Secret HFSE Properties Part 3

[ PHOTO ( above ):  Vanuatu Island Ambae Volcano Vent At It's Manaro Ngoro Summit Lake Voui New Island Mt. Manaro (aka) Aoba Volcano 'In Just Days' During November 2006 ( click to enlarge ) ]

Volcano Magma: Geochemical Earth Astrophysics
by, Unwanted Publicity Intelligence Annex I – Host

December 26, 2010 23:08:42 ( PST )

VANUATU ISLAND, Port Vila — December 25, 2010 — It may be difficult for some to realize this report is ‘not science fiction’, but within the Pacific Ocean volcanic arc “Ring of Fire,” in just a few days of November 26, 2005 Vanuatu Island residents did not even realize their island Lake Voui was where its ’new inner island mountain’ Mt. Manaro (aka) Aoba volcano was ‘created in merely a matter of a few days’ after their 420-year old volcano highly volatile magma was mixed into their lakebed hydrochloride sulfuric acid geochemicals, only just learned last year ( 2009 ),  as the actual trigger mechanism setting off the incredibly explosive eruption.

The Ambae volcano vent inside the Lake Voui new island Mt. Manaro ( also known as ) Aoba volcano is the largest basaltic shield volcano in the New Hebrides arc. Aoba volcano is one of the largest active volcano caldera crater lakes in the world today.

Warning Signs -

On February 16, 2005 a succession of earthquakes were felt by the Vanuatu islanders during the evening. Several days later, a seismometer was installed on the north coast of Vanuatu Island where no ‘significant seismic activity’ was recorded there prior to the November 26, 2006 volcano eruption.

On October 5, 2005 NASA Earth Observing System ( EOS ) AM-1 satellite ( TERRA ) carried onboard a Moderate Resolution Imaging Spectro-Radiometer ( MODIS ) that first ( 1st ) detected volcano Ambae volcano summit Lake Voui area registering a thermal imaging anomaly ( highly volatile magma emission degassing ), which was “8-days” ‘before’ the Ambae volcano erupted in the middle of Lake Voui on November 26, 2005 when Vanuatu Island residents were rocked with a Volcano Alert Level 2 ( representating the level of volcanic eruption activity ).

Shockingly, on November 21, 2005 – “2-days” after the November 19, 2005 thermal imaging anomaly ( highly volatile magma emission degassing ) – and yet still “6-days” ‘before’ the eruption on November 26, 2005 – the MODIS SST ( MOD28L2 Infra-Red imaging sensor product ) later detected – in Lake Voui on Vanuatu Island – a ‘definite visual IR display’ of ‘strong hydrothermal activity’ reported only as an “anomaly” that was clearly seeing Ambae volcano ( GEO-REF coordinates: 167°50′E, 15°23′S ) ‘highly volatile magma degassing emissions’ entering the high chloride sulfuric acid contents of Lake Voui’ where mixing those two ( 2 ) ingredients would most certainly cause a phreatic explosion.

When Did The Public Know? -

It wasn’t until ‘after’ the November 26, 2005 phreatic ( violent ) explosion of the Ambae volcano vent inside Lake Voui that the Vanuatu Island government then began to take precautions, by:

- Evacuating nearly 4,000 people away from the immediate area;
- Dispatching its own local volcanologists;
- Asked the New Zealand government to contribute aid assistance;
- Asked donor agencies for assistance contributions; and,
- Asked other aid contributors to additional assist.

U.S. National Aeronautic And Space Administration ( NASA ) Notified The New Zealand Government When? -

The New Zealand Ministry of Foreign Affairs and Trade – via NZAID – contracted INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. ( IGNS ) to mount a response dispatch of two [ 2 ] volcanologists [ Brad Scott ( E-MAIL: b.scott@gns.cri.nz ) and Steve Sherburn ( seismologist ) ] assigned objectives that also included:

- Assisting Vanuatu Island geological and government emergency response organization interpretations of its Ambae volcano eruption;

- Providing detailed assessment of Vanuatu Island Ambae volcano eruption current activity levels; and,

- Offer some prognosis of future Ambae volcano activity.

INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. ( IGNS ) was asked to, establish:

- Temporary seismic monitoring system to collect activity data for assessments; and,

- Provide a foreseeable means how Vanuatu Island scientists could continue monitoring future activity.

Steve Sherburn and Brad Scott departed, for Vanuatu Island, with provided:

- Seismic recording systems ( 3 ); plus,

- Additional volcano monitoring tools.

Prior Incident Response Experience On Vanuatu Island -

Due to such a short lead-time notice [ <?> ], remoteness of the Ambae volcano location on Vanautu Island, and lack of volcanological ( historical ) data, Vanuatu Island was a challenging assignment – offset somewhat by Steve Sherburn ( seismologist ) and Brad Scott ( volcanologist ) past eruption monitoring and assessment experience on Vanuatu Island, Tonga and Papua New Guinea.

The INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. ( IGNS ) – under New Zealand government contract – dispatched Brad Scott and Steve Sherburn whom upon arrival on Vanuatu Island found that one of Ambae volcano summit lakes named Lake Voui ( a 2 square kilometer and 150 meter deep chloride sulfuric acid lake ) was undergoing small-scale eruptions that in ‘just a few days’ grew into a ‘new volcano cone’ that became known as Mt. Manaro (aka) Aoba volcano mountain more than 656-feet wide and 229-feet tall.

On Vanuatu Island, Steve Sherburn and Brad Scott spent 6-days:

- Establishing seismic equipment;
- Collecting and analyzing data;
- Observing Ambae volcano eruptions; and,
- Providing Ambae volcanic activity level status reports for the government of Vanuatu Island.

Support and data additional information were supplied, by:

- French [ Polynesia - Tahiti, Wallis and Futuna (aka) Fakauvea (aka) Fakafutuna Islands, Vanautu Island, Melanasia, Kanak ( formerly known as ) Canaque, Indonesia and Viet Nam populace ] scientists from Nouméa, New Caledonia; and,

- Staffers and students from Massey University, Manawatu campus in the Manawatu-Wanganui region City of Palmerston, North Island, New Zealand.

Then-secret use of Differential Optical Absorption Spectroscopy ( DOAS ) retrieval methods found sulphur dioxide column abundances from magma SO2 and H2S gas flux emission analysis, seismic data analysis, visual observations of Inter-établissements de Recherche pour le Développement ( IRD ) Nouméa, New Caledonia ( Nouvelle-Calédonie ) team of French scientists Ambae volcano historical activity review was followed by Ambae volcano activity level assessments.

Later, it was all declared a ‘small-scale eruption’ of ‘no major threat’ to the Vanuatu Island population, ‘after information began being passed on in bulletins’ ( with Bislma language translations ) to, the:

- Disaster Co-ordination Group ( Port Vila, Vanuatu Island );
- Government of Vanuatu Island; and,
- Community of Vanuatu Island.

Vanuatu Island “Volcano Alert Level 2,” however ‘remained’ – until activity declined – as bulletins indicated.

Again on Vanuatu Island, GEOLOGICAL & NUCLEAR SCIENCES LTD. ( GNS ) marked as ‘important’ values to permanently monitoring ( over a period of time ) each active volcano for which activity has unique characteristics observed for correlating data on any changes in volcano geophysical measurements and behaviors.

As of November 25, 2006 the Ambae volcano Mt. Manaro island vent crater wall collapsed on one side opening-up its cauldron to a chloride sulfuric acid bath from Lake Voui halting its gasious plume cloud into the atmosphere.

Volcano Magma Knowledge Not Being Shared Why? -

In 2009, it was finally learned amongst public professionals that as the Lake Voui lake-bed received approaching degassed but ‘volatile-rich magma’ ( from the Ambae volcano ) that was the trigger mechanism to begin the surtseyan eruption of November 2005 on Vanuatu Island.

Plasma-Optical Emission Spectroscopy ( ICP-OES ) Technicon Auto-Analyzer II Analysis -

Even today magmatic–hydrothermal system eruption-related gas fluxes into the atmosphere and geochemistry associated therewith is sorely lacking professional knowledge throughout the world.

[ PHOTO ( above ): Bathymetric map of Aoba Volcano on Vanuatu Island with adjacent islands ( click to enlarge ) ]

On December 25, 2010  shortly after midnight and approximately 140-miles south of Vanuatu Island - although nearer to the Office de la Recherche Scientifique et Technique Outre-Mer ( ORSTOM )  seismic stations on Espiritu Santo Island and Efate Island - and 15-miles down at the bottom of the ultra deep sea where the epicenter was believed located.

Rainforest covered Vanuatu Island is positioned in front of the d’Entrecasteaux collision zone of geographic plates, beneath the ulta deep sea, between the North Aoba Basin and South Aoba Basin and along a fracture ( Geographic Reference coordinate: N50E ) transverse to the volcanic arc Ring of Fire.

The December 25, 2010 earthquake registered a 7.8 Richter scale, however later the U.S. Geological Survey ( USGS ) ’officially downgraded’ that same earthquake to a 7.3 Richter scale measurement reported to the public by the Associated Press ( AP ).

Submitted for review and commentary by,
Unwanted Publicity Intelligence Annex I, the website Host

E-MAIL: UnwantedPublicity@Gmail.com
WWW: http://upintelligence.wordpress.com

-

NOTES:

In 2001, the INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. (aka) IGNS (aka) GNS (aka) GNS SCIENCE – with core funding from the Earthquake Commission – began a 10-year project to provide real-time monitoring and data collection to be operated by GEONET ( a non-profit organization ), for:

- Rapid response to earthquakes, volcanic eruptions, and landslides; and,

- Research into earthquakes, volcanic eruptions and landslides.

GEONET involves the INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. ( IGNS ) building and operating a modern ‘geological hazards monitoring system’ for New Zealand.

GEONET exchanges information with various international institutions.

New Zealand focuses tsunami efforts with GEONET.

Pacific Ocean nations saw NZAID [ New Zealand government agency ] response with GEONET demonstrations in the Vanuatu Island Ambae volcano eruption.

-

SOURCES:

Université Libre de Bruxelles ( Brussels, Belgium );
Department of Geology, Mines and Water Resources ( Port Vila, Vanuatu Island );
Inter-établissements de Recherche pour le Développement ( Nouméa, New Caledonia );
Journal of Volcanology and Geothermal Research;
INSTITUTE OF GEOLOGICAL & NUCLEAR SCIENCES LTD. ( New Zealand );
GEONET ( New Zealand );
Smithsonian Institution ( USA );
NASA ( USA );
Unwanted Publicity Information Group; and,
Others.

-

RESEARCH REFERENCES:

http://www.volcano.si.edu/reports/bulletin/pdf/3011bgvn.pdf
http://www.ulb.ac.be/sciences/cvl/aoba/Modis_voui.html
http://www.ulb.ac.be/sciences/cvl/aoba/Ambae1.html
http://www.geo.mtu.edu/volcanoes/southeast_asia/vanuatu/aoba/gvn/aoba.v20n02.html
http://www.wesleyan.edu/planetary/bani2009.pdf
http://www.ird.nc/actualites/volcanology.htm
http://en.ird.fr/the-ird-in-the-world/pacific-ocean
http://www.geonet.org.nz/docs/news/geonet-news-issue-6-jul-06.pdf

Secret HFSE Properties Part 1

[ photo ( above ): HFSE Super-Conducting Electro-Magnetic Pyroclastic Magma - Iceland volcano eruption ( click to enlarge ) ]

Secret HFSE Properties – Part 1

by, Unwanted Publicity Intelligence Annex I, Host

December 16, 2010 15:01:42 (PST ) Updated ( Published: December 9, 2010 18:42:08 )

In 1961, BELL LABORATORIES ( USA ) physicist Eugene Kunzler and co-workers discovered that niobium–tin continued exhibition of superconductivity while in the presence of strong electric currents and magnetic fields, which made niobium-tin the first [ 1st ] material used to support High Field Strength ( HFS ) electrical currents and magnetic field strengths necessary for use in high-power electro-magnets and electrical power machines.

20-years later, the aforementioned discovery allowed production of niobium doped metallic wire wrapped into multi-strand form cables wound into coils creating powerful electro-magnetic force applications seen in particle accelerators, particle detectors, and rotating machines.

High Field Strength Element ( HFSE ) Niobium ( Nb ) holds far greater use from such properties than most professionals and the public realize so, before advancing any further on this subject, a basic foundation of understanding on such materials, elements and their valuable properties must be realized about this ‘extremely old Earth energy resource’, ‘how to harvest it ( from its original molten state )’, ‘how to capture and contain its volatile properties’, and then ‘transform it into applications’ for transportation - ‘yet unrealized factual knowledge’ on this extremely low-cost extremely powerful high-energy resource.

Niobium ( Nb ) -

[ photo ( above ): Niobium ( .9995 fine) crystals ( click to enlarge ) ]

Titanmagnetite (aka) Titanomagnetite mineral, under Fluorescent X-Ray Spectrography ( XRS ), holds detected high measurements [ from 350 ppm ( parts per million ) up to 1,000 ppm ] of the geochemical High Field Strength Element ( HFSE ) Niobium [ Nb ].

‘Where’ does such a ‘mineral’ ( titanmagnetite ) ‘element’ ( niobium ) originate? Volcanic magma.

‘Where’ are specific locations holding volcanic magma Niobium element properties that possess even ’higher field strength’ magnetics – ‘at least’ six ( 6 ) times greater? The Mariana Trench or other ultra-deep sea continental plate arc locations where volcanoes exist either ‘quite active’ or ‘somewhat dormant’.

Readers may begin to awaken from any slumber when they realize that ultra-deep sea ground trench ( arc ) volcano magma, naturally located nearer to the planet Earth molten liquid superconducting magnetic High Field Strength Element ( HFSE ) ’core’, sees element properties of Niobium absorbing far purer forms of High Field Strength Element ( HFSE ) magnetic properties while within its ‘natural molten liquid state’. Interestingly, nowhere else ‘above ultra-deep sea Earth elevations’ obtain more natural energy power.

How can such a volatile molten resource be ‘excavated’ while simultaneously being isolated from any exposure to contaminations from ‘seawater’, ‘oxygen’ or other environmentals to harness high-energy properties?

The molten material would  additionally have to be placed into a likewise uncontaminated ‘ultra-clean chamber’, whereupon after transport, ’high-energy properties extraction’ must undergo a ‘seamless application process’ for utilization.

What type of use? More basic fundamentals must be initially understood so, let’s begin by taking a look at what’s bubbling out of ultra-deep sea volcano vents and instantly becoming contaminated by seawater ( below ):

[ photo ( above ): Ultra-Deep Sea Trench Arc Volcanic Magma Vent ( click to enlarge ) ]

Preliminary report Part 1 ( herein ) displays a photograph of an above-ground volcano eruption in Iceland experiencing plenty of superconducting High Field Strength Element ( HFSE ) property fireworks, however far too little information is ever realized by the public about what ultra-deep sea trench arc volcano magmatic material element properties hold ‘naturally’ as primary key elements to a variety of other advancements.

Volcanic magma, in later stage differentiation, sees Niobium [ Nb ] and Titanium [ Ti ] ratios ‘increase’ five [ 5 ] to six [ 6 ] times above normal ( dry magma melts ).

To comprehend this, along with the importance of harnessing natural Earth high-energy magnetic properties, a basic understanding must be reached from what science, physics and astrophysics indications always seem to avoid for the public.

The purpose of this preliminary report Part 1 is to bring rare knowledge into better public understanding while stimulating solution-minded professionals wishing more done.

Have scientists, physicists, and astrophysicists ‘missed some major solution’ in their discoveries? Are portions of certain discoveries ‘kept quite’ considering serious repercussions? While highly doubtful that any small discovery having a major impact missed any application outlook, ramifications nevertheless are considered by professionals on whether a socio-economic impact will allowed to be proven helpful or otherwise.

Good advice may be to buckle your seatbelt because you are about to venture into some information few have ever known about. Whether most of those reading this may be able to absorb this information ( below ) now, or later, it is suspected that after much easier reading comes in Part 2 through Part 5, most will probably refer back to Part 1 ( herein ).

- – - -

Preliminary Report ( Part 1 of 5 )

Introduction -

High Field Strength Elements ( HFSE )

Niobium

Niobium enrichment, is possible, using two ( 2 ) natural rock-forming minerals:

- Titanmagnetite [ 350 ppm - 1000 ppm Nb ( Niobium ) ]; and,
- Kaersutite [ 38 ppm - 50 ppm Nb ( Niobium ) ].

General Information:

Rock-forming Minerals: Titanmagnetite ( element symbols: Ttn/Mag ), and Kaersutite ( Krs ).
Elements [ symbols ]: Titanite ( Ttn ), Magnetite ( Mag )
Geochemical Element [ symbols ]: Niobium ( Nb )

Studies & Resolutions -

Subject: Natural High Field Strength Element ( HFSE ) Materials

Titanmagnetite [ Ttn/Mag ] is a natural super-magnetic mineral, that later experiences a geochemical alteration reducing its magnetic High Field Strength Element ( HFSE ) Niobium ( Nb ) properties, as it exits ultra-deep sea arc volcanic magma influenced by hydrothermal fluid seawater ( see “Findings” below ). In its natural magma state where Titanmagnetite ( Ti/Mag ) holds its 6 [ X ] times greater High Field Strength Element ( HFSE ) Niobium ( Nb ) than above-ground.

Niobium ( Nb ) High Field Strength Element ( HFSE ) properties can be enhanced even greater by adding only one ( 1 ) mineral, Kaersutite ( Krs ).

For applications, extracting this natural combinatoric high-energy power may not easily be obtained.

Extraction Processes: Capturing Natural High Field Strength Elements ( HFSE )

Obtaining these properties may be resolved, however while natural initial ingress of high-temperature ( Tave 713° C to Tave 722° C ) fluid occurences at liquid melts [ magma ] have seen amphibole-plagioclase thermometry suggests ‘fracture and grain’ boundary ‘permeability’ – with seawater derived fluids – ‘open’ over similar temperature interval, however venturing into ultra-deep sea trench arcs and then burroughing into natural state volcanic magma dome vents capturing natural essence of titanmagnetite, and then containing it for processing HFSE properties further may be difficult so, is there an alternative to this type of extraction?

Above-ground experiment observations see major trace geochemical element fractionation trends in bulk rocks and minerals reproduced by Rayleigh fractional crystallization from dry [ magma ] melts ( < 0.5 wt. % H2O ) with oxygen fugacities of one [ 1 ] unit below the Quartz [ Qtz ] – Fayalite [ Fa ] – Magnetite [ Mag ] buffer ( QFM – 1 ).

[ photo ( above ): NASA Astrophysics Data System ( ADS ) ]

Preliminary Findings ( A - F  – below ) -

- – - -

A.

[ NOTE: Titanmagnetite mineral geochemical element Niobium ... ]

Source: NASA Astrophysics Data System ( NADS ) [ Harvard University, access: http://adsabs.harvard.edu/cgi-bin/nph-abs_connect ]

Geochimica et Cosmochimica Acta, vol. 29, Issue 8, pp.807-820

DOI: 10.1016/0016-7037(65)90081-5

Bibliographic Code: 1965GeCoA..29..807H

Die verteilung des niobs in den gesteinen und mineralen der alkalibasalt-assoziation der hocheifel
by, Hans Gerhard Huckenholz

Publication Date: August 1965

Abstract -

Niobium [ Nb ] contents are determined by the method of fluorescent X-ray spectrography [ FXRS ] for several rock types from the Tertiary Hocheifel volcanic province ( Western Germany ).

Alkalic olivine basalt, contains:

 65 ppm Niobium [ Nb ] ( 7 samples );
 69 ppm hawaiite ( 4 samples );
 86 ppm mugearite ( 3 samples );
 95 ppm trachyte ( 5 samples ); 77 ppm basanitoid ( 6 samples );
 65 ppm ankaramite ( 2 samples );
110 ppm hauyne-bearing alkali basalt ( 2 samples ); and,
 86 ppm a monchiquite dike.

Niobium enrichment, is observed in the alkalic olivine basalt trachyte [ magma ] series where, in later stage differentiation, Nb [ Niobium ] / Ti ratio increases five [ 5 ] to six [ 6 ] times.

Alkalic olivine basalt magma, however becomes poorer [ less rich ] in niobium [ Nb ] by accumulation of:

- olivine [ 10 ppm Nb ( niobium ) ]; and,
- clinopyroxene [ 20 ppm Nb ( niobium ) ].

Enrichment of niobium [ Nb ] is possible by taking-up titanmagnetite ( 350 ppm – 1000 ppm Nb [ Niobium ] ) and kaersutite ( 38 ppm – 50 ppm Nb [ niobium ] ) without olivine and clinopyroxene ( ankaramite HF 5, and the basanitoids ).

The most Nb [ Niobium ] bearing rock-forming mineral is titanmagnetite, containing 65%  to 85% niobium ( in volcanic rock ), however ground-mass clinopyroxene has contents of Niobium [ Nb ] up to 45 ppm, and feldspars have contents of Nb [ Niobium ] up to 67 ppm.

Reference

http://adsabs.harvard.edu/abs/1965GeCoA..29..807H

- – - -

B.

[ NOTE: ICP-MS analysis on trace geochemical element ( Niobium, etc. ) enrichment ( 5X greater than normal ) ... ]

Source: NASA Astrophysics Data System ( NADS ) [ Harvard University, access: http://adsabs.harvard.edu/cgi-bin/nph-abs_connect ]

Publication Date: December 2008

Title: Trace Element Geochemistry including the HFSE in Magnetites of Calc-Alkaline Plutons: the Tanzawa Complex of the Izu – Bonin – Mariana Arc and the Ladakh Batholith Complex, NW Himalaya

Authors: Basu, A. R.; Ghatak, A.; Arima, M.; Srimal, N.

Affiliation:

AA ( University of Rochester, Department of Earth and Environmental Sciences, 227 Hutchison Hall, Rochester, NY 14627, United States; abasu@earth.rochester.edu );
AB ( University of Rochester, Department of Earth and Environmental Sciences, 227 Hutchison Hall, Rochester, NY 14627, United States; arun@earth.rochester.edu );
AC ( Yokohama National University, Division of Natural and Environmental Information, 79-1 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan; arima@ed.ynu.ac.jp );
AD ( Florida International University, Department of Earth Sciences PC 344, University Park 11200 SW 8th Street, Miami, Fl 33199, United States; srimal@fiu.edu ).

Publication: American Geophysical Union, Fall Meeting 2008, abstract #V33C-2228

Origin: AGU

AGU Keywords: 1020 Composition of the continental crust, 1031 Subduction zone processes ( 3060, 3613, 8170, 8413 ), 1036 Magma chamber processes ( 3618 ), 1042 Mineral and crystal chemistry ( 3620 ), 1065 Major and trace element geochemistry

Bibliographic Code: 2008AGUFM.V33C2228B

Abstract

In this study we attempt to contribute to the understanding of a prominent feature, namely the Nb [ Niobium ] – Ta [ Tantalum ] depletion, in arc magmatic trace element geochemistry.

Traditionally, this depletion is explained by residual mantle-wedge phases with Nb [ Niobium ] and Ta [ Tantalum ] affinities, such as titaniferous ilmenite [ Ilm ], rutile [ Rt ] or titanite [ Ttn ], or by an amphibole.

Here, we propose a mechanism – long advocated – to explain the calc-alkaline trend ( Bowen vs. Fenner ) in MgO – FeO ( total Fe ) – ( Na2O + K2O ) ternary diagram by early crystallization and separation of magnetite in ‘subduction zone magmas’ associated with ‘high oxygen’ fugacity ‘environments’.

In support of our hypothesis, we provide high-precision multiple trace element data, including the High Field Strength Elements ( HFSE ), in separated magnetites and mafic mineral phases from mafic ‘magmatic enclaves’ associated with ‘tonalite suites’ of two [ 2 ] different ‘magmatic arcs’, the:

- Tanzawa Complex of the Izu-Tanzawa Collision Zone in Japan; and,
- Ladakh Batholith Complex of NW Himalayas.

The Tanzawa Complex is composed of diverse rock suites with SiO2 varying from 43% – 75%, ranging from hornblende gabbro through tonalite to leuco-tonalite. The geochemical characteristics of low K – tholeiites, enrichment of Large Ion Lithophile Elements ( LILE ), and depletion of HFSE [ High Field Strength Elements ] in rocks of this plutonic complex are similar to those observed in the volcanic rocks of the IBM arc.

The Ladakh batholith Complex is one of the granitic belts exposed north of the Indus-Tsangpo suture zone in Ladakh, representing calc-alkaline plutonism related to the subduction of the Neotethys floor in Late Cretaceous. This batholith comprises predominantly I-type granites with whole rock delta delta 18O values of 5.7-7.4 per mil, without major contribution from continental crustal material.

In separated magnetites, from five [ 5 ] gabbros of the Tanzawa tonalite-gabbro complex and from three [ 3 ] tonalitic gabbros of the Ladakh batholith, we analyzed 22 trace elements by ICP-MS, including:

Nb [ Niobium ];
Ta [ Tantalum ];
Hf [ Hafnium ]; and,
Zr [ Zirconium ].

In NMORB [ N Mid-Ocean Ridge Basalt ] normalized plots, the trace element patterns of all the magnetites analyzed show enrichment ( 5X NMORB ), in:

Nb [ Niobium ];
Ta [ Tantalum ];
Pb [ Lead ];
Sr [ Strontium ]; and, ( 2X NMORB ), in:
Zr [ Zirconium ] with characteristically high Nb [ Niobium ], Ta [ Tantalum ] and Zr[ Zirconium ] / Hf [ Hafnium ] ratios.

In contrast, the patterns show anomalously low ( less than 0.1 NMORB ), in:

La [ Lanthanum ];
Ce [ Cesium ];
Pr [ Praseodymium ];
Nd [ Neodymium ];
Sm [ Samarium ]; and,
Hf [ Hafnium ] concentrations.

It is noteworthy that in the normalized trace element plot, all the magnetites show ‘high’ Nb [ Niobium ] / Ta ratios, and in contrast with high Ta / Nb [ Niobium ] ratios were observed in typical arc [ volcanic ] magmas.

These data support our hypothesis, that:

Magmatic crystallization, of Fe [ Iron ] – Ti [ Titanium ] oxides ( under high oxygen fugacity conditions ) during ‘initial crystallization and formation’ ( of the Izu-Bonin and Ladakh-type arc batholiths ) may be the primary cause of depletion of HFSE [ High Field Strength Elements ] in later magmatic differentiates of less mafic and more felsic granitic arc rocks.

-

Query Results from the ADS Database

Retrieved 1 abstracts, starting with number 1.

Total number selected: 1.

@ARTICLE{2008AGUFM.V33C2228B,

author = {{ Basu }, A.~R. and {Ghatak}, A. and { Arima }, M. and { Srimal }, N. }

title = “{ Trace Element Geochemistry including the HFSE in Magnetites of Calc-Alkaline Plutons: the Tanzawa Complex of the Izu-Bonin-Mariana Arc and the Ladakh Batholith Complex, NW Himalaya }”

journal = {AGU Fall Meeting Abstracts},

keywords = {1020 Composition of the continental crust, 1031 Subduction zone processes (3060, 3613, 8170, 8413), 1036 Magma chamber processes (3618), 1042 Mineral and crystal chemistry (3620), 1065 Major and trace element geochemistry},

year = 2008,
month = dec,
pages = { C2228+ }

ADS url = http://adsabs.harvard.edu/abs/2008AGUFM.V33C2228B
ADS note = Provided by the SAO/NASA Astrophysics Data System

-

Reference

http://adsabs.harvard.edu/abs/2008AGUFM.V33C2228B

- – - -

C.

[ NOTE: multi-domain topographic elevation studies on magnetite [ Mag ] and hydrothermal fluid affection … ]

Publication Date: December 2007

Title: Spatial Distribution of Magnetic Susceptibility in the Mt. Barcroft Granodiorite, White Mountains, California: Implications for Arc Magmatic Processes

Authors: Michelsen, K. J.; Ferre, E. C.; Law, R. D.; Boyd, J. D.; Ernst, G. W.; de Saint-Blanquat, M.

Affiliation:

AA ( Virginia Tech, Department of Geosciences, Blacksburg, VA 24061, United States ; kmichels@vt.edu );
AB ( Southern Illinois University, Department of Geology, Carbondale, IL 62901, United States ; eferre@geo.siu.edu );’
AC ( Virginia Tech, Department of Geosciences, Blacksburg, VA 24061, United States ; rdlaw@vt.edu );
AD ( Southern Illinois University, Department of Geology, Carbondale, IL 62901, United States ; jdboyd77@yahoo.com );
AE ( Stanford University, Department of Geological and Environmental Sciences, Stanford, CA 94305, United States ; ernst@geo.stanford.edu );
AF ( Universite Paul Sabatier, LMTG, Toulouse, 31400, France ; michel@lmtg.obs-mip.fr ).

Publication: American Geophysical Union, Fall Meeting 2007, abstract #T11B-0567
 
Origin: AGU

AGU Keywords: 1020 Composition of the continental crust, 3640 Igneous petrology, 3660 Metamorphic petrology, 8104 Continental margins: convergent, 8170 Subduction zone processes ( 1031, 3060, 3613, 8413 )

Bibliographic Code: 2007AGUFM.T11B0567M

Abstract

The petrographic or chemical zonation of plutons, has been widely studied and used to constrain petrogenetic processes and emplacement mechanisms.

The time involved in modal data collection, as well as the cost of chemical analyses, makes the search for pluton-scale zoning patterns the exception rather than the norm in ‘magmatic arc studies’, however magnetic susceptibility ( Km ) of plutonic rocks – both magnetite bearing and magnetite free – can be an invaluable tool to quickly assess the internal organization of any pluton.

New field observations, new magnetic mineral data, and reprocessed Km data on the Barcroft granodiorite pluton ( White Mountains, California ) are presented.

The average Km of 660 specimens from 76 stations ranges from 140 x 10-6 [ SI ] to 75000 x 10-6 [ SI ] with an average at about 16800 x 10-6 [ SI ].

The distribution of Km is unimodal.

The hysteresis parameters of the Barcroft rocks indicate that Km is controlled mainly by multi-domain magnetite.

The contribution of mafic silicates ( biotite and hornblende ) to Km ranges from 0.4 to 99%, with an average at about 1.8%.

As in many other ferromagnetic ( i.e. magnetite – bearing ) plutons, Km variations reflect different amounts of magnetite which itself results from petrographic variations.

This is supported by the positive correlation between major oxide variations ( e.g., SiO2, FeO ) and Km.

A new Km map of the Barcroft pluton shows several important features including, a:

(a) Low Km zone in the SW corner of the pluton, near areas that exhibit economic mineralization possibly related to hydrothermal fluids;

(b) Few isolated anomalies that may be attributed to transformation of normal magnetite into lodestone;

(c) North south high Km ridge that could possibly result from local mingling between the main granodiorite rock type and syn-plutonic mafic dikes;

(d) Broad reverse Km zonation ( i.e. higher Km in the centre ); and,

(e) Possible ‘positive correlation between Km’ and ‘topographic elevation ( between 5,000 and 13,000 feet )’, which could be explained by a higher fO2 at a higher structural level in the chamber.

These preliminary results suggest that, the:

(1) Syn-plutonic diking may play a significant role in the geochemical differentiation of granodiorite plutons;

(2) Classic dichotomy between ilmenite [ Ilm ] series and magnetite [ Mag ] series of granitoids might at least – to some extent – depend on the ‘exposure level’ if such intrusions are confirmed to be vertically differentiated; and,

(3) Mapping Km in a ferromagnetic pluton can be an efficient tool to constrain its internal organization.

Reference

http://adsabs.harvard.edu/abs/2007AGUFM.T11B0567M

- – - -

D.

[ NOTE: geochemistry and petrology of deep oceanic crust geothermal high-temperature ( Tave 713° C to Tave 722° C ) fluids ... ]

Source: NASA Astrophysics Data System ( NADS ) [ Harvard University, access: http://adsabs.harvard.edu/cgi-bin/nph-abs_connect ]

Publication Date: November 2002

Title: Petrology and geochemistry of the lower ocean crust formed at the East Pacific Rise and exposed at Hess Deep: A synthesis and new results

Authors: Coogan, L. A.; Gillis, K. M.; MacLeod, C. J.; Thompson, G. M.; Hékinian, R.

Publication: Geochemistry, Geophysics, Geosystems, Volume 3, Issue 11, pp. 1, CiteID 8604, DOI 10.1029/2001GC000230 (GGG Homepage)

Origin: AGU [ http://www.agu.org ]

AGU Keywords: Marine Geology and Geophysics: Midocean ridge processes, Mineralogy, Petrology, and Mineral Physics: Igneous petrology, Mineralogy, Petrology, and Mineral Physics: Metamorphic petrology, Mineralogy, Petrology, and Mineral Physics: Minor and trace element composition.

Bibliographic Code: 2002GGG….3kQ…1C

Abstract

The geochemistry and petrology of the lower oceanic crust record information about the compositions of melts extracted from the mantle, how these melts mix and crystallize, and the role of hydrothermal circulation in this portion of the crust.

Unfortunately, lower oceanic crust formed at fast spreading ridges is rarely exposed at the seafloor making it difficult to study these processes.

At Hess Deep, crust formed at the East Pacific Rise ( EPR ) is exposed due to the propagation of the Cocos-Nazca spreading center westward.

Here we review our state of knowledge of the petrology of lower crustal material from Hess Deep, and document new mineral major and trace element compositions, amphibole-plagioclase thermometry, and plagioclase crystal size distributions.

Samples from the deeper parts of the gabbroic sequence contain clinopyroxene that is close to being in trace element equilibrium with erupted basalts but which can contain primitive ( moderate Cr, high Mg# ) orthopyroxene and very calcic plagioclase.

Because primitive Mid-Ocean Ridge Basalts ( MORB / MORBs ) are not saturated with orthopyroxene or very calcic plagioclase this suggests that melts added to the crust have variable compositions and that some may be in major but not trace element equilibrium with shallow depleted mantle.

These apparently conflicting data, are most readily explained if some of the melt – extracted from the mantle – is fully aggregated within the mantle but reacts with the shallow mantle during melt extraction.

The occurrence of cumulates, with these characteristics, suggests that ‘melts added to the crust’ do not all get mixed with normal MORB [ Mid-Ocean Ridge Basalts ] in the Axial Magma Chamber ( AMC ), but rather that ‘some melts partially crystallize’ in isolation within the lower crust.

However, evidence that primitive melts fed the AMC [ Axial Magma Chamber ], along with steep fabrics in shallow gabbros ( from near the base of the dyke complex ), provides support for models in which crystallization within the AMC followed by crystal subsidence is also an important process in lower crustal accretion.

More evolved bulk compositions of gabbros ( from the upper than lower parts of the plutonic section ), are due to greater amounts of ‘reaction with interstitial melt’ and not because their parental melt had become highly fractionated through the formation of large volumes of cumulates deeper in the crust.

Amphibole-plagioclase thermometry confirms, previous reports, that the initial ingress of fluid occurs at high-temperatures in the shallow gabbros ( Tave 713° C ) and show that the temperature of amphibole formation was similar in deeper gabbros ( Tave 722°C ).

This thermometry also suggests that fracture and grain boundary permeability for seawater derived fluids was open over the same temperature interval.

Reference

http://adsabs.harvard.edu/abs/2002GGG….3kQ…1C

- – - -

E.

[ NOTE: analysis of new major data and trace element data from minerals ... ]

Source: NASA Astrophysics Data System ( NADS ) [ Harvard University, access: http://adsabs.harvard.edu/cgi-bin/nph-abs_connect ]

Publication Date: December 2010

Title: The `Daly Gap’ and implications for magma differentiation in composite shield volcanoes: A case study from Akaroa Volcano, New Zealand

Authors: Hartung, E.; Kennedy, B.; Deering, C. D.; Trent, A.; Gane, J.; Turnbull, R. E.; Brown, S.

Affiliation:

AA ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; eha63@uclive.ac.nz );
AB ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; ben.kennedy@canterbury.ac.nz );

AC ( Earth and Space Sciences, University of Washington, Seattle, WA, USA; cdeering@u.washington.edu );

AD ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; ajt121@pg.canterbury.ac.nz );
AE ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; jtg29@uclive.ac.nz );
AF ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; ret26@student.canterbury.ac.nz );
AG ( Geological Sciences, University of Canterbury, Christchurch, New Zealand; stephen.brown@canterbury.ac.nz ).

Publication: American Geophysical Union, Fall Meeting 2010, abstract #V52B-02

Origin: AGU

Keywords: [ 3610 ] MINERALOGY AND PETROLOGY / Geochemical modeling, [ 3618 ] MINERALOGY AND PETROLOGY / Magma chamber processes, [ 3620 ] MINERALOGY AND PETROLOGY / Mineral and crystal chemistry, [ 3640 ] MINERALOGY AND PETROLOGY / Igneous petrology

Bibliographic Code: 2010AGUFM.V52B..02H

Abstract

The origin of compositional gaps in volcanic deposits that are found worldwide, and in a range of different tectonic settings, has challenged petrologists since Daly’s first observations at mid-ocean ridges.

In the shield-forming Akaroa Volcano ( 9.6 – 8.6 Ma ) of Banks Peninsula ( New Zealand ), a dramatic compositional gap exists in both eruptive and co-genetic intrusive products between basalt and trachyte, and between gabbro and syenite respectively.

Rock compositions display mildly alkaline affinities ranging from picritic basalt, olivine alkali basalt, and hawaiite, to trachyte.

Intermediate mugearite and benmoreite ( 50 – 60 wt. % SiO2 ) are not exposed or absent.

Equivalent plutonic diorite, monzodiorite, and monzonite ( 45 – 65 wt. % SiO2 ) are also absent.

Previously, the formation of the more evolved trachyte and syenite has been ascribed to ‘crustal melting’, however our analysis of new major data and trace element data from bulk-rocks and minerals – of this hy-normative intraplate alkalic suite – provide evidence based on crystal fractionation and punctuated melt extraction for an alternative model.

In bulk rocks observed major and trace element fractionation trends can be reproduced by Rayleigh fractional crystallization from dry melts ( < 0.5 wt. % H2O ) at oxygen fugacities of one [ 1 ] unit below the Quartz [ Qtz ] – Fayalite [ Fa ] – Magnetite [ Mag ] buffer ( QFM – 1 ).

The results of our MELTS models are in agreement with experimental studies, and indicate a fractionation generated compositional gap where trachytic liquid ( 62 – 64 wt. % SiO2 ) has been extracted after the melt has reached a crystallinity of 65% – 70 %.

The fractionated assemblage, of:

- clinopyroxene [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ];
- olivine [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ];
- plagioclase;
- magnetite; and,
- apatite.

All [ of the aforementioned ] are left in a mafic cumulate residue ( 44 – 46 wt. % SiO2 ).

Calculated values of specific trace and minor elements ( Sr [ Strontium ], Cr [ Chromium ], P [ Phosphorus ] ) from a theoretical cumulate are consistent with measured concentrations from cumulate xenoliths.

Compositional trends from individual mineral analysis are also supportive of fractional crystallization, but illustrate a disrupted ‘liquid line of decent for each mineral phase.

Olivine [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ] compositions progressively decrease in Mg [ Magnesium ] concentration ( Fo83-42 ) in basaltic [ magma ] melts and shows high Fe [ Iron ] concentration in trachytic melts ( Fo5-10 ).

Clinopyroxene [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ] analyses also displays higher Fe [ Iron ] / Mg [ Magnesium ] ratios in more evolved rocks.

Ternary feldspar [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ] compositions shift from plagioclase ( An84-56 ) in basalt to alkali feldspar ( Or8-65Ab53-33An39-2 ) [ depletes High Field Strength Element ( HFSE ) Neobium ( Nb ) ] in trachyte, but also lack the intermediate compositions.

On the other hand, analysis of mafic cumulate xenoliths reflect more evolved mineral compositions – towards the rim than volcanic equivalents – and complete observed fractionation trends.

In summary, our results indicate that these compositional gaps formed from punctuated melt extraction within an optimal crystal fraction window ( 60% – 70 % crystallinity ).

Reference

http://adsabs.harvard.edu/abs/2010AGUFM.V52B..02H

- – - -

F.

Source: NASA Astrophysics Data System ( NADS ) [ Harvard University, access: http://adsabs.harvard.edu/cgi-bin/nph-abs_connect ]

Publication Date: October 1996

Title: The Aurora volcanic field, California-Nevada: oxygen fugacity constraints on the development of andesitic magma

Authors: Lange, R. A.; Carmichael, Ian S. E.

Affiliation:

AA ( Department of Geological Sciences, University of Michigan, Ann Arbor, MI 48109, USA );
AB ( Department of Geology and Geophysics, University of California, Berkeley, CA 94720, USA ).

Publication: Contributions to Mineralogy and Petrology, Volume 125, Issue 2/3, pp. 167-185 (1996). (CoMP Homepage)
 
Origin: SPRINGER

DOI: 10.1007/s004100050214

Bibliographic Code: 1996CoMP..125..167L

Abstract

The Aurora volcanic field, located along the northeastern margin of Mono Lake in the Western Great Basin, has erupted a diverse suite of high-K and shoshonitic lava types, with 48 to 76 wt. % SiO2, over the last 3,600,000 million years.

There is no correlation between the age and composition of the lavas.

Three-quarters of the volcanic field consists of evolved ( < 4 wt. % MgO ) basaltic andesite and andesite lava cones and flows, the majority of which contain sparse, euhedral phenocrysts that are normally zoned; there is no evidence of mixed, hybrid magmas.

The average eruption rate over this time period was ˜200 m3/km2/year, which is typical of continental arcs and an order of magnitude lower than that for the slow-spreading Mid-Atlantic Ridge.

All of the Aurora lavas display a trace-element signature common to subduction-related magmas, as exemplified by Ba [ Barium ] / Nb [ Niobium ] ratios between 52 and 151.

Pre-eruptive water contents ranged from 1.5 wt. % in plagioclase – rich two-pyroxene andesites to ˜6 wt. % in a single hornblende lamprophyre and several biotite-hornblende andesites.

Calculated oxygen fugacities fall within 0.4 and + 2.4 log units of the Ni-NiO [ Nickel and Nickel-Oxygen ] buffer.

The Aurora potassic suite, follows a classic calc-alkaline trend in a plot of FeOT / MgO vs. SiO2 and displays linear decreasing trends in FeOT and TiO2 with SiO2 content, suggesting a prominent role for Fe [ Iron ] – Ti [ Titanium ] oxides during differentiation.

However, development of the calc-alkaline trend – through fractional crystallization of titanomagnetite – would have caused the residual liquid to become so depleted in ferric iron that its oxygen fugacity would have fallen several log units below that of the Ni [ Nickel ] – NiO [ Nickel - Oxygen ] buffer.

Nor can fractionation of hornblende be invoked, since it has the same effect – as titanomagnetite – in depleting the residual liquid in ferric iron, together with a thermal stability limit that is lower than the eruption temperatures of several andesites ( ˜1040 1080°C ; derived from two-pyroxene thermometry ).

Unless some progressive oxidation process occurs, fractionation of titanomagnetite – or hornblende – cannot explain a calc-alkaline trend in which all erupted lavas have oxygen fugacites ≥ the Ni-NiO [ Nickel - Nickel-Oxygen ] buffer.

In contrast to fractional crystallization, closed system equilibrium crystallization will produce residual liquids with an oxygen fugacity that is similar to that of the initial melt.

However, the eruption of nearly aphryic lavas argues against tapping from a magma chamber during equilibrium crystallization, a process that requires crystals to remain in contact with the liquid.

A preferred model involves the accumulation of basaltic magmas at the mantle crust interface, which solidify and are later remelted during repeated intrusion of basalt.

As an end – member case, closed – system equilibrium crystallization of a basalt, followed by equilibrium partial melting of the gabbro will produce a calc-alkaline evolved liquid ( namely, high SiO2 [ Silicon-Oxygen / Oxide ] and low FeOT / MgO ) with a relative f O 2 ( corrected for the effect of changing temperature ) that is similar to that of the initial basalt.

Differentiation of the Aurora magmas by repeated partial melting of previous underplates in the lower crust, rather than by crystal fractionation in large stable magma chambers, is consistent with the low eruption rate at the Aurora volcanic field.

Reference

http://adsabs.harvard.edu/abs/1996CoMP..125..167L

- – - -

While the aforementioned information material concludes the introductory phase of Part 1 in this preliminary report, more easily understood materialize will now be documented in Part 2 through Part 5, previewed below:

Part 2, of this Preliminary Report ( Part 1 of 5 ), will focus on new ‘methods of capturing’ natural essence High Field Strength Elements ( HFSE );

 

Part 3, of this Preliminary Report ( Part 1 ), will focus on new ‘discoveries of properties’ from captured natural High Field Strength Elements ( HFSE );

Part 4, of this Preliminary Report ( Part 1 ), will focus on new ‘applied theories’ of natural High Field Strength Elements ( HFSE ); and,

Part 4, of this Preliminary Report ( Part 1 ), will focus on new ‘transports’ having captured natural High Field Strength Elements ( HFSE ).

Submitted for review and commentary by,

Unwanted Publicity Intelligence Annex I, Host

E-MAIL: UnwantedPublicity@Gmail.com
WWW: http://upintelligence.wordpress.com

/

/

NonReferenceable Objects

[ photo #1 ( above ): 08NOV10 Santa Catalina, California island 'offshore missile launch' ( click to enlarge ) ]

[ photo #2 ( above ): 08NOV10 Santa Catalina, California island 'offshore missile launch' ( click to enlarge ) ]

[ photo #3 ( above ): 08NOV10 Santa Catalina, California island 'offshore missile launch' ( click to enlarge ) ]

NonReferenceable Objects ( NRO )
by, Unwanted Publicity Intelligence Annex, Host

December 5, 2010 19:19:42 ( PST ) Updated ( Published: Nov. 22, 2010 09:08:22 )

CALIFORNIA, San Nicholas Island – November 22, 2010 – Depends on how one looks at it, but amongst southern California islands, Santa Catalina rests about 23-miles offshore in the deadly Pacific Ocean channel deeper than Mount Everest is high.

This Pacific Ocean channel is also home for the world’s largest Great White shark species, and for decades – according to some southern Cailifornia residents – Santa Catalina island is suspected of harboring offshore resident extraterrestrial aliens ( also known as ) ‘non-referenceable aliens’ caught with Unidentified Submersible Objects ( USO ), Unidentified Flying Objects ( UFO ), and /or Non-Referenceable Objects ( NRO ) diving in and out of this sea passageway to their suspected deep sea base.

While there has been no mention of what these extraterrestrial aliens might be doing underwater, a few believe there is a distinct – although remote – possibility they [ nonreferenceable biological entities ] may be utilizing their Non-Referenceable Objects ( NRO ) interalia Unidentified Submersible Objects ( USO ) to harvest a planet Earth natural resource ’super-magnetic fluid’ easily removed by them from ultra-deep sea volcano molten minerals they then only extract the super-magnetic properties therefrom, afterwhich they jetison the remaining molten lava.

While that may be too unbelieveable you are urged to pause before making any final determinations about this report because the U.S. National Oceanic and Atmospheric Administration ( NOAA ) Ocean Scienes and Technology ( OST ) department in the ultra-deep sea below the Pacific Ocean, far west of the California island of Santa Catalina, is right on target with what some believe to be aliens from outer space reaches beyone the Earth.

The 2007 New Zealand American Submarine Ring of Fire ( NZASRoF or NZASRF ) Mariana Trench expedition using the AUV ( Autonomous Underwater Vehicle ) ABE ( Autonomous Benthic Explorer ) was assigned to detail map the ultra-deep sea Brothers volcano, a rhyodacite ( silicious ) explosive volcano more than 2,600 feet ( 800-meters ) above its surrounding deep-sea floor to its caldera rim located 1-mile ( 1,500 meters ) beneath the surface of the Pacific Ocean where it erupted with so much explosive force that it carried carried volatile energy and volume partially emptying its ‘magma chamber’ where its collapsed caldera area measures 1.6 nautical miles ( 3-kilometers ) by ( x ) 2.2 nm ( 4-kilometers ) to a depth of 300 meters below the volcano rim.

Brothers Volcano, however has more to offer out-of the ultra-deep Pacific Ocean where its ‘large magnetic anomalies’ register many hundreds of nano-Teslas, a unit of magnetic field strength amplitudes from its volcanic lava, from nearby just southeast where ‘several volcanic domes’ ( ‘slightly less explosive’ than Brothers major caldera was ) that are ‘younger’ and ‘larger volcanic lava bodies’ associated with ‘greater magnetic anomalies’ expectedly holding a ‘strong magnetic anomaly signature’.

During this expedition, as is the case on many traditional marine geophysical surveys, a Remote Vehicle ( R/V ) Sonne will ‘tow’ ( from the sea surface ) a magnetometer ( dipped into but not far below the surface of the sea where it is dragged along to roughly measure ‘magnetic field amplitudes’ far above buried volcano lava domes revealing ‘magnetic anomaly surveying’ to ‘identify recent lava flows’, however Brothers volcano nearby domes in the southeast Pacific Ocean lay 1,500 to 2,500 meters beneath any surface tow magnetometer that will only provide a ‘very broad kilometer scale’ reading of ‘magnetic anomaly variations’ but not readings like anything positioned near the ‘actual volcanic structure’ so, for a much higher resolution of magnetic anomaly variables, a more precise ‘magnetic anomaly information’ survey can be performed with the Autonomous Benthic Explorer ( ABE ), an Autonomous Underwater Vehicle ( AUV ), that can perform a series of ultra-deep sea dives and flights ( 50 meters above the volcano domes ) following parallel lines while collecting ‘magnetic anomaly measurements’ from a mounted onboard ‘fluxgate magnetometer’ ( the size of a hand palm ) performing swath fly-overs collecting ‘bathymetry’, ‘conductivity’, ‘temperature’, and ‘chemical’ measurement instrument readings used to estimate ‘magnetization of the volcano’ correlated with what is seen on bathymetry and ‘volcanic flow unit identification images.

The Brothers Volcano caldera area sees ‘geothermal vents’ of lava spewing a residual ‘high temperature demagnetization fluid’ that ‘alters magnetic chemistry’ of ‘titanomagnetite’, a natural super-magnetic mineral, however after this ‘geothermal alteration’ even titanomagnetite is rendered far less magnetic. This ‘geographic high-temperature demagnetizing fluid alteration’ can be found even within ‘magnetic dead zones’ where both ‘active’ and ‘inactive’ as well as ‘young’ an ‘old’ lava vent sites exist.

On land surfaces, studies of similar collapsed volcano calderas ( depressions ) suggest calderas were filled with formed deposits of a pyroclastic low-density vesicular material.

References provided, click on: http://upintelligence.wordpress.com/2010/12/09/secret-hfse-properties-part-1/ and http://oceanexplorer.noaa.gov/explorations/07fire/logs/aug1/aug1.html to begin learning more.

Who says that all intelligent biological entities, unknown to us, are not of this world but only from outer space? We already know that the ultra-deep sea holds biological entities foreign to us, however what we ‘do not know’ is the extent of ultra-deep sea biological entity spieces. Does the simply fact that ‘we do not know about all of them’ render them ‘aliens’ on Earth? No. What if there are ‘advanced biological entities’ of the ultra-deep sea? What if these creatures were on Earth before us? If that proves to be the case, then all human beings could very well be new ’aliens’ on Earth. Keyword, being, ‘new’ so just how new makes a ‘new alien’ on Earth?

In 1989, a large Unidentified Submersible Object ( USO ) was discovered floating on the surface of the Pacific Ocean, according to eyewitnesses  aboard an ocean going vessel that tracked the UFO / USO underwater on sonar.

This same USO, was witnessed releasing what appeared to be several smaller Unidentified Submersible Objects ( USO ), submerged on a heading southwest beyond Santa Catalina island where it disappeared off sonar tracking. Did this USO travel underwater to the Mariana Trench or, as yet to be identified, seabase location?

On June 14, 1992 more than two-hundred ( 200 ) Unidentified Flying Objects ( UFO ) interalia Unidentified Submersible Objects ( USO ) were witnessed by at least twenty-seven ( 27 ) residents of Los Angeles County in southern California, according to MUFON ( Los Angeles, California ) chapter UFO / USO researcher Preston Dennett.

These UFO / USO Non-Referenceable Objects ( NRO ), however were not ’hovering in the sky’ but ‘rising-up out-of the Pacific Ocean channel near Santa Catalina island’ west of Santa Monica, California, according to resident witnesses positioned less than 10-miles east in the foothills of Los Angeles.

These two-hundred ( 200 ) UFO / USO  crafts, that came out-of the Santa Catalina island channel of the Pacific Ocean for several seconds, gathered into several cluster formation ( small squadrons ) before each set shot-off upward like missiles into southwest sky beyond southern California’s Santa Catalina island.

Were these two-hundred ( 200 ) Non-Referenceable Objects ( NRO ), which were all headed southwest by air in the same direction as the Mariana Trench in the Pacific Ocean, or were they travelling far beyond it and the atmosphere of Earth?

