions of the Agency: designing
cipher systems that will protect the integrity of
U.S. information systems and searching for
weaknesses in adversaries' systems and
codes."
The
National Cryptologic Museum
"....provides a "peek behind the
curtain" at a once-secret world -- the
exploitation of enemy cryptology and the
protection of American communications. These
complementary activities have been of critical
importance in both peace and war since the
foundation of our nation, but knowledge about them
has in the past been limited to a privileged
few...."
"Menwith
Hill is.... the Largest U.S. Spy Base in the
World...It's Unaccountable... and It's Getting
Bigger"
Menwith
Hill U. S. Spy Station
".... is the largest electronic monitoring
station in the world. It is run by the US
National
Security Agency (NSA), which monitors the
world's communication for US intelligence. Menwith
Hill employs 1,200 US civilians and servicemen to
work around the clock inside "hardened"
buildings intercepting and analysing
communications mainly from Europe, Russia and the
Middle East. Until a few years ago, the existence
of the NSA was a secret and its charter and any
mention of its duties are still classified. But,
it does have a
Web
site) in which it describes itself as being
responsible for the signals intelligence and
communications security activities of the US
government...."
Government
Communications Headquarters
is Is U.K.'s equivalent of the National Security
Agency.
"The
Government Communications Headquarters
predecessor, the Government Code and Cipher
School, dates back to 1919, but is best known for
its work at Bletchley Park during the Second World
War. It is there that Colossus, the World's first
electronic computer, was built to decrypt German
messages enciphered by the Enigma machine."
Take
the GCHQ challenge!
A message has been broken into 5 parts, each
containing 5 characters. These parts have been
disguised or hidden in different ways on this Web
site. Simply find them, work out what they mean,
and put them together in the right order. Then you
will see our message!
You don't have to
solve the puzzle to apply successfully to join
GCHQ but if you include the message in your
application form, we would certainly be very
interested in talking to you.
Check
out the FBI's Freedom of Information Act's
Electronic
Reading Room and here are some of the
famous people you can "get the
goods" on:
Baker,
Josephine
Ball, Lucille
Darrow, Clarence
Einstein, Albert
Faulkner, William
Flynn, Errol
Ford, Henry
Hammer, Armand/Occidental
Petroleum
Hoffman, Abbie (Abbott)
Hoover,
J. Edgar
Kennedy, Joseph P
Kennedy, Robert F.
Lennon, John
Lewis, John L.
Lindbergh, Charles
Little, Malcolm X
London, Jack
Mantle, Mickey
Marshall, Thurgood
McCarthy, Joseph |
Monroe,
Marilyn
Onassis, Aristotle
Onassis, Jacqueline Kennedy
Picasso,
Pablo
Presley, Elvis
Reich, Wilhelm
Robinson, Jackie
Rockefeller, Nelson
Rogers, Will
Roosevelt, Eleanor
Sinatra, Frank
Spellman, Francis Cardinal
Steinbeck, John
Von Braun, Wernher
Wayne, John
Winchell, Walter
Windsor, Duke and Duchess |
or for
some really fascinating reading, check out
these
FBI
files of historical interest:
Hitler... Jonestown... Nikola Tesla... and
much more!
Here's a
list of
Famous
FBI cases... quite a few of which
involve espionage.
The
John Lennon FBI Files Website
Associated
Press's Feature Story on the Lennon FBI
Files
E!
Online: FBI Releases Lennon Files
E!
Online: FBI Comes Clean on Elvis
Timothy
Leary: the FBI Files
and
here's how to get your own FBI report
Get
Your FBI File
A form letter you can print out
|
Intelligence
and Security
Intelbrief.com
"We integrate news feeds and references from
over 2000 sources, organized into 200 categories,
all focused on providing operational, actionable
intelligence to decision makers." This
is a formidable directory!
IntelWeb
is home to the Terrorism Watch Report (TWR)
and Intelligence Watch Report (IWR) series,
which track and monitor international terrorist
groups and insurgency movements, and intelligence
communities, economic espionage and computer
security issues.
MI5
The official website of the Security Service, UK's
security intelligence agency. Its purpose is to
protect national security from threats such as
terrorism, espionage and the proliferation of
weapons of mass destruction, to safeguard the
economic well-being of the UK against foreign
threats, and to support the law enforcement
agencies in preventing and detecting serious
crime. For other portions of U.K.'s
security, see
National
Intelligence Machinery
Center
for Defense Information
Center
for Democracy and Technology: Counter Terrorism
Page
National
Reconnaissance Office
Defense
Intelligence Agency
Defense
Information Systems Agency
United
States Intelligence Community
National
Counter Intelligence Center
National
Security Institute's
website is the premier Internet resource for the
security professional. The site features industry
and product news, computer alerts, travel
advisories, a calendar of events, a directory of
products and services, and access to an extensive
virtual security library.
Janes
Online This subscription database is the
world's leading source for global defense,
geopolitical, transportation and law enforcement
information.