Worried local residents - including those from Santa Monica, California to as far south as Malibu, California – filed UFO / USO eyewitness reports by telephone with switchboard operators of the Los Angeles County Sheriff’s Department ( LASO ), Santa Monica Police Department ( SMPD ) as well as with other officials.

One ( 1 ) caller, who was recorded by a law enforcement operator, sounded hesitant perhaps, embarrassed, but nevertheless concerned enough to report the unidentifiable objects he had just witnessed.

The wealth of these eyewitness local resident report descriptions were fed by local officials to officials of the federal United States government, amongst which included the U.S. Coast Guard ( USCG ) that reportedly refused to honor a request to search the Pacific Ocean area near Catalina island for any trace remnant discharges any of the two-hundred ( 200 )  UFOs / USOs may have left or jetisoned.

On December 25, 2004 in southern California adjacent to Santa Catalina island the Long Beach Police Department ( LBPD ) had their own mid-air encounter with a UFO / USO officially recorded on their police helicopter Forward Looking Infra-Red ( FLIR ) camera ( see video below ):

During July 2009 in Santa Monica, California another UFO / USO - resembling the same UFO / USO encounter with the Long Beach Police Department helicopter ( video above ) – was filmed in color from the coastal City of Santa Monica, California just off the westcoast Pacific Ocean channel near Santa Catalina island ( see video below ):

On November 8, 2010 another Unidentified Flying Object ( UFO ) and / or Unidentified Submersible Object ( USO ) was sighted in southern California near Santa Catalina island witnessed it while filming it from aboard a southern California City of Los Angeles television ( KCBS TV ) news station helicopter ( see video below ):

The UFO / USO filmed ( above ) by the news station helicopter news was denied by ‘all’ official United States federal government agencies claiming they had no knowledge if it and had nothing to do with the Unidentified Flying Object ( UFO ) sighted.

Interestingly, after U.S. federal officials interviewed the KCBS TV news station helicopter reporter, the same reporter then disavowed what he previously reported by agreeing with U.S. federal officials that what he had seen filmed were just ice crystals glistening off a ‘small airplane’ travelling into the horizon during sunset.

Did this KCBS-TV news reporter undergo U.S. federal government official embedding? Why would the KCBS-TV news reporter change what he previously witnessed and then reported to the greater southern California Los Angeles news area public?

What about the KCBS-TV news helicopter video ( above )?

Listen very carefully to precisely what the news helicopter reporter describes ( below ) in the most ‘general of terms’:

Was the KCBS-TV Sky news helicopter video ‘interrupted’ or ‘earlier replaced’ by ‘decoy film footage’ to ‘disguise what was really being witnessed’ to ‘match general descriptions’ reported the KCBS-TV Sky 2 helicopter news reporter?

Watch what former U.S. federal government Department of Defense ( DoD ) military officials whom have decades of experience with what was sighted off the coast of southern California near Catalina island ( below ):

Now compare what civilian reporters said to agree with ‘official U.S. government cover story lines’ the later reported ( below ):

If the UFO / USO video was implanted or switched, might it have appeared more like the films ( further above )? One may no longer wonder what was actually seen coming out-of the Pacific Ocean near Santa Catalina island. Then again, the UFO / USO may have originated near another southern California island, San Nicholas island ( see video below ).

 

The U.S. National Reconnaissance Office ( NRO ) may have a purposeful misnomer embedded within its initials. Historical research proves that the U.S. federal government entity charged with who “owns the night” refers to Unidentified Flying Objects ( UFO ) as being ‘objects’ of “Non-Reference” or Non-Refrerencable Objects ( NRO ).

What if the U.S. National Reconnaissance Office ( NRO ) actually stands for the U.S. Non-Referenceables Office ( NRO ) charged with reconnaissance over Non-Referenceable Objects ( NRO ) “Who Rule The Night?” Learn a little something more about U.S. federal government clearance levels and what surrounds the NRO ( video below ):

Now, if those following this report are ‘thoroughly convinced’ and ‘absolutely sure’ that what is being discussed here has being cleverly twisted around into something less than factual, the following ( below ) serious speach given by the recently deceased former Minister of Defense for Canada may come to some as a rather shocking surprise:

The following five ( 5 ) color video mini-series ( below ) introduces Unidentied Submersible Objects ( USO ) also known as Non-Referenceable Objects ( NRO ):

The Truth Is Out There Amidst The Abyss Below

Far west of southern California islands, in the Pacific Ocean, lays the Marianna Trench where on May 24, 2009 an ultra-deep sea discovery project [ http://geology.com/press-release/deepest-part-of-the-ocean/ ] documented videos of ’self-illuminating ultra-deep sea creatures’ using no ’artificial light’ but a ‘natural bioluminescent process’ known as ‘counterillumination’, which is really something one needs to ’see to believe’ ( below ):

While the 2009 video ( above ) provides documented factual understandings of evidence for what truly exists ( i.e. bioluminescent sea creatures ) in the ultra-deep sea, another video clip ( below ) that was filmed twenty ( 20 ) years earlier in 1988 provided displays of bioluminescent sea creatures in the ultra-deep sea science-fiction motion picture film “The Abyss.” Perhaps, in another 20-years ( more or less ) in the future, this insight may allow the public to even better fathom and understanding what lies in the ultra-deep sea further ( below):

Now equipped with a new set of eyes, one wishing to go even deeper might research before consulting government on NonReferenceable Objects ( NRO ) claimed nonexistent for the public.

Submitted for review and commentary by,

Unwanted Publicity Intelligence Annex, Host
E-MAIL: UnwantedPublicity@Gmail.com
WWW: http://upintelligence.wordpress.com

X-CIA Files Archive 2

[ NOTE: 1998 - 2003 X-CIA FILES website ( incredible reports & images below ) ]

WARNING & DISCLAIMER: THIS IS NOT A GOVERNMENT WEBSITE

X-CIA Files Archive 2

” Details, Usually ‘Unavailable’ Elsewhere, Are Typically ‘Available’ Here! “

ExtraTerrestrial Technologies ( ETT )

Plasma Torch Rectenna Propulsion

3D Penrose Tiling Structures

Quasi-Crystal Materials Sciences

Lenticular Tactical Aerospace Vehicles ( LTAV )

Unmanned Combat Aerial Vehicle ( UCAV ) Linear Engines

Single-Stage To Orbit ( STO ) Vehicle Propulsion

Space-Time Continuum Manipulations

INTEL ( DOCILE ) Digital IC Orbit Communication Technologies

ExtraTerrestrial Biological Entities ( EBE )

Rare Unidentified Flying Objects ( UFO )

[ photo ( above ) LOCKHEED SR-75 Penetrator legacy cut-away shows 4 PRATT & WHITNEY engines ( click to enlarge ) ]

[ photo ( above ) LOCKHEED SR-75 Penetrator with ROCKETDYNE AeroSpike engines ( click to enlarge ) ]

[ photo ( above ) ROCKETDYNE XRS-2200 AeroSpike thrust-vector engine testbed ( click to enlarge ) ]

 

[ photo ( above ) ROCKETDYNE XRS-2200 AeroSpike diagramatic of thrust-vectoring engine technology ( click to enlarge ) ]

 [ photo ( above ) F-117-E Stealth Reconnaissance Vehicle with 2 ROCKETDYNE XRS-2200 AeroSpike thrust vectoring engines installed ( click to enlarge ) ]

[ photo ( above ) LOCKHEED LASRE SR-74 Scramp with hypersonic nuclear electric ion engine ( click to enlarge ) ]

Linear AeroSpike Engines for Unmanned Combat Aerial Vehicles ( UCAV )

ROCKETDYNE linear AeroSpike XRS-2200 ( RS-2200 ) engines utilize a design first developed in the early 1970s incorporating Apollo space mission era hardware from J-2S engines. Although this AeroSpike engine began almost 30-years ago it is of strategic importance today in the F-117-E stealth reconnaissance aircraft it will be for future aerospace vehicles now under development.

21st Century propulsion technology was derived from a combination of 1960s era hardware developed from several decades of engine designs plus 1990s era design/analysis tools and fiscal realities that ushered in an entirely new era of commercial and military space flight where ‘old technology’ was found to be a primary key to developing even newer technological advancements.

The AeroSpike team located vendors, who more than 30-years ago, manufactured the original J-2S legacy engine hardware that AeroSpike based its turbo-machinery on.

Vendors, still in existence, were contracted to provide the Program with newly built J-2S hardware.

In cases where vendors had gone out-of business, new generation vendors were identified for producing new hardware from 30-year old legacy designs.

Panels, that make up the unique AeroSpike nozzle, presented a huge design challenge.

AeroSpike nozzles have a form like a large curved ramp – unlike traditional bell shaped nozzle characteristics for most rocket engines.

AeroSpike nozzle thermal and structural loads required development of new manufacturing processes and toolings to fabricate and assemble AeroSpike nozzle hardware.

The AeroSpike team found a way to accommodate huge thermal expansions and induced mechanical forces in mechanical and brazed joints of the assemblies where appropriate materials and attachment techniques were identified so effective manufacturing processes were developed.

In early 1997, a small half span model packaged equipped with an AeroSpike 8 thrust-celled nozzle engine equipped Lift-Body Vehicle [ SR-74 Scramp ( see further below ) ] - called the LASRE experiment – was piggy-back mounted onto a LOCKHEED SR-71 BlackBird high-altitude reconnaissance aircraft that was then tasked to operate like a ‘flying wind test tunnel’ to determine a Single-Stage-To-Orbit ( STO ) Reusable Launch Vehicle ( RLV ) onboard AeroSpike engine plume would affect aerodynamics of the Lifting Body Vehicle shape at specific altitudes and speeds initially reaching approximately 750-mph.

The interaction of the aerodynamic flow with the engine plume could create drag and design refinements minimized that interaction.

The lifting body model, eight [ 8 ] nozzled AeroSpike engine and, canoe collective was called the “pod.” The entire pod was 41-feet in length and weighed 14,300 pounds. The experimental pod, mounted onto an Air Force LOCKHEED SR-71 BlackBird stealth reconnaissance aircraft loaner, was completed in November 1998.

Successfully completion braze of the first flight ramp was accomplished as well as the fabrication and assemblies of the parts for the first thrusters.

With completion of those milestones the AeroSpike engine proceeded through fabrication, test and, delivery enabling support for the planned first flight in 1999.

Now, the AeroSpike XRS-2200 linear thrust-vectoring engine’s eventual “new placement’ was set for the sub-orbital technology air/space vehicle – referred to as the X-33 VentureStar – had a Rocketdyne team anticipating delivery of their first XRS-2200 AeroSpike flight engine by September of 1999.

Also, a “combined industry and government team” at LOCKHEED-MARTIN Skunk Works ( Palmdale, California ) was developing the X-33 for its AeroSpike XRS-2200 engine flight out of Edwards Air Force Base ( California ) scheduled for December of 1999.

The Linear Aerospike XRS-2200 ( RS-2200 ) engine was developed by the ROCKETDYNE PROPULSION AND POWER UNIT of the BOEING COMPANY indicating they completed the engine in early 2000 although the F-117A Stealth fighter was already secretly flying ‘long before’ their official public information release.

The difference between the linear AeroSpike engine and conventional rocket engines are the shape of the nozzle – unlike conventional rocket engines using a bell shaped nozzle to constrict expanding gases – the Aerospike nozzle is V-shaped and called a “ramp”.

The performance of Electro-Mechanical Actuators ( EMA ) are used in propellant valving for these engines. EMA is seen as a technology of choice in new rocket engines that would be developed under the Space Launch Initiative ( SLI ).

The XRS-2200 gas generator operated successfully in the flow-rate range of proposed X-33 operating conditions. The gas generator essentially was a J2 gas generator modified for the higher chamber pressure and flow-rate required for the XRS-2200.

The gas generator must be able to operate in conditions significantly higher than normal J2 operating conditions.

A review of the data showed the gas generator operated in these conditions but that also, the combustor shell wall temperatures were within acceptable tolerances. Post test inspections also found the hardware to be in good operating condition which showed signs of marked improvements from past hardware weakening. Engineers at Marshall Space Flight Center ( MFSC ) were able to demonstrate the gas generator could be started with a softer ramp, to minimize overpressure of the combustor shell, by accurately sequencing valve timings and ramps on the XRS-2200 AeroSpike engine.

Successful component tests followed a series of AeroSpike multi-cell engine tests at Marshall Space Flight Center that successfully demonstrated hydrogen-oxygen combustion at full power, emergency power, and low throttle conditions.

The pressure fed thrusters and AeroSpike nozzles were developed at the Rocketdyne Division of Boeing under a technology agreement with NASA and Lockheed-Martin who was set to build the VentureStar X-33 transport aerospace vehicle.

The XRS-2200 AeroSpike engine shoots hot gases, from multiple linear placed chamber nozzles along the outside of the ramp surface. This unusual design allows the engine to be more efficient and effective than today’s rocket engines by ‘modulating the thrust to various positioned sets of these nozzels acting in concert with vectoring – shaping direction of engine propulsion / thrust.

Hot test firings were performed with tests on the powerpack at the John C. Stennis Space Center, which included the turbo-machinery and gas generator that ran a program duration of 45-seconds with a start to the 80% power level transition to mainstage operation at 100% power and then throttled down to 57% power.

Test data indicated normal shutdown with no anomalies for the ROCKETDYNE AeroSpike XRS-2200 linear engine designed for use onboard the VentureStar X-33 - Reusable Launch Vehicle ( RLV ) – prior to delivery at the LOCKHEED-MARTIN VentureStar X-33 assembly facility ( Palmdale, California ) where the X-33 was to be flown from Edwards Air Force Base ( California ) into outerspace followed by a return touchdown at one ( 1 ) of two ( 2 ) landing sites ( i.e. Utah or Montana ).

Some VentureStar X-33 and XRS-2200 ROCKETDYNE engine project participants, were:

- Gene Austin, Program Manager for NASA VentureStar X-33 at Marshall Space Flight Center;
- Cleon Lacefield, Vice-President LOCKHEED-MARTIN Space Systems ( Palmdale, California ) VentureStar X-33;
- Don Chenevert, Program Manager, NASA X-33, Aerospike Engine Testing at Stennis Space Center, MS;
- Mike McKeon, Program Manager X-33 Aerospike Engine, ROCKETDYNE Propulsion and Power Unit, BOEING ( Canoga Park, California ); and,
- Steve Bouley, Division Director, Propulsion Development, ROCKETDYNE Propulsion & Power Unit, BOEING.

Instead of hydraulics, future propulsion systems may use EMAs to control major propellant valves so gaining performance data in ‘real world testing’ has significant value.

There are six ( 6 ) EMAs – on each AeroSpike test engine – used to deliver propellants to the thruster banks and gas generators. Two ( 2 ) engines will use forty ( 40 ) thrusters – 20 per XRS-2200 AeroSpike engine achieves aircraft velocities exceeding Mach 13 +.

A total of seven ( 7 ) variations of the Advanced Linear AeroSpike Engines – built by the ROCKETDYNE DIVISION of BOEING – were to power the X-33 VentureStar RLV to have been built by LOCKHEED-MARTIN.

There were three ( 3 ) additional powerpack assemblies and four ( 4 ) full-up AeroSpike XRS-2200 linear engines – including two ( 2 ) flight units that existed during the remainder of the development program.

ROCKETDYNE developed the XRS-2200 Aerospike linear engine at its Canoga Park, California facility for the later cancelled ( 2001 ) VentureStar X-33 Single-Stage To Orbit ( STO ) Reusable Launch Vehicle ( RLV ) space transport program. A joint BOEING and NASA team at Stennis Space Center did the final XRS-2200 AeroSpike engine assembly.

The RS-2200 Linear Aerospike Engine is being developed for use on the LOCKHEED-MARTIN Skunk Works Reusable Launch Vehicle ( RLV ).

The Aerospike linear engine allows the smallest lowest cost RLV ( Reusable Launch Vehicle ) to be developed because the engine fills the base ( reducing base drag ) and is integral to the vehicle – reducing installed weight when compared to a bell shaped conventional rocket engine.

The Aerospike is somewhat the same as bell shaped rocket engines, except for its nozzle open to the atmosphere. The open plume compensates for decreasing atmospheric pressure as the vehicle ascends – keeping engine performance very-high along the entire trajectory.

This altitude compensating feature allows a simple low-risk gas generator cycle to be used. Over $500,000,000 million has been invested to-date in AeroSpike engines, and full size linear engines have accumulated seventy=three [ 73 ] tests and over 4,000 seconds of operation.

Following the series of tests, XRS-2200 AeroSpike engines were removed from the test stand facility and put into storage at the Stennis Space Center – awaiting NASA instructions on engine final dispositions.

The precursor to the AURORA Transport-Lift Vehicle X-43 placed three ( 3 ) such X-43A aerospace vehicles inside the Dryden Space Flight facility at Edwards Air Force Base, California where a 12-foot-long under wing test vehicle existed for the NASA “Hyper-X” multi-year hypersonic research program [ AURORA ] to demonstrate “airframe integrated and air breathing ( AeroSpike ) engine technologies” that promise to increase payload capacity for future vehicles by consuming ambient oxygen at altitudes higher than previously possible.

This will remove the need for carrying oxygen tanks onboard to promote combustion, as traditional rockets must do now.

Two flights are planned at Mach 7 ( approximately 5,000 mph ) and one ( 1 ) flight at Mach 10 ( almost 7,200 mph ) to a top speed of Mach 13 +.

By comparison, the world’s fastest “air-breathing plane” – to date – was the LOCKHEED SR-71 Blackbird that could fly at an ‘unclassified airspeed’ of Mach 3 + to an extimated top speed of Mach 7.

Future generations of EMAs will be even more compact – than those currently in operation – that will pave the way for linear AeroSpike acceleration thrust-vectoring engines to be deployed onboard ‘newly designed’ Unmanned Combat Air Vehicles ( UAV ).

Some X-33 and ROCKETDYNE XRS-2200 AeroSpike engine project participants, were:

- Gene Austin, NASA X-33 Program Manager, Marshall Space Flight Center;
- Cleon Lacefield, Lockheed-Martin Space Systems Company Vice President for X-33, Palmdale, CA;
- Don Chenevert, NASA X-33 Program Manager, Aerospike Engine Testing, Stennis Space Center, MS;
- Mike McKeon, X-33 Aerospike Engine Program Manager, Rocketdyne Propulsion and Power, The Boeing Company, Canoga Park, CA; and,
- Steve Bouley, Division Director, Propulsion Development, Rocketdyne Propulsion & Power Unit, the Boeing Company.

August 8, 2001 – The NASA Second Generation Reusable Launch Vehicle Program – also known as the Space Launch Initiative ( SLI ) – is making advances in propulsion technology with this third and final successful engine hot-fire designed to test electro-mechanical actuators. Information learned from this hot-fire test series about new electro-mechanical actuator technology – which controls the flow of propellants in rocket engines – could provide key advancements for the propulsion systems of future spacecraft. The test of twin ( 2 ) Linear Aerospike XRS-2200 engines originally built for the X-33 program, was performed Monday, August 6, 2001 at the NASA Stennis Space Center, Mississippi where the engines were fired for the planned 90-seconds and reached a planned maximum power of 85%. The test was originally slated to attain full power during 100-seconds of testing. Prior to the test, engineers determined the necessary results could be achieved at reduced duration and power. Based on this determination, both planned duration and planned power were reduced. Two [ 2 ] shorter hot-fires of the AeroSpike engines were performed last month [ July 2001 ] in preparation for the final test firing on August 6, 2001.

The Second Generation Reusable Launch Vehicle ( RLV ) Program, led by the NASA Marshall Space Flight Center in Huntsville, Alabama is a technology development program designed to increase safety and reliability while reducing costs for space travel.

“Because every engine proposed by industry for a second generation vehicle has electro-mechanical actuators, we took advantage of these AeroSpike engines already on the test stand to explore this relatively new technology now – saving us valuable time later,” said Garry Lyles, Propulsion Projects Office manager of the Second Generation Reusable Launch Vehicle Program at the Marshall Center. “This data is critical toward developing the confidence required to support the use of these actuators on future launch vehicles.”

Electro-mechanical actuators electronically regulate the amount of propellant (fuel and oxidizer) flow in the engine. The new technology is a potential alternative and improvement to the older pneumatic and hydraulic fluid systems currently used by the aerospace industry to drive and control critical rocket engine valves.

“This series of engine firings tested the actuator control system in what we call a ‘real condition of use’ environment,” said Dr. Donald Chenevert, electro-mechanical actuator project manager at the Stennis Center. “Firing allows us to see how the integrated system handles the extreme cold of cryogenic propellants, the stress loads of the propellants pushing through the valves, and the dynamic response to commanded flow rate changes. Additionally, we have many other unique conditions such as shock and vibration loads not found in a lab, so we capture more realistic data about the true performance of the actuators.” Engineers are performing engine post-test inspections, and early indications are that all test objectives have been met, Chenevert said.

The final data is to be fed directly into the engine systems being considered for a second-generation reusable launch vehicle, Lyles said. “Propulsion is one of the highest and most critical technology areas that we are exploring,” said Dennis Smith, manager of the Second Generation Reusable Launch Vehicle Program Office at the Marshall Center. “Our goal also is to find, improve or develop technologies such as airframes, avionics, health management systems and ground operations – all to make getting people and payloads into space safer and cheaper.”

The Rocketdyne Propulsion and Power Unit of The Boeing Company in Canoga Park, Calif., developed the AeroSpike engine and supported the engine tests at Stennis Space Center.

- -

[ photo ( above ) none, like the large UFO below, exists to-date ]

USA, California, Hesperia – 1997 – Local area residents of the Victor Valley southern California area formed a collective having focused new attentions toward the sky where a rash of ‘satellite failures’, unidentified flying objects ( UFO ) including one ( 1 ) that stopped 2-way traffic for 10-minutes at night along a popular California interstate where a very large triangle craft hovered while actually blocking out starlight, and – further south – a few extraterrestrial biological entity ( EBE ) sightings.

Local newspapers only reported that local area residents, curious from too many unexplained sightings, were holding an open to the public Town Hall Meeting ( Main Street in Hesperia, California ) to discuss and compare what they were encountering.

The town hall meeting, held in a small retail center with a fast food store, unfortunately did not discuss UFo sightings because a woman – operating an overhead transparency slide projector – placed images of ‘foreign’ ( Mexico ) area Chupacabra sightings for discussion. Frustrated by the obviously lengthy Chupacabra distraction, not taking local area UFO questions, most residents in-attendance abandoned the town hall office meeting to stretch their legs outside where some began talking amongst themselves about ‘UFO and alien local encounters’ they thought the town hall meeting was supposed to be allowing for open discussions.

Noticing town hall meeting attendees pouring outside, freelance reporter Paul Collin interviewed the disenfranchised residents whom left their off-topic town hall meeting inside. Eyewitnesses, came with family members, some providing additional eyewitness accounts. Providing one-on-one interviews for only first-hand reports describing details, residents were also allowed to personally sketch drawings of personal UFO and alien entity encounters.

A good investigative journalist may play unknowledgeable while subtly and quite effectively being able to quickly assess normal human frailties from purposeful deceit in getting to the bottom of the truth. Easy to spot, are armchair storytellers ( with plenty of time on their hands who invariably stray from the topic to talk about what they did or do for a living ), narcissists ( rambling on about themselves while exhibiting rather odd personal quirks ), weird-os and opportunists ( some wearing partial Star Trek or Wonder Woman costumes, alien face masks, spring-wired tinfoil antenna balls sprouting from headbands, or constantly looking in their compact mirrors to see if their make-up is still on their face correct ), and then move-on to interview others whose purpose stems from serious concerns as a resident member of the community.

Even then, trying to detrmine fact from fictionalized accountings is not an easy task. You look deep into these people’s faces as they convey their stories. “Did they really see what they’re claiming?” Look at their faces, closer, any micromomentary facial expressions? Also look carefully at their eyes and the direction they quickly snap ‘just before beginning to answer your question’. Look carefully at their reactions after throwing their own statement back at them, but with a purposeful small inaccuracy, to see whether they correct it, become exacerbated by your having just twisted what they just conveyed, or continue as though that’s what they said – but actually didn’t. Can they provide details as to what they were doing ‘just before the time of their encounter’? Do they appear to be easily disturbed emotionally or do they offer light-hearted concerns while discussing their more serious concerns on-topic?

Most were rather ‘original’, several did not match what was mostly being reported, some interviewees were very apolegetic for not having more than just a little to report. The culmination of many reports served to quickly narrow the scope of ‘believeable encounters’ from those ‘otherwise’.

Analysis of all boiled down to the following six ( 6 ) essential facts:

1. High-volume ( PUBLIC ) sightings;

2. Short-term duration ( 30-DAY ) reportings;

3. Small region ( HIGH DESERT ) locations;

4. Near ground ( LEO ) altitudes.

5. Limited design ( UFO ) triangles; and,

6. Incident ( MAJOR ) highways.

Over all reports, only four ( 4 ) really stood-out:

A. There was the Hesperia, California family in their minivan – homebound east on Main Street ( Hesperia, California ) with a clear sunset behind them having just left a soccer game when all occupants began to comment about what appeared outside their windshield in the low horizon distance where a slimline triangle shaped UFo just lingered ( for about 5-minutes ) but then suddenly ( in seconds ) snapped its location due south and shot upward where all of a sudden – and in’mid-sky’ – just blinked-out before even reaching the upper darkening sky. The triangle UFO exhibited ‘no contrails’, ‘no sound barrier boom’, nothing. Just a brief low earth hover, quick snap south and then up out of sight in the blink of an eye. While the kids were all excited, the parents tried calming them down – along with their own unsettled nerves – explaining it all away as only being some new Air Force jet. Deep inside, the parents knew it was ‘not any aircraft’, but only one ( 1 ) of other unexplained sightings plaguing yet other residents over the past month;

B. All alone, a middle-aged man traveling west on Main Street ( Hesperia, California ) homebound for Phelan, California spotted in the southwest sky over the Wrightwood mountains a large triangle craft slowly moving upward. Stopping at California state highway 395 traffic light. He looked back up out his windshield and saw nothing there anymore, but it gave him something to tell his wife when he arrived home. The wife, rolling her eyes, put dinner on the table, but interestingly was also present by his side at the town hall meeting as well. Residents wanted to know what was going on in their local community, especially after local UFO sightings appeared to begin registering in their local paper;

C. Further southwest and beyond the Wrightwood mountains – in Azusa, California – a grandmother and her live-in daughter nurse both witnessed – on two ( 2 ) separate occasions while driving home slowly down their semi-rural neighborhood street at night – two ( 2 ) glowing red eyes in the head of what appeared to them to be a small 2-legged ape-like creature hunched down by the side of their road where although well ahead of their vehicle the creature suddenly darted across the street but with what they both claimed was at a ‘frightening blur’ of a pace. The women also spotted what they believed was the same 2-legged ape-like creature with red eyes three ( 3 ) additional times but inside the furthest corner of their backyard where it seemed to be glaring at them both through the rear kitchen window. Immediately scared to death, both residents – whom by the time they thought to call police – then witnessed the creature pop-up – rather unusually – bounding over and outside their backyard fence. I had to ask if they remained in the town hall meeting for the Chupacabra discussion, and they glanced at each other and let me know that what they saw was ‘not’ a Chupacabra. I asked, “Could it have been a baby Chupacabra? They looked at each other and then back at me, shaking their heads in the negative. Their ‘thing’ was ‘not hairy’, did ‘not have head horn spikes’, was ‘not a color shade of grey, blue, or eggshell’. It was ‘black’, ‘short’, and when it moved – it moved ‘extremely fast’ with an ‘odd blur’ you couldn’t focus-in on. I thought to myself, “Probably darn hard to target fire onto;” and,

D. What brought the freelance reporter to the meeting in the first place was his own personal encounter in the same general area of the High Desert of southern California where 1-week earlier at night while 20-minutes northeast of Victorville, California in the middle of the desert on California Interstate 15 ( I-15 ) on his way to Las Vegas, Nevada he noticed traffic on ‘both sides of the that highway pulling over and stopping. He figured a serious accident occured and pulled over to exit his vehicle to look out into the desert along the highway, but didn’t see any vehicles there. He walked back a couple of cars and noticed a group of people talking together and asked where the accident was. He was told to look up just a little off to the east of the intersate highway to see what was stopping traffic, and there ‘it’ was – an incredibly huge black triangle shaped object just hovering without any lights on. The oddest thing about it was that it was so huge that a whole section of the night sky had no starlight while all around the flying object anyone ‘could easily see starlight all around’ but no starlight directly above the behemoth. I asked the group what the thing was doing and what had it been doing. They said they didn’t know what it was doing now, but that it had been exhibiting a low hum, which stopped, and it was just continuing to linger where it had been for what they estimated had been 15-minutes. I called the California Highway Patrol office and they said they were already responding to it. I heard no emergency sirens and saw no red lights. I waited another 15-minutes and nothing happened. It just lingered a few hundred feet above ground off in the desert. Not being too much braver I decided to get back into my car and turn around and go back home.

The following week, I located one ( 1 ) particular Blockbuster video store on Bear Valley Road in southwest Victorville, California. That particular store carried an unusually large selection of UFO documentary videos placed in a special section. I decidely watched over 100 of those videos to determine if anyone else might have seen any huge triangle UFOs. At the time ( 1997 ) there were unfortunately ‘no flying triangle videos’ I could lay my hands on.

Apparently my frequent selections attracted the attention of the store owner, John Pflughoft of MPM INVEST, who eventually approached me and politel asked why I was interested in watching so many UFO videos. I think he knew something had startled me into that habit so, I conveyed what I had seen the previous week.

I also shared my late night experiences during 1972 while assigned to the Intelligence Section Station at George Air Force Base and later Edwards Air Force Base in the High Desert. I told him about strange red, orange, and yellow ‘firelight’ coming out the tops of some of the smaller mountains scattered between George AFB and Edwards AFB out in the middle of the desert. The video proprietor asked if I knew what the ‘firelights’ were. I told him I figured it was just rocket engine testing going on inside some of those small mountains.

He asked if I had ever seen any UFOs before last week. All I had to convey was an experience in 1976 while camping with a couple of my military buddies of mine up in the Iron Mountain range between Randsburg, California and Mojave, California at night, and while we ‘saw nothing’ all three ( 3 ) of us ‘heard’ a very unusual ‘electronic whirring sound’ that seemed to be travelling up and down both sides of the foothills a few hundred feet from where we were trying to sleep. I told him we walked in the direction of where we heard the whirring sound coming from last but saw nothing. Then when we returned to our camp where 30-minutes later we all heard it start back up again so, we left in the middle of the night and drove 90-miles to get home. He smiled and said, “Well, I guess that until last week you’ve been pretty lucky to have remained out-of the UFO experience.”

He then asked if an upcoming town hall meeting in Hesperia, California where residents were going to discuss their own personal UFO and extraterrestrial encounters during the recent month might interest me. I knew nothing of any other sightings so, he suggested I attend and asked if I would report back to him what I learned. I agreed, attended the meeting, but when it began being abandonded, dug-out a yellow legal pad of paper and began interviewing attendees upon exit. A final report was  prepared, and along with resident sketches, placed in a manila envelope sealed-up and dropped-off at the Blockbuster store for his later review.

- -

 

[ photo circa: 12OCT62 ( above ) Ames Langley Lenticular Vehicle ( click to enlarge ) ]

As far back as October 12, 1962 Ames Langley and Dryden Flight Research Centers began feasibility studies and designs for developing a lenticular design space re-entry air vehicle with speeds capable of reaching Mach 25 + to Mach 50 +.

[ photo ( above ) TR-3B Astra – Flying Triangle ( click to enlarge ) ]

In 1995, at Nellis Air Force Base Test Range S-4 ( near Papoose Lake, Nevada ) the TR3-B ( a lenticular-shaped aerial vehicle ) was seen and reported to be between 300-feet and 500-feet in diameter.

Reportedly, the TR3B flies at speeds of Mach 15 + and reflects a bright blue grey color believed to be biological electro-chromatic 3-D Penrose tiling polymer material providing highly advanced stealth qualities.

TR3B is also believed to have carried the INTEL company Direct Orbital Communication & Intelligence Link Electronics ( DOCILE ) computer processor unit ( CPU ) system.

TR3B is believed to have derived partial funding from Strategic Defense Initiative ( SDI – Star Wars ) links with the super secret AURORA Program Office global security defense operations mission.

TR3-B is believed using a quasi-crystalline molecular property energy containment storage core driving a plasma-fluidic propulsion system employing combinatoric development of its Magnetic Field Disruptor ( MFD ) quantum-flux transduction field generator technology.

TR3B reportedly emits cyclotron radiation, performs pulse detonation acceleration, and carries EPR quantum receivers.

TR3B craft reportedly resembles a ‘very large triangle’ ( shaped ) air vehicle.

TR3B (aka) TR3-B (aka) TIER III B craft in no way resembled the TR-3/A MANTA air vehicle.

The flight-testing of all experimental and first-model military aircraft occurred here along an ancient dry lake now called Rogers Dry Lake, located on the western edge of Southern California’s Mojave desert – south of Highway 58 between the two ( 2 ) towns of Mojave, California and Boron, California ( where the World’s largest open-pit borax mine is ) in Rogers Dry Lake ( one of the first immigrant trails through California ).

The first permanent settlers, to a certain desert region area, was the Corum Family who located near this large dry lake area ( in 1910 ) where later local residents tried to get the local U.S. Post Office to name it “Corum, California” however another city with a similar name “Coram, California” existed so, the name “Corum” was reverse spelled it as “Muroc,” which is where this Mojave desert area saw the U.S. Army Air Corps later name “Muroc Field” and the subsequent naming of the NASA Muroc Flight Test Unit ( MFTU ) in this California area.

This dry lake was extremely ideal as what would become the major site of aviation flight-test history because, at about 2,300-feet above sea level, Rogers Dry Lake not only happens to fill an area of about 44-square miles (nearly half again as large as New York’s Manhattan Island) making it one of the largest and best natural ( flat and hard surfaced ) landing sites on Earth. The arid desert weather also promotes excellent flying conditions on almost every day of the year ( about 320-days out of the year ).

Rogers Dry Lake is the sediment filled remnant of an ancient lake formed eons ago. Several inches of water can accumulate on the lakebed when it rains, and the water in combination with the desert winds creates a natural smoothing and leveling action across the surface. When the water evaporates in the desert sun, a smooth and level surface appears across the lakebed, one far superior to that made by humans.

[ photo ( above ) DOUGLAS AIRCRAFT Black Horse Project Manta ( click to enlarge ) ]

AURORA Program Office consisted of lenticular shaped and wingless aerospace vehicle Projects that industry sleuths speculate secretly held a billion dollar high-speed high-altitude surveillance air space vehicle that leaves a ‘contrail’ behind it resembling ‘doughnut clouds on a string’.

According to some reports, AURORA Program aerospace vehicles are capable of high-speed maneuverability allowing abrupt course change corrections within their own flight path.

Information ( below ) are excerpts from two ( 2 ) individuals, Robert “Bob” Lazar and Edgar Fouche, during different time periods at different locations. These relevant excerpts should serve to familiarize readers and provide interesting relationships between similarities of ETT ( ExtraTerrestrial Technologies ), reverse-engineering ( backward engineering ) of U.S. government military seized extraterrestrial spacecraft, and current day advanced technologies controlled by the U.S. Department of Defense ( DOD ), Defense Advanced Research Projects Agency ( DARPA ) programs and projects worldwide.

Obvious template similarities seem to have been successfully performed in order to produce fully operational high-performance defense and observation flightcrafts for exclusively U.S. government use, examples of which may be viewed in the section “ NEWS ALERTS! “ on this website.

[ photo circa: 1995 ( above ) Area 51, Groom Lake Nevada ( click to enlarge ) ]

While Bob Lazar ( below ) provides his interviews mentioning eyewitness accounts coupled with basically seamless theories covering time and space folding with alien spacecraft ET technology interalia ETT [ ExtraTerrestrial Technologies ] given his previous work at the Nellis Air Force Base, Nevada Test Range Site S-4 Area 51 ( near Groom Lake, Nevada ), Edgar Fouche provides another arena of detailed information coinciding with some areas with what Bob Lazar saw in his own experiences near ExtraTerrestrial technology ( ETT ). Edgar Fouche depicts how ETT was converted into operational use flying craft for United States government arenas.

Skeptics may no longer speculate on what current aerospace lenticular crafts the U.S. has developed and just what is planned for the not too distant future where most of these highly classified Programs and Projects will remain cloaked for some time to come.

[ NOTE: For a look at current lenticular crafts, developed by the U.S., search this website for photos and details on UAV, UCAV, MCAV, MAV and High-Energy Weapons ( HEW ) and Directed Energy Weapon ( DEW ) research and development. ]

Culminations of technology data and relevant associated theories have never before been produced into one ( 1 ) reading area until now ( here ) where at first glance the following data may seem too fictionalized due in large part to its unfamiliarity to most, however these technologies are very much a large part of reality in what research provides of which only a very small percentage is presented in multiple interviews ( below ):

Interview Excerpts of Bob Lazar interview ( 09DEC89 ) on KLAS TV ( Las Vegas, Nevada ), below:

Producer / Host: George Knapp
Lazar: The first thing was hands-on experience with the anti-matter reactor.
Knapp: Explain what that is, how it works, and what it does.
Lazar: It’s a plate about 18-inches in diameter with a sphere on top.
Knapp: We have a tape of a model that a friend of yours made. You can narrate along. There it is…
Lazar: Inside that tower is a chip of Element 115 they just put in there. That’s a super-heavy element. The lid goes on top. And as far as any other of the workings of it, I really don’t know, you know, [ such as ] what’s inside the bottom of it ( i.e. Element 115 ), sets up a gravitational field around the top. That little waveguide, you saw being put on the top, it essentially siphons off the gravitywave – and that’s later amplified in the lower portion of the craft. But, just in general, the whole technology is virtually unknown.
Knapp: Now we saw the model. We saw the pictures of it there. It looks really, really simple, almost too simple to actually do anything.
Lazar: Right.
Knapp: Working parts?
Lazar: None detectable. Essentially what the job was, to back-engineer everything, where you have a finished product and to step backwards and find out how it was made or how it could be made with earthly materials. There hasn’t been very much progress.
Knapp: How long do you think they’ve had this technology up there?
Lazar: It seems like quite a while, but I really don’t know.
Knapp: What could you do with an anti-matter generator? What does it do?
Lazar: It converts anti-matter . . .It DOESN’T convert anti-matter! There’s an annihilation reaction. It’s an extremely powerful reaction, a hundred percent conversion of matter to energy, unlike a fission or fusion reaction which is somewhere around eight-tenths of one percent conversion of matter to energy.
Knapp: How does it work? What starts the reaction going?
Lazar: Really, once the 115 is put in, the reaction is initiated.
Knapp: Automatic.
Lazar: Right.
Knapp: I don’t understand. I mean, there’s no button to push or anything?
Lazar: No, there’s no button to push or anything. Apparently, the 115 under bombardment with protons lets out an anti-matter particle. This anti-matter particle will react with any matter whatsoever, which I imagine there is some target system inside the reactor. This, in turn, releases heat, and somewhere within that system there is a one-hundred-percent-efficient thermionic generator, essentially a heat-to-electrical generator.
Knapp: How is this anti-matter reactor connected to gravity generation that you were talking about earlier?
Lazar: Well, that reactor serves two purposes; it provides a tremendous amount of electrical power, which is almost a by-product. The gravitational wave gets formed at the sphere, and that’s through some action of the 115, and the exact action I don’t think anyone really knows. The wave guide siphons off that gravity wave, and that’s channeled above the top of the disk to the lower part where there are three gravity amplifiers, which amplify and direct that gravity wave.
Knapp: In essence creating their own gravitational field.
Lazar: Their own gravitational field.
Knapp: You’re fairly convinced that science on earth doesn’t have this technology right now? We have it now at S-4, I guess, but we didn’t create it?
Lazar: Right.
Knapp: Why not? Why couldn’t we?
Lazar: The technology’s not even — We don’t even know what gravity IS!
Knapp: Well, what is it? What have you learned about what gravity is?
Lazar: Gravity is a wave. There are many different theories, wave included. It’s been theorized that gravity is also particles, gravitons, which is also incorrect. But gravity is a wave. The basic wave they can actually tap off of an element: why that is I’m not exactly sure.
Knapp: So you can produce your own gravity. What does that mean? What does that allow you to do?
Lazar: It allows you to do virtually anything. Gravity distorts time and space. By doing that, now you’re into a different mode of travel, where instead of traveling in a linear method — going from Point A to B — now you can distort time and space to where you essentially bring the mountain to Mohammed; you almost bring your destination to you without moving. And since you’re distorting time, all this takes place in between moments of time. It’s such a far-fetched concept!
Knapp: Of course, what the UFO skeptics say is, yeah, there’s life out there elsewhere in the universe; it can never come here; it’s just too darn far. With the kind of technology you’re talking about, it makes such considerations irrelevant about distance and time and things like that.
Lazar: Exactly, because when you are distorting time, there’s no longer a normal reference of time. And that’s what producing your own gravity does.
Knapp: You can go forward or backward in time? Is that’s what you’re saying?
Lazar: No not essentially. It would be easier with a model. On the bottom side of the disk are the three gravity generators. When they want to travel to a distant point, the disk turns on its side. The three gravity generators produce a gravitational beam. What they do is they converge the three gravity generators onto a point and use that as a focal point; and they bring them up to power and PULL that point towards the disk. The disk itself will attach ONTO that point and snap back — AS THEY RELEASE SPACE BACK TO THAT POINT! Now all this happens in the distortion of time, so time is not incrementing. So the SPEED is essentially infinite.
Knapp: We’ll get into the disks in a moment. But the first time you saw the anti-matter reactor in operation or a demonstration — you had a couple of demonstrations — tell me about that.
Lazar: The first time I saw it in operation, we just put — a friend I worked with, Barry — put the fuel in the reactor, put the lid on as, as was shown there. Immediately, a gravitational field developed, and he said, “Feel it!” And it felt like you bring two like poles of a magnet together; you can do that with your hand. And it was FASCINATING to do that, impossible, except on something with great mass! And obviously this is just a . . . And it was a REPULSION field. In fact, we kind of fooled around with it for a little while. And we threw golf balls off it. And it was just a really unique thing.
Knapp: And you had other demonstrations to show you that this is pretty wild stuff, right?
Lazar: Yeah, they did. They were able to channel the field off in a demonstration that they created an INTENSE gravitational area. And you began to see a small little black disk form, and that was the bending of the light.
Knapp: Just like a black hole floating around?
Lazar: Yeah, well, a black hole is a bad analogy, but yeah, essentially.

Interview ( MAR – APR 1990 ) Excerpts of Bob Lazar at KLAS TV ( Las Vegas, NV ), below:

Lazar: The craft does not create an “antigravity” field, as some have surmised. “It’s a gravitational field that’s out of phase with the current one,” Lazar explained in a 1989 radio interview. “It’s the same gravitational wave. The phases vary from 180 degrees to zero … in a longitudinal propagation.”
Assuming they’re in space, they will focus the three [ 3 ] gravity generators on the point they want to go to. Now, to give an analogy: If you take a thin rubber sheet, say, lay it on a table and put thumbtacks in each corner, then take a big stone and set it on one end of the rubber sheet and say that’s your spacecraft, you pick out a point that you want to go to -which could be anywhere on the rubber sheet – pinch that point with your fingers and pull it all the way up to the craft. That’s how it focuses and pulls that point to it. When you then shut off the gravity generator[s], the stone (or spacecraft) follows that stretched rubber back to its point. There’s no linear travel through space; it actually bends space and time and follows space as it retracts.
In the first mode of travel – around the surface of a planet – they essentially balance on the gravitational field that the generators put out, and they ride a “wave”, like a cork does in the ocean. In that mode they’re very unstable and are affected by the weather. In the other mode of travel – where they can travel vast distances – they can’t really do that in a strong gravitational field like Earth, because to do that, first of all, they need to tilt on their side, usually out in space, then they can focus on the point they need to with the gravity generators and move on. If you can picture space as a fabric, and the speed of light is your limit, it’ll take you so long, even at the speed of light, to get from point A to point B. You can’t exceed it – not in this universe anyway. Should there be other parallel universes, maybe the laws are different, but anyone that’s here has to abide by those rules. The fact is that gravity distorts time and space. Imagining that you’re in a spacecraft that can exert a tremendous gravitational field by itself, you could sit in any particular place, turn on the gravity generator, and actually warp space and time and “fold” it. By shutting that off, you’d click back and you’d be at a tremendous distance from where you were, but time wouldn’t have even moved, because you essentially shut it off. It’ s so farfetched. It’s difficult for people to grasp, and as stubborn as the scientific community is, they’ll never buy it that this is in fact what happens.

According to Lazar, the propulsion system he worked on at S-4 gives rise to certain peculiar effects, including INVISIBILITY of the craft: “You can be looking straight up at it, and if the gravity generators are in the proper configuration you’d just see the sky above it – you won’t see the craft there. That’s how there can be a group of people and only some people can be right under it and see it. It just depends how the field is bent. It’s also the reason why the crafts appear as if they’re making 90- degree turns at some incredible speed; it’s just the time and space distortion that you’re seeing. You’re not seeing the actual event happening.”
If the crafts look like they’re flying at seven thousand miles per hour and they make a right-angled turn, it’s not necessarily what they’re doing. They can ‘appear’ that way because of the gravitational distortion. I guess a good analogy is that you’re always looking at a mirage – [ it's only when ] the craft is shut off and sitting on the ground, ‘that is’ what it ‘looks like’. Otherwise, you’re just looking at a tremendously distorted thing, and it will appear like it is changing shape, stopping or going, and it could be flying almost like an airplane, but it would never look that way to you.
Knapp: How close do you think you have to get before time distortion takes place?
Lazar: It’s tough to say, because it depends on the configuration of the craft. If the craft is hovering in the air, and the gravity amplifiers are focused down to the ground and it’s standing on its gravity wave, you would have to get into that focused area. If you’re directly underneath the craft at any time there’s a tremendous time distortion, and that’s in proportion to the proximity of the craft.
Lazar: I don’t know if I mentioned it before, but the amplifiers always run at 100%. They are always outputting a maximum gravity wave, and that wave is phase-shifted from zero to 180 degrees. That’s essentially the attraction and repulsion, and it’s normally at a null setting somewhere in between. It’s a very straightforward system. It looks more like a coal-fired engine than very hi-tech.

Interview ( JUN – JUL 1990 ) Excerpts of Bob Lazar at KLAS TV ( Las Vegas, NV ), below:

Lazar: …And there are two specific different types of Gravity: Gravity A and Gravity B. Gravity A works on a smaller, micro scale while Gravity B works on a larger, macro scale.
We are familiar with Gravity B. It is the big gravity wave that holds the Earth, as well as the rest of the planets, in orbit around the Sun and holds the moon, as well as man-made satellites, in orbit around the Earth. We are not familiar with Gravity A. It is the small gravity wave, which is the major contributory force that holds together the mass that makes up all protons and neutrons. Gravity A is what is currently being labeled as the Strong Nuclear Force in mainstream physics, and Gravity A is the wave that you need to access and amplify to enable you to cause space-time distortion for interstellar travel.
To keep them straight, just remember that Gravity A works on an atomic scale, and Gravity B is the big gravity wave that works on a stellar or planetary level. However, don’t mistake the size of these waves for their strength, because Gravity A is a much stronger force than Gravity B. You can momentarily break the Gravity B field of the Earth simply by jumping in the air, so this is not an intense gravitational field.
Locating Gravity A is no problem because it is found in the nucleus of every atom of all matter here on Earth, and all matter everywhere else in our universe. However accessing Gravity A with the naturally occurring elements found on Earth is a big problem. Actually, I’m not aware of any way of accessing the Gravity A wave using any Earth element, whether naturally occurring or synthesized, and here’s why.
We’ve already learned that Gravity A is the major force that holds together the mass that makes up protons and neutrons. This means the Gravity A wave we are trying to access is virtually inaccessible as it is located within matter, or at least the matter we have here on Earth.
The most important attribute of these heavier stable elements is that the Gravity A wave is so abundant that it actually extends past the perimeter of the atom. These heavier, stable elements literally have their own Gravity A field around them in addition to the Gravity B field that is native to all elements.
No naturally occurring atoms on Earth have enough protons and neutrons for the cumulative Gravity A wave to extend past the perimeter of the atom so you can access it. Even though the distance the Gravity A wave extends is infinitesimal, it IS accessible and has amplitude, wavelength and frequency just like any other wave in the electromagnetic spectrum. Once you can access the Gravity A wave, you can amplify it just like we amplify any other electromagnetic wave.
So, back to our power source. Inside the reactor, element 115 is bombarded with a proton that plugs into the nucleus of the 115 atom and becomes element 116 which immediately decays and releases or radiates small amounts of antimatter. The antimatter is released in a vacuum into a tuned tube that keeps it from reacting with the matter that surrounds it. It is then directed toward the gaseous matter target at the end of the tube. The matter and antimatter collide and annihilate, totally converting to energy. The heat from this reaction is converted into electrical energy in a near 100% efficient thermoelectric generator. This is a device that converts heat directly into electrical energy. Many of our satellites and space probes use thermoelectric generators, but their efficiency is very, very low.
All of these actions and reactions inside of the reactor are orchestrated perfectly like a tiny little ballet, and in this manner the reactor provides an enormous amount of power.
So, back to our original question: What is the power source that provides the power required for this type of travel? The power source is a reactor that uses element 115 as a fuel, and uses a total annihilation reaction to provide the heat which it converts to energy, making it a compact, lightweight, efficient, onboard power source.
I’ve got a couple of quick comments, on Element 115, for those of you that are interested. By virtue of the way it’s used – in the reactor – it depletes very slowly, and only 223 grams ( just under ½ pound ) of Element 115 can be utilized for a period of 20 to 30-years. Element 115 melting point is 1740 C.
I need to state here that even though I had hands-on experience with Element 115, I didn’t melt any of it down and I didn’t use any of it for twenty to thirty years to see if it depleted.
Now when a disk travels near another source of gravity, such as a planet or moon, it doesn’t use the same mode of travel that we learned about in our science lesson. When a disk is near another source of gravity, like Earth, the Gravity A wave, which propagates outward from the disk, is phase-shifted into the Gravity B wave propagating outward ( from the Earth ), creates lift. The gravity amplifiers ( of the disk ), can be focused independently, and they are pulsed and do not remain ‘on’ continuously.
When all three [ 3 ] of these amplifiers are being used for travel, they are in the delta wave configuration, and when only one [ 1 ] is being used, for travel, it is in the omicron wave configuration.
As the intensity of the gravitational field around the disk increases, the distortion of space-time around the disk also increases. And if you could see the space-time distortion, this is how it would look [ Bob Lazar draws a side-view picture of saucer hovering above ground, with field surrounding it and running straight down to the ground. Picture a disk on the end of a pole, then throw a sheet over it. ]
As you can see, as the output of the gravitational amplifiers becomes more intense, the form of space-time around the disk not only bends upward but – at maximum distortion – actually folds over into almost a ‘heart shape design around the top’ of the disk.
Now remember, this space-time distortion is taking place 360 degrees around the disk, so if you were looking at the disk from the top, the space-time distortion would be in the shape of a doughnut.
When the gravitational field around the disk is so intense, that the space-time distortion around the disk achieves maximum distortion, and is folded up into this heart shaped form, the disk cannot be seen from any angle vantage point – and for all practical purposes is invisible. All you could see would be the sky surrounding it.

Interview ( 28DEC89 ) of Bob Lazar at KVEG Radio Station ( below ):

KVEG Radio Incoming Caller: With the gravity generators running, is there thermal radiation?
Lazar: No, not at all. I was never down on the bottom ‘while’ the gravity generators were running, but the reactor itself – there’s no thermal radiation whatsoever. That was one of the really shocking things because that violates the first law of thermodynamics.
Lazar: In fact, I’m in the process of fabricating the gravity amplifier, but then I’m at a tremendous shortage for power. So yeah, I have even tried to do that stuff on my own.
Caller: Is there any electronics, as we know it, chips or transistors?
Lazar: No, nothing like that. Because, of the tremendous power involved too, there was ‘no direct connection between the gravity amplifiers and the reactor’ itself.
Caller: Are the waveguides similar to what we use with microwaves?
Lazar: Very similar.
Caller: In regard to the long-range method of travel, isn’t a ‘propulsion unit’ the wrong idea? I feel this device is creating a situation where it is diminishing or removing the localized gravitational field, and the long-distance body – that they’re heading toward – is actually ‘pulling’ the vehicle rather than it [ the vehicle ] being pushed. Am I correct in this?
Lazar: The vehicle is not being pushed. But being ‘pulled’ implies it’s being pulled by something externally; it’s pulling something else to ‘it’. ‘It’ is ‘creating the gravitational field’.
Caller: Is there any relation to the ‘monopoles’, which [ scientists ] have been looking for?
Lazar: Well, they’ve been looking for the ‘monopole magnet’, but then this [ the UFO force ] is a gravitational force.
Caller: What is the top speed of the craft?
Lazar: It’s tough to say a top speed because to say ‘speed’ you have to ‘compare distance and time’. And when you’re screwing around with time, and distorting it, you can ‘no longer judge a velocity’. They’re ‘not traveling in a linear mode’ – where they just fly and cover a certain distance in a certain time. That’s the ‘real definition of speed’. They’re ‘bending and distorting space’ and then essentially snapping it back with the craft so, the ‘distances they can travel’ are phenomenal – in ‘little or no time’. So ‘speed has little bearing’.
Caller: You’ve mentioned anti-gravity generator and anti-matter generator. Are they different?
Lazar: It’s ‘not a gravity generator’ – it’s a ‘gravity amplifier’. I get tongue-twisted all too often. The ‘anti-matter reactor provides the power’ for the craft and the basic ‘low-amplitude gravitational wave’ – ‘too low of amplitude’ to do anything – is ‘piped into the gravity amplifiers’ – found at the bottom of the craft – amplify that to an ‘extremely powerful wave’, and ‘that is what the craft travels along’. But there is ‘an anti-matter reactor’ that ‘provides the power’.
Caller: I understand there’s an antenna section in this device; what is the resonant frequency that that operates at?
Lazar: The resonant frequency of the gravity wave I ‘do know’ but I don’t know it off hand – I just cannot recall it just now.
Mark: Can you give me a ballpark, like 2,000 kilohertz?
Lazar: I really don’t remember. It’s a really odd frequency.
Mark: Is it measured in kilohertz or gigahertz or megahertz?
Lazar: I really don’t remember.
Burt: You were talking about the low- and high-speed modes and the control factors in there. Can you describe those modes and what the ship looks like each time it is going through those modes?
Lazar: The low-speed mode — and I REALLY wish I could remember what they call these, but I can’t, as I can’t remember the frequency of the wave –The low-speed mode: The craft is very vulnerable; it bobs around. And it’s sitting on a weak gravitational field, sitting on three gravity waves. And it just bounces around. And it can focus the waves behind it and keep falling forward and hobble around at low speed. The second mode: They increase the amplitude of the field, and the craft begins to lift, and it performs a ROLL maneuver: it begins to turn, roll, begins to turn over. As it begins to leave the earth’s gravitational field, they point the bottom of the craft at the DESTINATION. This is the second mode of travel, where they converge the three gravity amplifiers — FOCUS them — on a point that they want to go to. Then they bring them up to full power, and this is where the tremendous time-space distortion takes place, and that whips them right to that point.
Burt: Did you actually bench-test a unit away from the craft itself?
Lazar: The reactor, yeah.
Burt: About how large is this, and could you describe it?
Lazar: The device itself is probably a plate about 18-inches square; I said diameter before but it is square. There’s a half-sphere on top where the gravity wave is tapped off of, but that’s about the size of it.
Caller Jim ( Las Vegas, NV ): On TV [ television ], you spoke of observing a demonstration of this anti-matter gravity wave controller device. And you made a mock-up copy?
Lazar: A friend made one, yeah.
Jim: I heard you speak of bouncing golf balls off of this anti-gravity field?
Lazar: Yeah.
Jim: And also about the candle, the wax, and the flame stood still?
Lazar: Right.
Jim: And then the hole that you saw appear –
Lazar: It wasn’t a hole; it was a little disk.
Jim: Under what conditions did you see this demonstrated? Elaborate on this. And how large was the force field?
Lazar: The force field where the candle was?
Jim: The force field created by the anti-matter device.
Lazar: It was about a 20-inch radius from the surface of the sphere.
Jim: Where was this area, just above the device?
Lazar: Yeah, surrounding the sphere.
Jim: Did the sphere surround the device?
Lazar: No, the sphere sits in the center of the device. It’s a half-sphere sitting on a plate, and a field surrounds the half-sphere.
Jim: And you just place a candle in there?
Lazar: No, no, no. That was a separate demonstration. I’m just telling you from where the field extends.
Jim: Oh, that’s what I’m curious about.
Lazar: No, they tap the field off using a wave-guide, off of the sphere. And this is a completely different setup, where they had a mockup small gravity amplifier, and there were three focused into a point, and that area of focus was probably nine or ten inches in diameter.
Jim: They displaced this area or moved this area?
Lazar: No, it wasn’t displaced; it’s just where the field was generated.
Jim: And in there you put the candle?
Lazar: Right.
Jim: And that thing can actually bounce golf balls off of it?
Lazar: No, no. The golf ball thing, again, had nothing to do with that setup. The golf ball thing had something to do with just when the reactor was energized, before the wave-guide was put on or anything. We were just pushing on the field; it was being demonstrated to me; and we just bounced a golf ball off the top.

Interview Excerpts of Bob Lazar at Seminar; Rachel, Nevada ( 01MAY1993 ), below:

Question: I’m interested in a little bit more about the physics of the power generation from the development of the anti-matter to the Gravity “A” wave and the amplification and the process of generation of that and being able to fold space.
Lazar: Well, it’s… I can give you, I guess, a brief overview of essentially how that works. If you want an in-depth description, you can give me your address and I can send you a paper on it. Essentially, what the reactor does is provide electrical power and the base gravity wave to amplify, and it does that by interacting matter and antimatter, essentially. The way it does that is injecting an accelerated proton into a piece of 115. That spontaneously generates anti-hydrogen, essentially. That’s reacted in a small area. It’s a compressed gas, probably compressed atmospheric gas, and the antimatter reacting with matter produces the energy, mainly heat energy, and that is converted into electrical energy by a thermionic [ thermal ion / thermion ] generator that appeared to be 100% efficient, which is a difficult concept to believe anyway. Also, the reactor has two functions. That’s one of them; the other function is, it provides the basic gravity wave that’s amplified, and that appears at the upper sphere of the amplifier itself, and that’s tapped off with a wave-guide, similar to microwaves, and is amplified and focused, essentially.
Question: So how is the electrical energy related to the amplification of the gravitational “A” wave energy?
Lazar: The electrical energy is transmitted essentially without wires, and I related it to almost a Tesla setup. It seemed like each sub component on the craft was attuned to the frequency that the reactor was operating at, so essentially the amplifiers themselves received the electrical energy, like a Tesla coil transmits power to a fluorescent tube, and what was the rest of the question?
Question: Yeah, in other words, what is the relationship between… I think you basically answered it.
Lazar: Yeah, that’s how the amplifiers receive the power and through the wave-guide to receive the basic wave. It’s almost…It’s very, very similar to a microwave amplifier…
Question: Was the local means of propulsion the same as these across-space distances? What was the local means of propulsion?
Lazar: The local means of propulsion is essentially them balancing on a out of phase gravity wave, and it’s not as stable as you would think. When the craft took off, it wobbled to some degree. I mean a modern day Hawker Harrier or something along those lines of vertical takeoff craft is much more stable than then in the omicron [omicrom?] configuration, which is that mode of travel. The delta configuration is where they use the three amplifiers. Those are the only two methods I know about for moving the craft.
Question: When you listen to some abduction reports, whether or not people believe it or not, there seems to be a common thread of people being hit by blue beams of light….
Lazar: Any of the three gravity amplifiers could do that, could lift something off the ground, or for that matter compact it into the ground. That’s not a problem, because the craft can operate on one amplifier, in omicron mode, hovering. That would leave the other three (?) amplifiers free to do anything. So I imagine they could pick up cows or whatever else they want to do. On the craft I worked on there was absolutely no provision for anything to come in through the bottom of the craft, or anything along those lines…
Question: So what was the course of energy? How did it go from one area to another area?
Lazar: The best guess is essentially it operated like a Tesla coil does. A transmitter and essentially a receiver tuned to the transmitting frequency, receives electrical power. There again, that’s not real advanced technology. Tesla did that in the 30s, I think.
Question: You mentioned the photon earlier. Do you think that physics is taking a wrong turn by looking for exchange particles, when you’re talking about the strong force of gravity again? I’m not clear why you’re skeptical about the graviton?
Lazar: About the graviton?
Question: Every other force seems to have exchange particles connected with it.
Lazar: No, not necessarily. I mean, they make it have one, but as time goes on, that really hasn’t held true. The bottom line is, they don’t…First of all, they don’t even believe there’s a graviton anymore, so I’m not the only one. As far as exchange particles, still, though some of them like the zeta particle, maybe that’s an actual thing, but when they’re looking at transfers of energy, I think these are scapegoats for the most part. A lot of experiments that I was doing at Los Alamos essentially were along these same lines, but other exchange particles like the intermediate vector bozon, I don’t believe that thing exists. I really don’t. I think they’re grabbing at straws and just coming up with excuses.
Question: What about the small gravity, the Gravity “A”; how can you detect that one? What is the frequency of that?
Lazar: Well, the frequency that the actual reactor operates at is like 7.46 Hertz. It’s a very low frequency.
Question: That’s the frequency of Earth’s gravity, or universally, all gravity?
Lazar: That’s the frequency the reactor operates at.
Question: I can understand a reactor functioning – theoretically I can understand a reactor functioning at, say, (unintelligible word) 7.46 Hertz. There’s a wave-guide involved. I don’t buy 7.46…
Lazar: No, that’s the basic… The frequency of the gravity wave that’s produced, it has to be higher frequency, because you’re in a microwave range to follow a conduit like that.
Question: I understand from Lear’s lecture that it had a tendency to conduct on the outside also of the reactor.
Lazar: Right. Well, that’s all… this was the electric field we were talking about. The basic frequency, I think, was the way the reactor was operating. The pulses that we detected out of it were probably, instead of a straight DC power supply, it was more along the lines of a pulse, as if we were getting a burst of particles coming out: An antimatter emission, then a reaction, a pulse of energy, and that would repeat. That’s about seven and a half Hertz, something along those lines.
Question: Bob, the microwave frequency going to the wave-guide is electromagnetic, or that’s gravitational?
Lazar: They’re one in the same.
Question: I don’t understand what you mean by that.
Lazar: Gravity is… Unfortunately, physics hasn’t gotten to that part yet, but gravity essentially is part of the electromagnetic spectrum.
Question: Then what frequency is it?
Lazar: That’s something I’m reserving for myself.
Question: Something about the microwave range?
Lazar: Something about the microwave range. Well, you can sort of figure it out by the dimensions of the waveguide itself, and that’s about it.
Question: Positive energy versus regular photon?
Lazar: No, it’s not photon.
Question: Electromagnetic Energy?
Lazar: Right. I’m not trying to be secret, but this is part of the equipment that I’m working on, and I want to get it operating before…
Question: I hope we’ll find out one day.
Lazar: Absolutely.

Speech of Edgar Fouché at International UFO Congress ( Summer 1998 ), below:

 [ photo ( above ) LOCKHEED SR-71 Blackbird surveillance aircraft ( click to enlarge ) ]

I’m here to speak about government technology, special programs, and the TR-3B Flying Triangle. Thousands of sightings, of the Flying Triangle, have been reported, photographed, and investigated around the world – The USAF denies having such a vehicle. It also denies having replaced the Strategic reconnaissance spy plane – the SR-71 Blackbird. Keep this in mind as I proceed:

Astronauts Edgar Mitchell and Gordon Cooper say that new investigations are warranted in UFOs.

Edgar Mitchell, who became the sixth [ 6th ] man on the moon during the Apollo 14 mission said, “The evidence points to the fact that Roswell [ New Mexico crash of UFO ] was a real incident and that indeed an alien craft did crash and that material was recovered from that crash site.” Mitchell doesn’t say he’s seen a UFO, but he says he’s met with high-ranking military officers who admitted involvement with alien technology and hardware.

Gordon Cooper told a United Nation ( UN ) committee recently; “Every day in the USA, our radar instruments capture objects of ‘form’ and ‘composition’ unknown to us.” Cooper speculates public skepticism, toward UFOs, will shift dramatically.

Now, a little about my background:

I’ve held positions within the United States Air Force ( USAF ) that required me to have Top Secret and ‘Q’ clearances, and Top Secret Crypto access clearances.

I’ll show you pictures of some of aircraft programs I’ve worked. I’ll also show you some pictures of classified aircraft. And I’ll share with you some of the information and stories I’ve gathered through my research in developing [ my book ] Alien Rapture. In many cases I’ve been able to obtain actual details of this [ my book, “Alien Rapture – The Chosen” ] black technology.

I was born to fifth [ 5th ] generation French-Americans, and many of my relatives – for generations – have historically been involved with the government in fields of intelligence, black programs, cryptography, and classified development projects.

This is true, as far back as the French revolution, where Joseph Fouché was Prime Minister under Napoleon. He was the head of the French secret National Police Force and was a direct ancestor of mine. Joseph Fouché started and controlled the world’s first professionally organized intelligence agency with agents throughout Europe.

The CIA, the Russia KGB ( now FSB ), the UK MI-5 ( MI-6 ), Israel’s Mossad, and many other intelligence agencies have used and expanded on his methods of intelligence gathering, networking information, and political survival.

I have also worked intelligence and cryptography related programs, but because of oaths of secrecy, I will ‘not be able to share any details of this work’.

My career background spans 30-years, and since the government isn’t about to support my claims, you will see from the positions I’ve held and the Programs I worked that I was in a position to gather the information I am presenting.

Before, I gave a presentation to the International UFO Congress in Laughlin, Nevada during August [ 1998 ], I brought over 200 documents as an offer of proof to substantiate my credibility. These documents contained information on the positions and assignments I held in the U.S. Air Force and as a DOD [ U.S. Department of Defense ] contractor. They also detailed clearances I held, classified and non-classified ( DOD and military ) technical training I received ( over 4,000 hours ), and performance reviews from 1968 to 1995.

As a civilian, from 1987 to 1995, I performed as engineering program manager, site manager, and Director of Engineering for several DOD contractors.

Ken Seddington, of the International UFO Congress, Jim Courrant, a UFO investigator, and Tim Shawcross and John Purdie, of Union Pictures in London, England viewed these documents. Some of these documents are shown in “Riddle of the Skies” special, which will be on The Learning Channel next month.

With my training and experiences with intelligence equipment, special electronics, black programs, and crypto-logical areas, I received other government opportunities. I filled positions as major command liaison, headquarters manager, and DOD factory representative for TAC, SAC, ATC, and PACAF following the Viet Nam War.

Later in my career, as a manager of defense contractors, I dealt with classified ‘black programs’ developing state-of-the-art electronics, avionics, and automatic test equipment [ ATE ].

I was considered an Air Force expert with classified electronics counter-measures test equipment [ ATE ], certain crypto-logical equipment – owned by the National Security Agency – and Automatic Test Equipment [ ATE ].

I’ve worked with many of the leading military aircraft and electronics manufacturers in the U.S. At different times I participated as a key member in design, development, production, and flight operational test and evaluation in classified aircraft development programs, state-of-the-art avionics, including electronic countermeasures, satellite communications, crypto-logic support equipment.

During my military career, I was ‘hand picked’ ( Development Cadre ) for many of the Air Force newest fighter and bomber development programs. I also represented many of these programs for TAC, SAC, PACAF, and ATC.

Other research and development programs I worked as far back as the 1970s are still classified Top Secret.

My involvement with black programs, developing stealth aircraft, is classified.

I am perhaps the only person who has actually worked at the Top Secret Groom Lake Air Base, within Area 51 of the Nellis Range, and has proved that I had the position, training, and clearances to be there.

 
[ photo circa: 1974 ( above ) DOD DARPA Have Blue Project F-117 stealth fighter ( click to enlarge ) ]

This [ NOTE: ‘not photo above’ ] is a F-117 Stealth fighter being readied at Groom Air Base at night. Notice the fog engines in work for cover.

My last position for the Air Force was as a Strategic Air Command Headquarters’ Liaison.
As a Defense Contractor-Manager, I performed as an engineering program manager and site manager for DOD contractors involved in classified development, logistics support, electronic engineering, and technical data development from 1987 – 1995.

I have completely disassociated myself from the defense industry. I consider myself a writer and inventor now.

I undertook this trip to do research for my book Alien Rapture, which included a meeting with five [ 5 ] close friends who had agreed to release confidential information to me and discuss their closely guarded personal experiences.

I also interviewed other contacts that had worked classified programs or flown classified military aircraft to gather information about UFO sightings and contact.

Later, I was blessed to team-up with a great man and a great writer, Brad Steiger.
I had decided to get out of the defense industry, as I felt that fraud, waste, and abuse was rampant – both on the government and contractor sides.

Who were the five [ 5 ] friends and co-conspirators and a host of other insiders?

It started when some old friends of mine met in the spring of 1990 in Las Vegas [ Nevada ]. There were five [ 5 ] of us then; all of us had remained close following the Vietnam War. I’ve always been the networker for my DOD, military, and contractor friends so, I’m the one who set up the meeting with the five [ 5 ]:

1. The first friend, Jerald *, was a former NSA or TREAT Team member. T.R.E.A.T. stands for Tactical Reconnaissance Engineering Assessment Team. Jerald * worked for the DOE [ U.S. Department of Energy ] as a national security investigator. That was his cover, but he really worked for the NSA [ U.S. National Security Agency ]. His job required him to manage a team – to ‘watch employees’ with Top Secret and Q clearances in the mid-west, in Los Alamos, Sandia, and White Sands ( New Mexico ), and in the Nevada Test Site and Nellis Range, which includes Area 51. Area 51 is where the most classified aerospace testing in the world takes place. You may know the base as Groom Lake Air Base, Watertown, The Ranch, or Dreamland. He [ Jerald ] was found dead of a heart attack 1-year after our last meeting.

2. The second friend, Sal *, was a person who had worked directly for the NSA [ U.S. National Security Agency ] with Electronic Intelligence ( ELINT ) and became a defense contractor after his retirement.

3. The third friend, Doc *, was a former SR-71 spy plane pilot and USAF test pilot at Edwards Air Force Base [ California ].

4. The fourth friend, Dale *, and I were in the service together during the Viet Nam conflict [ war ], and I’ve known him [ Dale ] since the early 1970s. His father worked for over 20-years for the NSA [ U.S. National Security Agency ] and he [ Dale ] is the one who sent me the MJ-12 [ Majestic ] documents his father had obtained.
These documents, the New MJ-12 Charter signed by proxy during the Reagan [ Ronald Reagan ] Administration and Attachment D to the Eisenhower [ U.S. Army General Dwight D. Eisenhower ] MJ-12 briefing document, which is the Autopsy Report from Roswell [ New Mexico ], are included as attachments in my book Alien Rapture.

5. The fifth friend, Bud *, was a DOD contractor and electronics engineer. He [ Bud ] had worked on Top Secret development programs dealing with Electronic CounterMeasures [ ECM ], radar homing and warning, ECM ( Electronic CounterMeasure ) jammers, and Infra-Red [ IR ] receivers. He [ Bud ] retired as a program manager and later died of a brain tumor within 30-days after his symptoms appeared.

*All names and identifying factors have been changed.

It bothered each of us that we had experiences with unusual phenomena, extremely advanced technology, and witnessed unidentified aerial contact that had not been previously reported.
We sat at a table in a dark corner of the Silver Dollar Saloon and Casino in Las Vegas [ Nevada ], discussing our experiences and swapping knowledge.

In 1990, I had no intention of writing about programs I was involved-with due to the Secrecy Act and classification documents I had signed.

Jerald asked me if I had ever heard of the ‘Flying Triangle’.

Of course I had heard rumors of Delta shaped and bat winged shaped prototypes being tested at Groom Air Base.

He [ Jerald ] said that an early test model – of the Flying Triangle – was sighted by hundreds of people over Hudson Valley, in the mid 1980s there was a major flap in Belgium – the year [ 1989 ] before our meeting [ 1990 ] – and that thousands of people had witnessed the Triangle and F-16 chase that followed. He definitely piqued my curiosity.

Over the next 4-years, each member of the group wrote down as much information as he could remember about unusual phenomena and personal sightings.

From my close friends, came their contacts. I agreed to interview these contacts in person. I interviewed four [ 4 ] other [ LOCKHEED ] SR-71 pilots, two [ 2 ] [ LOCKHEED ] U-2 [ Dragon Lady ] pilots, a [ 1 ] TR-1 pilot, and about two dozen [ 24 ] bomber and fighter jocks [ jockeys ]. None, of the people I interviewed, wanted to be known or quoted – and wanted me to swear never to reveal their names. I have and will continue to honor their wishes.

Many were afraid of what the government would do to them for taking about Top Secret ‘Black Programs’ they were involved with, and others were just worried about losing their retirement pensions.

I’ll Share some of these secrets and unusual phenomena with you:

 
[ photo ( above ) LOCKHEED A-12 ( single and dual cockpit versions ) ]

The SR-71 was designed as a spy plane for the CIA in the 1960s and designated the A-12.

 
[ extremely rare photo circa: 1954 ( above ) LOCKHEED YF-12 Prototype ( click to enlarge ) ]
 
[ rare photo circa: 1958 ( above ) LOCKHEED A-12 ( click to enlarge ) - NOTE: USAF brand new 1958 Edsel station wagon ( blue with white top ) and Dodge Power Wagon ( blue with white top ) pick-up truck ( mid image far right ) ]

 
[ photo ( above ) LOCKHEED A-11 ( click to enlarge ) ]

The Mach 3 plus aircraft first flew in 1962 [ ? ], taking off from Groom AFB [ ? ] in Area 51.

 
[ rare photo circa: 1960 ( above ) LOCKHEED SR-71 ( click to enlarge ) ]

Later, once the Air Force operated it as a reconnaissance plane, it was designated the SR-71 BlackBird.

My friend Chuck, an SR-71 pilot, related to me an in-flight incident he experienced in the 1970s. He was returning from a reconnaissance flight, and while at an altitude of 74,000 feet at the speed of almost Mach 3, ( 3 times the speed of sound ) he noticed something flickering in his peripheral vision. Hovering over his left wing tip was a ball of dense plasma like light. It was so bright, that when he stared at it for more than a few seconds, his eyes hurt.

Chuck tried to use his UHF-HF and VHF communications sets to no avail. There was nothing but static. Repeatedly glancing briefly at the ball of light, he watched in amazement as it moved effortlessly about his aircraft.

At one point the light positioned itself a few feet in front of the large spiked cone at the air Intake Inlet. The enormous amount of air rushing into the engines should have sucked in and shredded almost anything in its path, but the light orb was mysteriously unaffected.

The light, he noted, acted in a curious manner, if something inanimate could act at all. It moved from time to time to other parts of the vehicle, staying with him until his approach to Beale AFB in California. He was in sight of the Air Base when the light swung away from his aircraft in a wide arch with ever increasing speed.

Of course, after reading his incident report, his operations commander told him not to ever speak about his experience. When Chuck related the story to me, he told me he was absolutely convinced that the ball of light was controlled by some form of intelligence. I have about two dozen [ 24 ] stories from pilots of similar in flight incidents with UFOs and plasma balls.
There have been thousands of reported sightings of plasma balls, energy filled orbs, or foo fighters as they were named during World War II.

In 1944, while fighting the Japanese and Germans, pilots started reporting strange flares and bright orange and red lights. These lights moved rapidly, were under intelligent control, and could come to a complete stop, remain stationary, and then disappear in an instant.

Foo means ‘fire’ in French. The pilots coined the term ‘foo fighters’ for the haunting glowing balls that doggedly paced their jets. Most were unnerved by radical maneuvers the foo fighters that could climb vertically, accelerate, and make high G turns at speeds far beyond any known allied aircraft.

Not far from the Royal Air Force base, MacRahanish, a triangular shaped aircraft was spotted off Western Scotland. MacRahanish has been rumored to be a base for black aircraft operations for a number of years. It’s also a NATO standby base.

RAF personnel have admitted that they have witnessed the operation of large triangular aircraft from RAF Boscombe in February 1997.

It was widely reported that a secret U.S. spy plane crash landed at Boscombe Down in 1994. It had been rumored for some time that the Triangle spotted over Belgium was based at Boscombe Down and Royal Naval Air Station ( RNAS ) Yeovilton where other sightings of the Triangle were reported.

British RAF [ Royal Air Force ] have a long history of close involvement with U.S. aerospace black programs. Key RAF officers and British scientists have been involved at Groom Air Base [ Nevada ] since 1957 and the [ LOCKHEED ] U-2 [ DragonLady ] program.

In 1995 and 1996 the National UFO Reporting Center alone received forty-three [ 43 ] reports:

11 in the State of Washington;
8 in the State of California; and,
18 from other states – from the State of Hawaii to the State of New York

Sightings, of a Triangular aircraft.

A few years ago The British Magazine, UFO Reality, published this information:

“A top BBC [ British Broadcast Corporation ] executive let slip recently that there is a D-Notice on media reporting of the so-called ‘Black Triangle. The executive is the former producer of a very popular BBC science program. He told one of our team that the black Triangle ‘craft’ – first witnessed by the hundreds in the Hudson Valley region of the U.S. in the mid-1980s, then by the thousands in Belgium in 1989 – 1990, and more in Britain – has been ‘heavily D-Noticed’ by the government. For this reason the BBC will NOT be reporting on the enigmatic craft, no matter how many witness reports there are. According to this producer, the government’s restrictive notice on reporting the Triangle, was authorized under secrecy laws, in order to protect secret new military projects.”

From 1973 through 1976, I was home based out of Edwards AFB. It is near Lancaster, California and even nearer to the San Andrus [ mountain range zone ] fault [ plate tectonic earthquake demarcation line ].

Edwards [ AFB ] has a long history with secret technology and experimental aircraft. The YB-49 was flown in 1948 at Edwards AFB which looks a lot like the B-2 Stealth Bomber.

[ photo ( above ) LOCKHEED XB-70 Valkyrie with 4 PRATT & WHITNEY engines ( click to enlarge ) ]

The XB-70 flown in 1964 looks a lot like the still Top Secret SR-75 that, the Air Force says doesn’t exist.

Edwards A.F.B. is the home of the U.S. Air Force Test Pilot School and is responsible for Flight Operational Test and Evaluation [ FOTE ] of the Air Force’s newest aircraft.

Edwards [ AFB ] hosts a number of tenant organizations, from NASA to the Jet Propulsion Laboratory [ Pasadena, California ] facility.

Edwards [ AFB ] developed various versions of the flying wing [ shaped aircraft ] from the B-35, YB-49, B-2 [ Spirit ], and exotic aircraft sometimes ahead of their time – like the XB-70, F-117, and YF-22.

I worked with the F-111 swing-wing bomber, the F-15 air superiority fighter, the F-16 fighter, the A-10 [ Warthog ] close air support attack aircraft, and B-1 stealth bomber. I was involved with these and other classified development programs, when they were just a gleam in some pilot trainee’s eyes.

One night – in the mid 1970s – a long time friend of mine and I were standing on top of the Fairchild A-10 [ Wart Hog ] hanger at Edwards AFB in southern California. It was about 02:00 a.m. and a clear night with millions of stars visible to the naked eye. I noticed a group of stars that seemed to be shifting in color. I pointed out to my friend that the three [ 3 ] bright stars in triangular formation were not part of the big dipper.

We watched as the strobing stars shifted from bright blue to a red yellow color. After a period of about 20-minutes we could tell the objects probably weren’t stars because they were getting larger. This was somewhat unnerving.

* It was further unnerving when ‘the space in-between the enlarging lights began blocking out the stars in the background’. [ See, e.g. beginning of this report, i.e. Victor Valley northeast area of California alongside Interstate 15 ( further above ) ]

We decided it probably was a Top Secret Air Force vehicle of some type, still we weren’t sure.
The vehicle had gone from, half the size of the big dipper, to twice its size in under a half hour [ 30-minutes ]  and had moved from the west to the east towards the base.

About the time we could make out a silhouette or outline of the triangular vehicle, the lights – or possibly exhausts – flared brighter and vanished from the sky in an instant.

This experience wasn’t my first sighting, but it was one of the few where I had a witness.
In the summer of 1976, I relocated to Nellis Air Force Base – north of Las Vegas. I spent the next 3-1/2 years there. I worked primarily with the F-15, electronics countermeasures, and Automatic Test Equipment [ ATE ]. I had heard rumors of airbases located in the desert, at places called:

Mercury;
Indian Springs; and,
Others, that didn’t even have names.

Before the collapse of the [ Russia ] USSR ( CCCP ), no one talked about their classified work experience, nor did anyone repeat rumors of Top Secret technology and aircraft.

Most of us who had Top Secret clearances never even told our wives what we were doing, and where we were going – when on these type projects. I once spent 6-months, in Viet Nam, while my ex-wife thought I was attending a classified technical school in Colorado.

The military, in a court of law, actually denied the existence of a classified Air Force Base inside the Nellis Range out in the Nevada Desert. Don’t you know, the Plaintiffs – who had worked at Groom – and their lawyer was surprised to hear this, but that’s another story.

I was one of the few personnel at Nellis who had a Top Secret clearance with Crypto access.
I was certified to work on Mode 4 IFF, ( an aircraft system which responded to classified, encrypted codes ). I was also certified to work on other Crypto equipment that I cannot discuss.

Due to a combination of coincidences, and my technical experience, I was requested to temporary assignment at a place that had no name. My commander told me I was to report to an office on the base, and he didn’t have a clue where I was going or what I was going to be working on. And let me tell you, he wasn’t too happy about being left in the dark.

I left one Monday morning long before sunrise. It was 4:30 AM when I boarded a dark blue Air Force bus with all of the windows blacked out. There were 28 other people on the bus, not including the 2 security policemen holding M-16 automatic weapons and the bus driver. We were each told when boarding, “Do not speak on this bus unless you are spoken too.” Not one of us uttered a word. Believe me. There is nothing that can inspire compliance like an M-16 sticking in your face, I assure you!

The bus drove through the desert, this much I know from the poor air-conditioning and the amount of fine dust that came through every crack in the old vehicle for several hours, and it was soon obvious where I was.

In the 1950s, the U.S. government started building the super secret Groom Lake facilities – for the CIA U-2 ( DragonLady ), a high-altitude global surveillance aircraft. Acquired in 1951 - with $300,000,000 million in seed money from the CIA - the site was called S-4, the name Area 51 and Site 4 insiders call the Papoose Lake, Nevada facilities south of Groom Lake, Nevada. Area 51, is located in the north central part of the Nellis Air Force Base ( AFB ) Range designated Area 51. Construction of facilities within the Nellis Range continues even to today.

The SR-71 Blackbird surveillance aircraft, TR-1, F-117 stealth fighter, B-2 bomber, TR-3A Manta, and TR-3B Astra or flying triangle were tested at Groom Lake, Nevada. Under certain circumstances had persons sighted these crafts they would have been looked upon perhaps, as unidentified flying object ( UFO ) extraterrestrial spacecraft.

SR-75, replaced the SR-71 Blackbird.

SR-74 SCRAMP is a drone that appears to ride under the SR-75.

TR-3B Flying Triangle are operated there – as well as other Top Secret prototype and operational aerospace vehicles.

Many of these aircraft have been misidentified as UFOs

When we reached Groom Lake, the bus pulled into a hanger and they shut the doors. The security personnel checked me in – while other security personnel dispatched the others to their places of work. I was given a pair of heavy glasses to wear, which can only be described as looking like welder’s goggles. The lenses were thick, and the sides of the goggles were covered to obliterate my peripheral vision. Once I had these goggles on I could only see about 30-feet in front of me. Anything beyond that distance became increasingly blurred. If an M1 Tank barrel had been pointed at me, from about 50-feet away, I would not have seen it. It was very disconcerting to have to wear those glasses.

The whole time I was there, some 10-days consecutive, followed by several follow-up visits, the routine was the same. Leave, Nellis before sunrise, and return home – from Nellis – after dark every day.

Only once did I get a chance to see the whole base, and that was when I was flown up – from Nellis – in a helicopter to Groom Lake for emergency repairs of their crypto test equipment.
For those stationed at Groom Lake, or commuting there daily – with flight schedules posted for classified flights – everyone ‘not cleared for that particular program and flight’ must be off the ramp – inside 30-minutes – prior to the scheduled operation.

A couple of thousand personnel are flown into Area 51 daily, from McCarran Airport in Las Vegas, Nevada and – from Edwards AFB in California – on contractor aircraft. Several hundred commute from Tonopah and Central Nevada via the north entrance near Rachel, Nevada. Other commuters use its [ Area 51 ] south entrance via Mercury, Nevada or Indian Springs, Nevada west of Las Vegas, Nevada.

While at Groom Lake I made contacts and met people from other programs. Over time, a few became friends and we exchanged stories.

On my 3rd day on the job at Groom Lake, I had to remove a module from a multi-bay piece of satellite communications equipment used to support certain special mission aircraft. I noticed while inside the bay checking out the wiring that it contained a sealed unit about the size of a large briefcase. It had a National Security Agency ID plate on it. The nomenclature on the nameplate was, Direct Orbital Communication Interface Link Emitter [ DOCILE ]. I thought this was strange, as the unit was part of a digital communications link used solely to communicate with classified Air Force vehicles. I was unaware – at the time – of any military orbital missions not related to NASA. Remember, this was in the late 1970s – the shuttle didn’t fly until 1981.I disconnected the unit, and – out of curiosity – I removed the rear access cover. To my amazement, there were some half-dozen [ 6 ] large hybrid integrated circuit [ IC processor ] chips inside. The largest chip had over 500 hair-thin leads attached and was approximately the size of a Zippo lighter. The ‘paper inspection stamp’ on the chip was dated 1975.

In 1975, the most advanced processor speeds – on the most classified projects – were equivalent to an IBM 8088 which ran at 4,000,000 million cycles per second, but this unit had a processor speed of 1,000,000,000 billion cycles per second.

It wasn’t until more than a dozen [ 12 ] years had passed before I saw comparable technology with integrated circuit chips, but ‘then’ [ 1975 ] it was at a Top Secret avionics development project at the ITT company.

In the mess hall at Groom Lake, I heard words like:

Lorentz Forces;
Pulse Detonation;
Cyclotron Radiation;
Quantum Flux Transduction Field Generators;
Quasi-Crystal Energy Lens; and,
EPR Quantum Receivers.

I was told ‘quasi-crystals’ were the key to a whole new field of propulsion and communication technologies.

To this day, I’d be hard pressed to explain to you the unique electrical, optical and physical properties of Quasi-Crystals and why so much of the research is classified.

Even the unclassified research [ on quasi crystals ] is funded by agencies like the Department of Energy [ DOE ] and the Department of Defense [ DOD ].

Why is the U.S. Department of Energy and Ames Laboratory so vigorously pursuing research with Quasi-Crystals?

What is the DOE new Initiative in Surface and Interface Properties of Quasi-crystals?

“Our goal is to understand, and facilitate exploitation of, the special properties of Quasi-crystals. These properties include ( but are not limited to ) low thermal and electrical conductivity, high-hardness, low friction, and good oxidation resistance.” That’s the ‘unclassified’ part.

What are Quasi-Crystals?

In 1984, a paper was published, which marked the discovery of quasi crystals, two ( 2 ) distinctly different metallic crystals joined symmetrically together.

[ NOTE: See, e.g. Project CARET ( 1984 ), at: http://upintelligence.wordpress.com/2010/10/23/secret-extraterrestrial-information-technologies/ ]

By 1986, several Top Secret advanced studies were going on – funded by DARPA – with leading scientists already working in the field.

In classic crystallography, a crystal is defined as a three dimensional ( 3-D ) periodic arrangement of atoms with translational periodicity along three ( 3 ) principal axis’s.

Since Quasi-crystals ‘lose periodicity’ in at least one [ 1 ] dimension, it is not possible to describe them in 3D-space as easily as normal crystal structures. Thus, it becomes more difficult to find mathematical formulae for interpretation and analysis of diffraction data.

After the official release for the discovery of Quasi-crystals in 1984, a close resemblance was noted between icosahedra quasi-crystals and 3-D Penrose patterning.

Before quasi-crystals were discovered, in 1984, British mathematician Roger Penrose devised a way to cover a plane in a non-periodic fashion using two ( 2 ) different types of tiles arranged in a way they obey certain rule match-ups of rhombohedrens [ rhombohedrans ] – instead of the rhombi [ rhombae ] – that later became known as 3D-Penrose Tiling.

12-years later, ‘Penrose Tiling’ became the prototype of very powerful models explaining structures within Quasi-crystals discovered in rapidly quenched metallic alloys.

14-years of quasi-crystal research, established the existence of a wealth of stable and meta-stable quasi-crystals with 5, 8, 10, and 12 fold symmetry with strange ‘structures’ and interesting ‘properties’. New ‘tools had to be developed for – study and description – of these extraordinary materials.

[ NOTE: See, e.g. Project CARET ( 1984 ), at: http://upintelligence.wordpress.com/2010/10/23/secret-extraterrestrial-information-technologies/ ]

I’ve discovered classified research showing quasi-crystals as promising candidates for high-energy storage materials, metal matrix components, thermal barriers, exotic coatings, infrared sensors, high-energy laser applications and electromagnetics. Some high strength alloy surgical tools are already on the market.

One of the stories I was told more than once was that one of the crystal pairs used in the propulsion of the Roswell crash was a Hydrogen Crystal. Until recently, creating a hydrogen crystal was beyond the reach of our scientific capabilities. That has now changed. In one Top Secret Black Program, under the DOE, a method to produce hydrogen crystals was discovered, and then manufacturing began in 1994.

The lattice of hydrogen quasi-crystals, and another material not named, formed the basis for the plasma shield propulsion of the Roswell [ New Mexico, USA UFO crash ] craft and was an integral part of the bio-chemically engineered vehicle.

A myriad of advanced crystallography – undreamed-of by scientists – were discovered by the scientists and engineers who evaluated, analyzed, and attempted to reverse-engineer the technology presented with the Roswell vehicle and eight [ 8 ] more vehicles which have crashed since then.

I wrote down everything I saw, heard and touched in my log – every night before going to bed.
By the way, the food at the Groom Lake mess hall was excellent, but what would you expect – there was no cable TV, no alcohol and no women. I guess they figured they’d better do something right.

Later, while back at the base, my routine went on as normal – as did my part-time job that summer at the Silver Dollar Salon [ Las Vegas, Nevada ].

My NSA friend, Jerald, managed a team that investigated and ‘watched’ those with highly classified jobs at the Nevada Test Site and the Nellis Range – among other highly classified facilities – happened to show up.

I met Jerald in 1976 when I was part of a team that moved the F-15 operation from Edwards AFB to Nellis AFB and set up the Joint NAV – AIR AIM – VAL / ACE – VAL program.

He was checking up on a guy who had a drinking problem who worked at the Nevada Test Site ( S-4 ) where they set off underground atomic explosions.

He [ Jerald ] happened to mention a vehicle that could be boosted into orbit and return and land in the Nevada desert. This was during the late 1970s. It was an Unmanned Reconnaissance Vehicle ( URV ) – launched from a B-52 bomber – and used booster rockets to place it in temporary low earth orbit ( LEO ) for taking high-altitude reconnaissance photographs. I thought he was feeding me a line of bull. Then he said, “This vehicle is remote-piloted ( unmanned ) with communications via the DOCILE system at Groom.”

I’m not usually too slow, but it didn’t hit me until he repeated, “You know, the Direct Orbital Code Interface Link Emitter ( DOCILE ).” Bingo, the light bulb went on, I had seen – at Groom Lake [ Nevada ] a part of the DOCILE equipment – the NSA briefcase sized unit with the large chips.

These are old pictures of the Virtual Reality Laboratory ( VRL ) at Brooks Air Force Base ( BAFB ) where the software – to remotely fly exotic aircraft – was developed.

Let me get back to the development of [ my book ] Alien Rapture – The Chosen.

After I agreed to write my co-conspirator’s story, I talked to several military Judge Adjutant General ( JAG ) lawyers whom were told I wanted to write about some of my experiences in the military and that I had been on many classified projects. I was told, I had to write my story as ‘fiction’, which I have.

I was told, I couldn’t name any real individuals with clearances or covers, or use their working names, which I haven’t.

I was also told, I couldn’t discuss any secrets of programs I had been personally assigned to, which I have ‘not done’ and ‘will never do’.

Then I was told so long as I did that I could damn well write anything I wanted to. Of course I did ‘not’ tell them that I was going to write about the government conspiracy to cover-up UFO contact and reverse engineering of alien technology. Or, that I was interviewing pilots who flew classified ‘air craft’, plus others whom had worked Black Programs.

In the summer of 1992, we again met in Las Vegas, Nevada. I had compiled my notes from our first meeting, my interviews, and input that five ( 5 ) friends had passed on to me, of whom each reached out to ‘their friends and contacts’ uncovering even more information.

We agreed I was the only one who could get away with writing about our experiences, since I was planning on getting out of the D.O.D. ( Department of Defense ) industry.

My friends for the most part, were still connected.

Bud, one of my co-conspirators and close friends, informed me he had a cancerous tumor and was going through some severe depression. He was dead 30-days later. It was a real blow to us.
We lost Jerrold, 1-year before, due to his heart attack.

Of the remaining three ( 3 ) friends, Sal dropped off of the face of the earth and none of his – nor my contacts – have been able to locate him for 2-years now. Sal was extremely paranoid about the two ( 2 ) deaths ( of Bud and Jerrold ), and had second thoughts about the book. Sal said he was going to move and didn’t know when or if he would contact me next. I like to think of him sipping a tropical drink on some Pacific island.

Let me talk about my friend Doc, who has a theory that UFOs were drawn-to like fast Aircraft. SR-71 pilot, Doc, whom I knew well, was stationed at Kadena AFB ( KAFB ) where they were located on the SAC ( Strategic Air Command ) side of the base during 1973.

While flying back across the South China Sea, from a reconnaissance mission, SR-71 pilot ( Doc ) encountered a shadow over his cockpit. Doc said his avionics systems went totally haywire, and he felt the aircraft nose down slightly, which can be dangerous at 2,000 miles per hour ( 35 miles per minute ). When the SR-71 pilot looked up, Doc was so startled that he almost panicked and immediately made an evasive maneuver to the right and down – one of many maneuvers made if an approaching missile is detected.

Doc said the object was so big that it totally blocked out the sun. His estimate was that it was 250-feet to 300-feet across, oval shaped and appeared bright blue-grey in color, however Doc wasn’t sure because it also had a shimmering halo of energy surrounding the vehicle.

About 3-minutes later, and some thousands of feet lower, the vehicle reappeared to the side of his left wing tip. He tried his UHF radio and all he could pick up was a deep electrical hum. He abandoned his attempts to use his radio, as his immediate survival was more important.

For the next 10-minutes, the large oval vehicle moved from his left wing tip to the rear of the SR-71 and then to his right wing tip. The movement from the left, to the rear, to the right wing tip took about 2-minutes, and then it reversed the movement. During the UFO’s last swing to the rear of his SR-71 his aircraft started buffeting wildly, which is terrifying at Mach 3, then it stopped after about 15-seconds, and then he never saw it again.

Doc said he heard a sound in his head, ‘like a swarm of bees in my brain,’ as he described it.
When Doc returned from the mission he immediately went to his debriefing. The minute he mentioned the incident with the Unidentified Aerospace Vehicle ( UAV ) to his commander, he was pulled away from the debriefing and taken to his commander’s office. His commander, a colonel, filled out an incident report, in detail, and then told Doc not to mention the incident to anyone or he would be subject to severe and speedy penalty under military regulations.

Doc told me he knew of no single other SR-71 pilot or astronaut who hadn’t had a close encounter or a UFO sighting. Doc felt none would ever go on record with their experiences because of fear of retaliation from the U.S. Department of Defense ( DOD ) and loss of their retirement pay and benefits for breaking the U.S. oath of Secrets.

During the 9-years after this in-flight incident, Doc related that a few of his trusted friends related similar incidents, with the same type of vehicles, or glowing orbs of dense light, dancing around their SR-71.

Then Doc told me another story about his friend Dave, another SR-71 Blackbird pilot, who – while drunk on Sake in Japan – told him in whispers that he hadn’t been a drinker until he made a reconnaissance flight over the Eastern border of Russia 6-months earlier when Dave returned delirious and semi-conscious.

Dave’s SR-71 crew had to pull him out of the cockpit. The Flight Surgeon attributed his symptoms to loss of oxygen. Dave didn’t share ( with U.S. Air Force base physicians ) his nightmares, for fear the Flight Surgeon would ground him and possibly lose his flying status, however under the influence of alcohol – in a quiet bar – with a trusted fellow SR-71 blackbird pilot ( Doc ) friend, Dave opened up.

Dave tearfully related – in an emotional story – having frequent nightmares that something had gotten to him during his flight over Russia. For Dave, what made matters worse was he had absolutely no memory of the flight from the time he lifted off from Osun Air Base ( Korea ) until the day after he returned and found himself in the Naval Regional Hospital in Okinawa, Japan.

I managed to track down Dave, who lives in Southern California, who confirmed off-the-record the incident relayed by Doc to me was true. Dave said he was actually happy someone was writing about stories of contact and sightings by military pilots, and was sure he had some type of contact with a UFO.

One day, while still at Nellis Air Force Base test range S-4, we were informed there was an F-15 that crashed on the Nellis Range, where Area 51 is located. The F-15 crash happened in 1977. A Lieutenant Colonel and Doc Walters, the Hospital Commander, actually flew into the side of a mountain while doing a routine Functional Check Flight.

A sergeant, who worked for me, recovered the F-15 Heads-Up Display film canister while he had earlier been assigned to the Accident Investigation Team. He told me that a guy ( in a dark jump suit ), who was out of Washington D.C. personally took that film canister away from him – unusual because everything else was picked up and logged, first, then taken back to the assigned hanger for analysis – in-addition to a ‘prototype video camera’ ( also on the aircraft ) and flight data recorder; all handed over to the guy from Washington, D.C.

One night a couple of weeks after the crash, my U.S. National Security Agency ( NSA ) friend, Jerald ( Gerald ? Jerrold ? ) relayed to me – at the Silver Dollar Saloon ( Las Vegas, Nevada ) – that the aforementioned Lieutenant Colonel radioed the Nellis Tower that he had an ‘extremely large thing’ hovering his aircraft and was experiencing loss of flight systems. His communications went dead and a few seconds later his aircraft exploded into the side of a mountain-top.

Jerald, who was the most ‘connected’ person I’ve ever known, told me viewing the ‘video’ showed some type of oval vehicle – of tremendous size – was so close to the F-15 its camera appeared to have gone out of focus.

When Doc and the Lieutenant Colonel ejected, the UFO was still above them, their bodies were torn to shreds. Officially, it was determined – as always the case – that ‘pilot error’ caused the perfectly functional aircraft – in clear airspace with maximum visibility – to crash.

Nevada calls itself the silver state, the battle-born state, and the sagebrush state. A more appropriate motto would be, the conspiracy state.

Of the 111,000 square miles of land in Nevada, over 80% is controlled by the federal government – the highest percentage of any state in the U.S. If it were not for the gaming industry in Nevada, the federal government would be the largest employer in the State of Nevada, with 18,000 federal and military personnel and another 20,000 government contractors and suppliers.

The Nevada Test Site, Nellis Air Force Base and Range [ Nevada ], Fallon Naval Air Station [ Nevada ], the Tonopah Range, and the aerospace industry eat-up a lot of U.S. tax dollars.

The Nevada Test Site and the Nellis Range have myriad secrets yet to be revealed, including a super secret laboratory named DARC, part of the Defense Advanced Research Center ( DARC ).

DARC is located, inside the Nellis Range, 10 stories underground.

DARC was built in the 1980s with SDI ( Strategic Defense Initiative ) money.

DARC is next to a mountain – near Papoose Lake, south of Groom Lake, Nevada – where the TR-3Bs ( TIER III B ) are stored in an aircraft hanger built into a side of a mountain near DARC. The Nellis Range covers more than 3,500,000 million acres.

EG&G, a government contractor, provides classified research and development services for the military and government, and supplies technical and scientific support for nuclear testing and energy research and development programs.

EG&G provided large diameter drilling, mining and excavation for DARC underground and mountainside facilities.

EG&G built these DARC hidden bunkers, mountain hangers and vast underground facilities at Groom Lake, Papoose Lake, and Mercury for the government – facilities and observations posts well camouflaged inside the Nevada Test Site and the Nellis Range.

Starting in 1971 and continuing through 1975, a massive amount of excavation took place at the Groom Lake facility and Papoose Lake facility where most subsequent construction also took place underground.

In 1972, EG&G was granted an ‘indefinite contract’ called “Project Red-Light” to support the U.S. Department of Energy ( DOE ) and the military. This contract gave EG&G responsibility to assist in the recovery of nuclear materials in cases of mishaps and to provide aerial and ground security for highly classified government and military sites.

My sources say DOE and NSA are primary responsibles, to the MJ-12 committee, for reacting to UFO sightings and recovery of UFO artifacts in cases of crash.

So what’s going on more recently, you may ask? Let’s talk about the newest secrets and rumors:

 
[ photo ( above ) AVRO VZ-9 AeroCar ( 1957 BELL Laboratory ( Canada ) contractor for CIA ) ]

The Hillary platform, AVRO saucer and NORTHROP sections where aerospace vehicles with advance technology was developed and tested – each emulated some characteristic of UFOs as described by the late Dr. Paul Hill, a NASA UFO investigator. Hill’s posthumously published book, Unconventional Flying Objects, discusses UFO technology extensively. If you have not read this illustrious tome, I suggest you do so.

Newly unclassified documents show that AVRO [ Canada ] built and tested a number of saucers – at Area 51 in Nevada  [ USA ] – contrary to DOD lies that the program was canceled because it failed to meet expectations.
LOCKHEED Advanced Developmental Projects Division ( ADPD ) – also known as the “Skunk Works” – developed the A-12 – for the U.S. Central Intelligence Agency ( CIA ) – and a later version, the SR-71 for the USAF, in the early 1960s.

30-years later, the SR-71 was still breaking world speed records. The sleek matte-black stiletto shaped spy plane SR-71 Blackbird – traveling 2,000 miles in 1-hour 4-minutes ( including multiple orbits, touch-down and take-off ) – broke the world air speed record from Los Angeles, California to Washington, D.C. on its retirement flight in 1990.

Area 51 ( Groom Lake Air Base Nevada facilities ) has a 6-mile long runway, the longest in the United States where U.S. Department of Defense ( DOD ) and CIA most exotic aerospace vehicles are tested and modified. Area 51 is a place where curious outsiders circulate rumors about aliens and extra-terrestrial technology being utilized to accelerate the various programs at Area 51.

Why a 6-mile long runway? You need a runway this long if the minimum, or stall speed, of an aircraft is a very high speed. Aircraft ( without wings ), like wedge shaped lifting bodies or those with 75 degree swept back wings, have very high stall speeds, and while they launch-lift very fast, they land even faster.

My sources estimate that up to 35% of SDI ( Strategic Defense Initiative – “Star Wars” ) funding was siphoned-off to provide primary expenditures for the U.S. Air Force most secret ‘Black Program’, begun in 1982, the AURORA Program.

AURORA, the Program, ‘is’ the ‘code name’ of the ‘ongoing Program’ to have advanced aerospace vehicles built and tested.

AURORA, contrary to popular belief, is ‘not’ the name of an individual aircraft.

AURORA Program is the namesake of “aurora borealis” – excited gas in the upper atmosphere.
As early as 1992 the Air Force had already made contingency plans to move some of it’s aircraft out of Groom Air Base ( Area 51 ) where the public eye was on the base and they ( government officials ) did ‘not’ like that one bit.

Everything, needing a long runway, like the SR-75 was removed by early 1992 to other bases in Utah, Colorado, Alaska, Greenland, Korea, Diego Garcia, and remote islands in the Pacific.

Short take-off and landing vehicles ( STOL ), especially the bat wing TR-3A ( TIER III A ) Manta and TR-3B ( TIER III B ) Astra – the ‘Flying Triangle’ – were relocated to Papoose Lake, Nevada ( USA ) in the southern part of the Nellis Air Force Base ( AFB ) Test Range Site called Area S-4.
Other than the SR-75 – still being dispersed to other locations – more research and development ( R&D ) and flight operational test and evaluation continues in Area 51, more-so now than ever before.

For the last few years high-tech buffs speculated that at least one ( 1 ) new and exotic aerospace vehicle existed, the SR-75 – first operational AURORA Program vehicle that went operational in 1989, 2-years ( 1987 ) ‘after’ flight testing and modifications were complete.

SR-75 is a hypersonic strategic reconnaissance ( SRV ) spy plane called the Penetrator, a mother ship, that I will explain shortly.

Hypersonic speeds start at approximately Mach 5.

SR-75 replaced the SR-71 spy plane, retired in 1990 by the U.S. Air Force that said, “there is no replacement, all we really need is our spy satellites to do the job.” Hmm?

The DOD, upon analysis of Desert Storm, admitted satellites ( alone ) could not provide the necessary quick response real-time reconnaissance information needed by various military agencies. Yet they have repeatedly fought some U.S. Congressional efforts to bring back the SR-71. Why? The answer should be obvious.

SR-75, is better capable of global positioning in less than 3-hours, equipped with multi-spectral sensors ( optical, radar, infrared, and laser ) collecting images, electronics intelligence ( ELINT ), signals intelligence ( SIGINT ), illuminating ( lighting-up via laser ) targets, and more.

SR-75, far exceeds classified military speed and altitude records set by predecessor SR-71 flight records – still classified Mach 3.3+ ( confidently add another 3 to 4 Mach + ) with ceiling altitudes of ( at least ) 85,000 feet.