FREE
JANES NEWS BRIEFS SUBSCRIPTION
Register
a free Jane's News Briefs E-mail subscription
which sends you an E-mail each week on the key
issues in your choice of defense, transportation
and law enforcement communities. "Jane's
News Briefs provide you with concise abstracts
from our world renowned magazines and vast array
of titles. In addition, you will be briefed on any
new products and developments at Jane's."
CORONA
"President Clinton signed an
Executive
Order on 22 February 1995, directing the
declassification of intelligence imagery acquired
by the first generation of U.S.
photo-reconnaissance satellites; the systems
code-named CORONA, ARGON and LANYARD. The order
provides for the declassification of more than
860,000 images of the Earth's surface, collected
between 1960 and 1972."
Scientists
and Global Security
The
Bulletin of the Atomic Scientists
Global security
issues
The
Federation of American Scientists is
engaged in analysis and advocacy on science,
technology and public policy concerning global
security.
The
Cold War International History Project
disseminates new information and perspectives on
the history of the Cold War, in particular new
findings from previously inaccessible sources on
"the other side" -- the former Communist
world.
Personal
Freedom and Privacy Issues
The
Feds'll Come A-Snoopin' WiredNews Jan 12, 2001"....Ever
wonder how much leeway federal agents have when
snooping through your e-mail or computer files?
The
short answer: a lot.
"The
U.S. Department of Justice this week published new
guidelines for police and prosecutors in cases
involving computer crimes...."
Uncle
Sam Exposed as Cybercrook's Accomplice Article from ECommerce Times 5/18/2000
Electronic
Frontier Foundation
EFF is a non-profit, non-partisan organization
working in the public interest to protect
fundamental civil liberties, including privacy and
freedom of expression in the arena of computers
and the Internet.
The
Center for Democracy and Technology
"works to promote democratic values and
constitutional liberties in the digital age. With
expertise in law, technology, and policy, CDT
seeks practical solutions to enhance free
expression and privacy in global communications
technologies. CDT is dedicated to building
consensus among all parties interested in the
future of the Internet and other new
communications media." They have also
created a single source to
OPT
OUT of mailing lists, unwanted mail, etc.
For example
"Placing yourself on the DMA's opt-out lists
for telemarketing and direct mail should reduce
the number of calls and mailings you recieve.
Placing yourself on the opt-out lists with the
credit bureaus (Equifax, Experian, Trans Union)
will limit the number of credit card applications
you receive in the mail. Opting-out at various
businesses will prevent your information from
being shared with other businesses. When you
opt-out of lists you will reduce the number of
catalogs and informational mailings you receive
from companies."
Privacy
Rights Clearing House
Center
for Media Education
KidsPrivacy.org
Consumers
Against Supermarket Privacy Invasion and Numbering
"Is Big
Brother in your Supermarket Cart?"
Don't
Give Up Your Online Identity to ANYONE!
ABSOLUTE online privacy protection.
How
to Protect Your Privacy Online article
by Jesse Berst
Freedom
Software
Promises TOTAL INTERNET PRIVACY. Here's
ZDNet's
review
Internet
Security and Privacy 30 Tips to Protect You
and Your Business
from PC Magazine (Also see
Internet
Security and Privacy)
Infowar.com
Infowar.com's
Hacker Sitings and News
InfoSec.com's
Crypto page
NerdWorld's
Security Portal
ZDNetUK's
Hacker page
World
Wide Wiretapping
Anonymous
Remailers Want
to send an unsigned email? Make a newsgroup
posting under a bogus name? You're not the only
one. Every day, countless netizens use
anonymous
remailers to put a buffer zone between who
they are and what they have to say.
Surveillance
Electronic
Frontier Foundation's Surveillance Archive
Watchdog
Societies
Militia
Watch Dog: Dedicated to Monitoring Far Right
Extremism in the US
The Watchdog's
page
of links to extremist groups.
Terrorism
Terrorist
Group Profiles
Some
interesting links on terrorism
Terrorism
Research Center
Travel advisories,
profiles of terrorist groups, etc.
Organization
for the Prohibition of Chemical Weapons
Chemical
and Biological Arms Control
Online
Publications
The
Drudge Report
Flatland
Magazine:
A Review of the suppressed and secret evidence.
Covert
Action Quarterly
The
Smoking Gun "brings you
exclusive documents -- cool, confidential, quirky
-- that can't be found elsewhere on the Web. Using
material obtained from government and law
enforcement sources, via Freedom of Information
requests, and from court files nationwide, we
guarantee everything here is 100% authentic."
2600
Hacker Quarterly
Free
Radio... Pirate Radio ... Clandestine Radio
Free
Radio
Crisis
at Radio Marti
Clandestine
Radio Intel with
links to various clandestine radio stations. "Clandestine
radio stations can be many things. First,
they can be a psychological warfare tool that
prepares a nation, its people and its leadership
for invasion or war. Secondly, they can be a
method of propaganda to proliferate an opposition
or guerilla groups ideology and political program.
Third, clandestine stations can be for
misinformation or, in the case of Cuba and other
nation states where the media is tightly
controlled, reeducation. Whether a
clandestine is operating from a cave or a big-time
commercial broadcast station, they are fascinating
and extremely exciting to listen to and
follow."
The
Grenade Project |