SR-75, attained altitudes of over 120,000 feet and speeds exceeding Mach-5 ( 5 times faster than the speed of sound ) – equating to more than 3,300 miles per hour.

SR-75, from take-off to landing, can make the round trip from central Nevada to Northeast Russia and back in under 3-hours.

SR-75, is 162-feet long and has a wing span of 98-feet.

SR-75, fuselage begins at 10-feet above ground.

SR-75, carries a flight crew of three ( 3 ), i.e. pilot, reconnaissance officer and launch control officer, the latter of whom doubles as the SR-75 Penetrator electronics warfare ( EW ) officer.
Two ( 2 ) methane and LOX fueled high bypass turbo-ramjet ( combined cycle ) engines – housed under each wing – where bays run 40-feet thereunder, terminating at the trailing edge of the wing.

SR-75 Penetrator Pulse Wave Detonation engines ( 2 ) push speeds above Mach 5 – now reported Mach 7+ or 4,500-mph ( miles per hour ) with now new engine modifications.
Although this plane has been sighted on numerous occasions, picked up on military radar, the pulse wave detonation contrail has been seen, but the Air Force vehemently denies its existence.

SR-75 large Pulse Wave Detonation engine bay inlets ( located under each wing of the black mother ship – hang downward 7-feet under the wings ) – are 12-feet wide.

SR-71 Blackbird, SR-75 Penetrator ( black mothership ), and its SR-74 daughter ship SR-74 ( Scramp ) were all built by LOCKHEED Advanced Development Company ( Skunk-Works ).

SR-74 Scramp, daughtership of the SR-75, is a ‘drone’ launched from ‘under’ the SR-75 black mothership fuselage.

SR-74 Scramp, after launch, utilizes a supersonic combustion ram-jet engine ( Scramjet ).

Jerald witnessed the flight of the big black Air Force SR-75 carrying the little unmanned SR-74 while inside Area 51 where it was initially positioned piggyback ( on its upper raised platform ) atop the SR-75 Penetrator.

[ photo ( above ) LOCKHEED YF-12-A / SR-71 Blackbird drone: D-21 ( drone ) ( click to enlarge ) ]

Remember, the SR-74 Scramp can ‘not’ launch itself from the ground.

SR-75 talk, was heard by me, as far back as the late 1970s when I was at Groom [ Groom Lake ], and I’ve 2 additional friends who saw the SR-75 at Groom Lake, Nevada.

SR-74 Scramp, from its SR-75 mother ship, can only launch at an altitude above 100,000-feet + from where it can then attain orbital altitudes over 800,000-feet ( 151-miles + ).

The U.S. Air Force SR-74 Scramp is for launching small highly classified ‘ferret satellites’ for the U.S. National Security Agency ( NSA ). SR-74 Scramp, can launch at least two ( 2 ) 1,000-pound satellites measuring 6-feet by 5-feet.

SR-74 Scramp is roughly the equivalent size and weight of a F-16 fighter.

SR-74, can easily attain speeds of Mach 15, or a little less than 10,000 miles per hour. NASA Space Shuttle is ‘technologically antique’ by comparison – taxpayer joke.

If you think these rumors are far-fetched, look at the YB-49 and XB-70 flown in 1948 and 1964 respectively, then look at the SR-75 that has been spotted numerous times.

Some say, “The government cannot keep a secret,” wrong statement if some think the government can’t.

There are new rumors that the U.S. placed two ( 2 ) new vehicles in permanent orbit. One of these, being the Space Orbital Nuclear – Service Intercept Vehicle ( SON-SIV ) code name LOCUST.

The SR-74 SCRAMP and the TR-3B [ TIER III B ] can deliver Spare Replacement Units ( SRU ), service fuels, fluids and chemicals to the SON-SIV.

SON-SIV robotic uses those deliverables to service, calibrate, repair and replace parts on the newer NSA, CIA and NRO ( National Reconnaissance Office ) satellites built to be maintained ‘in space’.

Finally, I’ve saved the best for last. The Operational model of the TR-3B [ TIER III B ].

The early information I gathered from interviewing my contacts and their closest friends who worked black programs resulted in the basic specifications of the TR-3B [ TIER III B ] Flying Triangle. I had this simple drawing by late 1990.

On the night of March 30, 1990 a Captain of the Belgium ( Belgique ) National Police decided to pursue incoming reports about a ‘triangular’ shape UFO. Two ( 2 ) radar installations, one a NATO defense group and the other a Belgium ( Belgique ) civilian and military radar verified the triangle UFO.

Excellent atmospheric conditions prevailed, and there was no possibility of false echoes due to temperature inversions. At 5 AM in the morning, 2 dispatched F-16 fighters spotted the Triangle on their radar screens that had locked onto the target.

Six seconds later the object speeded up from an initial velocity of 280 kilometers per hour to 1,800 kilometers per hour; at the same time descending from an altitude of 3,000 meters to 1,700 meters, then down to 200-meters, causing the F-16 radars to lose lock-on. This maneuver happened all in a matter of 1-second. The 40 G acceleration of the Triangle was some 32 gravitational forces higher than what a human pilot can stand.

Contrary to normal aeronautical expectations, no sonic boom was heard. This phenomenal game of hide and seek was observed by twenty [ 20 ] Belgium National Policemen and hundreds of other witnesses who all saw the Triangular vehicle and the F-16 fighters. The chase was repeated twice more during the next hour.

Belgians have made all information of this event public, unlike our U.S. government that only admits nothing and denies everything to do with UFOs – even when some are ours.

 
[ photo ( above ) another Triangle craft believed over Turkey enroute to Iraq ( click to enlarge ) ]

The TR-3B original photo was taken with a digital camera carried aboard, a special black operations C-130 cargo plane, by a U.S. Air Force Special Operations sergeant who took the picture from aboard the C-130 flying mission support for the TR-3B.

I’ve seen this picture personally and have interviewed several people who worked on the program. I’m sure of my facts and specifications.

You can see for yourselves, that from the Belgium pictures, a computer generated software composite rendition – resulting from the Europe sightings, plus my original schematic – taken from interviews – that this ‘is an accurate rendition’ of the TR-3 [ TIER III ].

From the ‘original digital photograph’ of the TR-3B, a ‘computer graphic enhanced representation’ – made using 3D graphic rendered software – hangs on the wall inside a ‘black vault’ at the AURORA Program Office. I am not at liberty to divulge further details about the digital picture except to say a friend took a great career risk taking it and showing it to me.

We have used these highly accurate computer graphic pictures of the Prototype and Operational models of the TR-3B to get further verification of their accuracy. You will not get a clearer picture of what the Flying Triangles are until one lands amidst ‘public domain’ and is captured by CNN or other news media.

Jerald said he would never forget the sight of the alien looking TR-3B based at Papoose Lake, Nevada where the pitch black triangular shaped craft was rarely mentioned – and then only in hushed whispers – at the Groom Lake facility where he worked.

TR3B [ TIER 3 B ] flew over the Groom Lake runway in complete silence, and magically stopped above Area S-4 where t hovered ( silently for about 10-minutes ) silently in the same position before gently settling vertically to the tarmac.

At times a corona of silver blue light glowed around the circumference of the massive TR-3B. The operational model of the TR3-B is 600-feet across.

TR3B ‘prototype’ ( 200-foot ) and TR3B ‘operational’ ( 600-foot ) version crafts are code named ASTRA.

TR3B tactical reconnaissance version first [ 1st ] ‘operational flight’ was in the early 1990s.

TR-3A Manta [ TIER III A Manta ] is a subsonic reconnaissance vehicle shaped like a bat wing and is in no way related to the TR-3B.

The nomenclature for the TR-3B is unconventional and named thusly to confuse those tracking black budget Programs, Projects and rumors leaked to be purposefully confusing as most are in the aerospace industry where one would think there ‘must be a relationship’ between the TR-3A and the TR-3B, although there is ‘no relationship’.

TR3B triangular shaped nuclear powered aerospace platform was developed under the Top Secret AURORA Program with SDI ( Strategic Defense Initiative – Star Wars ) and black budget monies. At least three [ 3 ] TR3B, $1,000,000,000 billion dollar +, were flying by 1994.

AURORA is the most classified aerospace development program in existence – with its TR-3B being the most exotic vehicle created from the AURORA Program – funded and operationally tasked by the National Reconnaissance Office ( NRO ), NSA, and CIA.

TR-3B flying triangle is ‘not fiction’ and was built with technology available in the mid 1980s and uses more reversed alien technology than any vehicle ever before, but ‘not’ “every” UFO spotted is one of theirs.

TR-3B vehicle outer coating is electro-chemical reactive, that can fluctuate from radar electrical frequency ( EF ) stimulation, causing reflective color spectrum changes from radar absorption.

TR3B is the first [ 1st ] U.S. aerospace vehicle employing quasi-crystals within its polymer skin used in conjunction with TR-3B Electronic Counter Measures ( ECCM ) that can make the vehicle look like a ‘small aircraft’ or ‘flying cylinder’ that also fools radar receivers into falsely detecting a either a ‘variety of aircraft’, ‘no aircraft’ or ‘several aircraft placed in various locations’.

Electro-chromatic polymer skins can be uncovered performing research that points to stealth material properties.

A couple in Ohio spotted the Triangle in early 1995, was first spotted by a man indicating its orange ball of light and then triangle shape with three [ 3 ] bright spots at each corner. As it moved slowly southward they were awestruck by the enormous size. “The damn thing is real,” he exclaimed to his wife, “It’s the flying triangle.” The man said it was the size of “two [ 2 ] football fields” – making it 200 yards or 600-feet across – same as the TR3B operational version craft.

From the collection of pictures, analysis and further refinement we now have a better schematic layout of the Top Secret USAF Flying Triangle [ TR 3 B ] seen by thousands that the U.S.  Department of Defense ( DOD ) and U.S. government claims ‘does not exist’.

A circular, plasma filled accelerator ring called the Magnetic Field Disrupter, surrounds the rotatable crew compartment, far ahead of any imaginable technology.

Sandia & Livermore U.S. National Laboratories developed reverse engineered MFD technology

The government will go to any lengths to protect this technology. The plasma, mercury based, is pressurized at 250,000 atmospheres at a temperature of 150 degrees Kelvin, and accelerated to 50,000 rpm to create a super-conductive plasma with the resulting gravity disruption.

MFD generates a magnetic vortex field, which disrupts or neutralizes the effects of gravity on mass within proximity, by 89 percent. Do not misunderstand. This is ‘not’ anti-gravity. Anti-gravity provides a ‘repulsive force’ that can be ‘used for propulsion’.

The MFD creates a disruption – of the ‘Earth gravitational field’ – upon the mass within the circular accelerator.

The mass of the circular accelerator and all mass within the accelerator, such as the crew capsule, avionics, MFD systems, fuels, crew environmental systems, and the nuclear reactor, are reduced by 89%.

A side note to the Magnetic Field Disruptor development; one source that worked at GD Convair Division in the mid 1960s described a mercury based plasma that was cooled to super-conductive temperatures, rotated at 45,000-rpm and pressurized at thousands of atmospheres. This would be considered state-of-the-art technology even by today’s standards, some 30 years after he worked this project.

He related that the project achieved its objective. Instruments and test objects within the center of the accelerator showed a 50 percent loss of weight, attributed to a reduction in the gravitational field. He had worked on MFD as far back as 1965 and was told by a senior scientist that the research had been going on for a decade. See: Convair, notes from Gravitics research and Gravity RAND article.

The current MFD in the TR-3B causes the effect of making the vehicle extremely light, and able to outperform and outmaneuver any craft yet constructed, except of course, the UFOs we did not build.

The TR-3B is a high altitude, stealth, reconnaissance platform with an indefinite loiter time. Once you get it up there at speed, it doesn’t take much propulsion to maintain altitude.

At Groom Lake there have been whispered rumors of a new element that acts as a catalyst to the plasma.

Recently NASA and Russia have admitted breakthroughs in technology that would use a plasma shield for exotic aerospace vehicles. If you know anything about the history of classified black programs, you know that by the time NASA starts researching something, it’s either proven or old technology. They are the poor stepchildren when it comes to research and development technology and funding.

With the vehicle mass reduced by 89% the craft can travel at Mach 9, vertically or horizontally. My sources say the performance is limited only the stresses that the human pilots can endure. Which is a lot, really, considering along with the 89% reduction in mass, the G forces are also reduced by 89%.

The crew of the TR-3B should be able to comfortable take up to 40Gs. The same flight characteristics described in the Belgium sightings and many other sightings. Reduced by 89%, the occupants would feel about 4.2 Gs.

The TR-3Bs propulsion is provided by 3 multimode thrusters mounted at each bottom corner of the triangular platform. The TR-3 is a sub-Mach 9 vehicle until it reaches altitudes above 120,000 feet – then who knows how fast it can go.

The three [ 3 ] multimode rocket engines mounted under each corner of the craft use hydrogen or methane and oxygen as a propellant. In a liquid oxygen / hydrogen rocket system, 85% of the propellant mass is oxygen.

The nuclear thermal rocket engine uses a hydrogen propellant, augmented with oxygen for additional thrust.

The reactor heats the liquid hydrogen and injects liquid oxygen in the supersonic nozzle, so that the hydrogen burns concurrently in the liquid oxygen afterburner.

The multimode propulsion system can operate in the atmosphere, with thrust provided by the nuclear reactor, in the upper atmosphere, with hydrogen propulsion, and in orbit, with the combined hydrogen\ oxygen propulsion.

What you have to remember is that the 3 multi-mode rocket engines only have to propel 11% of the mass of the Top Secret TR-3B. Rockwell reportedly builds the engines.

From the evolution of exotic materials, advanced avionics, and newer propulsion engines the stealth aircraft were born. Leaps in technology have been obtained with reverse engineering of Alien Artifacts as described in the newly released MJ-12 Revised Charter, signed during the Reagan [ Ronald Reagan ] Administration.

According to Jerald’s account, the technology developed at Papoose far exceeded any known within the world scientific community. Jerald was in his late 50s when I first met him in LV. He had actually spoken to scientists who analyzed the Roswell vehicle and technology–technology that we can assuredly assume was developed from reverse engineering of recovered alien artifacts.
The control of all Alien Artifacts, i.e. the research, the reverse engineering, and analysis of the Extraterrestrial Biological Entities (aka) EBE, were transferred to the super-secret laboratory, called the Defense Advanced Research Center ( DARC ), in Area S-4.

Many sightings of triangular UFOs are not alien vehicles but the top secret TR-3B. The NSA, NRO, CIA, and USAF have been playing a shell game with aircraft nomenclature.

Creating the TR-3, modified to the TR-3A, the TR-3B, and the Tier 2, 3, and 4, with suffixes like Plus or Minus added on to confuse even further the fact that each of these designators is a different [ Unmanned Aerial vehicle ( UAV ) ] aircraft, and not the same aerospace vehicle. [ See, e.g. “ DARPA Photos ” on this website for more on UAV and UCAV with Tier designations provided. ]

A TR-3B is as different from a TR-3A as a banana is from a grape. Some of these vehicles are manned and others are unmanned.

Before Jerald died, we had a long conversation. He was sure he had documentation that would prove the existence of the MJ-12 committee and our using crashed alien vehicles to reverse engineer their technology. I told him that I did not want any classified documents in my possession. I never found out what happened to them.

I also believe the recently deceased Colonel Corso, who discloses the government’s involvement with alien technology, was an honest and honorable man. I believe he was on the inside of administering alien artifact protocol for the Army, and he might have embellished the depth of his involvement.

I don’t have time to go into the two [ 2 ] unique MJ-12 documents that I acquired.

The characters in [ my book ] Alien Rapture are fictional, but the facts of the covert government agenda to suppress alien artifacts, reverse engineering of alien [ ExtraTerrestrial ] technology, and the details of Black Programs are absolutely true.

Part of our agreement was that every one of my close five friends would get a chance to look at the manuscript before I sent it to any Literary Agents.

Dale discussed the Alien Rapture manuscript with his father, who worked high up in the NSA for over 20-years. His father asked him how much he trusted me, and Dale told him ‘completely’.

Dale’s father provided him with two MJ-12 documents, and told him to retype them, and send them to me with the understanding that I would not ever reveal the source of them.

The documents that Dale retyped had most the names and dates blacked out. This is how I received these documents, and I was so naive that I didn’t even know what the histories of the MJ-12 documents were.

From as far back as the Viet Nam conflict [ war ], I knew Dale and that he was as close to his father as a son can get. I do not feel that his father used him for distributing disinformation. Whether his father was duped, I have no idea. From my personal opinion, I believe the MJ-12 committee was real, and still exists in some form.

The TR-3B’s anti-gravity physics is explained, insofar as the theory of general relativity can be considered as an explanation for anti-gravity flight anomalies.

Edgar Fouché describes (above) the TR-3B’s propulsion system as follows: “A circular, plasma filled accelerator ring called the Magnetic Field Disrupter, surrounds the rotatable crew compartment and is far ahead of any imaginable technology…

The plasma, mercury based, is pressurized at 250,000 atmospheres at a temperature of 150 degrees Kelvin, and accelerated to 50,000 rpm to create a super-conductive plasma with the resulting gravity disruption.

The MFD generates a magnetic vortex field, which disrupts or neutralizes the effects of gravity on mass within proximity, by 89%…

The current MFD in the TR-3B causes the effect of making the vehicle extremely light, and able to outperform and outmaneuver any craft yet …My sources say the performance is limited only the stresses that the human pilots can endure. Which is a lot, really, considering along with the 89% reduction in mass, the G forces are also reduced by 89%.

The crew of the TR-3B should be able to comfortable take up to 40Gs… Reduced by 89%, the occupants would feel about 4.2 Gs.

The TR-3Bs propulsion is provided by 3 multimode thrusters mounted at each bottom corner of the triangular platform. The TR-3 is claimed by some to be either a sub-Mach-9 up to a Mach 25+ lenticular-shaped vehicle until it reaches altitudes above 120,000 feet. No one knows really how fast it can go.

Many have been skeptical of Mr. Fouché’s claims however, in an interesting scientific article another claim is made that, the charged particles of plasma don’t just spin uniformly around in a ring, but tend to take up a synchronized, tightly pitched, helical or screw-thread motion as they move around the ring. This can be understood in a general way, where the charged particles moving around the ring act as a current that in turn sets up a magnetic field around the ring.

It is a well-known fact that electrons ( or ions ) tend to move in a helical fashion around magnetic field lines. Although it is a highly complex interaction, it only requires a small leap of faith to believe that the end result of these interactions between the moving charged particles ( current ) and associated magnetic fields results in the helical motion described above. In other words, the charged particles end up moving in very much the same pattern as the current on a wire tightly wound around a toroidal core.

In an article entitled, “Guidelines to Antigravity” by Dr. Robert Forward, written in 1962 ( available at: http://www.whidbey.com/forward/pdf/tp007.pdf ) Dr. Forward describes several little known aspects – of Einstein’s general relativity theory – indicating how moving matter can create unusual gravitational effects. Figure 5, indicates how the moving matter pattern describes what’s necessary to generate a gravitational dipole which was exactly the same as the plasma ring pattern described in the physics article discussed above.

If Fouche’s description is even close to correct, then the TR-3B utilizes this little known loophole in the General Relativity Theory to create it’s antigravity effects. Even though the TR-3B can only supposedly cancel 89% of gravity (and inertia) today, there is no reason why the technology can’t be improved to exceed 100% and achieve true antigravity capability.

In theory, this same moving matter pattern could be mechanically reproduced by mounting a bunch of small gyroscopes – all around the larger ring – with their axis on the larger ring, and then spinning both the gyroscopes and the ring at high speeds, however as Dr. Forward points out any such mechanical system would probably fly apart before any significant anti-gravity effects could be generated. However, as Dr. Forward states, “By using electromagnetic forces to contain rotating systems, it would be possible for the masses to reach relativistic velocities; thus a comparatively small amount of matter, if dense enough and moving fast enough, could produce usable gravitational effects.”

The requirement for a dense material moving at relativistic speeds would explain the use of Mercury plasma (heavy ions). If the plasma really spins at 50,000 RPM and the mercury ions are also moving in a tight pitched spiral, then the individual ions would be moving probably hundreds, perhaps thousands of times faster than the bulk plasma spin, in order to execute their “screw thread” motions. It is quite conceivable that the ions could be accelerated to relativistic speeds in this manner. I am guessing that you would probably want to strip the free electrons from the plasma, making a positively charged plasma, since the free electrons would tend to counter rotate and reduce the efficiency of the antigravity device.

One of Einstein’s postulates of the Theory of General Relativity says that gravitational mass and inertial mass are equivalent. This is consistent with Mr. Fouche’s claim that inertial mass within the plasma ring is also reduced by 89%. This would also explain ‘why the vehicle is triangular’ shaped. Since it still requires conventional thrusters for propulsion, the thrusters would need to be located outside of the “mass reduction zone” or else the mass of the thruster’s reaction material would also be reduced, making them terribly inefficient. Since it requires a minimum of three [ 3 ] legs to have a stable stool, it follows that they would need a minimum of three [ 3 ] thrusters to have a stable aerospace platform. Three [ 3 ] thrusters – located outside of the plasma ring – plus appropriate structural support would naturally lead to a triangular shape for the vehicle.

Some remain skeptical of the claimed size for the TR-3B at being approximately 500 to 600-feet across. Why would anyone build a tactical reconnaissance vehicle almost two ( 2 ) football fields long? However, the answer to this may also be found in Dr. Forward’s paper. As Dr. Forward’s puts it, “…even the most optimistic calculations indicate that very large devices will be required to create usable gravitational forces. Antigravity…like all modern sciences will require special projects involving large sums of money, men and energy.” Dr. Forward has also written a number of other articles, at: http://www.whidbey.com/forward/TechPubs.html

The TR3-B was spotted by U.S. military personnel as the “initial penetration bomb delivery vehicle” prior to the follow-up work done by the F-117 stealth fighters and B-2B bomber mop-up crews and not what Americans were told by the media were the initial strike penetration vehicles used during the Persian Gulf War air strikes inside Iraq airspace.

Recent sightings in December of 2000 has the TR3-B flying south from Utah across the mountain regions near a National Monument valley of Taos, New Mexico. For more information and images, See, e.g. ” UFO & ETT Pics ” on this X-CIA Files website.

Aerial vehicles, such as this ( below ), appears to have been around for decades

 

[ photo ( above ) VRIL VII Manned Combat Aerial Vehicle ( MCAV ) Circa: 1941 ( East Germany ) ]

November 9, 2001

The Old Technology

Reverse-engineered information production, although rarely used due to time consumption, may be utilized to uncover data previously gathered but somehow overlooked is a methodology rarely used by some of the most sophisticated intelligence gathering agencies in the World.

The concept is not ‘new’ but is the most feared form of information assimilation that tears down the walls of classification and censorship as to how things are or were previously perceived as fundamental beliefs. Little known and forgotten about practices and methodologies can easily circumvent new technologies by using the “Old Technology”.

An example of “Old Technology” was demonstrated in early-1970s era Soviet MIG defense aircraft using avionics that the West once saw used in 1950s-era television (TV) sets, i.e. electron vacuum tubes. During the 1970s, the West – sitting smug with transistorized miniature circuits in their fighter aircraft avionics – laughed at Soviet defense aircraft use of electron vacuum tube technology in these 1970s era advanced fighter jet aircraft being utterly outdated technology.

Years later, however the West discovered that Soviet defense aircraft avionics equipped with electron vacuum tube-type technology conquered EMP (elector-magnetic pulse) radiation (produced during above-ground Nuclear detonations) transistor micro circuit technology disruption. EMP wreaked havoc on Western ‘new technology’ electronics at great distances (sometimes, hundreds of miles) away from a ground zero nuclear blast or airburst electronic bombs or e-bombs.

Old “TV tube” technology was actually “higher technology” than what the West used for military defense fighter aircraft during the 1970s. The West was forced to develop other technology strategies, one of which was actually based on an even older technology, the Faraday Cage, a defense used against e-bombs.

That hurdle and yet another were to be eventually conquered, even better once again, with an ‘old technology school-of-thought’. The West found that the age-old adage of ‘fighting fire with fire’ would apply to protecting communication and electronic devices by, simply bombarding its “pre-production material’s structures” with gamma particle radiation. Thus the term, “rad-hard” or, “radiation hardened”, was coined.

In order to prevent EMP telecommunication disruption, fiber-optic communication cables using light-waves to transmit communications were bombarded (before installation) with ‘gamma radiation particles’ that provides a gamma-to-gamma resistance or vaccination against EMP telecommunication disruption, a “rad-hard technique” incorporated for years within U.S. defense Command, Control, Communication, and Computer Intelligence (C4I).

Old Technology, i.e. electron vacuum tubes, solid-state, analog, and arithmetic calculations, once thought to be old technology is still considered sensitive and continuing to be classified by the U.S. government. On the other hand, Extra-Terrestrial Technology (ETT) has brought unusual products into the consumer marketplace, which many take for granted. “Smart Structures” such as “Hybrid Composites” and “Smart Materials” such as “Shape Memory Alloys”, the later of which is now in the public domain and found in new technology ‘eyewear frames’ that will reshape back to their original form – after being bent out of shape – when water is poured over the frames.

Some believe that “cellphone technology” is a form of ETT, nevertheless more ETT products are coming our way, however what is “not” coming our way is the background information we should be focusing on, and for this reason, the following information is revealed.

Research and development on ETT materials was decompartmentalized into un-recognizable facilities after Area 51 began receiving so much publicity. Highly classified material and research projects began being conducted off government installations in universities and private firm research facilities around the world.

Initially, material pieces and sections of covertly held extra-terrestrial spacecraft began undergoing research studies at the Wright-Patterson Air Force Base General Electric Research and Development Division in Ohio, the Nellis Air Force Base test range sites at S-4 and Area 51 near Groom Lake in Nevada, and on a U.S. Army base in Dugway, Utah.

The U.S. Central Intelligence Agency (C.I.A.), U.S. National Security Agency (N.S.A.), and U.S. National Reconnaissance Office (N.R.O.) didn’t feel they had enough real estate space at Nellis Air Force Base (A.F.B.) to sufficiently “test” alien technology or ETT spacecraft insofaras their reverse-engineering programs went so, they went about an ingenious way of slowly but surely expanding their real estate property coverage area, which served to keep sensitive information even further hidden from the prying eyes of the outside World.

Additional funds were also used to bunkerize ETT-developed U.S. defense air, sea and even the new land-tunneling vehicular programs where most of the extremely sensitive and larger programs went literally underground from even the ever so watchful eyes of not only our own un-controllable and subverted satellites but, friendly foreigns as well as, enemy-based borns too. With everything in-place, the Government could move forward.

- – - -

Area 51 Law Suits – 1995 thru 2000

Lack of oversight creates opportunities for violations of environmental law to go undetected and unpunished. Some have charged that the Department of Defense, as recently as 1993, used secrecy as a cover for violations of environmental law. Recent lawsuits against the Department of Defense and the Environmental Protection Agency (EPA) allege that:

(1) Illegal open-air burning of toxic wastes took place at a secret Air Force facility near Groom Lake, Nevada; and,

(2) EPA has not exercised its required environmental oversight responsibilities for this facility.

Responding to the second (2nd) of these lawsuits, the EPA reported that in early 1995 it had seven (7) regulators on staff with Special Access [access to "Black Programs"] clearance that inspected the Groom Lake facility regarding “unknown health dangers” suffered by U.S. government contractors whom worked at the U.S. Nellis Air Force Base (AFB) experimental testing range near Groom Lake, Nevada known as “Area 51″.

The U.S. government would not release information to the victims or their professional advisors (medical and legal) as to the exact nature of “what” those workers had been exposed to, and consequently lawsuits were filed against the U.S. government.

What the public wasn’t aware of was, what occurred ‘before’ a U.S. Presidential directive in 2000.

What Happened In 1995:

In a federal 9th Circuit Court of Appeals case, these same injured government workers – from Area 51 – were battling for the release of U.S. government information. In one such instance, the U.S. Air Force base “Nellis AFB Nevada” claimed one (1) of their “manuals” – an “unclassified manual” in its entirety – should be considered a “classified” manual by the federal court. [It is suspected that because the particular "unclassified" manual was simply "found to be at Area 51" that it automatically became "classified" by reason of its "location". See, e.g. Declaration of Sheila E. Widnall (below)]. Hence, the 9th circuit court of appeals ruled in favor of the government, and prohibiting government worker Plaintiffs from pursuing their case further through any other court.

Interesting information on this was revealed by, an official of the United States Air Force during the federal hearings. (See Immediately Below)

UNCLASSIFIED DECLARATION
AND
CLAIM OF MILITARY AND STATE SECRETS PRIVILEGE OF:

SHEILA E. WIDNALL, SECRETARY OF THE AIR FORCE

I, SHEILA E. WIDNALL, HEREBY DECLARE THE FOLLOWING TO BE TRUE AND CORRECT:

1. Official Duties: I am the Secretary of the United States Air Force and the head of the Department of the Air Force. In that capacity, I exercise the statutory functions specified in section 8013 of Title 10, U.S. Code. I am responsible for the formulation of Air Force policies and programs that are fully consistent with the national security directives of the President and the Secretary of Defense, including those that protect national security information relating to the defense and foreign relations of the United States. As the Secretary of the Air Force, I exercise authority over the operating location near Groom Lake, Nevada, and the information associated with that operating location. As the head of an agency with control over the information associated with the operating location near Groom Lake, I am the proper person to assert the military and state secrets privilege with regard to that information. Under Executive Order 12356, I exercise original TOP SECRET classification authority, which permits me to determine the proper classification of national security information on behalf of the United States. Executive Order No. 12356, Sec. 1.2, 47 Fed. Reg. 20,105 (1982), reprinted in 50 U.S. Code Section 401 (1991); Presidential Order of May 7, 1982, Officials Designated to Classify National Security Information, 50 U.S. Code Section 401 (1991).

2. Purpose: This Declaration is made for the purpose of advising the court of the national security interests in and the security classification of information that may be relevant to the above captioned lawsuits. The statements made herein are based on (a) my personal consideration of the matter, (b) my personal knowledge; and (c) my evaluation of information made available to me in my official capacity. I have concluded that release of certain information relevant to these lawsuits would necessitate disclosure of properly classified information about the Air Force operating location near Groom Lake, Nevada. I am satisfied that the information described in the classified Declaration is properly classified. I have further determined that the information described in the classified Declaration, if released to the public, could reasonably be expected to cause exceptionally grave damage to the national security. It is not possible to discuss publicly the majority of information at issue without risking the very harm to the national security that protection of the information is intended to prevent.

3. Security Classification: Under Information Security Oversight Office guidance, “[certain information that would otherwise be unclassified may require classification when combined or associated with other unclassified information." (32 CFR 2001.3(a)) Protection through classification is required if the combination of unclassified items of information provides an added factor that warrants protection of the information taken as a whole. This theory of classification is commonly known as the mosaic or compilation theory. The mosaic theory of classification applies to some of the information associated with the operating location near Groom Lake. Although the operating location near Groom Lake has no official name, it is sometimes referred to by the name or names of programs that have been conducted there. The names of some programs are classified; all program names are classified when they are associated with the specific location or with other classified programs. Consequently, the release of any such names would disclose classified information.

4. National Security Information: As the head of the agency responsible for information regarding the operating location near Groom Lake, I have determined that information that concerns this operating location and that falls into any of the following categories, is validly classified:

a. Program(s) name(s);
b. Mission(s);
c. Capabilities;
d. Military plans, weapons, or operations;
e. Intelligence sources and methods;
f. Scientific or technological matters;
g. Certain physical characteristics;
h. Budget, finance, and contracting relationships;
i. Personnel matters; and,
j. Security sensitive environmental data.

The following are examples of why certain environmental data is sensitive to the national security. Collection of information regarding the air, water, and soil is a classic foreign intelligence practice, because analysis of these samples can result in the identification of military operations and capabilities. The presence of certain chemicals or chemical compounds, either alone or in conjunction with other chemicals and compounds, can reveal military operational capabilities or the nature and scope of classified operations. Similarly, the absence of certain chemicals or chemical compounds can be used to rule out operations and capabilities. Revealing the composition of the chemical waste stream provides the same kind of exploitable information as does publishing a list of the chemicals used and consumed. Analysis of waste material can provide critical information on the makeup as well as the vulnerabilities of the material analyzed. Disclosure of such information increases the risk to the lives of United States personnel and decreases the probability of successful mission accomplishment.

5. Role of State and Federal-Environmental Agencies: Since 1990, appropriately cleared representatives of Nevada's Department of Conservation and Natural Resources have been authorized access to the operating location near Groom Lake. The state representative's role is and has been to monitor and enforce compliance with environmental laws and regulations and to advise on remedial efforts, if required. Appropriately cleared officers of the U.S. Environmental Protection Agency were recently granted access to the operating location near Groom Lake for inspection and enforcement of environmental laws. Federal inspectors from the Environmental Protection Agency commenced an inspection pursuant to the Solid Waste Disposal Act, commonly referred to as a "RCRA inspection," at the operating location near Groom Lake, Nevada on December 6, 1994.

[EDITOR'S NOTE: Groom Lake: On May 19, 1995, the Director of the FFEO and the Deputy Assistant Secretary of the U.S. Air Force signed a memorandum of agreement ensuring that EPA has continued access to the operating location near Groom Lake for administering environmental laws. Moreover, due to national security concerns, the Air Force agreed to provide reasonable logistical assistance to EPA. Finally, EPA agreed that any classified information obtained by EPA would be treated in accordance with applicable laws and executive orders regarding classified materials.]

The Air Force has taken these steps to ensure full compliance with all applicable environmental laws. At the same time that the operating location near Groom Lake is being inspected for environmental compliance, it is essential to the national security that steps also be taken to prevent the disclosure of classified information.

6. Invoking Military and State Secrets Privilege: It is my judgment, after personal consideration of the matter, that the national security information described in this Declaration and in the classified Declaration, concerning activities at the U.S. Air Force operating location near Groom Lake, Nevada, constitutes military and state secrets. As a result, disclosure of this information in documentary or testimonial evidence must be barred in the interests of national security of the United States. Pursuant to the authority vested in me as Secretary of the Air Force, I hereby invoke a formal claim of military and state secrets privilege with respect to the disclosure of the national security information listed in paragraph four of this Declaration and more fully discussed in the classified Declaration, whether through documentary or testimonial evidence.

7. Environmental Compliance: Although I have found it necessary to invoke the military and state secrets privilege, I believe it important to comment on the Air Force’s commitment to full compliance with the environmental laws of the United States. Our goal is to be the best possible environmental steward of the lands comprising the Nellis Range. To meet that goal we are cooperating and will continue to cooperate with both federal and state environmental agencies.

8. Under penalty of perjury, and pursuant to section 1746 of Title 28, U.S. Code, I certify and declare that the foregoing statements are true and correct.

Executed this 21st day of February 1995 at Arlington, Virginia.

Sheila E. Widnall
Secretary of the Air Force

What Happened In 2000:

The outcome – five (5) years later – was that before President Clinton left office, he signed a document sealing the lid on the secret, once and for all, which also sealed the U.S. Government workers fate. Interests of “national security” were cited.

Below, is an exact copy of the document signed by the U.S. President.

THE WHITE HOUSE
Office of the Press Secretary

For Immediate Release February 1, 2000

TO THE CONGRESS OF THE UNITED STATES:

Consistent with section 6001(a) of the Resource Conservation and Recovery Act (RCRA) (the “Act”), as amended, 42 U.S.C. 6961(a), notification is hereby given that on September 20, 1999, I issued Presidential Determination 99-37 (copy enclosed) and thereby exercised the authority to grant certain exemptions under section 6001(a) of the Act.

Presidential Determination 99-37 exempted the United States Air Force’s operating location near Groom Lake, Nevada from any Federal, State, interstate, or local hazardous or solid waste laws that might require the disclosure of classified information concerning that operating location to unauthorized persons.

Information concerning activities at the operating location near Groom Lake has been properly determined to be classified, and its disclosure would be harmful to national security. Continued protection of this information is, therefore, in the paramount interest of the United States.

The determination was not intended to imply that in the absence of a Presidential exemption, RCRA or any other provision of law permits or requires the disclosure of classified information to unauthorized persons. The determination also was not intended to limit the applicability or enforcement of any requirement of law applicable to the Air Force’s operating location near Groom Lake except those provisions, if any, that would require the disclosure of classified information.

WILLIAM J. CLINTON

THE WHITE HOUSE,

January 31, 2000

- -

X-CIA Files Archive 1

[ NOTE: 1998 - 2003 X-CIA FILES website ( incredible reports & images below ) ]

WARNING & DISCLAIMER: THIS IS NOT A GOVERNMENT WEBSITE

X-CIA Files Archive 1

” Details, Usually ‘Unavailable’ Elsewhere, Are Typically ‘Available’ Here! “

IntelligenceThreats - DefenseOperationsSolutions

SciencesTechnologies – EngineeringApplications

EnvironmentSpaceFutures

SECTION(S):

DIA WATCH

[ photo ( 1980 ) Project Black Horse - Manta - McDonnell Douglas ( click to enlarge ) ]

Pegasus Program

USA, California, Edwards AFB – July 30, 2001 - U.S. Department of Defense ( DOD ) saw several versions of “air vehicles” ( aerial vehicles ) within both its Pegasus Program and Project Black Horse, wherein and amongst many defense contractors over a period of decades, NORTHRUP-GRUMMAN later announced its X-47 ( early version – see below ) and X-47A ( later version – see below ) that were claimed as being “company funded” ‘demonstrators’, Unmanned Aerial Vehicles ( UAV ) of which many more were ‘not publicly announced’, ‘not publicly demonstrated’, and ‘not unmanned’ either.

‘Demonstrators’ are relatively low-cost ‘remote-piloted aerial vehicles’ built for ‘later development’ highly classified ‘low-profile’ surveillance missions employing Unmanned Aerial Vehicles ( UAV ), on combat missions employing Unmanned Combat Aerial Vehicles ( UCAV ), on ‘extremely low-profile’ employment of Micro Aerial Vehicles ( MAV ), and on extreme highly classified surveillance and /or combat missions requiring all-weather capabilities Manned Combat Aerial Vehicles ( MCAV ).

[ photo ( above ) X-47A Prototype ( UAV ) ]

[ photo ( above ) X-47A ( Unmanned Aerial Vehicle ) UAV ]

[ photo ( above ) X-47A ( unmanned ) CAV over test range ]

June 19, 2001

Northrop Grumman Integrated Systems Sector ( ISS ) has received an ‘ X ‘ designation for the company’s Pegasus demonstration aircraft.

Pegasus will carry the designation X-47A, and a refined Navy Unmanned Combat Air Vehicle ( UCAV-N ) expected to be designated the X-47B is planned to be built under the Defense Advanced Research Projects Agency ( DARPA ) U.S. Navy UCAV-N program.

[ rare photo ( above ) NORTHROP-GRUMANN "Kite" X-47 Unmanned Combat Aerial Surveillance Drone ( UCAS-D ) - ( click to enlarge ) ]

The U.S. Air Force establishes ‘X’ designations given to ‘experimental aviation programs’. “Reserved for programs that ‘advance’ new and challenging aviation ‘concepts’, the ‘X’ designation for Pegasus acknowledges its significance and secures its position in aviation history,” said David Mazur, program manager for Pegasus. Designed with stealth features and ‘shaped like a kite’, Pegasus is constructed largely with composite materials. The aircraft measures, 27.9 feet long and has a nearly equal wingspan of 27.8 feet.

One of the first ( 1st ) tasks of the Pegasus flight program will be to demonstrate acceptable aerodynamic flying qualities suitable for ‘operations from an aircraft carrier’.

First ( 1st ) flight is planned for the fourth quarter ( Q-4 ) of this year ( 2001 ) at the Naval Weapons Center, China Lake, California.

Northrop Grumman is performing ‘trade studies’, ‘analysis’ and ‘preliminary design’ for a UCAV-N under a $12,000,000 million contract with DARPA and the U.S. Navy. The goal of the joint DARPA / U.S. Navy project is to demonstrate the technical feasibility for a UCAV system to effectively and affordably conduct sea-based 21st century surveillance, suppression of enemy air defenses, and strike missions within the emerging global command and control architecture. The UCAV-N is envisioned as a ship-based, “1st day of war” force multiplier that will complement manned systems by building and maintaining a common operational picture; providing targeting for other weapons and weapon systems; taking lethal action against designated fixed or moving targets; and collecting and disseminating post-strike information.

NORTHROP-GRUMMAN ISS unveiled its design for a ‘company funded’ Unmanned Air Vehicle ( UAV ) in February ( 2001 ) called “Pegasus” that will fly later this year ( 2001 ) to demonstrate ‘emerging technologies’ emanating from its new Advanced Systems Development Center ( ASDC ) in El Segundo, California. The Pegasus UAV is scheduled for completion this summer. Northrop Grumman efforts on Pegasus and UCAV-N are led by ISS Air Combat Systems ( ACS ) business area in El Segundo, California.

NORTHROP-GRUMMAN work, ‘leverages’ its ‘systems integration’ capability as well as ‘advanced technologies’ derived from years of experience in the design and development of ‘advanced weapons systems’ such as, the:

B-2 Stealth Bomber ( aircraft );

Global Hawk ( unmanned reconnaissance system );

E-8 Joint Surveillance Target Attack Radar System;

E-2C airborne early warning command and control ( EWAC2C ) aircraft; and,

F/A-18 Super Hornet.

Rare photos ( three – 3 – immediately below ) of the NORTHROP-GRUMMAN X-47B secret Manned Combat Aerial Vehicle ( MCAV ) suitable for autonomous operation from an ‘aircraft carrier’ as part of the U.S. Navy ‘Risk Reduction Workforce’ for what the U.S. Navy calls its Naval Combat Air Vehicle (  N-CAV ) [ NOTE: U.S. Navy does 'not' call this an Unmanned Combat Aerial Vehicle ( UCAV ) as it becomes secretly 'manned'. The X-47B is by NORTHROP-GRUMMAN Integrated Systems Sector ( ISS ) in El Segundo, California ( USA ).

[ photo ( above ) X-47B USAF ( MCAV ) launch from aircraft carrier ]

[ two ( 2 ) photos ( above ) NORTHROP-GRUMMAN X-47B MCAV ( click to enlarge ) ]

Besides ‘offshore test range sites’ for these and other similar looking aerial vehicles facilities for these are also conducted in the desert and dry lake test range regions of Edwards AFB ( California ), Nellis AFB S-4 ( Nevada ), Muroc Field ( Area 51 ), the 1969 built super secret China Lake Naval Weapons Center ( Trona, California ), and Dugway ( Utah ).

The X-47B is powered by a turbofan engine, which will enable it to carry a 4,000-pound payload. The aircraft’s endurance will be an estimated 12-hours. The X-47B is equipped with an open-architecture avionics system – designed by BAE Systems – and will use the JPALS ( Joint Precision Aircraft Landing System ) with its shipboard relative global positioning system ( SRGPS ) to land within 20 centimeters of a desired touchdown point.

[ photo ( above ) LOCKHEED Global Hawk RQ-4 TIER II URV and control station 5 man ground crew ( click to enlarge ) ]

One control station ( see above – LOCKHEED Global Hawk 5 man station crew ) will be able to simultaneously handle four ( 4 ) Unmanned Combat Aerial Vehicles ( UCAV ), dependant on technical specification requirements. The X-47B is equipped with dual-wheel main-mount landing gear from a naval aircraft such as the A-6 Intruder ( no longer in service ) – the X-47A is too small to accommodate dual-wheel gear.

The X-47B incorporates technologies developed for several other programs, such as the:

[ photo ( above ) LOCKHEED Global Hawk RQ-4A TIER III Global Hawk URV ( click to enlarge ) ]

RQ-4A Global Hawk ( Unmanned Reconaissance Vehicle ), see above ( 2 – photos );

RQ-8A Fire Scout VTUAV ( vertical-takeoff UAV );

F/A-18E/F Super Hornet strike fighter;

E-8 Joint Surveillance and Targeting System Radar aircraft;

E-2C Hawkeye radar warning aircraft; and,

B-2 Spirit stealth bomber.

PRATT & WHITNEY officials have announced its company intention to compete for the contract to produce the turbofan for the UCAV. Non-classified announcement is for the first ( 1st ) flight of the X-47B to be envisioned for late 2003 or early 2004. During the Phase III EMD ( Engineering and Manufacturing Development ) phase of the program, which will begin by 2007, the aircraft will conduct arrested landings and catapult launches at a land facility and later will make actual carrier launches and landings. Carrier operations – including safe deck handling as well as launch and recovery – present the greatest challenges in the UCAV program. Northrop Grumman officials estimate that the manning level of an aircraft squadron could be cut in half through the use of UCAVs.

The X-47 is in competition with a Boeing Phantom Works-designed UCAV demonstrator. Both demonstrators will continue testing through Phase II of the UCAV program, which is scheduled to begin in January 2002.

JT15D-5C PRATT & WHITNEY ( Canada )

U.S. Department of Defense ( DOD ) Defense Advanced Research Projects Agency ( DARPA ) U.S. Navy Unmanned Combat Air Vehicle ( UCAV-N ) program progressed to the next phase of ‘research and development’ ( R&D ) awarded multi-million contracts leading to a UCAV-N ‘flight demonstration’.

May 8, saw DARPA awarded $9,900,000 million to BOEING and $10,000,000 million to NORTHRUP-CRUMMAN for Phase II-A ‘advanced technology development’ and ‘risk reduction activities’ regarding their UCAV-N candidates. Phase II is divided into two ( 2 ) sub-phases extending to mid-2005, with Phase II-B ( to begin late 2001 ) involving actual flight demonstrations. DARPA may allow both competing UCAV-N projects to proceed into actual flight-testing.

The U.S. Navy UCAV-N program – like the DARPA U.S. Air Force ( UCAV-AF ) project – is geared towards developing ‘reusable fighter aircraft-class combat drones’.

[ photo ( above ) BOEING X-45A ( UCAV ) ]

The UCAV-N, however is one ( 1 ) step ‘behind’ the DARPA USAF BOEING X-45 UCAV ( above ), with the BOEING X-46 ( below ).

[ photo ( above ) BOEING X-46 ( UCAV ) ( click to enlarge ) ]

[ photo ( above ) NORTHROP-GRUMMAN X-45C USAF ( UCAV ) ( click to enlarge ) ]

BOEING X-46 resembles a miniature B-2 stealth bomber ( NORTHRUP-GRUMMAN ), competing against the NORTHRUP-GRUMMAN X-47, a scaled-up version of the Pegasus ‘diamond planform technology’ demonstrator.  The U.S. Navy BOEING UCAV-N initial requirement, is a ‘platform for surveillance missions’ as well as ‘strike and defense suppression’, with ‘larger’ and ‘longer range’ than the DARPA USAF Boeing X-45 ( UCAV ). The U.S. Navy sees its BOEING UCAV-N ‘initially providing’ intelligence gathering and reconnaissance capabilities with ‘armed strike’ following ( around 2020 ).

Pegasus was built with NORTHROP-GRUMMAN company funds to demonstrate aerodynamic qualities suitable for autonomous operation from an aircraft carrier. First ( 1st ) flight of the X-47A is expected later this year ( May 2002 ). Designed with stealth features and shaped like a kite, the NORTHROP-GRUMMAN funded technology demonstrator known as Pegasus has received the official “X” designation, X-47A. Built largely with composite materials, one of the first ( 1st )  tasks of the Pegasus flight program will be to demonstrate the aerodynamic qualities of an autonomous unmanned air vehicle ( UAV ) that would allow it to operate from an aircraft carrier, thus reducing the risk for carrier operations. Northrop Grumman recently completed another milestone on the road to first flight of the X-47A Pegasus. The air vehicle operator executed a command from a ground control center that allowed the X-47A to autonomously sequence through the engine start series and come to idle. Test team engineers then confirmed subsystems and engine performance. Once satisfied that all systems were working as planned, the operator initiated an autonomous shutdown of the Pratt & Whitney JT15D engine.

INTELL SYSTEMS

NAIC 10-Year Foreign Aerospace Intelligence Study

USA, District of Columbia,Washington – October 23, 2001 - The U.S. Department Of Defense ( DOD ) has outlined a ten ( 10 ) year foreign aerospace intelligence plan with its National Aerospace Intelligence Center ( NAIC ).

NAIC is just one ( 1 ) of fifteen ( 15 ) intelligence production centers.

NAIC primary mission is to be the World leader in Fifth ( 5th ) Dimension Data Dominance.

NAIC also deals with Foreign Aerospace Intelligence.

NAIC diversity of control center percentages is divided up amongst the following four ( 4 ) facilities:

Wright-Patterson Air Force Base, Ohio ( 76% ).;

Langley Air Force Base, Virginia ( 11% ).;

Washington, D. C. ( 8% ).; and,

Offutt Air Force Base ( 5% ).

NAIC plan begins in 2001 and planned to last through the end of the year 2010. See, e.g. “DIA Photos“, for more information on this website.

Aeronautical Systems Center ( ASC ) [ 2196 D Street, Wright-Patterson Air Force Base, Ohio, USA ] is where NAIC will be handling seventy-six percent ( 76% ) of mission operations for the United States.

The primary purpose of the NAIC far-reaching scope for what it calls 5th Dimension Data Dominance is to acquire, collect, analyze, produce and disseminate the following:

(1) Foreign Aerospace Intelligence using Scientific and Technical ( S&T ) intelligence information methods.;

(2) Conduct an integrated analysis program.;

(3) Operate a Science & Technology ( S&T ) intelligence data handling system.;

(4) Collaborate with other organizations, i.e. CIA ( Central Intelligence Agency ), NSA ( National Security Agency ), NRO ( National Reconaissance Office ), etc. to improve the collection, acquisition, and utilization of foreign technology and intelligence.; and,

(5) Develop and maintain the highest attainable level of knowledge concerning foreign aerospace technology, capabilities, and limitations.

Displayed below, is just one ( 1 ) of many outlines of NAIC studies:

V/L Task Force

Richard “Dick” Ledesma affiliated with the DDTSE&E / T&E, has chartered the Vulnerability / Lethality Task Force ( V/L Task Force ) to develop a roadmap to include, the following:

(1) Identification of resources, analytical tools and shortcomings of existing models.; and,

(2) Start the efforts on NRC recommendations.

Specifically, recommendations 4 g., 4 i., 10 a. and, 10 d. are being considered which, are:

Recommendation 4 g.: Fund the JTCG/AS and JLF to assure the completeness of data on the vulnerabilities of on-board ordnance.;

Recommendation 4 i.: Emphasize continuing efforts by the F-22 SPO and JTCTG/AS to develop improved methodologies for reducing flight crew vulnerability.;

Recommendation 10 a.: Validate and accredit formally, by the Joint Technical Coordinating Group on Aircraft Survivability and the Joint Technical Coordinating Group on Munitions Effectiveness, the vulnerability assessment models used by the Air Force and other services.”; and,

Recommendation 10 d.: Focus on ways to understand fully the response of F-22 composite materials to ballistic damage, and develop and exercise analysis tools that can handle large scale damage effects.

The “Vision Statement” (See Below) emphasizes a fresh look at all V/L analytical tools used by DoD/Industry to assess V/L of airborne platforms and to examine the generic applicability of the tools to other platforms.

Mr. Ledesma emphasized that the task force should look beyond F-22 and address issues with strategic implications that may affect future acquisitions, e.g. JAST, F-18, Comanche, etc.. Furthermore, Ledesma has encouraged all participants to work closely together to the common goal, beyond the existing organizational stovepipe interests.

The chartered members of the Task Force are: JTCG/AS, JTCG/ME, TILV, DTSE&E and DOT&E.

The proposed Vision Statement and the Mission statement for the Task Force are:

(1) Vision Statement: The vulnerability/lethality community is committed to use all available resources of the Department of Defense (DoD) to identify shortfalls with the present tools used to assess the vulnerability/lethality of weapon systems and platforms upon which the D.O.D.’s Warfighter depends.; and,

(2) Mission Statement: Another DOD Task Force will be formed to identify the resources (analytical tools, databases and facilities) and shortfalls of existing vulnerability/lethality hardware, models, and methodologies (i.e., on-board ordnance, flight crew vulnerability) as presented in the National Research Council (aka) N.R.C. report on “Live Fire Testing of F-22″, to update and improve these analytic tools for use by both government and industry in the acquisition decision-making process.

Product

The product of this effort will be a “Roadmap” to correct deficiencies identified in the National Research Center (aka) N.R.C. report.

Task Force Composition

One ( 1 ) government representative from each affected agency/activity to serve as POC: JTCG/AS, Joint Technical Coordinating Group for Munitions Effectiveness ( JTCG/ME ), the weapons Target Interaction Lethality/Vulnerability  (TILV ) Service Laboratory Initiative, DTSE&E and DOT&E.

Members of the Task Force must be empowered to make recommendations relative to the “Roadmap” to correct the noted deficiencies.

The Task Force is empowered to select its own chairman. Any unresolved issues are to be brought to the attention of the Senior Steering Group ( SSG ) expeditiously.

SSG Composition

One ( 1 ) senior government representative from each of the organizations comprising the Task Force plus one senior government representatives from each of the following: USD ( A&T ) / T&E, TFR and S&TS; DOT&E.

DDTSE&E / T&E will chair the SSG.

Joint Modeling and Simulation System ( J-MASS )

J-MASS is a M&S system which provides a software architecture for the development, execution, and post-processing of simulations. Additionally, it implements a set of standards by providing tools that assist in the development and application of re-usable models and model components.

J-MASS was designed specifically to fulfill the simulation architecture role as defined in the emerging standard test processes from within the Air Force T&E and DOD organizations.

J-MASS assists and supports the development of Digital System Models ( DSM ), and the J-MASS Modeling Library is designed to provide all the functions of the Test Process Archive.

J-MASS provides tools that support the five ( 5 ) activities of M&S:

(1) Develop Components;

(2) Assemble Players;

(3) Configure Simulations;

(4) Execute Simulations; and,

(5) Postprocess Results.

Furthermore, J-MASS will provide an object-oriented Modeling Library for the foundation of these tools as well as capture the specifications, designs, plans, T&E data, and other information generated during the weapon system acquisition process. Finally, the Modeling and Simulation Reuse Library, the main repository for components and models, supports the J-MASS community by allowing users to download files into the site’s Modeling Library.

Component Development

This purpose of this mode provides the J-MASS model developer with the capability to develop and maintain model components. Model components which related directly to real-world objects or phenomena can be created by either modifying an existing model component or by developing an entirely new component. Components are developed through visual programming with an object-oriented design tool called the Model Component Development Tool ( MCDT ).

Player Assembly

The purpose of this mode is to permit model developer to fabricate unique simulation models for a given scenario analysis by reusing existing model components. By browsing through the set of previously defined and tested model components, the user can select and assemble them into more complex players which can then be positioned and configured to create a required scenario.

Data Definition & Data Configuration Simulations

The purpose of this mode is to provide the user with a set of visual programming tools to define and configure data for the simulation. This mode also provides the ability to configure scenario level data and define which components, players, weapon systems, and environment will be utilized. The user can also provide parametric data specific to a model component and review the coverage of player sensors. With the Experiment Manager facility, the user has the capability to set up experiments (series of simulation runs). The user will specify not only initial data with the Experiment Manager, but ranges of data that allow the user to study the model under various conditions.

Previous Sumulations Execution

The purpose of this mode allows the user to execute simulations created earlier.

J-MASS provides an event driven, time-synchronized simulation engine for model execution, which includes services for data management, spatial object management, event synchronization and a centralized, non-intrusive data journalization capability. Intermodel communications are handled by features of the simulation engine’s data management services and allow for the user specification of all model player interactions.

Analaysis Post-Process

The purpose of this mode provides the capability to analyze and view simulation results. Standard plotting utilities are provided to graphically represent user-selected simulation results data in two dimensional ( 2-D ) and three dimensional ( 3-D ) formats with multiple datasets.

A visual playback capability is also provided to allow the user to replay the simulation results in an animated visual, 3-D presentation.

Modeling Libraries

The purpose of this mode provides a repository for user-developed model components to be used in the performance of M&S under J-MASS.

The components may be made accessible site-wide as well as program-wide to allow other users and user communities to reuse the components. This process is enhanced through the use of user-friendly browsers to facilitate the location of appropriate components. The purpose of this library is to perform database functions such as concurrency control, transaction management, security access, and versioning.

J-MASS provides a tool set that implements a single threat of functionality through the five M&S activities and the Modeling Library. J-MASS users can customize their installations with commercial tools that conform to POSIX standards. The table below describes these tools and states in which mode they are used:

MCDT ( Develop Components ) – Object-oriented design tool used to graphically represent the system being modeled.;

Code Generator ( Develop Components ) – Application that converts the Object-Oriented Design Application ( OODA ) data into compilable source code.;

Team Builder ( Configure Simulation ) – Builds a runable simulation.;

Configure Player ( Configure Simulation ) – This X window application edits model attribute values without recompiling simulation.

Configure Experiment ( Configure Simulation ) – Allows user to specify a range of initial attribute values to be used over many simulations.

Simulation Run-Time ( Execute Simulation ) – Controls the execution of the user’s models, Agent providing event, data, and spatial services.;

Filter / Extract ( Post-Process Results ) – Selectively converts simulation journal data to form used by post-processing applications.;

GNU Plot & X-Prism (Post-Process ( Results ) – 2-D and 3-D graph presentation.;

SimView ( Post-Process Results ) – This X window application allows the user to create animations from simulation journals.;

Batch Import / Export ( Modeling Library ) – Provide means of importing and exporting data into the J-MASS Modeling Library.

In developing J-MASS, Wright Laboratory, Electronic Warfare Division (aka) WL/AAWA-1, along with other Air Force, Army and Navy organizations represented by their acquisition, military intelligence and test communities formed an Architecture Technical Working Group ( ATWG ) under the auspices of DDT&E.

Under the leadership of the Electronic Warfare Division, the ATWG developed a System / Segment Specification containing eight-hundred and fifty ( 850 ) requirements to support the participating organizations and their missions.

Following these requirements, J-MASS exploits the technologies of re-use, object-oriented software development, and visual programming to reduce the cost of M&S and, ultimately, weapons system development, as well as ensuring consistent and credible analysis results.

Currently, J-MASS is in the Engineering and Manufacturing Development ( EMD ) phase. ASC/XREM is the J-MASS Program Office and McDonnell Douglas Aerospace ( MDA ) is the EMD contractor.

EMD effortings are responsible for developing, packaging and distribution of J-MASS ‘commercial level product’.

Electronic Warfare Division ( EWD ) along with its on-site contractor SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is investigating and developing ‘emerging technologies’ ( tools and models ) for inclusion and improvement of J-MASS.

Technology areas, being investigate or have been investigated, are:

Object-Oriented, Scientific Visualization, Database Management Systems, Hypermedia, Scientific, Visual, Visual Programization, Real-Time Systems, Open Systems, Visual Programs, Virtual Realiting, Virtual Prototyping, Animation, Virtual Reality, Graphical User Interface ( GUI ), Distributed Processing, Geographic Information Systems ( GIS ), Graphical User Interface and, Artificial Intelligence ( AI ) / Expert Systems.

Recent investigations have provided functional J-MASS prototypes of an Infra-Red ( IR ) Environment, IR Jammer, and Distributed Interactive Simulation ( DIS ) Interface.

J-MASS will ultimately help the user reduce M&S costs and ensure consistency and credibility in M&S results. As a J-MASS user, one will be able to re-use model components and weapon system models from the Modeling and Simulation Reuse Library.

Models have been or are currently being developed by the Missile and Space Intelligence Center, National Aerospace Intelligence Center, Aeronautical System Center and Wright Laboratory Armament Directorate.

These models represent missiles, aircraft, and multi-spectral sensors.

Some models are of specific weapon systems while some are generic in nature using system specific data.

Models, data, and tools can be shared throughout the J-MASS community.

SMART Project

Susceptibility Model Assessment and Range Test ( SMART ) Project was tasked by the OSD / DTSE&E to accomplish three ( 3 )goals:

(1) Develop and demonstrate a process for improving the credibility of M&S used to support acquisition decisions for airborne weapon systems.;

(2) Test the proposed process on a specific set of existing M&S widely used within the D.O.D. to support system acquisition and development decisions.; and,

(3) Transition a documented V V & A process and support infrastructure to D.O.D. organizations and to maintain and promulgate the methodology to users and developers of other types of M&S.

During the first ( 1st ) year of the project, a Proof of Concept demonstration was completed and documented in a series of reports that provided results of comparisons between test data recorded on Air Force ranges and three simulation models.

These M&S are maintained by the JTCG/AS and are used to support COEA tradeoff studies and assessments of survivability by operational units throughout the Department Of Defense ( DoD ).

The next two ( 2 ) years of the project were devoted, to:

(1) Identifying, testing, and codifying elements of V&V essential to the credibility of M&S while integrating configuration management into the V&V process.; and,

(2) Establishing an integrated set of information requirements that, taken as a whole, would address the accreditation problem for all DoD M&S.

Both of these objectives required the development of a standard way to report V V&A and CM results, so the Accreditation Support Package ( ASP ) concept was born.

The final two ( 2 ) years of the project were devoted to documenting the SMART process, codifying V V&A and CM product standards, broadening their scope of applicability, and applying them to ongoing acquisition and testing programs with current M&S accreditation needs.

The development of an integrated V V&CM process focused on accreditation requirements was a challenging task. Although many D.O.D. components reported performance of V&V activities when SMART was commissioned, few documented the results of their activities.

Many technical papers and a few books on V V&A touted widely differing methods focused on specific M&S credibility issues, but a repeatable process aimed at integrating V&V results into a body of evidence that would address D.O.D. accreditation requirements was lacking. SMART’s greatest contribution to the DOD-wide M&S credibility debate was the development, testing and documentation of such a process, which simultaneously also afforded enhanced credibility to the M&S that were subjected to it.

Since initiation of the SMART Project, the ultimate goal has been to devise, test, and document a VV&A/CM process for existing M&S that could be extended to others both in existence and under development, and that could be tailored to provide information for support of unique accreditation decision requirements. Within the context of this process, accreditation has always remained the responsibility of the user, and no attempt has been made to replace, usurp, or otherwise undermine this prerogative. V&V results are integrated into the development plan for the model via its in-place CM process, thus establishing an increasing level of credibility as the model continues to develop and mature.

The SMART credibility assessment process integrates the technical results of V&V and CM activities into a documentation product known as the Accreditation Support Package ( ASP ).

ASP documents have been produced for the M&S examined by SMART and used by acquisition and testing programs across the D.O.D. to substantiate the use of M&S in their respective efforts. The SMART accreditation support process has been formalized, documented, and distributed throughout the community to encourage its wider use as a standard approach to M&S credibility assessment and maintenance. Aspects of the larger methodology recommended by SMART include:

(1) Process for analysis of intended user applications to develop accreditation requirements, acceptance criteria for M&S, and decision space with respect to suitability.;

(2) V&V process that can be tailored to address only those functional elements critical to user accreditation requirements as well as scaled to fit existing or planned resource limitations.;

(3) Configuration management process that provides mechanisms for inclusion of V&V results into subsequent M&S version releases and maintains the shelf life of those results for application to existing accreditation needs.;

(4) Test data collection process that can be used to plan, conduct, and report range testing activities performed in conjunction with existing programs or via dedicated tests aimed at M&S validation and accreditation requirements.; and,

(5) Specifications and guidelines for production of standardized documentation that is used to report test results, V V&A activities, and M&S support manuals.

In addition to demonstration of V V&A and CM processes, their benefits, and applicability to current and future accreditation requirements, SMART has also developed a support infrastructure that has been used by acquisition programs to investigate and report M&S credibility issues.

In addition to established interfaces with D.O.D. test range facilities and ongoing T&E programs, SMART has assembled a team of V V&A and CM experts with experience in a wide array of current program accreditation requirements. An Accreditation Support Database (ASD) was also implemented to provide a quick-look capability for examining summary V V&A data via on-line applications, and a test data archive (TDA) was implemented to allow M&S users to retrieve and reuse data that was used by SMART to assess credibility of M&S functional elements or areas of engagement and mission analysis models.

Finally, the many lessons learned from SMART V&V, CM, T&E, and accreditation support efforts have been documented along with the process methodology and in training courses to facilitate transfer of this important information to the M&S community within the DoD.

SURVIAC – Survivability Information Analysis Center

Survivability Vulnerability Information Analysis Center is a DOD Information Analysis Center ( IAC ) spanning non-nuclear Survivability and Lethality Issues.

In order to correctly perform a survivability analysis, the models used in the analysis must accurately represent the interactions between the threat, the environment and the target. This requires that the threat, environment, and target be defined accurately.

The JTCG/AS has initiated several programs to develop, enhance, and document the SURVIAC models.

One ( 1 ) project, the SMART Project, will develop a process for verifying, validating, and accrediting models.

Most of these projects have been directed towards improving models and few of them have focused on the model input data bases.

The SURVIAC model user community, constantly requests approved and documented data bases to be used in survivability studies.

There is currently no single source that lists available approved data bases. It is left to the individual organizations to either find existing data bases or build their own.

In either case, the organization will have to expend resources resulting in data bases that may not accurately describe the threat, environment, or target.

The creation of a single source document that lists approved data bases and other important data will reduce overall data base creation and maintenance costs for the entire survivability community.

SURVIAC Origin

The SURVIAC began operations on December 21, 1984.

SURVIAC was formed from the merger of two ( 2 ) pre-existing functions – the Combat Data Information Center ( CDIC ) and the Aircraft Survivability Model Repository ( ASMR ).

CDIC was a central repository for combat and test data related to weapon system survivability and vulnerability.

CDIC was sponsored by the Joint Technical Coordinating Groups ( JTCG ) for Aircraft Survivability ( AS ) and Munitions Effectiveness ( ME ) and had been in continuous operation since 1970.

Aircraft Survivability Model Repository ( ASMR ) was established in 1981 to serve as a focal point for models related to aircraft survivability.

ASMR was sponsored by the Joint Technical Coordinating Group on Aircraft Survivability.

Both the CDIC and ASMR were operated under the technical monitorship of the Flight Dynamics Laboratory ( FDL ) at Wright-Patterson Air Force Base in Ohio located in its Flight Dynamics Laboratory facilities.

DIA WATCH

TECHNOLOGY – DEFENSE

 

[ photo ( above ) Directed Energy Weapon ( DEW ) Test Bed Laser ( click to enlarge ) ]

[ photo ( above ) Directed Energy Weapon ( DEW ) Space based Laser ( click to enlarge ) ]

[ photo ( above ) Directed Energy Weapon ( DEW ) Fixed Ground based Laser ( click to enlarge ) ]

[ photo ( above ) Directed Energy Weapon ( DEW ) Portable Ground based Laser at Area 51 ( click to enlarge ) ]

[ photo ( above ) Directed Energy Weapon ( DEW ) Mobile based Laser ( click to enlarge ) ]

 

[ photo ( above ) Directed Energy Weapon ( DEW ) Hand Held Laser ( click to enlarge ) ]

SURVIAC Mission & Scope

SURVIAC purpose is to increase the knowledge and productivity of scientists, engineers and analysts engaged in non-nuclear survivabilityvulnerability and lethality scientific and engineering programs for the DoD.

SURVIAC’ mission is to perform the functions of a full-service D.O.D. IAC ( as described, in: ”DOD 3200, 12-E-2, Centers for Analysis of Scientific and Technical Information” ) in the vital technical areas of non-nuclear survivability / vulnerability and lethality.

SURVIAC mission specifics are to maintain a technology base of its technical area, provide authoritative responses to user inquiries, provide technical assistance and support to its user community, prepare authoritative technical reference works, i.e. handbooks, data books, state-of-the-art reports, and perform special tasks and studies.

SURVIAC technical area is non-nuclear survivability/vulnerability and lethality as they relate to U.S. and foreign aeronautical and surface targets. Nuclear survivability information is provided by the DOD Nuclear Information and Analysis Center ( DASAIC ).

Non-nuclear threats included within the SURVIAC scope, are:

(1) Conventional weapons ( i.e. small arms / automatic weapons ( SA/AW ), AAA, SAM ( surface to air missiles ), air to air guns, air to air missiles ( AAM ), field artillery and direct fire weapons ( i.e. tanks, TOWs, etc. ).;

(2) Directed Energy Weapons ( DEW ), i.e. laser, millimeter wave, particle beams, sonic flocculators, etc.; and,

(3) Chemical and Biological Weapons ( CBW ).

Data requirements ( in threat areas ) include ( as applicable ):

- Acquisition ( target acquisition or TA );

- Detection;

- Tracking;

- Launch;

- Fly-Out characteristics;

- Fuzing characteristics;

- Counter Measure ( CM ) employment;

- Counter-Counter Measure ( CCM ) employment; and,

- Terminal Effects ( kill analysis ).

SURVIAC scope involves, both:

U.S. ( domestic ) defense ‘aeronautical targets’ ( ‘atmospheric’ and ‘space’ ) and ‘surface targets’ ( ‘ground’ and ‘water’ ); and,

International ( foreign ) defense ’aeronautical targets’ ( ‘atmospheric’ and ‘space’ ) and ‘surface targets’ ( ‘ground’ and ‘water’ ).

Aeronautical targets, include: Aircraft ( ‘fixed winged’ and ‘rotary winged’ and ‘manned’ and ‘unmanned’ ) and Missiles.

Surface targets, include: Shelters, Armored Personnel Carriers ( APC ), Radar Vans, Trucks, Tanks, Artillery, and similar others.

Data requirements, in these areas, include ( as applicable ):

Physical design, performance and operational information characteristics, of: Acoustic signatures, Infra-Red ( IR ) signature , Optical signatures, Electro-Optical ( EO ) signatures, and Radar signatures;

Functional design, performance and operational information characteristics, of: Acoustic signatures, Infra-Red ( IR ) signature , Optical signatures, Electro-Optical ( EO ) signatures, and Radar signatures;

Combat damage and repair; and,

System, sub-system and component Probability of Kill given a Hit ( Pk/h ) functions.

Initial holdings are concentrated on aeronautical targets with an expanding scope to surface targets.

SURVIAC Organization

BOOZ-ALLEN & HAMILTON INC. full-time staff of professional engineers, computer scientists, information specialists and support members operate SURVIAC.

SURVIAC assistance is provided by the SURVICE ENGINEERING COMPANY [ 'not' mis-spelled ] ( SEC ) and the BATTELLE MEMORIAL INSTITUTE ( BMI ) for system vulnerability and susceptibility matters, respectively.

The extensive staff of Booz-Allen employees located in offices around the world are also available to SURVIAC, as required.

Other sub-contractors and consultants may be hired for specific projects requiring specialized expertise.

To address the survivability concerns of organizations located in the Washington, D.C. area, a SURVIAC Satellite Office is maintained at the BOOZ-ALLEN facility in Arlington, Virginia.

SURVIAC Information Operations

SURVIAC capabilities include the technology base of information and data held by and available to the SURVIAC, the physical facilities and equipment used to store, retrieve and process this information and data, and the skilled personnel required to use and analyze them.

The technology base consists of data, reports, data bases, models, methodologies, libraries, etc.

These are available as computer-resident and computer-retrievable. Much of the information and data are classified and, therefore, stored in secure computer facilities and large, secure vaults.

The libraries and equipment are physically located at: Wright-Patterson A.F.B., Ohio, Area B, Building 45.

The computer capabilities of the Aeronautical Systems Division ( ASD ), Information Systems and Technology Center ( IS&TC ) are used for the computerized technology base.

SURVIAC maintains four ( 4 ) reference libraries with copies of the document available on site and retrievable through computerized operations with key word searches.

Arrangements have been made with seven ( 7 ) other library-type data bases for on-line access to additional specialized information resources related to SURVIAC technical area.

SURVIAC libraries currently total approximately 11,000 separately retrievable items.

SURVIAC also maintains five ( 5 ) major additional numerical databases focusing on combat damage and survivability testing of systems, subsystems and components.

A “single-incident” philosophy has been adopted for these databases where each individual data record is backed by a folder which contains all known information relevant to that incident.

SURVIAC currently maintains and disseminates to qualified requesters copies of selected survivability models and their documentation.

SURVIAC provides configuration control and limited technical support to the survivability and lethality communities for these models.

SURVIAC Services & Products

SURVIAC provides the full range of services inherent to D.O.D. IAC operations including response to bibliographic and technical inquiries and referrals to other centers or organizations when appropriate.

SURVIAC has also hosted several workshops and offers training on the SURVIAC models.

Special tasks, funded by the requesting organization, are conducted consistent with the SURVIAC charter and technical area.

The full range of IAC products such as handbooks, data books, state-of-the-art reports, critical reviews and technology assessments, etc., will be provided.

A critical review has been produced and the first data book is in publication.

Another data book, a handbook and SOAR are also being prepared for publication.

Introductory materials are produced and distributed to provide an overview of survivability and lethality, and present the resources and services available through SURVIAC.

SURVIAC Brochure, Current Awareness Bulletin, capabilities video and SURVIAC Model and Product Guides introduce goals, resources, and services that are available through the Center.

Technical Inquiries are handled by SURVIAC’s technical experts using the Center’s resources to provide needed information on a timely basis.

SURVIAC responds to over 1,000 user inquiries a year on a variety of subjects such as the following, as a brief example:

(1) Combat damage and attrition.;

(2) Aircraft and ground system signature data.;

(3) Laser and microwave effects.;

(4) System survivability, vulnerability, and susceptibility issues.;

(5) Hypervelocity kill mechanisms and test facilities.; and,

(6) Aircraft battle damage repair.

Information resources are maintained in computerized databases, in original form, and in computer-indexed reference libraries. SURVIAC’s library holdings include more than 15,000 documents developed through an aggressive continuing acquisition and review process.

Special studies and routine reviews of literature applicable to the survivability and lethality community contribute to the library’s continued expansion.

SURVIAC personnel access other existing databases, such as the Defense Technical Information Center holdings through the Defense RDT&E On-Line System ( DROLS ), the NASA Scientific and Technical Information Library, Lessons Learned Program, and the Chemical Defense Database, to name just a few.

SURVIAC major reference libraries include:

(1) Survivability/Vulnerability Reference Reports, Studies, Analysis, and Raw Data Laser Reference Library: Test, R&D, and Directed Energy Weapons ( DEW ).;

(2) Aircraft Battle Damage Repair ( ABDR ) Library: Reports and Data on ABDR Vehicle Signatures Reference Library.; and,

(3) Reports and Data on Vehicle Signatures Combat Evaluation Library: Reports, Studies, and Analyses from U.S. Army Experience in Southeast Asia Database Services.

The Center has developed specialized databases storing information not otherwise readily available.

SURVIAC databases contain thousands of items spanning detailed combat incidents, battle damage repair information, and sophisticated system and subsystem test data. Additions continually keep pace with community needs. The major databases maintained by SURVIAC include:

ACFTDAB: Southeast Asia Fixed-Wing Aircraft.;

HELODAB: Southeast Asia Rotary-Wing Aircraft.;

GNDVEHSEADB: Southeast Asia Ground Vehicle.;

LASERDAB: Laser Shots Against a Variety of Materials.;

RAM TEAM: ( Rapid Area Maintenance Team Database ) Yom Kippur Arab-Israeli Tank and Personnel Carrier.;

Fixed Wing Aircraft: Just Cause Battle Damage Repair from 1989 Panama Incident.; and,

Pk/h: Matrix Critical Component and Supporting Test Data Requirements.

Matrix Modeling Services

SURVIAC is a focal point for distribution of and expert advice on the most widely-used, up-to-date, and accepted survivability and lethality models. SURVIAC maintains and disseminates model code and documentation, provides technical advice regarding their use, and conducts workshops on their application and operation.

The Center is also the clearinghouse for changes and updates to the models. The SURVIAC holdings include:

AASPEM – Air-to-Air System Performance Evaluation Model – Air Combat Analysis Model, Evaluates Aircraft and Weapon Systems.;

ALARM 87 – Advanced Low Altitude Radar Model – Represents Radar in Search or Track Mode.;

BLUEMAX II – Aircraft Flight Path Generator.;

COVART II – Computation of Vulnerable Areas/Repair Times – Determines Vulnerable Areas and Repair Effort.;

ESAMS – Enhanced Surface-to-Air Missile Engagement Model – Surface-to-Air Survivability/Vulnerability Assessments.;

FASTGEN 3 – Target Geometric Description – Methodology to Generate Shotline Information.;

HELIPAC – Helicopter Piloted Combat Model – Helicopter Version of PACAM 8 ( See Below ).;

IMARS – Integrated Missile and Radar Simulation – Surface-to-Air Missile Model.;

LTM 3.0 ( Laser Threat Mode l) – Ground Laser Weapons against Dynamic Airborne Targets.;

PACAM 8 – Piloted Air Combat Analysis Model – Provides Weapon Performance Data in Air-to-Air Combat.;

P001A Anti-Aircraft Artillery Simulation – Computes Single Shot Probability of a Kill of a Target Aircraft.;

RADGUNS Simulates One-on-One Engagement between Aircraft and Radar Directed Anti-Aircraft Artillery.;

SCAN Target Vulnerability Model – Evaluates Effects of Fragmentation Warhead Missiles.; and,

TRAP Trajectory Analysis Program – Detailed Air-to-Air Missile Model ( Available Soon ).

Products are made available as a result of specific projects and special studies, and provide new sources of information and methodologies for the D.O.D. survivability/lethality communities. Products currently available include:

A Critical Review of Graphite Epoxy Laser Damage.;

Advanced Materials for Enhanced Survivability ( state-of-the-art report ).;

ABDR Directory/ABDR Library.;

Aircraft Engine Analysts Reference Manual ( ARM ) ( 9 volume set ).;

Aircraft Survivability ( video ).;

An Overview of Laser-Induced Eye Effects.;

An Overview of Laser Technology and Applications.;

Army Survivability Information Resource Database.;

Battle Damage Repair – A Survey of Actual Combat Experience ( 3 volume set ).;

Battle Damage Repair of Composite Structures ( video ).;

Comparative Close Air Support Vulnerability Assessment Study ( multi-volume set ).;

Compendium of References for Non-nuclear Aircraft Survivability.;

DOD Aircraft Joint Live Fire Test Program ( 3 video set ).;

Gas Explosion suppression Agent Investigation proceedings of the 7th DOD Conference on DEW [ Directed Energy Weapons ] Vulnerability/Survivability and Effects   multi-volume set ) Note: 5th and 6th also available.;

Threat Effects in Aircraft Combat Survivability ( video ).; and,

Unmanned Aerial Vehicles ( UAV ) Survivability Compendium

VALIDATE

VALIDATE objective is to improve the fidelity and the credibility of the analysis tools which are used by all the services for vulnerability and lethality assessments in support of weapon system design, test and evaluation.

Detailed goals include verification and validation of Joint Service analysis methodologies, application of physics based methods such as hydrocode and finite element methods to vulnerability assessment techniques, improvement of these methodologies for credible assessment of vehicle vulnerability and prediction of test results, and demonstration of these improvements by comparison with results from the Joint Live Fire test progam ( JLF ).

Specific Fiscal Year 1996 objectives were:

(1) Develop a detailed program master plan by adapting the verification and validation process developed by the SMART project to vulnerability models and simulations, and coordinate the plan with other ongoing and planned efforts.;

(2) Initiate the development of verification and validation documentation for the COVART and FASTGEN models.;

(3) Institute a structured configuration management process for COVART and FASTGEN.;

(4) Perform an analysis of damage mechanism criticality to prioritize methodology improvement tasking.; and,

(5) Conduct a pilot feasibility study for the use of advanced “physics based” methods, such as hydrocodes, to assess their applicability to air vehicle [UAV] vulnerability analysis. The results of this feasibility study will determine the scope of effort for advanced code applications in the outyears, which will be incorporated into the program master plan.

At the end of the first (1st) year’s effort, a decision point in the program will have been reached. The Feasibility Study will have established the risks and costs associated with applying advanced physics methods to vulnerability analysis. The Damage Mechanism Criticality Study and the initial V&V work accomplished on the vulnerability analysis tools will have established the risks associated with applying the V&V processes developed for susceptibility models to vulnerability M&S.

At this point a decision will be made whether to:

(1) Terminate the program;

(2) Terminate the advanced physics part of the program and continue only with vulnerability model V&V; or,

(3) Continue the program according to the master plan developed during the first (1st) year.

Background

Aircraft vulnerability is a major factor in overall aircraft survivability. In fact, vulnerability modeling is used directly to support COEAs, design trade studies, specification development, live fire testing, and ensuring specification compliance throughout the system acquisition cycle.

Even though the trend is toward “commercial practices” in defense systems acquisition, due to the unique requirements of combat aircraft vulnerability it is anticipated that vulnerability specifications will still be required for military aircraft programs, and those specifications are derived and evaluated using models and simulations.

Vulnerability analysis codes have been integrated with computer aided design ( CAD ) packages by all major airframe designers. Consequently, these codes have major impact on air weapon system design, in all the services.

Therefore, it is imperative that decision makers have the utmost confidence in the estimates provided by vulnerability models. A verification and validation process provides the basis necessary to establish that confidence; however, current vulnerability models are not verified or validated in any systematic way.

The resulting lack of confidence impairs the ability of vulnerability modeling to impact decisions at critical acquisition decision points. This results in the potential for vulnerability features wrongly being excluded from air weapon systems to save weight and cost. To ensure that vulnerability models can influence aircraft acquisition decisions a systematic verification and validation process must be undertaken.

The Susceptibility Model Assessment and Range Test (SMART), funded by OUSD (A&T) DTSE&E, has developed a M&S credibility assessment process which is in use by a number of system acquisition programs to support M&S accreditation requirements.

The SMART process converts the technical results of verification, validation and configuration management activities into a documentation product known as the Accreditation Support Package (ASP). This document may be used by acquisition and testing programs across D.O.D. to substantiate the use of M&S in major acquisition and testing decisions.

The verification sections of the ASP document the correctness of M&S software with respect to design criteria, allowing decision makers to determine the applicability of the model’s algorithms to their analytical or testing requirements. The validation sections of the ASP document the results of comparisons of M&S predictions with empirical testing, allowing decision makers to assess the confidence that can be placed in M&S predictions.

The configuration management sections of the ASP document the degree to which M&S development is controlled and managed, allowing decision makers to assess the “shelf life” of analytical results taken from M&S.

Taken as whole, the SMART ASP provides a high level of confidence in the analysis of phenomena affecting air vehicle susceptibility. However, the SMART program has not addressed the vulnerability aspects of survivability modeling.

To guarantee full flexibility in estimates and to provide realistic test predictions vulnerability models need to be based on physical principles.

Current component vulnerability analysis techniques are empirically derived, and so they are not generally applicable to new technologies, and they can only be applied to evaluation of new system design in limited circumstances.

Detailed physics level “first principle” models have not seen great application in the vulnerability analysis methodology for several reasons: in many cases, they are not well enough developed to represent ballistic impacts, they are computer intensive and time consuming to run, and in some instances simply no resources have been available to consider their application.

New model developments are on the horizon, such as the Advanced Joint Effectiveness Model (AJEM), which may accommodate the results of detailed first principle models (and in some cases the models themselves). Some of these techniques may also be readily integrated with existing vulnerability codes. However, this has not been done to date to any great extent.

One of the lessons learned from the SMART project was to allow for funding to improve the models as they are being verified and validated. SMART taught that correcting errors and integrating new enhancements during the V&V process requires extra funding initially, but, saves money in the end.

This project will integrate the elements of a systematic and proven V V&A process for both existing and developmental models with the development of first principle vulnerability analysis methods, and validate the resulting M&S using ballistic test data obtained from all the services from a number of ongoing test sources.

These test sources include the Joint Live Fire (JLF) program, Live Fire Testing (LFT) by various acquisition programs, and other sources such as the JTCG/AS, JTCG/ME, the Defense Nuclear Agency (aka) DNA, and the National Laboratories.

Requirements

Validated vulnerability assessment methodologies are required for all weapon system development programs. In order to support procurement decisions, design tradeoff decisions, specification development and verification, ECP and P3I decisions, live fire testing and advanced concept studies for combat weapon systems, the ability to evaluate the vulnerability of the vehicle in a realistic threat environment is essential.

This is a requirement for all the services for any new procurement or weapon design improvement. This is particularly true for the new generation of aircraft and weapons systems where vulnerability reduction is such an important part of the design. In order to adequately support mandated Live Fire Testing, validated and detailed vulnerability assessment tools which provide realistic predictions of test results are essential.

In “Live Fire Testing of the F-22″, the National Research Council concluded that “. . . significant improvements are needed in several of the tools that complement live fire testing”; that “There is considerable need for expanded efforts over the next several years to improve the databases used in models for conducting vulnerability assessments”; “formal validation and accreditation . . . of (vulnerability) models used by the Air Force and other services is warranted”; and, that the “vulnerability community could make much better use of advanced analytical tools (e.g., finite element analysis) . . .”.

Advanced Joint Endgame Model (AJEM) – Encounter Group Software Overview

Proposed

AJEM is a computer simulation of the terminal conditions that result when a weapon engages an air target. The endgame involves elements of missile flyout and guidance, projectile trajectories, fuzing, and warhead interactions with targets. With appropriate modeling of targets, threat trajectories, and encounter conditions the methodology is not limited to air targets and can be utilized for surface target analysis or to support live fire tests by emulating single or multiple object impacts with specific target structures.

AJEM will allow the User to combine the elements of target modeling, encounter geometries and kinematics, generation of weapon burst positions from proximity or contact fuzing, propagation of damage mechanisms to the target, damage mechanism/target interaction (penetration, fire, blast, etc.), target systems relationships (functionality, redundancies, etc.), and target remaining capability or loss of function to perform lethality and vulnerability analyses. AJEM is structured to contain several options for handling level of complexity versus speed of computation and level of detail known about the targets or threats.

Needed input data is gathered from multiple sources and models (for existing as well as conceptual systems) and are input to and stored in data files. The data can be generated and maintained by respective expert sources (e.g., intelligence agencies, fuze, warhead, and guidance engineers, and vulnerability analysts) for use by analysts desiring to do component studies up to COEA level studies.

Using these databases, an analyst can specify a static, singular trajectory and/or variable, Monte Carlo conditions in order to accomplish a wide range of study objectives. For example, the analyst can vary the terminal flight path in a deterministic pattern to determine how aircraft survivability varies with threat approach aspect. AJEM provides the capability to specify and vary each of the dozens of conditions and simulation options within a study.

Once the study conditions are specified, the analyst can run AJEM in various modes. Runs can be made individually with detailed, time stepped, real-time output describing what is going on during a single encounter, or many thousands of encounters can be run with just a single output, Pk (aka) Potential Kill, for each. Based on study requirements, AJEM could be linked with other models, like ESAMS and RADGUNS, to provide effectiveness evaluations for their engagements or it could be linked to hardware in the loop test facilities to provide endgame effectiveness determinations.

The AJEM analysis utilities allow the analyst to visually display pictures of target and threat models; three-dimensional, variable aspect, views of the engagement; two-dimensional graphs of data (e.g., Pk versus angle-of-attack); and statistics such as average Pk of a missile against a set of targets or average Pk for each target. With the graphical displays (for which hardcopy output can be obtained as well) and associated digital data, the analyst can see what happened during the engagements and can provide input (such as a particular SAM Pk envelope for a conceptual aircraft) to other models used to do mission analysis, COEA support, or for inclusion in a report.

The Encounter Group Software Design Document (SDD), discusses those portions of the AJEM computer model which deal with defining the initial encounter conditions, generating a burst position from internal or external fuze modules, and output data display and analysis requirements. See, e.g. “DIA Photos“, for more information on this website.  

NAIC Support INSS Profile

USA, Washington, D. C. – October 23, 2001 – The United States Air Force ( USAF ), Institute for National Security Studies ( INSS ) published “Occasional Paper” ( its own published volumed editions ) are primarily sponsored by the National Security Policy Division ( NSPD ), Nuclear and Counter-Proliferation Directorate ( NCPD ), Headquarters U. S. Air Force ( HQ USAF / XONP ) and the United States Air Force Academy ( USAFA ) faculty Dean.

INSS sponsors currently include:

Air Staff Intelligence, Surveillance, and Reconnaissance Directorate ( XOI );

U.S. Department of Defense ( DOD ), Office of the Secretary, Office of Net Assessment ( OSD / NA );

Defense Threat Reduction Agency ( DTRA ), Defense Special Weapons Agency ( DSWA ), On-Site Inspection Agency ( OSIA );

U.S. Army Environmental Policy Institute ( AEPI );

U.S. Space Command ( SPACOM ) Plans Directorate ( PD ); and,

U.S. Air Force ( USAF ) Long-Range Plans Directorate ( XPXP ).

INSS mission promotes U.S. Department of Defense ( DOD ) National Security Research ( NSR ) – within the military academic community – and supports U.S. Air Force National Security Education ( NSE ) programs.

One ( 1 ) of its authors, Lieutenant Colonel Roy E. Horton III ( for the INSS Occasional Paper ) holds an interesting background:

- Bachelor of Sciences degree in Electrical Engineering;

- Masters degree in Strategic Intelligence – originally commissioned into the U.S. Air Force through the Reserve Officer Training Corps ( ROTC ) at the University of Southern California ( 1979 );

- Intelligence officer radar analyst for the National Aerospace Intelligence Center ( NAIC ) at Wright-Patterson Air Force Base, Ohio;

- Chief, Command Control and Communications ( C3I ) Electronics Group ( EG ), Liaison Officer at USAF Europe Headquarters ( HQ ) Intelligence ( Ramstein Air Base, Federal Republic of Germany ) providing ‘critical intelligence support’ for “must know” operational and developmental programs like the F-117 ( Stealth military strategic aircraft ), F-22 and B-2 ( military bomber aircraft );

- Defense Intelligence Agency ( DIA ) Scientific and Technical ( S&T ) manager of  intelligence products on foreign air defense command and control systems deployed extensively throughout Europe and the Middle East in support of Operation Desert Shield and Operation Desert Storm;

- Air Command and Staff College attendee;

- Supreme Headquarters Allied Powers Europe Intelligence Division ( Mons, Belgium ) principal intelligence support planner for NATO operations in Bosnia and Hercegovnia;

- National Defense Fellowship from the Arms Control, Disarmament, and International Security program at the University of Illinois ( Urbana – Champaign, Illinois, USA ) from July 1997 to May 1998;

- Commander, 91st Intelligence Squadron ( Fort George G. Meade, Maryland, USA ) during August 1998.

CIA WATCH

[ click photo ( above ) to enlarge ]

USS Cole Secrets Or Propaganda?

YEMEN, Aden – September 2000 - Yemen Navy base commander General Mohammad Ali Ibrahim reportedly said the explosion that ripped open the side of the U.S. Navy U.S.S. Cole was not caused “intentionally by external forces.”

Gen.  Ali Ibrahim said the explosion “was most likely caused by a technical malfunction in the U.S. Navy destroyer itself . . . the large hole – the explosion left in the vessel – shows it is far fetched that it was caused by explosive devices, no matter how big.”

U.S. private sources held facts that the ‘ends’ of the ‘steel hull plates’ appear ‘snapped’, ‘torn’ and ‘ripped-away’ rather than from any massive ‘bending’. The deck plates appeared ‘bowed upward’ showing impact carried from ‘inside’ to ‘spread upward’.

U.S. sources revealed that ‘shooting’ ( as its referred to ) or ‘cracking steel plates’ is an ‘exact science’ with the bomber normally using ‘shaped line charges’ - cut to order - backed with ‘wood frames’ and ‘metal frames’, however when ‘underwater’ or at ‘water level’ 55-gallon drums of SEMTEX ( plastique, a plastic compound  ’stable’ explosive ) or a ANFO ( a mixed ‘unstable’ explosive ) either in the boat ( highly unlikely as it would have taken 1,000 to 1,500-lbs. of SEMTEX to detonate that type of explosive force plus that ‘small’ of a ’rubber inflatable boat’ could not carry that payload weight onboard without being severely low in the water level but could have been ‘towed underwater’ possibly accomplishing an act like this. Water under explosive pressure – at a high order of detonation such as this – would be tantamount to a steel fist punching ‘inward’ – though steel - but not ‘outward’.

 CIA WATCH

Iraq Rematch Bush vs. Hussein Set

IRAQ, Tuwaitha – July 30, 2001 - Unfriendly and old reminders are coming to a head this year between Saddam Hussein and – this time – it’s George Bush Jr. Almost akin to an old America televison series rerun or boxing rematch, these same two ( 2 ) names are seen yet again set in the same place ( with exception of a few minor modifications ) but coming in a ‘new time slot’ set for more action so, stay tuned with this new handy program guide ( below ) providing legacy secrets ( below ) for what may come:

United States, and air raid allies, targeted Iraq veterinary clinics, hospitals and more without public mention of military strategic Initial Point ( IP ) location interests. Why? Intelligence data ( below ) sheds some light now.

OCR ( Optical Character Recognition ) ‘official intelligence transmissions’ of teletype image documents, sent to respective global intelligence reception centers, have now been translated into text readable publishing ( below ).

[ NOTE: Information ( immediately below ) was "Not finally evaluated intelligence," consequently "Unclassified" and "Non-Classified" in these 'back-channel message traffics', although 'routed' by 'only one' ( 1 ) official U.S. Navy 'field intelligence agent' ( NSA assigned NSG ) worldwide for 'further review' by U.S. domestic and foreign station intelligence analysts', actually originated from an 'Iraq based intelligence source' ( a 'physics and science doctor' ) advisor ( very close to Saddam Hussein ) to an Iraq based CIA transmitter relay for U.S. Navy processing with satellite routing distribution coordinates read ( below ). ]

- -

IIR 2 201 0629 90 / THE NUCLEAR RESEARCH CENTER ( NRC ) ( U ).

Filename: 22010629.90a

ENVELOPE

CDSN = LGX736 MCN = 90088/47183 TOR = 900882351

RTTSZYUW RUEKJCS6678 0882351- –RUEALGX.

ZNY

HEADER

R 292351Z MAR 90

FM JOINT STAFF WASHINGTON DC

INFO RUEADWD/OCSA WASHINGTON DC

RUENAAA/CNO WASHINGTON DC

RUEAHQA/CSAF WASHINGTON DC

RUEACMC/CMC WASHINGTON DC

RUEDADA/AFIS AMHS BOLLING AFB DC

RUFGAID/USEUCOM AIDES VAIHINGEN GE

RUETIAQ/MPCFTGEORGEGMEADEMD [ N.S.A. Hdqtr., Maryland, USA ]

RUEAIIA/CIA WASHINGTON DC [ Office of Central Intelligence White House ( OCIWH ) Sub-Level 8 ]

RUEHC /SECSTATE WASHINGTON DC

RUEAMCC/CMC CC WASHINGTON DC

RUCQVAB/USCINCSOC INTEL OPS CEN MACDILL AFB FL

RUCJACC/USCINCCENT MACDILL AFB FL//CARA//

RUSNNOA/USCINCEUR VAIHINGEN GE//ECJ2//

RUFTAKA/USA INTEL CENTER HEIDELBERG GE

RUFTAKC/UDITDUSAREUR HEIDELBERG GE

RHDLCNE/CINCUSNAVEUR LONDON UK//N24//

RHFPRWO/RWO RAMSTEIN AB GE//IN/IV/SP//

RUDOGHA/USNMR SHAPE BE//SURVEY//

RUEALGX/SAFE

R 291505Z MAR 90

FM: CDR [ (b)(1) sec 1.3(a)(4) ] USAOPSGP INSCOM ALEX VA //[(b)(1) sec 1.3(a)(4) ]//

TO: AIG 9194

INFO RUEBJFA/CDRASAOPSGP FT MEADE MD//IAGPC-CM//

RUEKJCS/DIA WASH DC

RUFHTV/USDAO TEL AVIV IS

RUEORDF/DIRAFMIC FTDETRICKMD//AFMIC-CR//

RUSNNOA/USCINCEUR VAIHINGEN GE//ECMD//

RUCJACC/USCINCCENT MACDILL AFB FL//CCJ2

BT

CONTROLS

QQQQ

SERIAL: IIR 2 201 0629 90

BODY

PASS:  (U) DIA FOR DB-8C, DAH-6 FOR INFO

COUNTRY:  ( U ) IRAQ ( IZ );  [ (b)(7)(D) ]

SUBJ:  IIR 2 201 0629 90 / THE NUCLEAR RESEARCH CENTER ( NRC ) ( U )

WARNING:  ( U ) THIS IS AN INFO REPORT, NOT FINALLY EVALUATED INTELLIGENCE. REPORT CLASSIFIED [ oops! ]

DEPARTMENT OF DEFENSE

DOI:  ( U ) 900300

REQS:  ( U ) G-OSG-1610-19-88;  S-OSG-01198;  S-UDX-90001

SOURCE: (S/NF/WN) //2 243 0850//[ (b)(1) sec 1.3(a)(4) ][(b)(7)(D) ]

SUMMARY: THE NUCLEAR RESEARCH CENTER, TUWAITHA CONTINUES TO PROCURE BIOLOGICAL RESEARCH MATERIAL

TEXT: [ (b)(7)(D) ]

THE NUCLEAR RESEARCH CENTER or NRC AT TUWAITHA HAS NOT ONLY CONTINUED, BUT INCREASED THE PROCUREMENT OF MEDIA FOR CELL CULTURES AND MATERIAL FOR MOLECULAR BIOLOGY AND GENETIC ENGINEERING. THE CENTER IS ALSO PRECURING A CENTRIFUGE SUITABLE FOR VIRUSES, BACTERIOPHAGE AND CELL NUCLEI.  ( SOURCE COMMENT ) – EVEN THOUGH THE NRC HAS BEEN PROCURING MATERIALS ASSOCIATED WITH GENETIC ENGINEERING AND VIROLOGY, THERE HAVE BEEN NO PUBLICATIONS IN THESE AREAS FROM THIS FACILITY. FOR THAT REASON IT IS SPECULATED THAT THE FACILITY IS AFFILIATED WITH BW.

COMMENTS: (U) NONE.

//IPSP: (U) PT 1610; PT 1610; PT 1600//.

//COMS: (U) 141; 144; 144//.

ADMIN

PROJ: (U) 202019.

INSTR: (U) US NO.

PREP: (U) 2-10446.

ACQ: (U) ALEXANDRIA, VA (900329).

DISSEM: (U) NONE.

FIELD: NONE.

SENT TO: NONE.

WARNING: (U)

IIR 2 201 0629 92 / VACCINE PROCUREMENT ( U ).

Filename: 22010629.92a

ENVELOPE

CDSN = LGX485 MCN = 92134/40888 TOR = 921342112

RTTSZYUW RUEKJCS 7231 1342113 — RUEALGX

ZNY

HEADER

R 132113Z MAY 92

FM: JOINT STAFF WASHINGTON DC

INFO: RUEAHQA/CSAF WASHINGTON DC

RULSJGA/COGARD INTELCOORDCEN WASHINGTON DC

RHEPAAB/TAC IDHS LANGLEY AFB VA//IDHS//

RUFTAKC/UDITDUSAREUR HEIDELBERG GE

RUDOGHA/USNMR SHAPE BE//SURVEY//

RUCJACC/USCINCCENT MACDILL AFB FL//CARA//

RUQYSDG/FOSIF ROTA SP

RUEHC /SECSTATE WASHINGTON DC

RULKQAN/MARCORINTCEN QUANTICO VA

RUFTAKA/CDR USAINTELCTRE HEIDELBERG GM

RUEALGX/SAFE

R 121359Z MAY 92

FM: CDR [ (b)(1) sec 1.3(a)(4) ]USAFIA INSCOM ALEXANDRIA VA // [(b)(1) sec 1.3(a)(4) ]//

TO: RUEBJFI/CDRUSAFIA FT MEADE MD//IAFIA-CM/IAFIA-S//

RUDHAAA/CDRUSAINSCOM FT BELVOIR VA//IAOPS-H-C//

RUEADWD/DA WASHINGTON DC//DAMI-POH/DAMI-FIT/DAMO-SWC//

RUDMMIC/NAVMARINTCEN WASHINGTON DC//DC-30/DC-40/DC-50//

RUEAIIA/CIA WASHINGTON DC//ACIS-TMC/OSWR-LSB/OIA-CWEB//

RUEAIJU/NPIC WASHINGTON DC//IEG-TFD//

RUEOAYC/FSTC CHARLOTTESVILLE VA//AIFICB//

RUCIAEA/FASTC WRIGHT PATTERSON AFB OH//SCIS/NIIS//

RUEKJCS/DIA WASHINGTON DC//DAH-3//

RUEATAC/CDRUSAITAC WASHINGTON DC//AIAIT-RC//

RUCDGDA/DIRMSC REDSTONE ARSENAL AL//MSC-2A//

RUETIAA/NSACSS FT MEADE MD//T5232//

RUEORDF/DIRAFMIC FT DETRICK MD//AFMIC-CR/EPI/LST//

RUEOHNA/CDRUSAJFKSPWARCEN FT BRAGG NC//ATSU-CD-CS-T//

RUEDADA/AFIA AMHS BOLLING AFB DC

RUFTAKA/CDRUSAINTELCTRE HEIDELBERG GM

RUEOACC/CDRPSYOP GP FT BRAGG NC//ASOF-POG-SB//

RUFDAAA/CINCUSAREUR HEIDELBERG GM//AEAGB-C (CM)//

RUFDAAA/CINCUSAREUR HEIDELBERG GM//AEAGB-PD-CUR//

RUEHBJ/USDAO BEIJING CH

RUFHOL/USDAO BONN GM

RUEHDM/USDAO DAMASCUS SY

RUEHNE/USDAO NEW DELHI IN

RUFHTVB/USDAO TEL AVIV IS

RUSNTCC/USEUCOM VAIHINGEN GM

RUEHC/SECSTATE WASHINGTON DC

RHDLCNE/CINCUSNAVEUR LONDON UK//N2/N24//

RUEACMC/CMC WASHINGTON DC

RUEOFAA/JSOC FT BRAGG NC//J2//

RUFRQJQ/COMSIXTHFLT//NR//

RHDLDLL/DIAL LONDON

RUCNFB/FBI WASHINGTON DC

RULYSHH/FICEURLANT NORFOLK VA

RUCIBBA/HQUSCENTAF SHAW AFB SC //INR//

RULKQAN/MARCORINTCEN QUANTICO VA

RHDLPGV/NAVENVPVTMED UNIT SEVEN NAPLES

RHEPAAB/TAC IDHS LANGLEY AFB VA//IDHS//

RHCDAAA/USAFSOS HURLBURT FLD FL

RUCJACC/USCINCCENT MACDILL AFB//CCJ2-ISM/ISA/CARA//

RUCJAAA/USCINCSOC MACDILL AFB FL//SOJ2//

RUDOGHA/USNMR SHAPE BE//SURVEY//

INFO RUSNNOA/USCINCEUR VAIHINGEN GM//ECJ2-OC/ECJ2-JIC//

BT

CONTROLS

QQQQ

SERIAL:  ( U ) IIR 2 201 06 29 92

BODY

PASS:  (U) DIA FOR DB-38/8C’ DAH-7/6 FOR INFO.

COUNTRIES:  ( U ) IRAQ ( IZ );  GERMANY ( GM );  NETHERLANDS ( NL );  JORDAN ( JO ).

SUBJECT: IIR 2 201 0629 92/ VACCINE PROCUREMENT (U).

WARNING:  ( U ) THIS IS AN INFO REPORT NOT FINALLY EVALUATED INTELLIGENCE. REPORT CLASSIFIED. [ oops! ]

DEPARTMENT OF DEFENSE

DOI:  (U) 920000.

REQS:  (U) D-TSA-1610-02-90.

SOURCE: //2 243 0834//[ (b)(7)(D) ]

SUMMARY: IRAQ IS ATTEMPTING TO PROCURE RABIES AND ANTHRAX VACCINES. IRAQ MAY HAVE OBTAINED THE VETERINARY ANTHRAX BOVINE LIVE SPORE VACCINE FOR USE IN HUMANS.

TEXT: (U)

1. AT THE END OF 1991, KIMADIA (NFI) SHOWED INTEREST IN THE PROCUREMENT OF AN UNKNOWN QUANTITY OF RABIES VACCINES. A SHIPMENT WAS ALSO TO HAVE BEEN DELIVERED AT THE BEGINNING OF 1992 FROM GERMANY’S KARL KOLB COMPANY TO KIMADIA. THE SHIPMENT WAS TO HAVE BEEN ROUTED VIA AMMAN, JORDAN.

2. AT THE BEGINNING OF THIS YEAR, IRAQ WAS ENGAGED IN THE PROCUREMENT OF 4000 VIALS ( 100 MILLILITERS EACH ) OF ANTHRAX BOVINE LIVE SPORE VACCINE’ THIS ACTIVITY WAS CARRIED OUT UNDER THE AUSPICES OF THE UNITED NATIONS’ FOOD AND AGRICULTURAL ORGANIZATION or FAO WHICH APPROACHED THE DUTCH ORVET B.V. COMPANY. THE PROJECT WAS DESIGNATED FAO PROJECT OSRO/IRQ/103/FIN.

COMMENTS:  ( SOURCE COMMENT ) – IN VIEW OF IRAQ’S PRESENT DIFFICULTIES IN OBTAINING HUMAN ANTHRAX VACCINES’ IT IS POSSIBLE THAT THESE VACCINES, USUALLY INTENDED FOR VETERINARY USE, ARE IN THIS CASE INTENDED FOR IMMUNIZATION OF HUMANS. IT IS RECALLED THAT VETERINARY ANTHRAX VACCINES ARE SUPPOSED TO BE PRODUCED AT THE AL-KINDI LABORATORIES IN ABU-GHRAIB.

//IPSP: (U) PT 1610//.

//COMSOBJ: (U) 141//.

ADMIN

PROJ: (U) 202019.

INSTR: (U) US NO.

PREP: (U) 2-10479.

ACQ:  ( U ) ALEXANDRIA VA ( 92050 1).

DISSEM: (U) FIELD: NONE, SENT TO: NONE.

WARNING: ( U ) REPORT CLASSIFIED [ oops! ]

[b.2.]

SERIAL:  (U) IIR 2 340 0258 90

COUNTRY:  (U) IRAQ ( IZ );  KUWAIT ( KU ); SAUDI ARABIA ( SA ).

SUBJECT: IIR 2 340 0258 90/ USE OF CHEMICAL WEAPONS ( U ).

WARNING: (U) THIS IS AN INFORMATION REPORT, NOT FINALLY EVALUATED INTELLIGENCE.

DEPARTMENT OF DEFENSE

DOI: (U) 850000.

[b.2.]

[b.1. sec. 1.5.(c)]

SUMMARY: INITIAL CHEMICAL RELEASE AUTHORITY IS HELD BY SADAM HUSSEIN. TO INITIATE CHEMICAL ATTACK, HUSSEIN INFORMS THE GENERAL STAFF WHICH ISSUES VERBAL ORDERS TO CORPS CDRS AND SHOWS THEM THE ONLY EXISTING CHEMICAL MAP. CORPS CDRS INFORM DIVISIONS TO PREPARE TROOPS FOR CHEMICAL ATTACK FROM OPPOSING FORCES.

TEXT: 1. [b.1. sec. 1.5.(c)]

SOURCE, AT LEAST IN GENERAL TERMS, HAS A FAIRLY ACCURATE INTELLIGENCE OVERVIEW OF THE SITUATION IN THE GULF AS OF 900807 AND HAS NUMEROUS RESOURCES AT HIS DISPOSAL TO SUPPORT HIS ASSESSMENTS.

2. CHEMICAL RELEASE AUTHORITY – DURING THE INITIAL PHASE OF CONFLICT, RELEASE AUTHORITY FOR USE OF CHEMICAL WEAPONS WILL REMAIN WITH SADAM HUSSEIN. SADAAM HUSSEIN WILL INFORM THE GENERAL STAFF WHEN IT IS TIME TO UTILIZE CHEMICAL WEAPONS.

3. COMMUNICATIONS – RADIO COMMUNICATIONS CONCERNING THE USE OF CHEMICAL WEAPONS IS FORBIDDEN EXCEPT UNDER THE FOLLOWING CONDITIONS – DIVISION AND CORPS COMMANDERS ARE AUTHORIZED TO REQUEST USE OF CHEMICAL WEAPONS IF THEY ARE IN IMMINENT DANGER OF BEING OVERRUN OR DEFEATED. EVEN IN THIS INSTANCE THE USE OF COURIERS IS PREFERRED.

4. NORMAL PROCEDURES – CHEMICAL PLANNING IS AN INTERGRAL PART OF ALL IRAQI MILITARY OPERATIONS. WHEN HUSSEIN DECIDES TO USE CHEMICAL WEAPONS HE WILL INFORM THE GENERAL STAFF. THE GENERAL STAFF WILL SUMMON THE CORPS COMMANDERS TO COME TO THE GENERAL STAFF HEADQUARTERS ( HQS ) IMMEDIATELY. ALL COMMANDERS ARE GIVEN A VERBAL CHEMICAL WARNING ORDER AND ARE SHOWN THE ONLY EXISTING CHEMICAL MAP. CORPS COMMANDERS CALL THEIR DIVISION COMMANDERS AND TELL THEM TO PREPARE THEIR TROOPS FOR AN OPPOSING FORCE CHEMICAL ATTACK. FOR EXAMPLE, WHEN IRAQ USED CHEMICAL WEAPONS AGAINST THE IRANIANS, THE IRAQI FRONTLINE TROOPS WERE INFORMED THAT THEY COULD EXPECT AN IRANIAN CHEMICAL ATTACK. WHEN THERE IS INSUFFICIENT TIME TO CONDUCT THIS PROCEDURE, THE CHEMICAL WARNING ORDER BYPASSES ALL ECHELONS AND THE FRONTLINE TROOPS ARE TOLD TO EXPECT AN OPPOSING FORCES ATTACK. COURIERS ARE USED TO RELAY THE INFORMATION.

[b.1. sec 1.5(c)]

[b.2.]

CIA WATCH

Sri Lanka Boat Detained At Yemen Port

YEMEN, Aden – August 16, 2001 and August 26, 2001 - One hundred and sixteen ( 116 ) Sri Lanka passengers still remain detained in an Aden, Yemen sea port for having illegally arrived in Yemen territorial waters.

On August 16, 2001 and August 26, 2001 passengers arrived at the Aden Sea port in two ( 2 ) conventional boats – typically used for ‘smuggling foreign workers’ into neighboring countries – for ‘refueling’ and upon entry  were detained by security port authorities.

Boats were found overcrowded with most Passengers, with ’no passports’ or ‘identity papers’, were found overcrowed into the boats lacking safety measures for the large number of occupants.

Boat owner is to be contacted, for sending a well-equipped ship to collect them, the Yemen Port Authority only said.

Yemen Soldiers & Politicians Exiled In Iraq Returned To Yemen Via Syria

YEMEN, Aden – September 2001 - A Yemen military returnee said he was just one of twenty four ( 24 ) Yemen Army ‘officers’, and ‘politicians’, whom were returned Friday – from Damascus, Syria – in Aden after exile for seven ( 7 ) years in Iraq.

Lieutenant Colonel Mahdi Shaush said that a group of twenty ( 20 ) military officers, four ( 4 ) military civilians and more than seventy five ( 75 ) family members were returned from Damascus, Syria.

The returnees were leaders of the aborted Yemen 1994 secession attempt by former South Yemen which, had been unified with the former, Yemen Arab Republic in 1990. Yemen President Ali Abdullah Saleh earlier issued a pardon and gave his directives to ease the return of the exiles.

Yemen Sets Up Flights To Iraq With Jordan Permission

YEMEN, Sana’a – September 2001 - Yemen officially requested Jordan to allow Yemen air flights to cross Jordan airspace into Baghdad, Iraq.

Al-Zawraa newspaper mentioned Yemen wanted to organize weekly flights from Sana’a, Yemen to Baghdad, Iraq meeting increased demands for passengers between those two ( 2 ) country’s cities.

INTELL NEWS

Usama bin Laden CIA Boomerang Monsters 

USA, Washington, D.C. – September 12, 2001 - President George W. Bush Jr. announced that, the United States was officially at War as a result of the Nation having sustained damages from multiple international terrorist acts – however he neglected to mention ‘who’ the United States was now at “War” with.

How did Usama bin Laden (aka) Osama bin Laden terrorist cells initially came to be fuele has not been addressed by any U. S. news media.

Usama bin Laden, former Iran government leader Ayatollah Khomeni and former Pamama President General Manuel Noriega all have similar things in common. Drug cartel interests, formerly run by burned-out stooge monsters previously turned-around by the Central Intelligence Agency ( CIA ). In the case of Usama bin Laden, however the biggest difference was the ‘considerable degree’ his ‘blowback’ was either ‘unwilling or ‘unable’ to be stopped.

From the 1970s thru 1980s, during the Soviet war against Afghanistan ( Soviet-Afghan War ), saw Russia military soldiers fighting Afghanistan domestic soldiers and its imported foreign soldiers whom were being ‘secretly militarized’ by America  that called them “Afghan Freedom Fighters” ( also known as ) the  ”Mujahideen” whom were also seen fighting against the Afghanistan ”Northern Alliance.”

From the 1970s through the 1980s, Usama bin Laden led his Islam religious fanatic militant terrorist cells enabled through foreign sources - believed connected to CIA interests - that nourished these same monsters whom just bit-off a chunk of America. Head monster Osama bin Laden has - for many years previously – continued nibbling ( on America ) by leading global terrorist attacks elsewhere ( overseas ).

Some claim America renigged on certain promises or just simply abandoned Usama bin Laden and his cause back in Afghanistan as America was seen doing to friends in Viet Nam when it left there. There subtle difference was, no one was supposed to ‘know’ the United States was ‘involved’ in Afghanistan back then.

Russia Soviet military war in Afganistan gave up much, in the same fashion as did the U.S. in Viet Nam, however the Soviet posture was to continue allowing the ‘Taliban way of government’ maintaining rule over Afganistan citizens.

The Taliban government has been permitting Usama bin Laden paramilitary Islamic extremists  ‘al Qaeda’, and others, free harbor and continued sanctuary for training and housing international terrorists within its borders, however for years Pakistan has been financially supporting Taliban government rule.

The following notes and referral pages to other points on this website that are sensitive points of interest that may serve to identify the Afganistan and Pakistan regime leaderships as those collective entities with which the West will present their final ultimatum to “Give up Usama bin Laden or else be blasted out of existence”. Interesting problems arise from that type of psychological warfare simply because that part of the World knows full well what the United States initially fueled what are now terrorist cells provided with modern era military warfare strategies, considerable funding, military armaments and other supplies. In short, long ago America military influences served to nurture Usama bin Laden type Islamic terrorists that now possess rather solidified emotional footholds in both Afghanistan and Pakistan citizenry.

Residents of Afghanistan are in-part unwitting victims of internal party struggles to gain one (1) supreme leadership government. Most Afghan residents are incredibly poor, underprivileged, starving and virtually stuck – unable to move away from a war – with mass transportation systems inoperable for the most part. Afghani children, on a daily basis, are killed or maimed from encountering landmines that were never cleared away by anyone so, deadly explosive systems remain buried in residential areas for even more suffering as United Nations ( UN ) and International Red Cross ( IRC ) assistance in Afghanistan has greatly diminished. In short, bombing and blasting on a widespread basis counters efforts to help Afghan people who are already suffering.

Surgical strikes might be effective ‘if’ target areas could be ‘properly identified’ before terrorist cells go underground traversing their tunnel systems, however that is highly unlikely – this late in their game.

Here are some points to consider:

1. Usama bin Laden has been extremely successful in his ability to unite and direct the carrying out of multiple and very well-planned Islamic-extremist terrorist-cell group’s fight against the United States and in many other foreign Countries as well. Usama bin Laden, via old CIA-type brainwashing techniques, has successfully mounted a new radical Islamic religious militant front which, fights U.S. interests both at home (domestic) and abroad (foreign). Usama’s mentors or trainers as it unbelieveably turns out was “us”, i.e. America. We, are wholly responsible for the indoctrination, training and support which created this monster’s new radical Islamic militant religious front. as history now proves.

2. There exists today, a self-said member of Usama bin Laden’s “al-Qaede” terrorist cell. A Morroco man by the name of, L’Houssaine Kherchtou, who was supposedly sent under direct orders of Usama bin Laden to Nairobi, Kenya in order to become a pilot. The true degree and sophistication of his pilot training skills were not initially revealed except to say that he said he performed some crop dusting on fields in Nairobi.

L’Housainne Khertou being only a crop dusting pilot training under Usama bin Laden directives was down-played by, U.S. Department of Justice officials during the first World Trade Center bombing in New York, years ago. It seems that L’Housainne was being trained many years ago in-advance for an ingenious plan. Although he would appear as only a low-profile type crop dusting pilot, L’Housainne was to have a future very high-profile. His future and significantly higher profile would appear when he would appear out of nowhere as a “sleeper” for Usama bin Laden as he was trained to use a new delivery method for chemical warfare attacks on World citizenry by, loading the plane’s chemical tanks with deadly chemicals rather than crop chemicals.

Kherchtou L’Housainne and his family are safe within the U.S. Government’s, Witness Protection Program now, after his aid many years ago in providing the U.S. with information leading to the conviction of the bombers who staged the New York World Trade Center bombing, years ago. The same men who were just “recently convicted”.

3. Afghanistan, is a country rich in history and tradition. It was once the crossroads of very ancient and medieval worlds. Today, Afghanistan (aka) Land Of Khurasan, is suffering a humanitarian crisis unprecedented in World history.

4. The United Nations High Commission for Refugee Resettlement (aka) UNHCRR has been instrumental in aid to relocating approximately 2.5-million former Afghan citizens as refugees to Pakistan and Iran, ½-million others are internally displaced and, 1-million or more are at risk of famine. This catastrophe is the result of over twenty (20) years of war and, the worst drought in memory where “water” continues as an ever-increasing problematic issue throughout the entire global region. The ruling Taliban regime is doing little to alleviate the suffering of the Afghan people.

5. Although Taliban leadership publicly declares a desire for their negotiated end to Afganistan Civil War strife, their radical Islamic religious militant form of Taliban government rule has now embraced Usama bin Laden trained terrorist cell troops as their own military and police force enforcement which, is currently undertaking fresh offensives against the Taliban opposition and conducting numerous illegal border crossing sqirmishes in norther neighboring Soviet-controlled countries such as Tajikistan.

6. The Taliban provides safe havens to indicted international terrorists and goes on even further to utilize the financial support from Pakistan to allow terrorist organizations to run and maintain terrorist-bred training camps in Taliban-controlled, Afghanistan territories. These policies de-stabilize the region and endanger people around the world.

7. The United Nations Security Council has passed two resolutions – UNSCR 1267 (1999) and 1333 (2000) – demanding the Taliban cease their support for terrorism.

8. The United States has great sympathy for the Afghan people and is the largest single donor of humanitarian assistance for Afghans through the United Nations’ support efforts which, includes food, shelter, and medicine.

9. The United States participates in reviews by the United Nations Security Council to assure that the United Nations’ sanctions avoid undue humanitarian impact on the Afghanistan people. See, e.g., “INTELL Briefs“, “CIA Watch” and, “INTELL Photos” subject areas on this website.

U.S. Encounters Multiple Strikes

USA, Washington, D.C. – September 11, 2001 – In a series of multiple terrorist strikes today within the United States, a rumor was begun amongst the confusion that, the U.S. State Department office building on “E” Street had somehow been threatened by a car bomb here, however it was not struck while other targets  were. Multiple targeted strike locations ensued across other parts of the United States today with a variety of explosively destructive techniques.

In Arlington, Virginia the Pentagon building was struck today by a terrorist group implementing a kamikaze style air strike. Used in the attack was a commandeered U.S. commercially flown passenger airline which, was “flown to impact” on the Pentagon building itself which, resulted in the destruction of its west wall and inner building areas. The passenger airline was used as the sole source of destruction by nose-diving it into and colliding with the Nation’s largest military single aboveground complex building here. The specific building-area destroyed was already under a partial re-construction effort included reinforcing ( via retro-fitting ) the building’s “window structures” to defend against armor-piercing bullet and small rocket projectile penetration plastic laminate glass and, outside eavesdropping penetration by using honeycomb-designed plastic-layer window tint.

Also, in another part of the United States at approximately 8:45 a.m. in New York City, New York both of the World Trade Center twin tower buildings were attacked using two ( 2 ) separately commandeered U.S. passenger airlines in yet another kamikaze nosedive attack where they were flown-to-impact at a speed of approximately 300-knots for these strikes. The second twin tower building impact strike came at approximately 9:03 a.m..

The twin-tower buildings, formerly standing 110 stories tall, were instantly reduced in minutes to only about 15 stories tall, that initially remained of these twisted behemoth structures made of steel reinforced concrete cement and glass.

An estimated fifty-thousand ( 50,000 ) human lives appeared trapped within and outside ‘all area buildings affected including those on sidewalks and streets in adjacent areas. In the aftermath of this World Trade Center dual-strike, traffic vehicles ( buses, trucks, and cars loaded with human occupants as well as pedestrians in adjacent areas were literally disintegrated and/or melded into streets and sidewalks littered with building rubble below where buildings once towered.

A new type of very ugly 21st Century graveyard appeared below where the twin-tower structures once stood after they began collapsing ‘inwardly’ in a cascading fountain of flames, smoke and melted destructive rubble.

CIA WATCH

Former CIA Monsters Out Of Control

USA, District of Columbia, Washington - September 11, 2001 – Brought to past, the devastating kamikaze air strike on three ( 3 ) locations within the United States with commandeered commercial passenger jet aircraft airlines flown-to-impact created a wake of death and mass destruction the likes of which the World has never seen during peacetime. These attacks were wrought on American soil sites from out of the extremist and radical wrath of paramilitary global-wide Islamic-extremist terrorist cell groups.

Names: There are a multitude of group and splinter group names and some with “no names”. Identifying a terrorist cell via its “label” will not necessarily serve to identify the true culprits of their terrorist attacks in these instances since, many cells are instantly formed and then disbanded and then members are re-joined and split-up into yet another variety of other cells some of whom either have no names per se or simply new “given names” from Usama bin Laden, himself. In short, pinpointing culprits for any long periods of time is next to impossible due to flexibilities in their operational planning, intelligence and, terrorist methodologies or works. Here’s the short list:

Pakistani run camps near Miranshah ( Afghan – Pakistan border town );

Harkatul Ansar (aka) HUA;

Jamiatul Mujahideen ( 250 soldiers + ).;

( unkown name: Bangladesh, India based Islamic militant group );

International Islamic Front For Jihad Against Jews & Crusaders;

al-Gama’a al-Islamiya;

Egyptian Islamic Jihad;

Aden-Abyan Islamic Army;

Gama’at al-Islamiya;

Harakat Ul-Mujahidin;

al-Qa’ida (aka) al-Qaeda, al-Qaeda fighter wing (aka) 055 Brigade;

Islamic Army;

World Islamic Front for Jihad Against Jews and Crusaders;

Islamic Army for the Liberation of the Holy Places;

Usama Bin Laden Network;

Usama Bin Laden Organization;

The Group for the Preservation of the Holy Sites;

Islamic Salvation Foundation;

Some of Usama bin Laden terrorist camp names are: Salman Farsi, Badar 1, Badar 2, and Saiful Islam - inside Afghanistan – and others elsewhere.

Description: Established by Usama bin Ladin around 1990 to bring together Arabs who fought in Afghanistan against the Soviet invasion. He through the direction of the U.S. Central Intelligence Agency, helped finance, recruit, transport, and train Sunni Islamic extremists for the Afghan resistance against the Soviet Union. His current goal is to “re-establish the Muslim State” throughout the World. He works with allied militant Islamic-extremist groups to overthrow regimes it deems “non-Islamic” and remove Westerners from Muslim countries. Usama’s issued statement under banner of “The World Islamic Front for Jihad Against The Jews and Crusaders” in February 1998, said in short that, “it is the duty of all Muslims to kill US citizens, civilian or military, and their allies everywhere in the World”.

Global Activities: Primary terrorist training camps are located deep inside Afghanistan subterranean bases. One headquarters is in the Kandahar province area. Specifically, Jalalabad and Khost, Afghanistan were bombed by over eight ( 80 ) cruise missiles launched by the United States. His groups conducted the bombings of both U.S. Embassies in Nairobi, Kenya and Dar Es Salaam, Tanzania on August 7, 1998 killed at least 301 persons and injured more than 5,000 others. He claims to have shot down U.S. helicopters and killed U.S. servicemen in Somalia in 1993 and, to have conducted three (3) bombings targeted against the U.S. troop presence in Aden, Yemen in December 1992. He’s linked to plans for attempted terrorist operations, include the attempted assassination of the Pope in Manila, Philippines in late 1994 with simultaneous bombings of the U.S. and Israeli Embassies in Manila and other Asian capitals in late 1994, the mid-air bombing of a dozen U.S. trans-Pacific flights in 1995 and, a plan to kill President Clinton during a visit to the Philippines in early 1995. Usama bin Laden, continues to train, provide finance and, provide logistic support to his terrorist groups that support his goals spelled out in his fatwahs or holy orders issued which serves to be his Islamic misguided holy ruse.

More groups and camps cover the Globe from the Philippines, Bosnia, India, Pakistan, Afghanistan, Iran, Iraq, Libya, Sudan, Zimbabwe and a host of many other countries throughout the World.

Strength & Size: From several hundred to several thousand members. And, 1,200,000 million was the “Usama bin Laden estimate”. Also serves as the core of a loose umbrella organization that includes many Sunni Islamic extremist groups, including factions of others.

Location & Area of Operation: The U.S. Embassy bombings in Nairobi, Kenya and Dar es Salaam, Tanzania underscore the Usama bin Laden, al-Qa’ida global reach. Usama bin Laden and his key lieutenants in Afghanistan maintained some of its primary terrorist training camps and groups there. Aden, Yemen where the U.S.S. Cole was bombed in an attack, has just as tightly a knit group of supporters which is said to be an ideal second or back-up location to that of Afghanistan as a base of operations for Usama bin Laden and his other groups.

Yemen officials however, have been known to provide sanctuary for other leaders of terrorist organizations by housing them right inside their own palace homes. Such was the case for terrorist, Sheikh Tariq Bin Nasir Bin Abdullah al-Fathli (aka) Tariq al-Fathli.

External Aid: Usama bin Laden (aka) Osama bin Laden, is the son of a billionaire Yemen family based in Saudi Arabia family, who is believed to have initially inherited what amounted to approximately $300,000,000 million dollars he may have used as seed money start-up financing for the global terrorist network base al-Qa’ida (aka) al Qaeda believed deriving its terrorist financing support from other money-making businesses, monetary donations and property collections from like-minded supporters, global funds illicitly siphoned from donations – by both, ‘witting’ and ‘unwitting’ others – provided through a host of others to and including multiple Muslim charitable organizations and Islam religious organizations, amongst which but not limited to, the Islamic Salvation Foundation and others.

CIA WATCH

Libya Gaddafi Ultimatum For U.S. Oil Company Interests

LIBYA, Tripoli - September 13, 2001 – On the heels of 9/11, one of the primary supporters of international terrorism against the West is Libya where back into the limelight sees its leader Colonel Muammar Abu Minyar al-Gaddafi who enlightened the World and the United States with an unfriendly reminder, “U.S. oil company’s ‘oil leases’ are about to expire in Libya” – and if the U.S. wants to renew its ‘oil lease’ for yet another 15-years, the U.S. must lift its ‘trade ban’ against Libya.

The United States may be concerned over Gaddafi’s potential oil lease resales and or oil lease renewals of U.S. oil company’s former oil lease properties there. The “sell-out” will make instant the pathway for yet another third world country to benefit and thereby bolster its economy that could provide further state fund global terrorism.

Afghanistan is interested in the oil lease deal with Libya as are other state sponsored supporters, of terrorism, offering safe harbor to terrorist groups undermining interests of the U.S.

Gaddafi has his country’s own new problems threatening what he believes is a CIA backed group, the SUDAN PEOPLE’S LIBERATION ARMY ( SPLA ) [ background, see: FIRST INTERNATIONAL BANK OF GRENADA LTD. founder Van Brink meetings with SPLA chief commanders for NEW SUDAN currency, Uganda African Reserve entity and other development plannings. ] leading Civil War strife in Libya to dislodge its leader Gadaffi.

In 1999, a little known about ceremony between Libya and the United Kingdom ( UK ) lifting trade sanctions between those two ( 2 ) countries. The United States has not been pleased with the British decision for making the deal they did with Gaddafi.

Britain was handed on a silver platter ( so-to-speak ), by Gaddafi, his own two ( 2 ) former Libya government intelligence agents – responsible for the 1998 killing of 270 passengers aboard the PanAm jumb jet passenger airline crash over Lockerbie, Scotland – in-exchange for the UK lifting its former trade ban sanctions with Libya.

The outcome, of Britain’s exchange for these two ( 2 ) Libya intelligence agents ( sacrificed by Gaddafi ), amounted to:

- In a Scottish court – located in The Netherlands - the two ( 2 ), Lamine Khalifa Fhimah and Abdel-Baset Ali Al-Megrahi, were tried;

- Abdel-Baset AliAl-Megrahi was sentenced to ‘life imprisonment’ ( now under appeal ) [ note: freed in 2010 ]; and,

- Lamine Khalifa was acquitted, freed on all criminal charges.

At the current time however, a British citizen is now actually putting together a “tourist program” with Libya, which probably won’t last if the SUDAN PEOPLE’S LIBERATION ARMY ( SPLA ) has anything to say about it to Gaddafi.

CIA WATCH

Pakistan Taliban Corruption U. S. Trap

PAKISTAN,  Peshwar – September 14, 2001 – Pakistan money funneling via the Pakistan Ambassador to the Taliban government and its terrorist sponsors has gone on for years to the tune of millions of Rs. Some of the covert ruses used to launder terrorist monies out of Pakistan were earmarked for “road repairs in Kabul”.

Over 1,000 Sunni-Islamic religion extremist-type radical students known as the, Madressah are responsible for the majority of the uprisings within Pakistan. These specific students have Afghanistan’s Taliban, al-Qaeda-influenced government agents who have incited and nurtured these students into creating virtual hotbeds for anti-U.S. sentiment throughout Pakistan.

Only twenty-five ( 25 ) miles from Peshawar, Pakistan hundreds of student radicals amass on occasion at the Darul Uloom Haqania facility at Akora Khattak as a staging platform for violent student protests which serve to disrupt Pakistan societal norms along with disrupting the current U.S. cooperative dictatorship already in place.

PARALLEL GOVERNMENTS & TAKEOVERS

CENTRAL ASIA & SOUTHWEST ASIA

ISLAMIC MILITANTS IN AFGHANISTAN

Global Surrogate Warfare Training Center

Pakistan, Islamabad – September 12th, 2001 - Islam militant extremists with Pakistan government controllers supported and assisted for years in the creation of the current Afganistan government Taliban rule.

With the United States as the primary donor and some others, the U.S. has been pumping millions of dollars in supposed “aid” into Pakistan under the ruse of “refugee aid support” for those displaced Afghanis who migrated to Pakistan during the Soviet-Afghan War, years ago. Now, whether the refugees actually ever received all the aid sent them or, whether that aid was turned around and sold throughout the World for arms is anyone’s guess at this point.

Afghanistan’s Taliban government today, controls approximately 70% of its geographic territory. The Taliban’s opposing force today is another Islamic militant religious extremist group Hezb-i Wahdat.

The Hezb-i Wahdat happens to be a former ruling Islamic party occupant of Afghanistan which, continues to receive covert support from Iran and occupies the northern region of Afghanistan.

The Taliban government has been permitting the Usama bin Laden Islamic-extremist paramilitary terrorist group al Qaeda and other radical Islamic-extremist terrorist cells ‘free harbor’ and, continuing sanctuary for the sole purpose of furthering it’s own beliefs and those of its terrorists in training visitors. In short, Afghanistan is nothing more than “terrorist hot bed warfare training camps” now nestled in the hills above what used to be bustling cities and homes to millions of Afghani people.

Looking at Afganistan, a country rich in history and tradition, it was once the crossroads of the ancient and medieval worlds. Today however, Afghanistan is suffering a humanitarian crisis unprecedented in its history due to it having been riddled with so many Islamic militant extremist groups backed by so many foreign country’s covert support operations that one has to wonder who’s really in control of the country of Afghanistan. It’s not as simple as dropping a bob on Afganistan to truely rid the World of Islamic-based terrorist cells. One (1) bomb will not solve the problem for the United States and “that” is what the President Bush hinted at recently when he told the Nation that “we are fighting a new war where the enemy hides in the shadows”.

Approximately 2.5-million Afghan people are refugees now in Pakistan and Iran, ½-million others are internally displaced and, 1-million or more are at risk of famine. This catastrophe is the result of over twenty (20) years of war and the worst drought in memory. The ruling Taliban regime is doing little to alleviate the suffering of the Afghan people.

Developments in Afghanistan are spilling over into the states of Central Asia, which are still emerging from seventy (70) years of Soviet rule.

The five (5) Central Asian states, i.e. Tajikistan, Uzbekistan, Kazakhstan, Kyrgyzstan, and Turkmenistan, are threatened by a lucrative opium and heroin trade, financial crisis, refugee migration flows, and the potential rise of Islamic opposition movements. Above all else, these states fear internal economic collapse, which could send them begging to Moscow for economic and security assistance.

The Islamic Republic of Iran harbors three (3) especially deep suspicions of the Taliban:

1. Deep doctrinal differences divide the religious leaderships in the two countries.;

2. A Taliban-led Afghanistan adds to Iran’s sense of encirclement by hostile Sunni states following what appears to be their de facto or de jure Mesiah, Usama bin Laden.; and,

3. Taliban’s treatment of Shi’ite minorities in Afghanistan arouses alarm in Tehran, Iran.

There are divisional factions which, exist within Iran about whether to engage the Taliban directly in war or, to continue covert support for the Hezb-i-Wahdat (aka) Unity Party, a predominantly Shi’ite umbrella party fighting to overthrow the Taliban today.

Recent border skirmishes between Iran and Afghanistan and the Soviet concern focused at their Tajik-Afghan border, highlights the real potential for an expansion of tensions to a wider, interstate war.

Brief History of Hizb-i Wahdat (aka) Unity Party

In 1988, Iran united eight (8) Shi’a Islamic parties – except for the Harakat-i Islami – into the, Hizb-i Wahdat for Afghanistan.;

In 1993, Hizb-i Wahdat split into factions allied respectively with Jamiat and Hizb.;

In February 1995, Commander Massoud took over Kabul, Afghanistan in an offensive after its ally, Hizb-i Islam, had been defeated by the Taliban.

In January 1996, Iran announced it had once again re-united the same Islamic factions and reconciled them under the rule of President B. Rabbani for Afghanistan.;

Hizb-i Wahdat was use to effectively controlling Central Afghanistan and Hazarajat remained under the control of Hizb-i Wahdat, though initially the Jamiat government and later, the Taliban contested their power in the town of Bamiyan, Afghanistan.

In late August 1998, Hizb-i Wahdat continued its control over the Hazarajat which, was under the Taliban’s blockade from both the north and south. Hizb-i Wahdat was pushed northward by the Taliban and became the major military force in northern Afghanistan and also, became the backbone of the resistance force, opposing Taliban government control attempts to capture Mazar-i Sharif.

INTELL NEWS

Suspect Mix-Up WTC Disaster

USA, New York – September 14, 2001 - CNN issued a correction today for their having wrongfully reported and accused two (2) men of being the terrorist-pilot(s) who flew into New York’s World Trade Center (aka) WTC buildings on September 11, 2001.

CNN’s statement read in-part:

“We would like to correct a report that appeared on CNN. Based on information from multiple law enforcement sources, CNN reported that, Adnan Bukhari and Ameer Bukhari ( Vero Beach, Florida ) were suspected to being two ( 2 ) of the pilots who crashed planes into the World Trade Center. CNN later learned that Adnan Bukhari is still in Florida, where he was questioned by the FBI. We are sorry for the misinformation. A federal law enforcement source now tells CNN that Bukhari passed an FBI polygraph and is not considered a suspect. Through his attorney, Bukhari says that he is helping authorities. Ameer Bukhari died in a small plane crash last year.”

CNN reported information from ”multiple law enforcement agencies” was correct however, it was the “information from multiple law enforcement sources” that was “not correct” which, led them to post the false information that Adnan Bukhari was one of the hijacking pilots. And that he was dead after blowing up the World Trade Center. And that his brother Ameer was another hijacking pilot. And that he was dead after blowing up the World Trade Center, too.

The problems with law enforcement’s stories to CNN were that Adnan Bukhari is alive and well and lives in Florida, and Adnan Bukhari was ‘not’ on any hijacked plane. Adnan Bukhari’s brother Ameer Bukhari had already died in an unrelated small plane crash the previous year ( 2000 ), making it impossible for him to have hijacked and been piloting any aircraft into the World Trade Center on September 11, 2001.

Not that consideration for things like ‘facts’ have ever deterred the World of ‘multiple law enforcement sources’ from falsely accusing anyone.

These ‘multiple law enforcement sources who publicly proclaimed the guilt and deaths of two ( 2 ) people who had nothing whatsoever to do with the World Trade Center bombing and who were nowhere near the scene is the same law enforcement group who expects us to believe them when they claim that Usama bin Laden had something to do with it, too.

The fact that their are a plethora of higher level suspects than Usama bin Laden himself and better equipped terrorist organizations having a pattern for ‘suicide bombings’ lead one to believe the ‘true terrorists’ are not being publicized ‘yet’. This might very well be for U.S. Government security concerns.

Last year, the U. S. Department Of Justice claimed Usama bin Laden was involved with a man who snuck into Seattle, Washington from Canada to blow up ’millennium issue targets’. What was the proof? This same man, who crossed into Seattle happened to have lived somewhere in Afghanistan during the 1970s as did Usama bin Laden. That seemed to be the sum total of the ‘proof’. It’s an example of what ‘ties to Usama bin Laden meant in previous reports.

From the U.S.S. Cole in Yemen to the shores of New York, the Usama bin Laden name is on the headlines everywhere. What is not found, however are any media mentions linking the American attacks on any other terrorist leader or group.

Another group, Hezbollah (aka) Hizbullah (aka) Hizballa, exhibited a long-standing history of suicide boat bombers and their incredible global networking of terrorist strike sophistication.

Usama bin Laden worked shoulder-to-shoulder with U.S. persons long ago in Afghanistan. Today, he leads a significant group of individuals and influences see at least four ( 4 ) governments providing ‘turn the other way’ official attitudes when their own resident terrorist cells attack tourists and others abroad.

We needed someone to envision a picture of the enemy for us to focus on. Let’s hope we aren’t looking at the wrong picture.

CNN Issued Correction: [ http://web.archive.org/web/20020209205305/http://www.cnn.com/2001/US/09/13/america.attack/ ]

CIA WATCH

Satellite Links Usama Bin Laden Hideout

YEMEN, Aden - September 17, 2001 - Usama bin Laden left Sudan for Afghanistan in 1996. While in Sudan, though, he had actually been fighting in Afghanistan for most of those 5-years. But, he made plans to leave his former al-Qaeda headquarters within the Kandahar province of Afghanistan, long before mid-August of 2001.

Bin Laden newly eyed home, in Yemen, will probably be tucked away yet situated near a 350-meter tall cliff topped by a summit in the Yemen more mountainous regions. This area also happens to be riddled with man-made caves that are still controlled by, the Bani Dhabyan tribesmen out of Khawlan province near Shibam, Yemen. Germans built the road to the top of this mountain region many years ago.

The German influence is prevalent in Yemen. YEMENIA AIRWAYS caters to German citizen tourists, but, not all Yemeni’s are friendly toward most tourists and that, includes the Germans. See, e.g., “Foreign Briefs“, on this website.

 CIA WATCH

[ photo ( above ) Sheikh Tariq Bin Nasir Bin Abdullah al-Fathli (aka) Sheikh Tariq Al-Fathli (aka) Sheikh Tariq Fadli ( circa: 1980 ) ]

Hostages Always Moved To Yemen Mountains

YEMEN, Aden - Terrorist tribesmen here, kidnapped Germany diplomat Commercial Attaché Rainer Burns who was moved to a mountainous region where Yemen government military forces – familiar with the region - could not reach. After pointing guns, at the head of  German hostage Rainer Burns - threatening to kill him if Yemen government forces made any attempt to intervene - the terrorists fired five ( 5 ) Rocket Propelled Grenade ( RPG ) missiles at Yemen military soldiers.

According to a ‘source’ within the terrorist tribe camp, Rainer Burns - walked by his abductors up into the mountainous area -health condition had greatly deteriorated, and that his primary kidnap leaders Mohammed Ali Al-Zaidi, Ahmed Ali Al-Zaidi and a third ( 3rd)  person - all belonging to the Al-Zaidi tribe - refused to turn over diplomat hostage Burns ( and / or themselves ) to Sheikh Rabish bin Ka’alan, Sheikh Sultan Al-Aradah, and Sheikh Tariq Bin Nasir Bin Abdullah al-Fathli (aka) Sheikh Tariq al-Fathli (aka) Sheikh Tariq Fadli.

Sheikh Tariq Bin Nasir Bin Abdullah al-Fathli,  sent by the Yemen President along with the other two ( 2 ) aforementioned Sheikhs, is a well-known Commander of a Usama bin Laden led terrorist cell network.

Sheikh Tariq Bin Nasir Bin Abdullah al-Fathli background is unique because at an earlier time period Sheikh Tariq al-Fathli was - for committing terrorist crimes – wanted by Yemen government authority ‘interests’ whom saw him become a resident ‘house guest’ ( of an ‘official’ for the Yemen Interior Ministry’ ) rather than become imprisoned.

* * * * *

Why Yemen?

Usama bin Laden’s Father was originally from these reaches. Besides, Usama “himself” went on record telling on himself and of his plan to return to Yemen in order to save Afghanistan from destruction should the United States come looking for him there. (see below)

Usama bin Laden billionaire tycoon father led a Saudi Arabia based firm The BinLaden Group. Today this international firm is a multi-billion dollar concrete cement building contractor that builds posh skyscraping hotels, including the FOUR SEASONS Hotel & Resort chain, amongst others.

The BinLaden Group also builds interstate roads and airport runways and has at its disposal a plethora of engineers familiar with construction and demolition techniques.

Even the U.S. based PORTLAND CEMENT organization looks in awe at The BinLaden Group accomplishments and contracts that rank high in cement construction technologies.

At the current time, Usama bin Laden has more problems than just the U.S. looking for him with his ailing kidney - possibly requiring special medication and/or, dialysis by now – and his satellite phone – one cannot call easily from remote regions with simple “cell phones” since, other issues prevail. Ghazni Afghanistan government’s commercial satellite telephone center no longer has him in their phone system by choice so, who, where and, how would Usama go to for even more secure communication link-ups?

Communications is a major priority in any war campaign’s security. Where else to hide Usama’s communications links but, right under the noses of the Country who expelled him, his homeland of Saudi Arabia.

With corporate espionage being what it is and corporate contracts and bids being worth literally billions of dollars to The BinLaden Group of Usama’s Father, has established its own privatized satellite links for communications. An ideal place to hide Usama’s terrorist network communication’s signals within.

There exists, a distinctly elaborate Saudi telecommunication satellite system besides ArabSat for not only cellular and satellite phones but, for internet use as well.

What with the terrorist business of Usama and his Supervisor being what it is today, pressing needs to issue holy war orders or, war theme fatwahs, might very well be communicated not by satellite phone alone or P-C computers. Instead, of using a laptop computer which requires expensive re-chargeable batteries with an A-C power current handy, what do you do when your no where near an electrical outlet while your hiding in an Usama bin Laden man-made cave in Yemen?

Palm-Top or Hand-held P-C only use small-size batteries to operate. They’re easier to send e-mail or even issue e-fatwahs, i.e. electronic and wirelessly sent, holy Jihad orders, that could provide a new high technology slant for communicating terrorist strike plans. The use of ancient Yemen tribesman symbolic codes would make interpretation of communications extremely difficult to identify, trace and, decipher by any intelligence agency’s listening posts worldwide and could easily serve Usama bin Laden terrorist cell networks, globally.

Sending e-mailed scripture fatwahs via Palm-Top hand-held devices to communicate globally with terrorist commanders and by using just a few of oh so many tapped-into family of The Bin Laden Group privatized satellite links, Usama and his Boss would no doubt profit in terrorism and world market online stock tradings. Just simple and very easy courtesies could be extended to Usama from his Father’s old family and friends in Yemen, however makes some sense. But, how do we put Usama in Yemen especially just after the U.S.S. Cole attack?

Usama bin Laden also has another close running mate and military subordinate, i.e., Dr. Ayman Zawahri (aka) Iman Zowaheri, resident of Switzerland who is also, the leader of the Egyptian Islamic Jihad.

Escaping from Afghanistan to Sri Lanka would not be too awfully difficult but, why would Usama go to Sri Lanka? Getting in to Yemen would be easy.

Around the middle of August 2001, Yemen seized two ( 2 ) boats which came into port for re-fueling. These boats were over-filled with supposed illegals, i.e. “smuggled laborers”, many of whom had absolutely “no identification”.

The Yemen Port Authority was simply told that nothing was out of the ordinary for they only had on-board “peasants” seeking Saudi jobs where everyone knows “the money is” and where it is rumored that even for peasant laborers become rich.

There was just one problem with that story though. The number of passengers at first, totalled one hundred and sixteen ( 116 ) passengers but, only 112 were actually detained. What happened to the other four ( 4 ) passengers?

More importantly, did the “same” four ( 4 ) passengers who were “not detained” amount to the same passengers who left Yemen in yet another boat?

Or, was the boat dropping off four ( 4 ) people in Yemen? If so, ‘who’ or ‘whom’ got dropped off? ‘Who’ got back on board? And, just ‘how many passengers actually “left” Yemen? Did people get off the boat and ‘hide’, while others boarded the boat to fill those vacancies?

Yemen is newsworthy. It also just received back, some of its former citizens. Persons whom were previously exiled to Iraq, including some high level military commanders, twenty four ( 24 ) of which included one ( 1 ) Yemen Chief Intelligence Commander, as well as others who recently ( September 2001 )  arrived back in Yemen from Damascus, Syria. Were ‘all’ really in ‘exile’ in “Iraq,” or were ‘some re-routed elsewhere’, like to one of those infamous Soviet managed Syria terrorist training centers or Russia GRU military war colleges?

- -

24 Exiled Yemeni Military Officers Back Home

A Yemen military returnee said that 24 Yemeni army officers and politicians returned Friday to Aden, Yemen, from Damascus, Syria after having been placed in exile for the past seven ( 7 ) years.

Lt. Col. Mahdi Shaush said that a group of twenty ( 20 ) officers, four ( 4 ) civilians, plus more than seventy five ( 75 ) family members whom were all returned from exile in Damascus, Syria.

The returnees were leaders in the abortive 1994 secession attempt by former South Yemen that had been unified with former Yemen Arab Republic in 1990.

President Ali Abdullah Saleh earlier issued a pardon and gave his directives to ease the return of the exiles.

- -

[ click photo ( above ) Yemen Socotra Island Mountains ]

Usama bin Laden (aka) Osama bin Laden is believed by a few to have left Afghanistan before mid-August of 2001 using a small contingent security force of perhaps, ten ( 10 ) of his closest and most trusted guards, possibly to have included suditives Mohammed Atef (aka) Abu Hafs and /or Mohamed Shawqi Islambouli ( leader of the Gama’at Al-Islamiyya ) as a means by which he ( Usama bin Laden / Osama bin Laden ) could either ‘maintain’ or ‘secure’  his safehaven safe harbor in Yemen.

How would Usama bin Laden and his men manipulate circumstances thereby providing a great escape from intelligence sources?

Most often a ‘diversion’ and / or ‘low profile’ is required while hiding and /or traveling, the latter seeking to avoid monitored transportation hubs where passengers board airlines, trains, and ships, however hiding amongst a ‘smaller group’ of ‘low-profile’ individuals in unlawful transportation means exist in ‘passenger smuggling’ rarely looking deeper into those huddled in ’small boats’. Take for instance, two ( 2 ) small boats – carrying a mix of Sri Lanka peasant laborers seeking better opportunities in Saudi Arabia where yet ‘another country’ serves as ‘entry point’ via the Arabian Pennisula - ’not’ being unusual at all – serving as a relatively undetected port of entry conclusion, the ’point of arrival’ from what ‘few knew’ was a ‘much earlier departure point’ because of a diversion from what was ‘originally believed by the contigent’ as only a ‘land journey’ to Afghanistan ‘mountains’, but not those in Yemen or on its Socotra island where no one looked for Usama bin Laden (aka) Osama bin Laden.

Could Usama bin Laden (aka) Osama bin Laden have been within the two ( 2 ) small boats detained recently by Aden, Yemen Port Authority during August 2001, or earlier, as one ( 1 ) of those Sri Lanka peasant laborer ‘passengers with no ‘identification’? See, e.g. “Foreign Briefs” on this website.

It was, afterall, the Usama bin Laden pattern to be conveniently “missing” from where he was always thought to be at, while in Afghanistan.

Usama bin Laden, in his own words even said, “Before the U.S. strikes out against Afghanistan to turn me over to U.S. authority, I will return to the birthplace of my Father. In essence Usama planned on, Yemen, years ago but, once again every Country’s intelligence service missed that piece of juicy foreign information.

A rather interesting and recent note should be attached to Usama bin Laden’s running mate now. Swiss resident, Dr. Ayman Zawahri, was recently made to be a part of a highly unusual “staged abduction” of himself. This odd act was sponsored by, Egyptian Intelligence Service agents in Cairo, Egypt. This was odd, for some individuals actually witnessed and reported it. Dr. Zawahri is wanted on serious charges in Cairo and around the World but, was secretly released shortly after his staged abduction by Egyptian authorities before he disappeared again.

Even stranger, was the fact that one ( 1 ) of the former attacks on the New York World Trade Center – years ago – [ 1993 ]  had an interesting defendant who was recently convicted. This particular co-bomber was a U.S. Citizen, former member of the U.S. Special Forces and Egypt Army Sergeant, a 48-yr. old named Ali Mohamed who was also an ‘intelligence officer’ for the Usama bin Laden supreme terrorist cell al-Qaeda.

So it seems as though Usama bin Laden’s ability to recruit extremely talented mercenaries into his waged holy-war campaign against Americans is not such a difficult task for him to accomplish.

The United States had planned to try to cement a permanent U.S. military base facility on the Yemen island of Socotra which, is the ironic part of Usama’s move here but, it was also the birthplace of his Father too.

Usama bin Laden is the Son-in-Law of Afghanistan’s Taliban Supreme Leader, i.e. Mullah Mohammad Omar, who went on record as saying that, “Even if one-half of Afghanistan is destroyed by war, I wouldn’t give up the other half for turning over Usama bin Laden to the United States” and then went and noted that besides, “one-half of Afghanistan is ‘already’ destroyed by war.” Usama bin Laden , a couple of years ago, married his fourth ( 4th ) wife ( when she was just 14-years old ).

Usama bin Laden Arab volunteers are currently involved in Taliban military offensives throughout the northern regions of Afghanistan but, in particular opposition to the Northern Alliance (aka) United Front forces there near their neighboring other countries.

Usama bin Laden vowed long ago that before Afghanistan was targeted for destruction from United States efforts to secure him that, he would return to the homeland of his Father which, was Yemen but, in a mountainous region of northern Yemen.

Usama bin Laden’s father – originally from Yemen – was a non-royal family citizen of Saudi Arabia and a billionaire tycoon who headed up The Bin Laden Group that provides cement building contract services including construction efforts on international multi-billion dollar interstate roadways, airstrip runways and hotels such as the global expanse of the well known Four Seasons Hotel chain and other interests.

Usama bin Laden was to receive a portion of his Father’s inheritance wealth which was said to be valued around $300-million dollars when, Usama had his citizenship revoked by Saudi Arabia. Usama bin Laden never personally collected the $300-million inheritance however, he may have arranged for it to be held as security on loans for purchasing other revenue generating non-governmental organizations.

Today, Usama bin Laden is said to be worth in excess of $500-million dollars and hides the vast amount of his money in a Swiss-bordered bank probably under an alias provided by his best friend, Dr. Ayman Zawahri.

It’s been a long and arduous struggle for Usama in Afghanistan which, began with his U.S. backed war efforts ousting the Russia led Soviet Army in 1989, his work with the Mujahideen and now finally the Taliban.

CIA WATCH

Britain Bombs Iraq

IRAQ, Basra – September 18, 2001 - U.S. Air Force ( USAF ) Joint Task Force Southwest Asia ( JTFSA ) – based in Saudi Arabia – said United Kingdom ( UK ) military Tornado airplanes bombed – an anti-aircraft surface-to-air ( SAM ) missile site in southern Iraq on Tuesday - in retaliating against Iraq for “hostile activities” against airplanes patrolling a no-fly zone. The strike targeted a position ‘near’ Basra, 350-miles south of the Baghdad, Iraq capital.

The strikes were in response to past Iraq hostile activities also experienced today. No immediate report on damage or comment from Iraq.

Iraq, for months, improved its ability to fire missiles at both U. S. and UK aircraft patrolling a no fly zone in southern Iraq. No-fly zones in both ‘southern’ and ‘northern’ Iraq were established after the 1991 Persian Gulf War to protect Shiite Muslims and Kurdish minorities.

Iraq said, last week, it downed a second ( 2nd ) Unmanned Aerial Vehicle ( UAV ), a ‘remote piloted’ airborne military ground surveillance vehicle. See, e.g. “Pegasus Program” ( below ).

United States authorities confirmed disappearance of a ‘drone’ but are still investigating its fate. No descriptive information was provided as to the UAV ’type’ believed downed.

Osama Bin Laden & Carlos The Jackal Sudan Links

SUDAN, Khartoum – September 19, 2001 – The world’s public enemy number one used to be, Carlos (aka) The Jackal, i.e. Ilyich Ramirez-Sanchez. Today, there exists a link between Carlos “The Jackal” and 43-year old Usama bin Laden. Both persons years ago, happened to be in Khartoum, Sudan at the same time.

It was Khartoum, Sudan where Usama bin Laden set up his own construction business called the, Bin Laden Company Of Khartoum.

Now there are many places in the world that breed terrorist groups, however Yemen is like the Club Med of terrorist camps.

Within Yemen there exists a group known as the Islamic Army of Aden-Abyan containing both Salafi and Islamic Jihad elements.

In 1995, the Islamic Army of Aden-Abyan established a terrorist training camp in the mountains at Hatat, Yemen – about 35-km north of Zinjibar – in Abyan Province [ Yemen ] with the help of instructors from various countries.

In May 1995, Yemen police and Yemen military troops used military heavy artillery and military helicopter gun ships to attack the Hatat mountain terrorist training camp after complaints from tribal and community leaders in Yafa’.

Hatat mountain terrorist training camp was described as ‘practically impregnable’. The results of those security force attack efforts are ‘unknown publicly’.

Arab Afghans, who fought in the Afghanistan War, later became known as Muslim volunteers who fought against the Soviet Union Red Army in Afghanistan. The Soviet military withdrawal left many of these volunteer fighters at loose ends although still filled with the spirit of Jihad (aka) Holy War; often made them unwelcome when they tried to return to their home countries. In some ways they were like U.S. Viet Nam War veterans – deprived of adrenaline and unable to adjust to a quiet life.

But unlike the Vietnam veterans, their efforts had not been futile. They had defeated a superpower and were flushed with success. Many – including Osama bin Laden himself – told of narrow escapes from death which led them to believe that Allah ( God ) had preserved them for a purpose.

Two ( 2 ) prominent figures have been named in connection as leaders of Islamic militant religious radical terrorist organizations:

FIRST – Usama bin Laden, who allegedly provided the group with funds and whose extradition from Sudan was sought during 1993 in Yemen where his family came originally from [ Aden, Yemen ] but a few family members moved north to Saudi Arabia where they prospered and were later joined by the rest of the bin Laden family following the UK withdrawal from Aden, Yemen and the consequential Marxist takeover there. Today there are about fifty ( 50 ) members of the bin Laden family – Saudia Arabia citizens – with primary interests in the construction industry. They are considered the wealthiest non-royal family in the Kingdom of Saudi Arabia.

During the 1980s, during the Soviet – Afghanistan War, Usama bin Laden – in common with many other Saudi businessmen – saw a ‘religious duty to support Islamic rebels financially’ against the Soviet regime in Moscow. He ‘could afford to be more generous’, than most, and became more deeply involved than most. Not only did he pay for weapons and what, by his own account, were thousands of Muslim volunteers from the Middle East and North Africa to join the Mujahideen ( Soviet Afghanistan War veterans ), He went there himself and took part in the fighting. Osama bin Laden, using the resources of his construction business, blasted new guerrilla trails across the mountains and tunneled into the rock to create underground hospitals and armament depots in Afghanistan.

In 1989, Usama bin Laden relations became strained with Saudi Arabia authorities who confiscated his passport.

In 1991, when his passport was returned, Osama bin Laden moved to Sudan where he founded the BIN LADEN COMPANY ( Khartoum, Sudan ), a business specializing in construction and the export of sesame seeds. Many veterans of the Afghan war also joined him in Khartoum, Sudan.

Osama bin Laden, although not convicted of any crime, Egypt, Algeria, Jordan and, Yemen authorities named him as a ‘financial source’ where funds were expended for bombing and assassination campaigns.

Osama bin Laden, was an ‘unindicted co-conspirator’ in the U.S. list of those bombing the World Trade Center.

In 1994, Osama bin Laden was formally disowned by his Saudi Arabia relatives and stripped of his Saudi Arabia citizenship for “irresponsible activities” harming the Kingdom of Saudi Arabia international relations. With financial and human resources to mount attacks in the name of Islam almost anywhere in the world, Osama bin Laden and his associates directed their efforts not only against unbelievers of the Islamic faith but against other Muslims deemed strays from the Islamic “true path.”

Also in 1994, in Jordan he was named in court as having funded a plot to assassinate politicians and bomb cinemas, nightclubs, video shops and liquor outlets. The twenty-five ( 25 ) accused including Osama bin Laden son-in-law Muhammad Khalifa who was tried in absentia. Muhammad Khalifa has business interests in the Philippines where he was linked to the Abu Sayyaf (aka) Father of the Executioner, a group that attacked Christians, allegedly plotted to kill the Pope and blow-up U.S. airliners over the Pacific Ocean.

According to claims of intelligence services, Osama bin Laden and his associates funded armed Islamic struggles in Afghanistan, Albania, Algeria, Egypt, Iraq, Jordan, Kenya, Lebanon, Malaysia, Morocco, The Netherlands ( Holland ), Pakistan, Philippines, Romania, Russia, Syria, Tanzania, Turkey, United Arab Emirates, United States and Yemen.

SECOND – Sheikh Tariq Bin Nasir Bin Abdullah al-Fadli (aka) Tariq al-Fadli (aka) Sheikh Tariq Al-Fathli, an important figure in Yemen terrorism during the early 1990s – though a very different character tha Osama bin Laden. Tariq al-Fathli was a ‘sheikh’ from a prominent South Yemen family, the Fathli Family. Prior to the Marxist takeover of Yemen, the Sheikh Fathli Family controlled one ( 1 ) of the biggest cotton plantations outside Aden, Yemen where a huge share of all southern exports passed through Sheikh Tarik Family businesses. Perhaps more importantly still, is that the Sheikh Fathli Family also controlled the ‘water’ supply. Very soon after the establishment of Marxist rule the Fathli Family moved to Saudi Arabia. Following unification, Tariq al-Fathli returned to Yemen to claim his inheritance as heir to the ‘Sultan of Yemen’ who 25-years earlier was deposed from the Abyan province ( Yemen ).

Sheikh Tariq al-Fathli gathered around himself a number of Soviet-Afghanistan War veterans ( Mujahideen ), members of his own tribe, and religious opponents of the Yemen Socialist Party (aka) YSP.

Sheikh Tariq al-Fathli was said, at one point, to be seeking 12,000 “heroes” to help him “save Muslims in Bosnia, wage war on the authorities and bring down the regime which he considered outside Islam, intimate with unbelievers.” Whatever the motives of his helpers and backers, it seems that Shiekh Fathli had given his campaign a religious tinge merely to win support in pursuit of a far more personal and mundane goal: to take revenge on those who had dispossessed his family and to obtain restitution of their property.

In the aftermath of the Aden, Yemen hotel bombings at the end of 1992, hundreds of people were arrested and several caches of weapons discovered. NOTE: The southern Yemeni authorities, who were still controlled by the YSP, were generally more vigorous in their response to terrorism than their northern counterparts – though often no more successful in catching the culprits. The trail pointed to a group of “Afghans” led by, Sheikh Tariq al-Fathli who was eventually besieged at his home in the Maraqasha mountains, 20-km from coast of Abyan, Yemen.

Despite sending their Third Armoured Brigade having been sent to arrest Sheikh Tariq al-Fathli, southern authorities found themselves powerless to act. A military spokesman explained: “The forces could not reach the Sheikh’s stronghold which is protected by a large guard in a village in a chain of rugged mountains. We don’t want to use warplanes because that could injure the citizens in villages which are geographically integral with the sheikh’s stronghold.” The authorities then had to content themselves with sealing off all possible escape routes and urging the Maraqasha tribe to withdraw its confidence from the sheikh.

By this stage Sheikh Fathli was presenting himself as a supporter of the Yemeni Islah Party and a victim of South Yemen intrigue. He appealed directly to the party leader, Shaykh Abdullah al-Ahmar, for a guarantee of safe conduct to Sana’a. Shaykh Abdullah, who is Speaker of the Yemen Parliament, responded initially with a sharp rebuff, saying in a letter to Sheikh Fathli: “We do not protect criminals,” though in fact the appeal placed him in a difficult position. The affairs of Abyan were outside Sheikh Abdullah’s tribal purview and the Sheikh Fathli affair was not strictly a tribal matter. On the other hand, it might be politically unwise for Islah to refuse to deal with an important local opponent of the YSP.

By one means or another, however, Sheikh Tariq Al-Fathli (aka) Sheikh Tariq Fadli escaped the siege and arrived – accompanied by a delegation of Abyan tribal leaders guarded by a North Yemen army unit – at the house of Sheikh Abdullah ( Sana’a, Yemen ) with an appointment to meet the President next day.

The ‘official’ story, differed:

Sheikh Fadli (aka) Sheikh Tariq Al-Fathli had ‘peacefully surrendered to authorities’ and was ‘reported to the public prosecutor’ for ‘questioning in connection with the attempted assassination’ of Ali Salih Abbad Muqbil – a member of the YSP and secretary of the party’s organization in Abyan – plus, ‘various bombings’ in Aden.

In-fact Sheikh Tariq Al-Fathli (aka) Sheikh Tariq Fadli was never ‘imprisoned’ – though he spent some time at the Sana’a, Yemen house of Sheikh Abdullah.

In 1994, during the war between North Yemen and South Yemen, Sheikh Tariq Al-Fathli fought on the side of the President who in South Yemen saw him become the leading Sheikh ( Tariq Al-Fathli ).

Sheikh Tariq Al-Fathli appeared to have severed all links with Jama’at al-Jihad and urged his erstwhile followers to get regular jobs and work in the system.

Despite the religious connotations of the name “Jihad” it is still unclear what the organization primary aim was or whether it even had one.

At one level, Jihad could be regarded as part of a worldwide Islamic struggle with a marked anti-Soviet emphasis that found its Yemen parallel in waging war on the YSP. At another level, some of its supporters were concerned that the name merely provided a ‘moral cloak’ for essentially parochial interests and / or personal grievances.

Any or all of its diverse elements may well have considered themselves the “real” Jihad, each trying to make use of the others – through a tactical alliance much in the same way Usama bin Laden is doing today.

The confusion of purposes is nowhere more striking than in the case of the Aden, Yemen hotel bombings that were assumed connected with the use of the hotels by the U.S. military during their operations in Somalia, which would seem to imply an attack on the spread of Western culture and values in Yemen, however some of those involved also had links to an earlier terrorist campaign in South Yemen organized and funded by the U.S. Central Intelligence Agency ( CIA ) with assistance from Britain ( UK ) and Saudi Arabia.

Between 1977 and 1979, members of the Red Army Faction terrorist organization underwent weapons training at a Palestine terrorist training camp and then took refuge in South Yemen to evade authorities of Germany.

In 1979, the plot began – intent on weakening the Yemen PDRY government – and involved recruiting Yemen saboteurs, twelve ( 12 ) of whom were captured, tortured and later executed for ‘trying’ to blow up a bridge.

Between 1978 and 1986, Ilyich Ramirez-Sanchez (aka) Carlos the Jackal ‘frequently used’ a Diplomat passport issued in South Yemen.

There was a period – by chance or circumstance – when shortly before Ilyich Ramirez-Sanchez (aka) Carlos the Jackal was finally arrested – both he and Osama bin Laden (aka) Usama bin Laden lived in Khartoum, Sudan.

Prior to 1990, the Yemen unification year, South Yemen was controlled by the YSP political party ( Marxist ideology ) led government and black-listed – for state sponsored terrorism – by the United States ( U.S. ).

The 1992 Yemen hotel bombings may not so much have been directed against the United States as it may have been against the YSP in reprisal by relatives over the twelve ( 12 ) saboteurs executed for ‘attempting’ a crime.

In recent years Yemen ‘generally tries to cooperate’ with other countries ‘trying to combat terrorism’ netting limited success, the West believes because if Yemen was seen tightening control over its citizens, such actions would be viewed internationally as a behavior against democracy.

Factors Make Yemen An Attractive Haven For Terrorists

1. Yemen land and sea borders are virtually impossible to guard;

2. Yemen government-presence authority in many parts of the country is minimal;

3. Very rugged, sparsely populated terrain makes it easy to train guerrillas and construct well-defended hideouts; and,

4. Yemen religious diversity means that most varieties of Islamic militants can find someone, somewhere, to shelter them.

Reference

http://web.archive.org/web/20020601211014/communities.msn.com/AnExCIA/intelldata.msnw

INTELL NEWS

Website Names Linked To 9/11 Attacks 1-Yr. Ago

U.S.A., Washington, D.C. – September 19, 2001 - Terrorists who planned and executed the September 11, 2001 attack on America may have registered as many as twenty ( 20 ) internet domain names (aka) URL website addresses experts believe should have warned authorities of attacks on the World Trade Center ( New York ) and possibly elsewhere.

Names such as:

attackontwintowers.com and,

worldtradetowerattack.com

Officially registered website domain names registered more than 1-year ago. At this time, however it still is not publicly known ‘who’ actually registered the suspicious web domain names or ‘what purpose was being served’ for registering such.

A spokeswoman in the FBI press office would only say that the Bureau will not comment on its investigation into the attacks.

At least 17 domain names, including pearlharborinmanhattan.com and worldtradetowerstrike.com were registered as early as June 2000, 15-months prior to the attacks. Two ( 2 ) of the website domain names contained the dates of August 11 and September 29, which Livingstone said may have indicated ‘windows of opportunity’ during which the attackers planned to strike.

Dismissed is, speculation that the web domain names were referencing ‘bombing’ the World Trade Center 8-years ago. “You have two ( 2 ) other names containing ’2001′ so, there’s no confusion over the 1993 World Trade Center attack.”

A domain name search Tuesday indicated that hundreds of web addresses, containing references to the terrorist attacks, were registered during the past week plus four ( 4 ) older domain names had undergone re-registration.

Domain name registrants are required to use a ‘credit card’ for payment and must provide administrative, technical, and billing contact information. That information, except the credit card data, is available to the public - so long as the registration is kept current. The required use of a credit card should mean that authorities would at least have a starting point to investigate the registrant.

Network Solutions ( Fairfax, Virginia ) is the world’s largest website domain name registrar that includes a privacy statement indicative of industry standards regarding confidentiality: “We will not share such information with other third parties, except in response to formal requests ( e.g. subpoena or court order ) made in connection with litigation or arbitration proceedings directly relating to a domain name registration or other services we provide.”

CIA former Director of Central Intelligence ( DCI ) James Woolsey indicated current laws make it difficult for the FBI to get a warrant for electronic surveillance and wiretaps or to recruit informants based on actions such as registering threatening domain names. “There would not be enough material that is close enough to a specific crime for an investigation to be opened,” Woolsey said. “The attackers might have been planning a propaganda campaign following the attacks. Maybe their success was so overwhelming that they didn’t need to use this or they may have decided it was too dangerous to do.”

Domain names, on the list, also included:

attackamerica.com , attackonamerica.com , attackontwintowers.com , august11horror.com , august11terror.com , horrorinamerica.com ,  horrorinnewyork.com , nycterroriststrike.com , pearlharborinmanhattan.com , terrorattack2001.com , towerofhorror.com , tradetowerstrike.com , worldtradecenter929.com , worldtradecenterbombs.com ,  worldtradetowerattack.com , worldtradetowerstrike.com , wterroristattack2001.com

CIA WATCH

Global Jihad Jack In The Boxes

INDONESIA, Jakarta – September 29, 2001 - The U. S. Pacific Fleet Commander-In-Chief Admiral Thomas B. Fargo has busy hands here with ‘regional peacekeeping efforts’ while Islamic militant groups create havoc elsewhere too.

Ever since the Usama bin Laden “war cry” for a Jihad (aka) Holy War to commence, against all Westerners and ‘non-militant’ Islamic Muslim supporters, Jihad-fixated Islamic ‘militants’ are crawling out from under every rock and sandstone crevice to complete his orders.

In Jakarta, his message calls-up the Islam Defenders Front (aka) FPI leader Habib Riziq who’s whooping things up here with students at local area universities see local oil company American workers – here and in East Kalimantan – now running for cover.

Cities in the area, experiencing Islamic militant unrest, are: Jakarta, North Sumatra, Medan, Balikpapan, Benjarmasin, East Kalimantan, South Kalimantan and elsewhere throughout Indonesia.

Another Jihad Jack In The Box

ALGERIA, Larba – September 29, 2001 - In the Mitidja Plain area here, is a virtual hot-bed of Islamic militants where 150 people were just killed in the month of September alone.

Since 1992, over 100,000 people have been killed here as a result of Islamic militant groups fighting Algerian government forces and it’s no wonder why. This is also the former “home” of one of Usama bin Laden’s major financial contributors called the, Islamic Salvation Front.

CIA WATCH

TERRORISM – FINANCE

Long Time Money Trail To Usama bin Laden

Five ( 5 ) top Saudi Arabia businessmen, worth more than $5,000,000,000 billion, ordered NATIONAL COMMERCIAL BANK ( Saudi Arabia ) to bank wire transfer amounts in ‘personal funds’ in-addition to $3,000,000 million from a Saudi Arabia ‘pension fund’ to banks in New York, USA and London, UK where the money was deposited into accounts of Islamic charities, including the Islamic Relief and Blessed Relief that served as fronts for Usama bin Laden.

It was discovered that these businessmen were in-essence paying Usama bin Laden “protection money” for their Saudi Arabia businesses.

The money transfers were discovered in April 2000 after the royal family ordered an audit of NCB and its founder and former chairman, Khalid bin Mahfouz. Mahfouz was under “house arrest” at a military hospital in Taif, Saudia Arabia. His successor, Mohammad Hussein Al-Amoudi, also heads the Capitol Trust Bank in New York and London, which U.S. and British officials are investigating for allegedly transferring money to Usama bin Laden. Amoudi’s Washington, D.C. lawyer is, Vernon Jordan. Mahfouz’s son, Abdul Rahman Mahfouz, is on the board of Blessed Relief in Sudan in which, suspects in the attempted assassination of Egypt President Hosni Mubarak, are linked to this charity.

In August 1990, after the money bank wire transfers were discovered, the Kingdom of Saudi Arabia Royal Family ordered an audit of the NATIONAL COMMERCIAL BANK and its founder and former chairman Khalid bin Mahfouz who is now under ‘house arrest’ in Taif, Saudi Arabia.

Khalid bin Mahfouz successor Mohammed Hussein Al-Amoudi heads-up the CAPITOL TRUST BANK ( New York, USA ) and ( London, UK ) that is being investigated – for allegedly transferring money to Usama bin Laden – by American and British officials.

Mohammed Hussein Al-Amoudi attornies of the law firm AKIN, GUMP, STRAUSS, HAUER & FELD ( Washington, D.C. ) said, “He has no knowledge of the acts alleged and does not know Usama bin Laden,” continuing, “has never knowingly had dealings of any kind with Usama bin Laden,” and, “Sheik Mohammed H. Al-Amoudi does not have any knowledge of any money transfers by Saudi businesses to Usama bin Laden and is unalterably opposed to terrorism.”

Business executives in Saudi Arabia continue to transfer tens of millions of dollars to bank accounts linked to Usama bin Laden, with bank wire money transfers – having begun more than 5-years ago – used to finance several attacks by Usama bin Laden, including the 1995 assassination attempt against Egypt President Hosni Mubarak while in Ethiopia.

Usama Bin Laden Real Estate, Money And More

AFGHANISTAN, Farmada – October 6, 2001 – Usama bin Laden was last sighted at his nearby base called, the Darunta Camp Complex, but then left immediately to Kunar Province, in the Hindu Kush Mountain area of North Eastern Afghanistan. Usama bin Laden, travelled in a small convoy with his most loyal fighters to an unknown destination.

Usama Land Deal In Pachi Ragam District

In Jalalabad, Afghanistan many who did not want to be identified, said many Arab nationals are living in Pachi Ragam district of Nangarhar, on property purchased by Usama bin Laden before the Taliban took control of the area in 1996. Usama bin Laden, purchased the land from Younis Khalis, i.e. former leader of the Afghan resistance during the 1980s.

The fortified farmhouse in Farmada has about 600 Islamic-militants from Saudi Arabia, Egypt, Yemen and the Gulf states still based there. Several hundred more are serving with Taliban forces fighting in the north of the country. Between the two (2) training camps, i.e. one in Farmada, Afghanistan (with 600 Islamic-militants) and another one West of Farmada, i.e. the Darunta Camp Complex (with 400 Islamic-militants) nearly 1,000 men are at these two (2) camps alone. There are men from Yemen, Algeria, Egypt, Tajikistan, Uzbekistan and Pakistan.

INTELL NEWS

Afghanistan Taliban Consequential Breakdowns

Taliban Government Viewpoint -

“They [ Americans ] are really unspeakable. Many [ Afghanistan ] factories and companies will close down; some have already done that. Many businessmen face problems with their bankers. In other words, they do not have the necessary facilities. They are bankrupt. When such factories close down, the unemployment growth rate will ride high, the price of the U.S. Dollar will witness a free rise vis-a-vis the Yemeni Riyal, and we [ Afghanistan ] will witness many other economic problems that will plague our society.

Afghanistan Invasions

The recent problems in Afghanistan started in 1979. Afghanistan was a peaceful country. The Russians, along with their 140,000 troops attacked Afghanistan in the December of 1979, just twenty one ( 21 ) years ago, stayed there for a decade, killed 1,500,000 people, maimed 1,000,000 million more people, and 6,000,000 million out of the 18,000,000 million people migrated because of the Russia Soviet military brutalities. Even today, our children are dying because of the landmines that they planted for us. And nobody knows about this.

After the Russians left during the Russian occupation, on the other side, the American government, the British government, the French, the Chinese, and all of the rest, supported the counter-revolutionaries called the Mujahideen; There were seven [ Mujahideen ] ( 7 ) parties only in Pakistan and eight ( 8 ) parties in Iran who fought  the Russian occupation. And after the Russians left, these parties went into Afghanistan.

All of them [Mujahideen] had different ideologies, and a lot of weapons. And instead of having a single administration, they fought in Afghanistan. The destruction that they brought was worse than the destruction the Russians brought. 63,000 people were only killed in the capitol, Kabul. Another million people migrated because of this lawlessness.

Taliban Origin

Seeing this destruction and lawlessness, a group of students called the Taliban. A group of students which, started a movement called the Movement of Students. It first started in a village in the southern Kandahar province of Afghanistan. It happened when a warlord [ commander ] abducted two ( 2 ) minor girls and violated them. The parents of those girls went to a school and asked the teacher of the school to help them. The teacher of that school, along with his fifty-three ( 53 ) students, finding only sixteen ( 16 ) guns, went and attacked the base of that commander. After releasing those two girls, they hanged that commander and so many of his people were also hanged.

This story was told everywhere. The British Broadcast Corporation (aka) B.B.C. also quoted this story. Hearing this story, many other students joined this movement and started disarming the rest of the warlords. This same student’s movement now controls ninety-five percent (95%) of the country [ Afghanistan ] including its capital [ Kabu l]. Only a bunch of those warlords are remaining in the northern [ Northern Alliance ] corridor of Afghanistan.

Spoils Of War & Achievements

Afghanistan is called the Crossroads of Asia (aka) The Land Of Khursan. So, we are suffering because of our geo-strategic location. We have suffered in the 18th Century, 19th Century, and we are still suffering in this century. We have not [ ever ] attacked the British. We have not [ever] attacked the Russians. It was them who attacked us. So the problems in Afghanistan you see are not our creation.

Taliban Achievements In Afghanistan

We have been in government [ Taliban ] for only five ( 5 ) years, and the following things that we have done, and many of you may not know:

1. The first thing we have done is reunifying the fragmented country. Afghanistan was formerly fragmented into five parts. We unified it when nobody else could do it.;

2. Second thing we have done, which everybody failed to do, was disarming the population. After the [ Afghan ] war every Afghan got a Kalashnikov [ Russia military styled automatic rifle ], and even sophisticated weapons such as stinger missiles, and they even got fighter planes and fighter helicopters. Disarming these people seemed to be impossible. The United Nations in 1992 made an appeal asking for 3,000,000,000 billion dollars to re-purchase those arms. And because of its impracticality, that plan never materialized, and everybody forgot about Afghanistan. So the second thing we have done is to disarm 95% of that country.;

3. The third thing that we have done is to establish a single administration in Afghanistan, which did not exist for 10 years.;

4. The fourth achievement that we have that is surprising to everybody is that we have eradicated seventy-five percent (75%) of World’s opium cultivation [ i.e. white and red opium poppy plants ]. Afghanistan produced 75% of World’s opium. And last year we issued an edict asking the people to stop growing opium, and this year, the United Nations Drug Control Program (aka) UNDCP, and their head, Mr. Barnard F. proudly announced that there was zero percent (0%) of opium cultivation. Zero, zilch, none at all.; Incidentally this was not good news for the U.N. itself because many of them lost their jobs. In the UNDCP, seven hundred ( 700 ) so called experts were working there and they got their salaries and they never went into Afghanistan. So when we issued this edict, I know that they were not happy. And this year they lost their jobs.; and,

5. The fifth achievement that we have, is the restoration of Human rights. Now, you may think that we are involved in violation of Human Rights. The reality is exactly the opposite. Among the fundamental rights of a human being is the right to live. Before us, nobody could live peacefully in Afghanistan. The first thing we have done, is to give to the people a secure and peaceful life. The second major thing that we have restored is to give them free and fair justice; you don’t have to buy justice, unlike here. In Afghanistan justice is free and readily available.

Afghanistan Women Rights

We have been criticized for violating women’s rights. Do you know what happened before us? I can see some Afghans living here, and they will agree with me, that in the rural areas of Afghanistan, women were used as animals. They were sold actually. We stopped this abominable practice.

They didn’t use to have any say in the selection of their husbands. First thing we have done is to let them choose their future. Another thing that used to happen in Afghanistan was women were exchanged as gifts. Of course, this was not something religious; this was something cultural.

When two fighting tribes wanted reconciliation, they would exchange women. And this has been stopped.

Unlike what is generally said women do work in Afghanistan. True that until 1996 when we captured the capital Kabul, we did ask women to stay home. It didn’t mean that we wanted them to stay at home forever. We said that there is no law, and there is no order, and you have to stay at home.

We disarmed the people, and we established law and order, and now women are working. True, that women are not working in the ministry of defense, like here. We don’t want our women to be fighter pilots, or to be used as objects of decoration for advertisements. But they do work. They work in the Ministry of Health, Interior, Ministry of Education, Ministry of Social Affairs, and so on.

Similarly we don’t have any problem with women’s education. We have said that we want education, and we will have education whether or not we are under anybody’s pressure, because that is part of our belief. We are ordered to do that. When we say that there should be segregated schools, it does not mean that we don’t want our women to be educated. It is true that we are against co-education; but it is not true that we are against women’s education.

We do have schools even now, but the problem is the resources. We cannot expand these programs. Before, our government numerous curriculums were going on. There were curriculums that preached for the kings, curriculums that preached for the communists, and curriculums from all the seven parties. So, the students were confused as to what to study. We have started to unify the curriculum and that is going on.

Recently, we reopened the Faculty Of Medical Science in all major cities of Afghanistan and in Kandahar [ province ]. There are more girl students studying than boys are. But, they are segregated. And the Swedish committees have also established schools for girls. I know they are not enough, but that is what we have been able to do.

Usama bin Laden

We are also accused of sponsoring terrorism. And for Americans terrorism or terrorist means only [ Usama ] bin Laden. Now you will not know that Afghanistan, or bin Laden was in Afghanistan for 17 years before we even existed. Bin Laden was in Afghanistan, fought the Soviet Union, and Mr. Ronald Reagan, the President of America at that time, and Mr. Dick Cheney called such people “Freedom Fighters” or the “Heroes of Independence” because, they were fighting for their cause.

And now when the Soviet Union is fragmented, such people were not needed anymore, and they were transformed into terrorists. From heroes to terrorists. This is exactly like Mr. Yasser Arafat who was transformed from a terrorist to a hero.

What is the difference between those acts that Usama bin Laden is blamed for, and the 1998 cruise missile attacks on Afghanistan? Neither of the two ( 2 ) were declared and both of them killed civilians. If it means killing civilians blindly, both of them killed civilians blindly.

The United States Government tried to kill a man without even giving him a fair trial. In 1998, they just sent cruise missiles into Afghanistan and they announced that they were trying to kill Usama bin Laden. We didn’t know Usama bin Laden then. I didn’t know him; he was just a simple man.

So we were all shocked. I was one of those men who was sitting at home at night, I was called for an immediate council meeting and we all were told the United States had attacked Afghanistan.

With seventy five ( 75 ) cruise missiles they tried to kill one man. And they missed that man; killed nineteen ( 19 ) other students and never apologized for those killings.

What would you do if you were in our situation?

If we were to go and send 75 cruise missiles into the United States and say that we were going to kill a man that we thought was responsible for our Embassy [bombing], and we missed that man, and we killed 19 other Americans what would the United States do? An instant declaration of war. But we are polite. We did not declare war.

Proposals & Rejections

Rather we have been very open-minded on this issue. We have said, that if really this man is involved in the Kenya and Tanzania U. S. Embassy bombing acts, if anybody can give us proof or evidence about his involvement in these horrific acts, we will punish him. Nobody gave us evidence. We put him on trial for forty five ( 45 ) days and nobody gave us any kind of evidence.

The United States told us they did not believe in our judicial system. We were surprised as to what kind of judicial system they have? They just tried to kill a man without even giving him a fair trial. Even if one of us is a criminal here, the police are not going to blow his house; he must go to a court first.

So our first proposal was rejected. They [ U.S. ] said they do not believe in our judicial system, and we must extradite him to New York. After the rejection of this first proposal was, we said we were ready to accept an international monitoring group to come into Afghanistan and monitor this man’s activities in Afghanistan. So that he does nothing. Even that he has no telecommunications. That proposal was also rejected.

The third ( 3rd ) proposal we gave, six ( 6 ) months ago, was that we were ready to try or accept the trial of Osama bin Laden in a third ( 3rd ) Islamic country with the consent of Saudi Arabia and Afghanistan. That was also rejected.

We are still very open minded. And for the fourth time, I am here, with a letter from my leadership that I m going to submit to the [U. S.] State Department hoping that they will resolve the problem. But I don’t think that they will.

Because we think, and I personally think now that maybe the United States is looking for a boogey man always.

Remember what Gorbachev said? He said, that he’s going to do the worst thing ever to the United States. And everybody thought that he’s going to blow the United States with nuclear weapons.

But he said, I’m going to remove their enemy. And then he fragmented Soviet Union. And he was right. After he fragmented Soviet Union, a lot of people lost their jobs in the Pentagon, in the CIA, and the FBI, because they were not needed anymore.

So we think that maybe these guys are looking for a boogey man now. Maybe they want to justify their annual budget, maybe they want to make their citizens feel that they are still needed to defend them.

Afghanistan is not a terrorist state; we cannot even make a needle. How are we going to be a terrorist state? How are we going to be a threat to the world? If the world terrorism is really derived from the word terror, then there are countries making weapons of mass destruction, countries making nuclear weapons, they are terrorist states; we are not.”

Why Afghanistan People Support Taliban – Statues vs. Starving

Sayyid Rahmatullah Hashemi is the roving Ambassador from Afghanistan who recently visited the U.S.. The following, is a foreign edited version of the transcription pertaining to his lecture given at the University Of Southern California in Los Angeles, California on March 10, 2001:

“I was just coming from a meeting with a group of scholars, and the first thing we started talking about there was the statues. And the first thing we started talking about here was also the statues. It is very unfortunate how little we see and how little we know. Nobody has seen the problems of Afghanistan; nobody saw their problems before. And the only thing that represents Afghanistan today are the statues.

Now, we are under sanctions. And the sanctions have caused a lot of problems. Despite that we already had been going through so many problems — the 23 years of continuous war, the total destruction of our infrastructure, and the problem of refugees, and the problem of [ Soviet Army Aghan War ] military landmines in our agricultural lands — all of a sudden the United Nations, with the provocation of Russia, is imposing sanctions on Afghanistan. And the sanctions have been approved; we are under sanctions. Several hundred ( 700 ) children died a month ago. Seven hundred ( 700 ) children died because of malnutrition and the severe cold weather. Nobody even talked about that. Everybody knows about the statues.

When the World is destroying our future with economic sanctions, then they have no right to worry about our past. I called my headquarters, I asked them, why are they [ Taliban ] going to blow [destroy] the statues, and I talked to the head of the [ Taliban Government ] Council of Scholars of People, who had actually decided this, he told me that UNESCO and, an unidentified Non-Governmental Organization (aka) NGO from one ( 1 ) of the Scandinavia countries possibly Norway, Sweden had actually come with a project to rebuild the face of Afghani statues, which were worn by weather elements. They [Taliban] told them to spend that [ UNESCO & NGO ] money in saving the lives of these children, instead of spending it to restore these statues. And these guys [ UNESCO & NGO ] said, “No, this money is only for the statues.” And the people were really pissed off. They said that, If you don t care about our children, we are going to blow those statues. If you were in such a situation what would you do? If your children are dying in front of your eyes, and you are under sanctions, and then the same people who have imposed sanctions and are coming and building statues here? What would you do?

United Nations  Secretary General Kofi Annan

Kofi Annan, the United Nations Secretary General, went to Pakistan, and he said he is going to meet our representative there. This man never bothered to come, to talk about these children, he never bothered himself to talk about 6,000,000 million refugees, and he never talked about the poverty of Afghanistan. He only goes to that region because of these statues.

It is really, really ridiculous. These people do not care about children, about people who are dying there, about the foreign interference that still exists; they only care about the statues. And I am sure they don’t care about our heritage. They only care about their picnic site one time. Maybe they’ll have a good picnic site there, seeing those statues.

And I’m sure these sanctions which are imposed on our [ Taliban ] government will never change us, because for us, our ideology is everything. To try to change our ideology with economic sanctions will never work. It may work in the United States, where the economy is everything, but for us, our ideology is everything. And we believe that it is better to die for something than to live for nothing.”

PRE-WAR PHOTOS #1

PRE-WAR PHOTOS #2

CIA WATCH

World War II Tactic In WTC Attacks

 USA, Washington, DC - October 26, 2001 – During World War II, the GT-1 (aka) Glide Torpedo, was somewhat successful and saw some used in the Pacific theater of the War. The development of Glide Bomb series weapons later included radio-controlled steering servomechanisms and even television cameras during the 1940s.

Today, we’ve been tracking Usama bin Laden (aka) Osama bin Laden with Unmanned Aerial Vehicles ( UAV ). See, e.g. “DIA Watch” in “Archives” for more on this website.

The UAV is designed to utilize both integrated onboard surveillance sensor systems to identify, track and destroy intended targets using a variety of weapons, and controlled via remote command centers carrying out originating directives from many miles further away.

Reviewing the method used by terrorists in the September 11, 2001 attacks may easily see the plan was taken from World War II U.S. military history books – demonstrating some shocking similarities.

In the early 1940s – as the air-war progressed at that time – B-17s and B-24s bomber aircrafts literally began to “wear out”. These surplus bombers occupied valuable ramp space and even more valuable maintenance time.

By late 1943, Brigadier General Harry H. Arnold (aka) “Hap” of the Army Air Corps (aka) A.A.C., directed Brigadier General Grandison Gardner engineers at Eglin Air Field, Florida to outfit these “Weary Willies” with ‘automatic piloting devices’ so the airplanes, i.e. B-17s and B-24s, could be filled with TNT or liquid petroleum ( fuel ) and remotely flown-to-impact on enemy targets.

Project Aphrodite, is where the whole idea was born from, targeting principles to crash orphan aircraft into large cities or industrial complexes causing instant chaos amongst the enemy.

General Carl A. Spaatz utilized several of these “guided missile aircrafts” during the fall of 1944 against German enemy targets in Europe. They were largely unsuccessful because they were easy to shoot down before they reached the target area. At Yalta, shortly after the first Weary Willies were used in combat, the British vetoed further Project Aphrodite missions because of possible German retaliation to the undeniable “terror” nature of the weapon. Weary Willies were eventually grounded after Yalta, much to General Arnold’s dismay.

Project Aphrodite’s, Weary Willie converted war-weary B-17s & B-24s – flown as explosive “area bomb aircraft-weapons” – were equipped with relatively simple radio-controlled transmitters and receivers, hooked through servomechanisms inside the planes.

B-17 / B-24, after conversion, were loaded with 20,000 pounds of TORPEX, a very high explosive. The B-17 / B-24 planes had various design configurations:

- Flown-to-impact ( impact fuse charges ) TORPEX explosives; and,

- Fuel ( e.g. petroleum, etc. ) optional explosives / systems.

Aircraft weapon delivery techniques for the bomb area blast were that a pilot would fly the aircraft up near its destined target areas, its pilot would bail out ( with a parachute ) after transferring radio frequency controls to an accompanying aircraft ( used for remote control sighting and steering and flying ) that would control the bomb-delivery aircraft over its target destination.

The different Weary Willie projects were supposed to be clarified at this point as being “supposedly” flown “up to the enemy battle lines” where its pilot was to set the “automatic pilot” and bail-out into friendly territory. The Weary Willie orphan aircraft were then totally radio-controlled and remotely guided into enemy territory from a mothership that followed it nearer to enemy territory.

Aphrodite was begun supposedly with totally radio-controlled aircraft, usually piloted from a ground station. The importance of Aphrodite was not its impact [ no pun intended ] on the outcome of the war. General Arnold had no great hopes for the ultimate decisiveness of these area bomb aircraft-weapons. Rather, Aphrodite demonstrated General Arnold’s willingness to supplement a precision-bombing doctrine in an effort to save the lives of American airmen, particularly since he was feeling confident that the war in Europe was essentially under control by late spring 1944.

In a staff memo, General Arnold explained that he didn’t care if the Weary Willies were actually radio-controlled or just pointed at the enemy and allowed to run into them loaded with just aircraft fuel.

Aphrodite did provide an opportunity to test new automated piloting technology in a combat situation. Additionally, and more importantly, destroying these already “weary” bombers made room for new airplanes that the prescient General Arnold knew the Army Air Corps would need after the war concluded. Although General Arnold was determined to rid the Armed Forces inventory of useless machines; in most combat situations, he preferred manned bombers to that of the Weary Willies.

In November 1944, General Arnold reminded General Spaatz of the salvage rules for damaged aircraft: “The accelerated activities of our fighting forces in all theaters makes it increasingly important that we utilize our material resources to the maximum, not only for the sake of the economy, but also in order that the greatest possible pressure be brought to bear against the enemy.”

The experienced General Arnold realized that to win the war, “One side must try and kill as many men and destroy as much property as you can. If you can get mechanical machines to do this, then you are saving lives at the outset.” [ NOTE: Brigadier General H. H. Arnold staff memo, 2 November 1944, "Arnold Papers", box 44; Arnold to Spaatz, letter, 22 November 1944, in MGC, roll 12. ] At this point though – willing to try non-precision methods on occasion – General Arnold realized that technology had not surpassed the abilities of manned bombers in accuracy or guile for accomplishing that mission

Interestingly, Project Aphrodite clearly involved the use of a non-precision weapon system and yet, General Arnold staunchly supported its development well before Germany launched its first V-1 at England in the early morning hours of June 13, 1944. Weary Willies capable of carrying large amounts of explosives to an eventual enemy’s homeland for destruction – using them as guided aircraft missiles – assured the United States that, none of these ailing elephants would clog up its moth-balled stockpiles.

One mission flown by the U. S. Army Air Corps began at a rendezvous point with a “pair of Weary Willie drones”, with an accompanying pair of directors – each controlling a drone – on four (4) B-17s. Their mission was to fly at very low-level altitudes just off the surface of the North Sea. They rendezvoused somewhere on the coast of England where, their eventual target was a group of distant submarine pens on an island called, Hellova Island, somewhere up in the Denmark or Norway area of the Baltic Sea.

The terminal guidance system on those drones were something that was never even heard of at that time which were television-type camera monitors. They had a television camera in the nose of the Weary Willie drone transmitting its picture back to each director. The director used this guidance system as its terminal to dive on targets. While keeping the television image of his target right in that screen, he’d flew it right into the target.

The time-length of that mission, was more than seven (7) hours up there and back, escorting these Weary Willies on their one-way trip to impact.

The directors flew those drones directly into their targets which were right through the entrance of this “underground submarine pen installation” inside some “rocky area” and then right into the doors of the pens. There was a tremendous explosion from those results. Few saw the post-attack reports but, it had to have accomplished its objective for devastating that entire German submarine base.

[ SCIENTIFIC EXPERIMENTATION NOTE ON COLLISIONS: Target Size Effects and Resultant Velocity Distributions ( TSE&RVD ) have studied the dynamic fragmentation of impact collisions - using a 2 dimensional, continuum damage numerical hydrocode which, modeled 2 body impacts. This hydrocode monitored stress wave propagation and interaction within the target body, and included a physical model ( Grady and Kipp Fragmentation Theory ) for the formation and growth of cracks in rock like structures. With this algorithm, the study successfully reproduced 'fragment size distributions' and 'mean ejecta speeds' from laboratory impact experiments utilizing basalt, and weak and strong mortar as target materials. Using the hydrocode it was determined that the energy needed to fracture a body has a much stronger dependence on 'target size' than predicted from most  model scaling theories'. In addition, velocity distributions previously obtained indicated that 'mean ejecta speeds', resulting from large-body collisions, did not exceed escape velocities. ]

NOTE: In World War II, the German Luftwaffe use to identify sections of the Autobahn (Interstate Highways), generally down in the southern part of Germany, in Bavaria and down towards Munich, and they’d carve out areas in the forest along the Autobahn where they built revetments and parking places for the airplanes. They would use the Autobahn then to take off and to land.

CIA WATCH 

TERRORISM – TECHNOLOGY

World War II Tactic In WTC Attacks

USA, Washington, D. C. - October 26, 2001 – During World War II, the GT-1 (aka) Glide Torpedo, was somewhat successful and saw some used in the Pacific theater of the War. The development of Glide Bomb series weapons later included radio-controlled steering servomechanisms and even television cameras during the 1940s.

Today, we’ve been tracking Usama bin Laden (aka) Osama bin Laden with Unmanned Aerial Vehicles ( UAV ). See, e.g. “DIA Watch” in “Archives” for more on this website.

The UAV is designed to utilize both integrated onboard surveillance sensor systems to identify, track and destroy intended targets using a variety of weapons, and controlled via remote command centers carrying out originating directives from many miles further away.

Reviewing the method used by terrorists in the September 11, 2001 attacks may easily see the plan was taken from World War II U.S. military history books – demonstrating some shocking similarities.

In the early 1940s – as the air-war progressed at that time – B-17s and B-24s bomber aircrafts literally began to “wear out”. These surplus bombers occupied valuable ramp space and even more valuable maintenance time.

By late 1943, Brigadier General Harry H. Arnold (aka) “Hap” of the Army Air Corps (aka) A.A.C., directed Brigadier General Grandison Gardner engineers at Eglin Air Field, Florida to outfit these “Weary Willies” with ‘automatic piloting devices’ so the airplanes, i.e. B-17s and B-24s, could be filled with TNT or liquid petroleum ( fuel ) and remotely flown-to-impact on enemy targets.

Project Aphrodite, is where the whole idea was born from, targeting principles to crash orphan aircraft into large cities or industrial complexes causing instant chaos amongst the enemy.

General Carl A. Spaatz utilized several of these “guided missile aircrafts” during the fall of 1944 against German enemy targets in Europe. They were largely unsuccessful because they were easy to shoot down before they reached the target area. At Yalta, shortly after the first Weary Willies were used in combat, the British vetoed further Project Aphrodite missions because of possible German retaliation to the undeniable “terror” nature of the weapon. Weary Willies were eventually grounded after Yalta, much to General Arnold’s dismay.

Project Aphrodite’s, Weary Willie converted war-weary B-17s & B-24s – flown as explosive “area bomb aircraft-weapons” – were equipped with relatively simple radio-controlled transmitters and receivers, hooked through servomechanisms inside the planes.

B-17 / B-24, after conversion, were loaded with 20,000 pounds of TORPEX, a very high explosive. The B-17 / B-24 planes had various design configurations:

- Flown-to-impact ( impact fuse charges ) TORPEX explosives; and,

- Fuel ( e.g. petroleum, etc. ) optional explosives / systems.

Aircraft weapon delivery techniques for the bomb area blast were that a pilot would fly the aircraft up near its destined target areas, its pilot would bail out ( with a parachute ) after transferring radio frequency controls to an accompanying aircraft ( used for remote control sighting and steering and flying ) that would control the bomb-delivery aircraft over its target destination.

The different Weary Willie projects were supposed to be clarified at this point as being “supposedly” flown “up to the enemy battle lines” where its pilot was to set the “automatic pilot” and bail-out into friendly territory. The Weary Willie orphan aircraft were then totally radio-controlled and remotely guided into enemy territory from a mothership that followed it nearer to enemy territory.

Aphrodite was begun supposedly with totally radio-controlled aircraft, usually piloted from a ground station. The importance of Aphrodite was not its impact [ no pun intended ] on the outcome of the war. General Arnold had no great hopes for the ultimate decisiveness of these area bomb aircraft-weapons. Rather, Aphrodite demonstrated General Arnold’s willingness to supplement a precision-bombing doctrine in an effort to save the lives of American airmen, particularly since he was feeling confident that the war in Europe was essentially under control by late spring 1944.

In a staff memo, General Arnold explained that he didn’t care if the Weary Willies were actually radio-controlled or just pointed at the enemy and allowed to run into them loaded with just aircraft fuel.

Aphrodite did provide an opportunity to test new automated piloting technology in a combat situation. Additionally, and more importantly, destroying these already “weary” bombers made room for new airplanes that the prescient General Arnold knew the Army Air Corps would need after the war concluded. Although General Arnold was determined to rid the Armed Forces inventory of useless machines; in most combat situations, he preferred manned bombers to that of the Weary Willies.

In November 1944, General Arnold reminded General Spaatz of the salvage rules for damaged aircraft: “The accelerated activities of our fighting forces in all theaters makes it increasingly important that we utilize our material resources to the maximum, not only for the sake of the economy, but also in order that the greatest possible pressure be brought to bear against the enemy.”

The experienced General Arnold realized that to win the war, “One side must try and kill as many men and destroy as much property as you can. If you can get mechanical machines to do this, then you are saving lives at the outset.” [ NOTE: Brigadier General H. H. Arnold staff memo, 2 November 1944, "Arnold Papers", box 44; Arnold to Spaatz, letter, 22 November 1944, in MGC, roll 12. ] At this point though – willing to try non-precision methods on occasion – General Arnold realized that technology had not surpassed the abilities of manned bombers in accuracy or guile for accomplishing that mission

Interestingly, Project Aphrodite clearly involved the use of a non-precision weapon system and yet, General Arnold staunchly supported its development well before Germany launched its first V-1 at England in the early morning hours of June 13th, 1944. Weary Willies capable of carrying large amounts of explosives to an eventual enemy’s homeland for destruction – using them as guided aircraft missiles – assured the United States that, none of these ailing elephants would clog up its moth-balled stockpiles.

One mission flown by the U. S. Army Air Corps began at a rendezvous point with a “pair of Weary Willie drones”, with an accompanying pair of directors – each controlling a drone – on four (4) B-17s. Their mission was to fly at very low-level altitudes just off the surface of the North Sea. They rendezvoused somewhere on the coast of England where, their eventual target was a group of distant submarine pens on an island called, Hellova Island, somewhere up in the Denmark or Norway area of the Baltic Sea.

The terminal guidance system on those drones were something that was never even heard of at that time which were television-type camera monitors. They had a television camera in the nose of the Weary Willie drone transmitting its picture back to each director. The director used this guidance system as its terminal to dive on targets. While keeping the television image of his target right in that screen, he’d flew it right into the target.

The time-length of that mission, was more than seven (7) hours up there and back, escorting these Weary Willies on their one-way trip to impact.

The directors flew those drones directly into their targets which were right through the entrance of this “underground submarine pen installation” inside some “rocky area” and then right into the doors of the pens. There was a tremendous explosion from those results. Few saw the post-attack reports but, it had to have accomplished its objective for devastating that entire German submarine base.

[ SCIENTIFIC EXPERIMENTATION NOTE ON COLLISIONS: Target Size Effects and Resultant Velocity Distributions (aka) TSE&RVD have studied the dynamic fragmentation of impact collisions - using a two-dimensional, continuum damage numerical hydrocode which, modeled two-body impacts. This hydrocode monitored stress wave propagation and interaction within the target body, and included a physical model (Grady and Kipp Fragmentation Theory) for the formation and growth of cracks in rock-like structures. With this algorithm, the study successfully reproduced "fragment size distributions" and "mean ejecta speeds" from laboratory impact experiments utilizing basalt, and weak and strong mortar as target materials. Using the hydrocode it was determined that the energy needed to fracture a body has a much stronger dependence on "target size" than predicted from most "scaling theories". In addition, velocity distributions previously obtained indicated that "mean ejecta speeds", resulting from large-body collisions, did not exceed escape velocities. ]

NOTE: In World War II, the German Luftwaffe use to identify sections of the Autobahn ( interstate highways ), generally down in the southern part of Germany, in Bavaria and down towards Munich, and they’d carve out areas in the forest along the Autobahn where they built revetments and parking places for the airplanes. They would use the Autobahn then to take off and to land.

CIA WATCH

TERRORISM – FINANCE

Usama Bin Laden Real Esate, Money & More

AFGHANISTAN, Farmada – October 6, 2001 – Usama bin Laden was last sighted at his nearby base called, the Darunta Camp Complex, but then left immediately to Kunar Province, in the Hindu Kush Mountain area of North Eastern Afghanistan. Usama bin Laden, travelled in a small convoy with his most loyal fighters to an unknown destination.

Usama bin Laden Real Estate Deal In Pachi Ragam District

Afghanistan, Jalalabad - Residents here, who did not want to be identified, said many Arab nationals in the Pachi Ragam district of Nangarhar are living on property purchased by Usama bin Laden before the Taliban took control of the area in 1996.

Usama bin Laden, purchased the land from Younis Khalis, former leader of the Afghanistan resistance during the 1980s.

The fortified farmhouse in Farmada, Adghanistan has about 600 militant Islam religion Muslims from Saudi Arabia, Egypt, Yemen and the Gulf states still based there where everal hundred more are serving with Taliban forces fighting in the Northern Afghanistan.

Between the two ( 2 ) training camps, one ( 1 ) in Farmada, Afghanistan ( with 600 Islamic militants ) and another one ( 1 ) west of Farmada on the Darunta Camp Complex ( with 400 Islamic militants ), nearly 1,000 men are at these two (2) camps alone where there are men from Yemen, Algeria, Egypt, Tajikistan, Uzbekistan and Pakistan.

Long Time Money Trail To Usama bin Laden

Five ( 5 ) top Saudi Arabia businessmen, worth more than $5,000,000,000 billion, ordered NATIONAL COMMERCIAL BANK ( Saudi Arabia ) to bank wire transfer amounts in ‘personal funds’ in-addition to $3,000,000 million from a Saudi Arabia ‘pension fund’ to banks in New York, USA and London, UK where the money was deposited into accounts of Islamic charities, including the Islamic Relief and Blessed Relief that served as fronts for Usama bin Laden.

It was discovered that these businessmen were in-essence paying Usama bin Laden “protection money” for their Saudi Arabia businesses.

The money transfers were discovered in April 2000 after the royal family ordered an audit of NCB and its founder and former chairman, Khalid bin Mahfouz. Mahfouz was under “house arrest” at a military hospital in the Saudi city of Taif. His successor, Mohammad Hussein Al-Amoudi, also heads the Capitol Trust Bank in New York and London, which U.S. and British officials are investigating for allegedly transferring money to Usama bin Laden. Amoudi’s Washington, D.C. lawyer is, Vernon Jordan. Mahfouz’s son, Abdul Rahman Mahfouz, is on the board of Blessed Relief in Sudan in which, suspects in the attempted assassination of Egypt President Hosni Mubarak, are linked to this charity.

In August 1990, after the money bank wire transfers were discovered, the Kingdom of Saudi Arabia Royal Family ordered an audit of the NATIONAL COMMERCIAL BANK and its founder and former chairman Khalid bin Mahfouz who is now under ‘house arrest’ in Taif, Saudi Arabia.

Khalid bin Mahfouz successor Mohammed Hussein Al-Amoudi heads-up the CAPITOL TRUST BANK ( New York, USA ) and ( London, UK ) that is being investigated – for allegedly transferring money to Usama bin Laden – by American and British officials.

Mohammed Hussein Al-Amoudi attornies of the law firm AKIN, GUMP, STRAUSS, HAUER & FELD ( Washington, D.C. ) said, “He has no knowledge of the acts alleged and does not know Usama bin Laden,” continuing, “has never knowingly had dealings of any kind with Usama bin Laden,” and, “Sheik Mohammed H. Al-Amoudi does not have any knowledge of any money transfers by Saudi businesses to Usama bin Laden and is unalterably opposed to terrorism.”

Business executives in Saudi Arabia continue to transfer tens of millions of dollars to bank accounts linked to Usama bin Laden, with bank wire money transfers – having begun more than 5-years ago – used to finance several attacks by Usama bin Laden, including the 1995 assassination attempt against Egypt President Hosni Mubarak while in Ethiopia.

Osama Bin Laden & Carlos The Jackal Links In Sudan & Yemen

SUDAN, Khartoum – September 19, 2001 - Global public enemy number one used to be Ilyich Ramirez-Sanches (aka) Carlos (aka) The Jackal. There exists an unusual link between Carlos “The Jackal” and Usama bin Laden (aka) Osama bin Laden ( 43 ), both lived in Khartoum, Sudan at the same time years ago. Coincidence? Perhaps, however another link places them both in Yemen, as was the U.S. Central Intelligence Agency ( CIA ) as well.

It was Khartoum, Sudan where Usama bin Laden set up his construction business office, the BIN LADEN COMPANY of Khartoum.

Now while there are many places around the world that for decades have bred terrorist groups, Yemen is like the CLUB MED resort of all terrorist camps.

Within Yemen, amongst several terrorist groups, exists  the Islamic Army of Aden-Abyan containing both Salafi and Islamic Jihad elements.

In 1995, the Islamic Army of Aden-Abyan established a terrorist training camp in the Hatat mountains ( Yemen ) – about 35 kilometers north of Zinjibar – in Abyan Province [ Yemen ] equipped with terrorism instructors from other countries.

In May 1995, Yemen police and Yemen military troops used military heavy artillery and military helicopter gun ships to attack the Hatat mountain terrorist training camp after complaints from tribal and community leaders in Yafa’, Yemen.

Hatat mountain terrorist training camps were described as ‘practically impregnable’, and the results of those Yemen security force attack efforts are ‘publicly unknown’.

Arab Afghans, who fought in the Afghanistan War, later became known as Muslim volunteers who fought against the Russia Soviet Union Army in Afghanistan where the Soviet military withdrawal left many of these Muslim volunteer fighters at loose ends but filled with the spirit of Jihad ( Holy War ), which often made them ‘unwelcome when they tried to return to their home countries’. In some ways they were like U.S. Viet Nam War veterans, deprived of adrenaline and unable to adjust to a quiet life, but unlike Vietnam veterans, their efforts had not been futile for they defeated a superpower ( Russia ) nation and were consequently flushed with success. Many, including Osama bin Laden himself, told of narrow escapes from death bolstering their belief that Allah ( God ) had preserved them for a purpose.

Two ( 2 ) prominent figures have been named in connection as leaders of Islamic militant religious radical terrorist organizations:

FIRST – Usama bin Laden, who allegedly provided the group with funds and whose extradition from Sudan was sought during 1993 in Yemen where his family came originally from [ Aden, Yemen ] but a few family members moved north to Saudi Arabia where they prospered and were later joined by the rest of the bin Laden family following the UK withdrawal from Aden, Yemen and the consequential Marxist takeover there. Today there are about fifty ( 50 ) members of the bin Laden family – Saudia Arabia citizens – with primary interests in the construction industry. They are considered the wealthiest non-royal family in the Kingdom of Saudi Arabia.

During the 1980s, during the Soviet – Afghanistan War, Usama bin Laden – in common with many other Saudi businessmen – saw a ‘religious duty to support Islamic rebels financially’ against the Soviet regime in Moscow. He ‘could afford to be more generous’, than most, and became more deeply involved than most. Not only did he pay for weapons and what, by his own account, were thousands of Muslim volunteers from the Middle East and North Africa to join the Mujahideen ( Soviet Afghanistan War veterans ), He went there himself and took part in the fighting. Osama bin Laden, using the resources of his construction business, blasted new guerrilla trails across the mountains and tunneled into the rock to create underground hospitals and armament depots in Afghanistan.

In 1989, Usama bin Laden relations became strained with Saudi Arabia authorities who confiscated his passport.

In 1991, when his passport was returned, Osama bin Laden moved to Sudan where he founded the BIN LADEN COMPANY ( Khartoum, Sudan ), a business specializing in construction and the export of sesame seeds. Many veterans of the Afghan war also joined him in Khartoum, Sudan.

Osama bin Laden, although not convicted of any crime, Egypt, Algeria, Jordan and, Yemen authorities named him as a ‘financial source’ where funds were expended for bombing and assassination campaigns.

Osama bin Laden, was an ‘unindicted co-conspirator’ in the U.S. list of those bombing the World Trade Center.

In 1994, Osama bin Laden was formally disowned by his Saudi Arabia relatives and stripped of his Saudi Arabia citizenship for “irresponsible activities” harming the Kingdom of Saudi Arabia international relations. With financial and human resources to mount attacks in the name of Islam almost anywhere in the world, Osama bin Laden and his associates directed their efforts not only against unbelievers of the Islamic faith but against other Muslims deemed strays from the Islamic “true path.”

Also in 1994, in Jordan he was named in court as having funded a plot to assassinate politicians and bomb cinemas, nightclubs, video shops and liquor outlets. The twenty-five ( 25 ) accused including Osama bin Laden son-in-law Muhammad Khalifa who was tried in absentia. Muhammad Khalifa has business interests in the Philippines where he was linked to the Abu Sayyaf (aka) Father of the Executioner, a group that attacked Christians, allegedly plotted to kill the Pope and blow-up U.S. airliners over the Pacific Ocean.

According to claims of intelligence services, Osama bin Laden and his associates funded armed Islamic struggles in Afghanistan, Albania, Algeria, Egypt, Iraq, Jordan, Kenya, Lebanon, Malaysia, Morocco, The Netherlands ( Holland ), Pakistan, Philippines, Romania, Russia, Syria, Tanzania, Turkey, United Arab Emirates, United States and Yemen.

SECOND – Sheikh Tariq Bin Nasir Bin Abdullah al-Fadli (aka) Tariq al-Fadli (aka) Sheikh Tariq Al-Fathli, an important figure in Yemen terrorism during the early 1990s – though a very different character tha Osama bin Laden. Tariq al-Fathli was a ‘sheikh’ from a prominent South Yemen family, the Fathli Family. Prior to the Marxist takeover of Yemen, the Sheikh Fathli Family controlled one ( 1 ) of the biggest cotton plantations outside Aden, Yemen where a huge share of all southern exports passed through Sheikh Tarik Family businesses. Perhaps more importantly still, is that the Sheikh Fathli Family also controlled the ‘water’ supply. Very soon after the establishment of Marxist rule the Fathli Family moved to Saudi Arabia. Following unification, Tariq al-Fathli returned to Yemen to claim his inheritance as heir to the ‘Sultan of Yemen’ who 25-years earlier was deposed from the Abyan province ( Yemen ).

Sheikh Tariq al-Fathli gathered around himself a number of Soviet-Afghanistan War veterans ( Mujahideen ), members of his own tribe, and religious opponents of the Yemen Socialist Party (aka) YSP.

Sheikh Tariq al-Fathli was said, at one point, to be seeking 12,000 “heroes” to help him “save Muslims in Bosnia, wage war on the authorities and bring down the regime which he considered outside Islam, intimate with unbelievers.” Whatever the motives of his helpers and backers, it seems that Shiekh Fathli had given his campaign a religious tinge merely to win support in pursuit of a far more personal and mundane goal: to take revenge on those who had dispossessed his family and to obtain restitution of their property.

In the aftermath of the Aden, Yemen hotel bombings at the end of 1992, hundreds of people were arrested and several caches of weapons discovered. NOTE: The southern Yemeni authorities, who were still controlled by the YSP, were generally more vigorous in their response to terrorism than their northern counterparts – though often no more successful in catching the culprits. The trail pointed to a group of “Afghans” led by, Sheikh Tariq al-Fathli who was eventually besieged at his home in the Maraqasha mountains, 20-km from coast of Abyan, Yemen.

Despite sending their Third Armoured Brigade having been sent to arrest Sheikh Tariq al-Fathli, southern authorities found themselves powerless to act. A military spokesman explained: “The forces could not reach the Sheikh’s stronghold which is protected by a large guard in a village in a chain of rugged mountains. We don’t want to use warplanes because that could injure the citizens in villages which are geographically integral with the sheikh’s stronghold.” The authorities then had to content themselves with sealing off all possible escape routes and urging the Maraqasha tribe to withdraw its confidence from the sheikh.

By this stage Sheikh Fathli was presenting himself as a supporter of the Yemeni Islah Party and a victim of South Yemen intrigue. He appealed directly to the party leader, Shaykh Abdullah al-Ahmar, for a guarantee of safe conduct to Sana’a. Shaykh Abdullah, who is Speaker of the Yemen Parliament, responded initially with a sharp rebuff, saying in a letter to Sheikh Fathli: “We do not protect criminals,” though in fact the appeal placed him in a difficult position. The affairs of Abyan were outside Sheikh Abdullah’s tribal purview and the Sheikh Fathli affair was not strictly a tribal matter. On the other hand, it might be politically unwise for Islah to refuse to deal with an important local opponent of the YSP.

By one means or another, however, Sheikh Tariq Al-Fathli (aka) Sheikh Tariq Fadli escaped the siege and arrived – accompanied by a delegation of Abyan tribal leaders guarded by a North Yemen army unit – at the house of Sheikh Abdullah ( Sana’a, Yemen ) with an appointment to meet the President next day.

The ‘official’ story, differed:

Sheikh Fadli (aka) Sheikh Tariq Al-Fathli had ‘peacefully surrendered to authorities’ and was ‘reported to the public prosecutor’ for ‘questioning in connection with the attempted assassination’ of Ali Salih Abbad Muqbil – a member of the YSP and secretary of the party’s organization in Abyan – plus, ‘various bombings’ in Aden.

In-fact Sheikh Tariq Al-Fathli (aka) Sheikh Tariq Fadli was never ‘imprisoned’ – though he spent some time at the Sana’a, Yemen house of Sheikh Abdullah.

In 1994, during the war between North Yemen and South Yemen, Sheikh Tariq Al-Fathli fought on the side of the President who in South Yemen saw him become the leading Sheikh ( Tariq Al-Fathli ).

Sheikh Tariq Al-Fathli appeared to have severed all links with Jama’at al-Jihad and urged his erstwhile followers to get regular jobs and work in the system.

Despite the religious connotations of the name “Jihad” it is still unclear what the organization primary aim was or whether it even had one.

At one level, Jihad could be regarded as part of a worldwide Islamic struggle with a marked anti-Soviet emphasis that found its Yemen parallel in waging war on the YSP. At another level, some of its supporters were concerned that the name merely provided a ‘moral cloak’ for essentially parochial interests and / or personal grievances.

Any or all of its diverse elements may well have considered themselves the “real” Jihad, each trying to make use of the others – through a tactical alliance much in the same way Usama bin Laden is doing today.

The confusion of purposes is nowhere more striking than in the case of the Aden, Yemen hotel bombings that were assumed connected with the use of the hotels by the U.S. military during their operations in Somalia, which would seem to imply an attack on the spread of Western culture and values in Yemen, however some of those involved also had links to an earlier terrorist campaign in South Yemen organized and funded by the U.S. Central Intelligence Agency ( CIA ) with assistance from Britain ( UK ) and Saudi Arabia.

Between 1977 and 1979, members of the Red Army Faction terrorist organization underwent weapons training at a Palestine terrorist training camp and then took refuge in South Yemen to evade authorities of Germany.

In 1979, the plot began – intent on weakening the Yemen PDRY government – and involved recruiting Yemen saboteurs, twelve ( 12 ) of whom were captured, tortured and later executed for ‘trying’ to blow up a bridge.

Between 1978 and 1986, Ilyich Ramirez-Sanchez (aka) Carlos the Jackal ‘frequently used’ a Diplomat passport issued in South Yemen.

There was a period – by chance or circumstance – when shortly before Ilyich Ramirez-Sanchez (aka) Carlos the Jackal was finally arrested – both he and Osama bin Laden (aka) Usama bin Laden lived in Khartoum, Sudan.

Prior to 1990, the Yemen unification year, South Yemen was controlled by the YSP political party ( Marxist ideology ) led government and black-listed – for state sponsored terrorism – by the United States ( U.S. ).

The 1992 Yemen hotel bombings may not so much have been directed against the United States as it may have been against the YSP in reprisal by relatives over the twelve ( 12 ) saboteurs executed for ‘attempting’ a crime.

In recent years Yemen ‘generally tries to cooperate’ with other countries ‘trying to combat terrorism’ netting limited success, the West believes because if Yemen was seen tightening control over its citizens, such actions would be viewed internationally as a behavior against democracy.

 Factors Yemen Haven For Terrorists

 1. Yemen land and sea borders are virtually impossible to guard;

2. Yemen government-presence authority in many parts of the country is minimal;

3. Very rugged, sparsely populated terrain makes it easy to train guerrillas and construct well-defended hideouts; and,

4. Yemen religious diversity means that most varieties of Islamic militants can find someone, somewhere, to shelter them.

Reference

http://web.archive.org/web/20020601211014/communities.msn.com/AnExCIA/intelldata.msnw

INTELL SYSTEMS

Carnivore and Other Systems

What Carnivore Is and How Carnivore Works

CARNIVORE, is just one ( 1 ) rudimentary form of domestic data collection used by federal authorities of the United States.

CARNIVORE fanciful advertising mentions and logo ( see above ) falsely represent CARNIVORE as being a ”Diagnostic Tool” but CARNIVORE does ‘not’ perform any “diagnostics” and does ‘not’ provide any ‘diagnosis’.

CARNIVORE, is a ‘system’ controlled by a standard telephone wire connection modem controller or DSL type connection designed to work in conjunction with a Commercial Off The Shelf ( COTS ) personal computer ( PC ) system installed with a specialized application software program operated specifically to ‘identify’ and ‘record’ data from a Internet Service Provider ( ISP ) telephone line providing virtual e-mail messagings and other forms of communication data sent from any type of ISP client computer ( desk-top, laptop, palm-top, hand-held cell phone, satellite phone and/or any other communication device utilizing transmitters and receivers via land-lines, satellite or other manipulators of recordable data onto a standard comercial off the shelf ( COTS ) electronic or optical storage mechanism.

According to the United States Department of Justice Federal Bureau of Investigations ( FBI ), “CARNIVORE is a computer-based system designed to allow the FBI, in-cooperation with an Internet Service Provider ( ISP ), to comply with Court Orders requiring collection of certain information about e-mails or other electronic communications to or from a specific user targeted in an investigation.”

FBI explains Codename: “CARNIVORE chews all the data on the network, but it only actually eats the information authorized by a court order.”

[ photo ( above ): CARNIVORE - DCS-1000 - Flow Chart ]

Carnivore Intercepts

Carnivore is used in two ( 2 ) ways: as a ‘content wiretap’ and a ‘trap and trace and pen-register’.

A telephone “content wiretap” is where law enforcement eavesdrops on the suspect’s telephone calls, recording the oral communications on tape. Carnivore can do similar things for Internet communication:

A. Captures all e-mail messages to and from a specific account.; and,

B. Captures all the network traffic to and from a specific user or IP address.

A less invasive style of wiretapping is the telephone “trap-and-trace,” where police tracks all the caller IDs of inbound telephone calls. For example, if your child has been kidnapped, the FBI will put a trap and trace on your phone in hopes of discovering the telephone number of the kidnappers.

There is a similar feature known as a “pen-register” that tracks all outbound telephone numbers dialed. If you are a suspected drug dealer, the FBI might perform a virtual stake out where they put a trap-and-trace plus pen-register on your phone in order to discover everyone you call, and everyone who calls you. Similar functionality for the Internet consists of:

A. Captures all the e-mail headers (including e-mail addresses) going to and from an e-mail account, but not the actual contents (or Subject: line).;

B. Lists all the servers (web servers, FTP servers) that the suspect accesses, but don’t capture the content of this communication.;

C. Tracks everyone who accesses a specific web page or FTP file.; and,

D. Tracks all web pages or FTP files that a suspect accesses.

One will notice that the trap-and-trace/pen-register functionality is mostly a subset of the content-wiretap interception. This is because the legal standards are more relaxed. A full content-wiretap can only be authorized by a federal district court judge, and only in cases of clear probable cause when certain crimes have been committed. The purpose of a full content-wiretap is to gather evidence to use during prosecution. In contrast, a trap-and-trace/pen-register can be authorized by lower judges. It is often used during the course of a criminal investigation in order to find out background information. This information is not considered “hard evidence” and may not standard up in court. Instead, it is often simply part of the background investigation.

If the FBI suspects you of a crime for which you are using e-mail, they will do their best to get a court order to grab the full contents. If they cannot do that, they will back off and try to get a court order for all the e-mail addresses of people you correspond with.

Carnivore Internet Communication Interception Ability

Carnivore acts like a “packet sniffer“. All Internet traffic is broken down into bundles called “packets”. Carnivore eavesdrops on these packets watching them go by, then saves a copy of the packets it is interested in.

It is important to note that Carnivore is a passive wiretap. It does not interfere with communication. Some news reports falsely claim that Carnivore interposes itself into the stream, first grabbing data, then passing it along.

Carnivore Frequency of Use

The FBI claims that Carnivore has been used roughly 25 times leading up to August, 2000. The FBI claims that they used Carnivore only 10% of the time for such court orders: most of the time the ISP complies with the court order using their own facilities. The FBI claims that the majority of cases have been for counter terrorism, though they also mention hacking and drug trafficking.

Carnivore P-C Computer & Configurations

Each Carnivore P-C is likely to vary somewhat. The FBI however, claims that the standard Carnivore P-C configuration looks like this:

One (1) standard – commercial-off-the-shelf ( COTS ) – personal computer ( P-C ).; MICROSOFT Windows NT, Windows 2000 or, Windows XP Pro type Operating System software package.; 128-MB ( megabyte ) RAM memory module.; INTEL Pentium III CPU ( central processing unit ) chip.; Minimum of between 4 to 18-GB ( gigabytes ) hard-disk drive free-space available.; An IOMEGA Jazz ( 2-GB ) removable storage media disk drive where the seized evidence will be written to.; Software written in C++.; P-C operating system software set up with no TCP/IP stack ( an anti-hacking web measure ).; Hardware authentication device used to control access to the P-C’s operating system software ( prevents ISP personnel from accessing the P-C without leaving visible signs of damage ).; A “network isolation device”, which is probably a Shomiti or NetOptics tap ( prevents the P-C from transmitting even if a web hacker were able to break in somehow ).; Another commercially available off-the-shelf type communications software ( perhaps the Carnivore P-C is written with C++ plug-ins to the EtherPeek program ).; Optionally available dial-in modem ports.

NOTE: Typical FBI procedure is to have their agent come in on a daily basis to exchange the removable Jazz disk with a fresh replacement.

Carnivore Controversy

People are worried about the privacy implications of Carnivore. There are three (3) main concerns:

1. How (exactly) Carnivore works, and whether there are bugs that lead to privacy violations.;

2. How Carnivore can be misused.; and,

3. The privacy debate of wiretaps in general, and the changing rules of the Internet in particular.

Carnivore vs. 4th Amendment

The Fourth (4th) Amendment of the United States Constitution states:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Carnivore requires a warrant to be issued given “probable cause” clearly specifying who the suspect is (e.g. e-mail address), what lines will be tapped, and what kind of information is being seized (e.g. e-mails). Furthermore, wiretaps like Carnivore are usually held to a higher standard. A warrant for the contents of your e-mail can only be issued by a Federal District judge or higher, whereas normal search warrants can be authorized by any judge.

For The Paranoid

At least for now, the government considers tapping your e-mail a serious thing and curtails most of the FBI ability to read it. The U.S. National Security Agenncy ( NSA ) may coordinate with the United Kingdom ( UK ) to monitor your e-mail ( ECHELON project ) but during peacetime the FBI probably doesn’t. That is not to say other domestic intelligence collection servicees for the U.S. government, or from a foreign nation, could not.

Does Carnivore retrieve e-mail from unintended targets?

There is a huge controversy over this issue because the FBI refuses to disclose how Carnivore works (see below). It is technically possible to write a system in a robust manner that won’t capture data from innocent people. However, industry practice has been to take short-cuts in sniffing devices. If the FBI follows industry practice, then there are several cases whereby they may capture unintended data a small percentage of the time.

A spokesman from the EFF has made the claim that Carnivore cannot sniff e-mail for only one person out of a network stream containing thousands of e-mail. There claim is that even experts in AI (Artificial Intelligence) would not be able to build such a system. This spokesman was thinking of the program from the wrong perspective. Carnivore isn’t a dumb pattern matcher, but a protocol decoder. This means that instead of blinding searching the entire e-mail content for a specific e-mail address, Carnivore carefully follows the e-mail transfer protocols and only examine specific fields. The blind content searching would indeed be impossible. See the explanation below on SMTP for more info.

Does Carnivore do “content-searching” to sniff e-mails that contain trigger-words like “plutonium”, etc.?

No, content-search type technology systems may typically be controlled by, other government agencies. Carnivore only looks at e-mail addresses within the “FROM:” or “TO:” fields. See the next question for a more complete answer.

Is Carnivore a network of black-boxes deployed throughout the Internet?

Or, Is Carnivore an unrestrained wiretap of the entire Internet?

No. This type of widespread monitoring is not allowed by law.

To install a Carnivore box, the FBI must have a court order specifying exactly what is to be monitored (e.g. email contents), for exactly whom monitoring will take place (e.g. email address), and is limited for how long the box may be in place. Furthermore, the ISP does not have to accept a Carnivore box if they can satisfy the search warrant using their own means. Carnivore is only used when the ISP cannot satisfy the search warrant.

As of August 2000, the FBI currently had roughly only twenty (20) Carnivore boxes  stored in Quantico, Virginia from where they are only used in specific cases under court order.

The courts don’t allow any one ( 1 ) box to be in place for more than 1-month or 2-months.

Furthermore, these boxes are rarely placed on ISP backbones, but ‘usually close to the servers’ they are ‘designed to monitor’.

More For The Paranoid

Carnivore’s answer is not a satisfactory answer for paranoids who believe that government does not follow its own laws, so let me phrase it another way:

If the government is doing widespread monitoring ( ECHELON program ), it isn’t doing it with Carnivore. Carnivore is not made for widespread monitoring, but instead designed for only “surgical” wiretaps. Carnivore is widely publicized and many ISP engineers have direct experience with Carnivore (and know where the boxes are placed; ECHELON is much more secretive. In other words, the government may have black-boxes deployed throughout the network, but that may not necessarily be Carnivore black-boxes.

E-Mail Corruptions & Misrepresentations

A problem with Carnivore is that it doesn’t see the original email, but a copy as it flows by on the wire. Email is fragmented into packets. It is possible that Carnivore will miss packets, or accidentally collected unrelated packets as being part of an e-mail message.

However, Carnivore can detect these problems and clearly mark them. Rather than capturing the email messages itself, it instead captures the raw packets that transported the email. These packets have “checksums” and “sequence numbers” to guard against corruption. Therefore, if Carnivore misses a packet that was in the middle of an email message, this hole is clearly marked within the packet.

Therefore, while Carnivore can certainly miss packets or capture too many packets, it will clearly indicate these problems and not misrepresent the e-mail.

Is Carnivore permanently located at the ISP ?

No. It is unlikely to be in place for more than a month. There are strict government regulations on the use of wiretaps; they most be renewed every month. If they are making forward progress, then they stop because the evidence is sufficient to convict. If they aren’t discovering anything, they are removed as being useless. Either way, they don’t last long.

The FBI claims that they longest a Carnivore unit has been in place was 45-days.

FBI Source Code Not Released

The FBI makes the following justifications as to why they don’t release source code:

They say that hackers will find ways around it.

They claim that part of the code is from commercially licensed ( i.e. they are contractually forbidden from releasing it ).

United States Code, Title 18, Section 2512, prohibits possession and/or distribution of devices designed to surreptitiously eavesdrop on other people’s communications.

FBI Arguements Not Bought By Industry Experts

Hackers already know how to find ways around Carnivore (e.g. PGP, anonymous remailers, anonymizing services, etc.). Experts think the real reason is that the code has not gone through a security audit and that hackers can easily attack Carnivore and bring it down. Experts believe that the only way to harden code against hacker attacks is to open it up to peer review.

The fact that key portions are licensed from commercial vendors rather than created by the FBI demonstrates that the FBI does not know how to create such code in the first place. This hints at severe weaknesses within the program that can lead to privacy violations (such as using the same short-cuts prevalent in network sniffers).

Sniffers and network monitoring products are pervasive throughout the industry. Carnivore is less capable than many programs people already have installed on their desktops. Carnivore would indeed be a useful email backup tool.

FBI made the statement in their RFP:

“The Department recognizes that the Carnivore system is subject to certain inherent design limitations that preclude its use in certain situations. Those limitations will be identified to the Contractor [ reviewing the system ], but for obvious reasons will not be made public.”

Experts don’t understand ‘what obvious reasons’ the FBI could be talking about.

CARNIVORE Performance Disclosures

FBI claims it has been forthcoming on basic details of the program. Many experts disagree, blaming the FBI for creating an environment of fear and mistrust.

Even though the FBI cannot disclose the source code for Carnivore, it could disclose through the National Testing Standards Laboratory ( NTSL ) test running Carnivore through a series of tests at their independent labs but, more specifically through all permutations (e-mail content, e-mail headers, IP packets, RADIUS logon, etc.) and disclose the evidence gathered along with original tracefiles. This would clearly demonstrate the capabilities of Carnivore without exposing the advanced details that they want to keep secret.

Carnivore’s False-Positive Arrests

Yes, easily (you can do this yourself). You can simply reconfigure your own email system to use somebody else’s email address. This won’t allow you to read their email, but will certainly allow you to impersonate them when sending email out.

Another common problem is through the use of “Trojan Horses“. This technique, allows for a hacker to not only forge an e-mail, but to make it come from that person’s IP address as well. Currently, this fools the FBI as well as courts ( in a pending legal case, a defendant is accused of posting fraudulent information about a public company to Yahoo message boards; he claims that somebody else controlled his P-C to post that information ).

One may never be able to prove that somebody was actually at the console. A neighbor could be walking over every day while the suspect is at work in order to send/receive e-mails from the computer.

None of this is really important for Carnivore, however. “Probable Cause” must be shown before Carnivore is used to monitor the suspect. Remember that the FBI normally just has the ISP copy the e-mail for them rather than having Carnivore do it. Whatever the source of the e-mails, the defense can still call into question that the e-mails are in fact legitimate for the above reasons.

CARNIVORE Ice Breaker Laws

Omnibus Crime Control and Safe Streets Act, Title III – 1968

Commonly known simply as, Title III, law making ‘wiretapping legal’.

Electronic Communications Privacy Act ( ECPA ) – 1986

ECPA (pronounced: ek-pah). This law was designed to clarify how existing wiretap laws apply to cyberspace, but at the same time sets boundaries on how much the government can invade our on-line privacy.

Computer Fraud and Abuse Act – 1986

Makes breaking into federal computers and trafficking in stolen passwords felonies.

CALEA – 1994

Requires ‘telephone carriers’ ( including Internet Srvice Providers – ISP ) to help with investigations. A court order usually comes in two (2) parts:

 1. Authorizing FBI to ‘sniff’; and,

2. Obligation of ISP to ‘assist’ Government.

Roving Wiretap – 1998

Allows the FBI to tap lots of people’s communication as long as it only keeps records of the suspect’s communications. In other words, Carnivore can be placed on a backbone that listens to thousands of people’s e-mails as long as it only remembers e-mails for the specific suspect.

Pen Registers and Trap & Trace

A pen-register is a device the FBI might put on your phone line that records every telephone number you dial.

A trap-and-trace is a different kind of device that records the caller-ID of everyone who dials you. In movies, when the suspect calls in and the FBI says, “Keep him on the line” so they can conduct a trace, that is in-essence a ‘trap and trace’.

These two ( 2 ) items are frequently used as a sort of ‘electronic stake-out’. Because they only reveal calling numbers, called, date, time, and potentially the length of the call ( ’not’ as intrusive into privacy as a ‘full wiretap’ ) legal standards necessary to obtain a court order are significantly reduced.

According to the FBI, Carnivore is usually used more often as a pen-register/trap-and-trace style device rather than a full wiretap.

Court Order – Specifics

FBI agents must go to a judge and get them to authorize use of CARNIVORE, the court order specifies:

1. Name of suspect(s).;

2. Specific account information, i.e. exact e-mail address(es).;

3. Nature of crime commission-type suspected.; and,

4. What is going to be tapped (i.e. which wire, etc.).; and,

5. Duration requested for the tap/trap, i.e. time limit example: 1 or 2-month(s).

The judge then authorizes the search warrant. At the same time, the judge will create a court order demanding that the ISP comply with the FBI.

Full content wiretaps may only be used for certain felonies ( e.g. terrorism, drug trafficking, kidnapping ). They may only be issued by a Federal District Judge, not any old judge. They may only be granted to FBI agents. They may only be used to gather hard evidence, ‘not for background reconnaissance’.

Computer Records & Legal Hearsay Rules

According to U.S. Federal Rules of Evidence, business records ( including computer records ) are considered “hearsay” ( and not admissible in court ) because there is no first-hand proof that they are accurate, reliable, or trustworthy. There are exceptions to this rule when you can demonstrate accuracy, reliability, and trustworthiness.

First, the FBI cannot simply capture a single e-mail and claim it as evidence. Instead, Carnivore must be running all the time (for a week, month, etc.). All of the e-mails captured during that time must be maintained. The FBI cannot simply take one e-mail from this set and use it as evidence, they must instead present to the court all e-mails captured during this time. If one e-mail says “let’s bomb the World Trade Center”, but the next e-mail says “I was only joking”, then the FBI must present both to the defense team.

Second, the captured data must be “authenticated” according to Rule 901 of the Federal Rules of Evidence. The FBI agents that put Carnivore into the ISP and locks it down will need to document everything they did. The FBI cannot simply give Carnivore to an ISP engineer and have them install it, because the ISP engineer is not considered a qualified witness.

Third, Carnivore must meet the “best evidence” rule. ISPs are usually able to create copies of e-mail directly from their servers. These copies have a higher integrity than e-mails sniffed from the wire (Carnivore might miss a packet, and therefore leave a gaping hole in the e-mail). Therefore, the FBI can only use Carnivore when the ISP is not willing or is unable to copy the e-mail from their servers.

CARNIVORE Evidence Chain of Possession

As part of the Rules of Evidence, all evidence must be “sealed” in a tamper-proof manner. Carnivore uses a Jaz drive for this. As soon as the Jazz disk is removed from the machine, it is immediately sealed in a bag, then written on the outside who ( the FBI agent ) sealed it and what date/time. From then on, anybody who opens that seal must likewise sign the form and clearly document what they did with the evidence. The evidence must not be altered ( except in certain cases ).

This is one of the reasons that the FBI cannot put a TCP/IP stack on the box. They cannot risk the defense team using this as an excuse as to why the evidence might be tainted.

CARNIVORE Rules Law  Of  Minimization

The laws state that the FBI must be very careful to minimize how much it inadvertently eavesdrops on. Agents must be very careful to monitor only the information authorized by the court order, and nothing more. For example, if they are wiretapping the telephone of the father of a family, then if a kid dials-out, they must immediately turn off the recording machines. For telephones, this requires an FBI agent who constantly listens on the line monitoring for such things.

This means that the FBI is not allowed to listen for any e-mails containing the word “plutonium”, because it would inadvertently capture messages from innocent people. Instead, they must prove to a judge that they can tap into only the traffic for the specific suspect; i.e. they must give the judge the exact e-mail address they are going to monitor.

FBI agents are very paranoid about this. If extra stuff leaks into their recordings, they must carefully discard it. Also, if a lot of stuff has leaked in, then the defense attorneys will “move to suppress” the evidence claiming proper procedure was not followed. Remember, the FBI has to prove a legitimate reason to the judge in order to get a court order, but also must be careful when they get the evidence that it won’t be thrown out of court. This is especially important because full content-wiretaps are only obtained in order to get hard evidence that will indeed be used in court.

Note that full content-wiretaps have been used in this discussion; trap-and-trace style wiretaps are a little more lenient because they do not record the full contents of a conversation, only the parties doing the conversing.

CARNIVORE IN-DEPTH TECHNICALS

CARNIVORE Old Technology New Technologies

Carnivore is often portrayed in the press as something extremely technologically sophisticated and clever. It isn’t. For example, one news article claims that when the FBI unveiled Carnivore, it “astonished industry specialists”. It certainly did NOT. It is a well-known fact from even within the computer industrial circles of the lowly technicians at BestBuy and other computer superstore service centers that, there are numerous other products on the commercial off-the-shelf ( COTS ) market which are significantly more advanced than the F.B.I.’s Carnivore program.

There’s an author who wrote an e-mail sniffing program identical to Carnivore, nine (9) years ago. Carnivore has a couple of things that are unique to it ( capturing e-mail packets rather than messages, RADIUS monitoring ), but these aren’t necessarily sophisticated.

CARNIVORE & OMNIVORE – Stuffy Nose Issue

The FBI has used Carnivore in a ‘mode’ they call OMNIVORE capturing ‘all traffic to’ and ‘all traffic from’ specified IP addresses. ( Remember, a court order has to specify exactly who is being monitored, the FBI ‘was’ outlawed from monitoring everybody ).

AG GROUP EtherPeek was reportedly used for OMNIVORE, one of only a few ‘packet sniffers’ that can accept an IP address as a ‘capture filter’ then write in real-time (with ‘no lost packets’ ) directly to the disk.

There are numerous products which fulfill these types of requirements. The easiest is the freeware program known as TCPDUMP, which is available for both Windows and UNIX. If the court order specifies a full capture for the IP address of 192.0.2.189. An EXAMPLE of the command would simply be: tcpdump –w tracefile.tcp host 192.0.2.189

CARNIVORE Stumped – Defending Against

CARNIVORE – Make Your Own

The popular personal firewall from NetworkICE’s, BlackICE Defender, has a feature called “Packet Logging”. It will monitor all traffic to and from your own machine and save it directly to disk just like Carnivore. You can use this feature if you think you are under attack ( though there are limits to its admissibility in court ). The popular freeware utility known as “Ethereal” can then be used to display the contents of this data. A great “defense” against any FBI bungled message screw-ups between an ISP’s backbone and you or, the IOMEGA Jazz disks.

IP sniffing may also be done in a pen-register/ trap-and-trace mode. Many packet sniffer could be used for this capability. The desired IP address would be specified in a “capture filter”, then the “slice/snap” length would be set to 54 bytes. This would capture all the TCP/IP “headers”, but not the content. The raw data would be saved live to a file. Again, using TCPDUMP as an EXAMPLE: tcpdump –w tracefile.tcp host 192.0.2.189 –s 54.

However, this may very well be over-stepping the bounds of the law collecting more information than the warrant or court order allows. In order to align it more closely with a traditional pen-register/trap-and-trace, it would need to capture a lot less information. It would monitor the wire and create a record that would appear to contain, the following:

IP address of initiator

IP address of the receiver

Time when conversation started

Duration of conversation

This would require a more complex programming within the system.

RADIUS Triggering

In the case of dial-up connections, the suspect has no fixed IP address. Therefore, CARNIVORE has to sniff the RADIUS log-on / authentication packets in order to discover the IP address in use. This is the probably the only feature unique to Carnivore: the ability to track dialup users.

CARNIVORE E-mail Sniffing Methodology

SMTP protocol ( the system for exchanging e-mail ) might look something like the following:

–220 mx.altivore.com SMTP server.

>>>HELO mx.example.com

–250 mx.altivore.com Hello [192.0.2.183], pleased to meet you

>>MAIL FROM: &lt;alice@example.com>

–250 &lt;alice@example.com> … Sender ok

>>>RCPT TO: &lt;bob@altivore.com>

–250 &lt;bob@altivore.com>

>>>DATA

–354 Start mail input; end with &lt;CRLF>.&lt;CRLF>

>>>(e-mail message)

>>>\r\n.\r\n

&lt;–250 Queued mail for delivery

>>>QUIT

–221 mx.altivore.com closing connection

What you are seeing here is an exchange of data between two mail exchangers. One exchanger contacts the other in order to forward e-mail to it. Carnivore listens in on them surreptitiously. They start with a few greetings, and then get down to business. The exchanger that initiated the connection first transmits the “envelope” containing the MAIL FROM and RCPT TO fields, then sends the “message”. The message is terminated by a blank line containing a single dot.

The message itself contains “headers” and a “body”. These aren’t shown in the diagram. One of the big questions about Carnivore is whether it tracks just the SMTP “envelope”, or whether is looks within the RFC822 “body”. The following is a sample e-mail message that would be transferred over this connection:

From: “Alice Cooper”

To: “Bob D Graham”

Subject: Shipment

Date: Thu, 7 Sep 2000 15:51:24 -0700

Message-ID:

MIME-Version: 1.0

Content-Type: text/plain;

charset=”iso-8859-1″

Content-Transfer-Encoding: 7bit

X-Priority: 3 (Normal)

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)

Importance: Normal

X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600

How is the plutonium shipment coming? I need it by Friday.

–Alice

The logic is quite simple. If the court order specifies the suspect’s e-mail account as alice@example.com“. Carnivore triggers when it sees that address in the SMTP envelope, and starts capturing the e-mail message until it sees the end. Some court orders might limit this to only the headers rather than the content. In this case, Carnivore has to stop capturing at the first blank line. Furthermore, Carnivore has to remove the “Subject:” header because that is also considered “content” by the courts.

There are several products on the market that can capture e-mails in a similar fashion. One of the important differences with Carnivore is that it doesn’t record the e-mail messages themselves, but instead captures the raw packets that carry the e-mails. In this fashion, it has a solid history of checksums and TCP sequence numbers that clearly show missing fragments are inadvertently captured fragments. This is extremely important in order to validate the authenticity of the data.

A pen-register/trap-and-trace mode can also be used. The MAIL FROM and RCPT TO addresses can be logged to a file whenever either of them matches the suspect’s address. The log entry would look like:

time

MAIL FROM address

RCPT TO address

Email message length

HTTP & FTP

In the sample scenarios described by the FBI, the describe cases where they want to track all the websites accessed by the suspect. The way they do that is filter for any packet from the suspect to port 80 ( meaning HTTP ), and record the IP address. This may be complicated by having to parse RADIUS described above.

HTTP - FTP - NTTP

One of the claims read in the news is that Carnivore does something with HTTP more than monitoring IP addresses of the sites. I think the news reporters were confused, but there are some things the FBI could do with sniffing technology.

One technique would be to do a “trap-and-trace” on a webpage. For example, the FBI could put a sniffing device next to the server hosting this webpage, then monitor everyone who access just this one page on the site. Similar techniques could be used for monitoring users of certain FTP files.

NTTP ( UseNet news groups ) can be a little more interesting. The FBI can do trap-and-trace on specific newsgroups. Webpages are actually well controlled ( little bad stuff ) and innocent people often find themselves unintentionally at the wrong webpages due to search engine details, however UseNet is ‘less regulated’ where some are frequented by persistent cyber criminals; various hacking news groups come to mind.

IRC

There are rumors that Carnivore was used to capture IRC traffic. If the FBI wanted to tune into IRC chatrooms, the could simply use any number of programs that simply log onto the chatrooms and record all the contents. Indeed, the FBI probably records the full contents of the most popular hacker IRC chatrooms. The reason is that this isn’t “wiretapping”, it is simply recording data that is publicly visible. You don’t need to be at the ISP to do this, but can monitor chatrooms from anywhere on the net, remotely.

Note that IRC supports generic handles rather than fixed account names. People can ( and often do ) masquerade as others. When the FBI monitors IRC, they want to track it back to the IP address that originated the content.

CARNIVORE Dropped  Packet Problems

This is a frequent question for sniffers: How much traffic may they suck up before they get overloaded?

This is an important question especially if Carnivore is placed upon an ISP backbone, which often approaches 100-Mbps ( megabytes per second ). The Windows platform which Carnivore is based upon may certainly keep up with this traffic in theory hopwever, Network ICE sells Windows-based gigabit solutions which finds that most Windows-based sniffing software is quite slow. Therefore, for many people that Carnivore is after, the FBI may find itself too slow to be placed on ISP backbones for just everyone.

However, Carnivore is frequently used in a “surgical” manner. This means that if possible, it will only tap into the wire used by the e-mail server (for example). This means that the traffic loads in real-world deployments are extremely small.

CARNIVORE EtherPeek Connection AG Group ( Germany )

EtherPeek was certainly used originally for investigative work by the FBI. It probably is what the FBI called, OMNIVORE. They would obtain court orders for all traffic to/from IP addresses and save it directly to evidence files. EtherPeek supports this feature well whereas other commercial sniffers don’t do this as well.

The FBI could be making-up Carnivore as just simple plug-ins or, modifications for EtherPeek. The FBI persistently claims that Carnivore is based upon a commercial sniffer, so this is just suposition. Also, looking at EtherPeek plug-ins, they are remarkably similar to Carnivore described capabilities ( though not exactly ).

The FBI may have picked EtherPeek to grab IP information, then after seeing the new plug-ins appear in their latest version, licensed those plug-in codes from a Germany based firm ( AG GROUP ) direct exclusive FBI use after having them make simple minor modifications.

Anti CARNIVORE Defenses

There are several ways. The first is to simply encrypt your data and use anonymizing services. If you are sending e-mail that you don’t want other people to read, you should certainly encrypt it.

The second, is via a direct attack on Carnivore. Carnivore is probably susceptible to typical buffer overflow attacks by just sending very large e-mails. Also, one may always change the format of their e-mail address without changing the meaning. This will prevent Carnivore from correctly matching your email address. If you think your dial-up connecting is being sniffed by Carnivore, you can probably forge RADIUS packets in order to convince Carnivore that somebody else is using your IP address, which will cause it to stop monitoring.

FBI Request For Proposal & SPRINT Earthlink

On August 24, 2000, the FBI issued a “Request For Proposal” (aka) R.F.P. for “experts” to come in to evaluate Carnivore. Many experts have shied away from this because of the handcuffs placed on them, feeling that the FBI is just looking for a rubber stamp to alleviate the public’s fears that than submitting their system to a full review.

“Questions that have been raised include concern that the FBI’s temporary use of the Carnivore system could interfere with the proper functioning of an ISP’s network; concern that the system might, when used properly, provide investigators with more information than is authorized by a given court order; and concern that even if the system functions appropriately when properly used, its capabilities give rise to a risk of misuse, leading to improper invasions of privacy.”

What this may mean is that, bungling on the FBI’s part caused problems for a major Internet Service Provider, SPRINT and their Earthlink internet software, who is now suing to keep Carnivore off their networks. The government wants to prove that under proper usage, Carnivore won’t cause such problems in the future.

People are worried that Carnivore will capture more information that allowed by the court order. For example, a spokesman for EFF says that even experts in AI ( Artificial Intelligence ) would not be able to figure out how to make Carnivore work properly. The FBI wants to prove their case in face of this criticism.

People are worried that the “powerful” capabilities can be misused in order to invade privacy. Some academics refuse to participate. They believe that the FBI is simply trying to allay the public’s fears without addressing the real concerns. The RFP gives strict limitations on how the product is to be evaluated, and has full control over what the evaluator is allowed to publish as results. The FBI may certainly create a “technical evaluation” which could give Carnivore a clean bill of health while still failing to address any of the major concerns.

ECHELON & CARNIVORE Relatives

CARNIVORE

Carnivore is often compared to other systems, however a brief list ( below ) describes a few other data collection systems:

CARNIVORE  ( U.S. Domestic )  vs.  ( UK Domestic )

R.I.P. ( Regulatory Investigative Powers ) for the United Kingdom will mandate ‘black-boxes’ at all Internet Service Providers ( ISP ), unlike Carnivore where boxes have to be brought on site for each investigation, however like Carnivore a ‘court order’ is required, first. The UK, however are pushing hard for encryption key recovery as well.

CARNIVORE ( U.S. ) vs.  SORM ( Russia – CIS )

Russia’s S.O.R.M. requires an ISP to forward all traffic to the Russia FSB ( formerly known as KGB ).

There is no issue with this because the vast majority of ISPs are ‘run by the Russia CIS Sgovernment directorates’.

FSB does ‘not’ need a ‘warrant’ for ‘its citizenry’ and can use the information for whatever reason it wants.

FSB outlaws encryption ( unless key recovery is used ).

CARNIVORE ( U.S. )  vs. ( Japan )

Japan law requires that “all ISPs keep a trap-and-trace / pen-register style log of all Internet communications” that their law enforcement can subpoena at any time.

[ photo ( above ) ECHELON Global Ground Base Location Map ( click to enlarge ) ]

CARNIVORE ( USA ) vs. ECHELON ( UK-USA )

ECHELON, while being a global ELINT [ Electronic Intelligence ] and SIGINT [ Signals Intelligence ] monitoring network, without boundaries, used primarily by both USA and UK government shared with only a few more foreign country based satellite downlink receiver stations.

One ( 1 ) United States federal government authority operating ECHELON is the U.S. National Security Agency ( NSA ) in cooperation with the United Kingdom ( UK ) MI-6 intelligence service. See, e.g. “INTELL Photos” and “COSMIC Photos“, for more information on this website.

ECHELON is ‘not’ totally related to Carnivore, however a satellite interface or other remote communication link might.

FBI and NSA have been successful through disinformation campaigns to give foreigners the impression they are somehow engaged in ‘official intra-organizational turf wars’  of not exactly like each other very much to seamlessly communicate, however with some lower-end personnell bureaucratic run-ins this may be true. Some individuals have been led to believe these federal agencies are somehow stumble-bums unlikely to share technologies, howeverthat’s not exactly true.

ELINT priority interface establishes order for ‘measured data distribution’ at lower-level enforcement levels  – eliminating some inter-agency boundary disputes when it comes to ‘identifying’ critical or priority data requests.

Lower-level government communication echelons do not possess ‘sophisticated mapping abilities’ approaching anywhere near ECHELON processing technologies for tasking ‘problem set’ assignment(s), per se.

ECHELON operates as a de facto or de jure senior level government executive command control and communication intelligence authority whereas others possess no dedicated say over their own specific operational taskings or specific durational usages.

There is no proverbial ‘request’ that can be simply submitted from any country’s lower level federal security agency authorities to priortize the ECHELON World Region Chief Of Station.

Another decision-making substrate controls ECHELON and “some” of the data may be filtered even more before it is even reaches another country’s lower-level federal security agency authority for use.

While some of this technology is similar in theory, the application of collection technology is different enough so much so that, it may appear to have been easier to write or formulate such systems separately than to try to share the more sensitive information technology base itself.

Future interfacing may actually gain federal security agencies much easier acess to collate and mix additional data relevant to what it’s needs are, without other lower level federal security agency authorities becoming privy to higher-level security business production needs.

It may also be a new political way to expand budget definitions without having to reveal classified detail justifications to Congress and its accompanying oversight security detail boards of authority.

Carnivore has nothing to do with ECHELON.

ECHELON – CARNIVORE interfacing may provide a more expanded meshing of data collection which might realize a greater database control over monitoring communications overall. An interface between the two - if coupled with a common-link database - might serve to provide for rapid deployment response instituted by lower-level federal security agency authorities however, the direction of information trafficking then becomes an even more burdensome task for both high and low federal security agency levels alike.

The release of certain data might threaten the secure nature by which ECHELON now operates and could most certainly undermine other security interests of its users worldwide.

ECHELON usage is somewhat governed as an intelligence collection actuarial system by its operators setting data priority level requests to determine the relevancy of data importance along with priority of need in sequestering electronic communication information via e-mail, telephone. facsimile transmission, TELEX and a few other forms, worldwide. That’s why it is called, “ECHELON“. See, e.g. “INTELL Systems“, “INTELL Photos” and “COSMIC Photos“, for more information on this website.

CARNIVORE Internet, E-Mail And CellPhone Surveillance

USA, Washington, D.C. – August 28, 2001 - Federal law enforcement officials may be ready to use a controversial surveillance technology to monitor E-Mail and other text messages delivered via wireless devices, such as Cell Phones and Palm-top P-Cs is a fact that has one telecommunications group concerned.

In a letter to Federal Communications Commission ( FCC ) Chairman Michael Powell, the Cellular Telecommunications & Internet Association ( CTIA ) warned the Federal Bureau of Investigation ( FBI ) may start using its DCS-1000 surveillance system, originally known as CARNIVORE, to eavesdrop on wireless communications as early as October 2001.

The CTIA fears the FBI might start using the DCS-1000 system because the wireless industry has so far been unable to develop a standard for law enforcement agencies to monitor e-mails sent between handheld devices.

The FCC has set a September 30, 2001 deadline for the wireless industry to submit guideline proposals for use of the DCS-1000 system.

Although agency officials would not comment on the CTIA letter, a representative said the FCC intends to decide soon whether to extend the deadline.

In the August 15, 2001 letter, CTIA association vice president and general counsel Michael Altschul wrote: “If the industry is not provided the guidance and time to develop solutions for packet surveillance that intercept only the target’s communications, it seems probable that Carnivore, which intercepts all communications in the pathway without the affirmative intervention of the carrier, will be widely implemented.”

Privacy advocates, civil libertarians and some lawmakers have criticized Carnivore because they fear the system may be used to snoop on innocent citizens without their knowledge.

The FBI has been using the controversial technology for two years. The Carnivore system, which is installed at Internet service providers, captures “packets” of Internet traffic as they travel through ISP networks. The program monitors millions of mail messages, searching for notes sent by people under investigation.

An FBI representative would not say whether Carnivore has been, or will ever be, used to monitor wireless communications.

Keith Waryas, a wireless analyst with market watcher I.D.C., said that even if federal officials do snoop on wireless e-mails, they’re going to be disappointed with what they find.

Although businesses are starting to use wireless networks to send sensitive e-mails, it’s still a small audience. Wireless consumers such as cell phone users are even less apt right now to use such modern services as sending wireless e-mails, he said.

Though there has been some movement by criminal enterprises to use the Internet, that same push hasn’t happened yet on wireless, Waryas believes.

“I don’t think the world will come to a standstill,” he said. “I don’t think guys running a drug operation on the corner will have a WAP interface (a type of wireless network) for their distributors.”

He also pointed out that hackers already have broken into some wireless networks. This week marked the release of a product called AirSnort, which lets hackers intercept some wireless data transmissions.

“When it comes to wireless, you’re talking about broadcasting something. My guess is it doesn’t take a rocket scientist to intercept those transmissions,” Waryas said.

There is a bill before Congress that would require the attorney general and the FBI director to submit a detailed report on the use of surveillance systems, including Carnivore.

CIA WATCH

Egypt Air Crash Secrets Or Propaganda?

USA, Massachusetts, Nantucket – October 31, 1999 - Ground observers, ordinary American citizens thought they saw a ground-launched rocket or missile flying off the U.S. east coast hitting an Egypt Air ( Boeing 767 ) passenger airline flight number 990 (aka) MSR990 that exploded and went down into the Atlantic Ocean about 60 nautical miles ( 112 kilometers ) off the coast of Nantucket, Massachusetts where 217 people were killed.

Some speculated the Egypt Air passenger airline was blown up by an onboard explosion, however some wondered if it may have been shot down by some sort of surface-to-air missile ( SAM ) fired off from somewhere on the America eastcoast.

Many questions came to mind about the cause of the airplane ‘sudden fall’ right after its explosion at an 11,000 feet elevation 40-minutes into its flight from Kennedy International Airport ( New York, USA ).

The tragedy, was the worst in Egypt aviation history of the entire 19th century, has been shrouded with great mystery more-so than any other similar tragedy. What made it even more mysterious was the confusing and strange conclusions reached by U.S. authorities surrounding ‘details’ - in this incident - that puzzle the intellect of many other professionals besides investigators and law enforcement.

Neutral investigators are practically definite the tragedy was a result of ‘sabotage’, asking ” What ‘hit’ the airplane’ in its ‘tail section’ that left absolutely ‘no trace’ or ‘no evidence’ as to the ’cause’?”

Also asked was, what the nature of the ‘sabotage’ was. ”If ‘external’,  ’what’ brought the plane down?” “If  ’internal’, ‘what’ brought the plane down’?” “Was something ‘planted’ onboard?” Was something fired at it?”

Whatever the cause, there has to be someone who caused the incident.

Some investigators, used the ‘know who would benefit from the act to know who did it’ principle in their research.

Others searched closely in a series of events that came before, during and after the bodies of all 217 victims ended up in the bottom of the ocean or eaten by its sharks and whales.

Events became givens  leading them to draw a sketch of the culprit, or at least show fingerprints therefrom.

Here is a series of events or coincidences as in the language of investigators:

Sixteen ( 16 ) Hidden Coincidences

1. “There were thirty four ( 34 ) Generals of different ranks from the Egyptian Armed Forces on board the plane. Among them was a General who has a Doctorate degree in atomic sciences, and more than twenty ( 20 ) pilots who successfully completed training in operating Apache helicopters that were sold recently to Egypt. Also on board were other generals who successfully completed training in launching the famous American Patriot anti-missile missiles. The training of all those generals lasted three (3) years and has cost Egypt $3-Billion, which Egypt paid in full.;

2. Israel vehemently denounced the training program of those Generals upon their arrival in the U.S. three ( 3 ) years ago, and Israel called the training program “a threat to Israel’s security”.;

3. Cairo started a big campaign to rid the region of weapons of mass destruction. The campaign has targeted mainly Israel since it is the only country in the region that possesses such dangerous weapons.;

4. Israel started a campaign accusing Egypt of seeking to modernize its armed forces, and of possessing missiles that threaten the security of Israel, especially so because the Army’s Generals who came to train in the U.S. will be exposed to the secrets of the joint American-Israeli missiles and jet fighter’s technology.;

5. Egypt Defense Minister, Muhammed Hassan Tantawi, announced last October ( 2000 ) that war with Israel is not ruled out. He also announced that Egypt therefore is continuously building its armed forces to be in a state of readiness.;

6. One day before the tragedy, the American authorities provided hotel accommodation in a 3-star hotel for the airplane crew, which constitutes a violation of the simplest norms of international aviation, where the crew is usually accommodated in the airport hotel or, in a 5-star hotel.;

7. On the same day, a crew of pilots and flight attendants of Israel airline EL AL checked into the same hotel occupied by a General from the Israel intelligence service ( Mossad ) who was put in-charge of crew luggage and personal belongings;

8. A few hours prior to the incident, one Egypt Air flight crew member complained to hotel security that someone snuck into his room when he noticed signs of tampering to open his suitcase by breaking its locks, however hotel security assured him of no foul play as long as nothing was missing;

9. The day of the incident, Israeli-American Edward McLaughlin, vice-president of an U.S. civilian agency was one of the passengers aboard [ the first travel route leg of ] Egypt Air from Los Angeles, California to New York City, New York enroute onto Cairo, Egypt, however when the plane landed in New York City, McLaughlin refused to continue his onward journey to his final destination ( Cairo, Egypt ) fearing the possible “planting of a bomb by one of the passengers” during his initial layover in New York City, New York, USA;

10. The same day of the incident, the American authorities opted to take the flight crew’s luggage from the hotel through the halls to the plane itself. Meanwhile the Mossad General opted to take the luggage of the crew of the EL AL flight to the Israeli plane himself. But the luggage of the crews of both Egypt Air and EL AL ended up being taken from the hotel to the airport in the same car that took the Mossad General to the Israeli airline plane.;

11. Prior to the Egypt Air flight departure, the American authorities had inspected the plane for three (3) hours which, is a very unusually long time in aviation norms. Also it has been reported that airport security had not given similar attention to any other plane that day.;

12. After forty ( 40 ) minutes of the flight’s departure, contact with the plane was lost over the Edward American naval base [ ? ], which is known to have anti-aircraft missiles, some of which are ready to be launched automatically by the mere sensing of an object passing over at a certain elevation.;

13. After the incident, three (3) eyewitnesses testified to the investigators that they saw the plane on fire as it was falling down. Fox News also has confirmed in its own investigation of the incident that the plane had exploded in mid-air before its fall according to what was seen on the radar screens.;

14. The American investigation team reported that the plane fell down from 33,000 feet to 19,000 feet in 40 seconds, ‘which, according to aviation experts, is a speed equal to a free fall due to earth gravity, which makes it evident that the plane has fallen down in pieces and not as one body. Because the body of the plane is designed in such a way that makes it impossible for the body of the plane to descend at a speed in access of 7,000 feet per second’. Aviation experts also add that ‘even if the engines of the plane stopped working, it would still be possible to land the plane at the nearest airport.’;

15. After 10-hours of the incident, a member of the American investigation team announced that they have found the black box that records details of events in the last moments just before the plane’s fall. However, the next day, the American official spokesman denied finding the box and said that the investigation team is still searching for it.;

16. There were 34 Generals from the Egypt Army on board ‘the plane’, which is a violation of Egypt Army rules that ‘prohibit’ more than three ( 3 ) Generals to be aboard the same flight ( domestic or international ) for ‘security’ of the Army. This decision was reached in 1978 after the Western Sahara flight crash with Ahmad Badawi aboard that also killed twelve ( 12 ) Generals. At that time the fingers pointed to “the Israel enemy” and U.S. intelligence.

INTELL STORIES

Iran – Contra Islamic Terrorist Enterprise 

Years ago and during the Soviet Afghanistan War – Russia’s version of our Viet Nam War – the United States sought to undermine Soviet efforts to back the Islamic party they wanted to rule Afghanistan.

The U.S. continued covert support through Iran where splinter groups covertly supported the Islamic Party, or as some Americans knew them as Afghan Rebels (aka) Mujahideen. The U.S. heralded these radical Islamic extremeist militants.

Years ago and during the Soviet Afghanistan War – Russia’s version of our Viet Nam War – the United States sought to undermine Soviet efforts to back the Islamic party they wanted to rule Afghanistan. The U.S. continued their covert support through Iran. And, Iran’s splinter groups covertly supported the Islamic Party or, as we knew them by their buzz-word, i.e. Afghan Rebels (aka) the Mujahideen. The U.S. heralded these radial extremist Islamic militants across Amercan televison sets as, “Freedom Fighters”. But, remember, the age old adage of “One man’s ‘freedom fighter’ is another man’s ‘terrorist’,” and ‘who’ were we actually referring to? Today it is well documented that it was none other than Usama bin Laden (aka) Osama bin Laden.

There ‘is’ also the distinct possibility that it was the U.S. Central Intelligence Agency ( CIA ) may have actually created and / or fostered the Usama bin Laden following of Islam militant terror extremists.

Not too far-fetched an idea as much as the little known about CIA, Hari Krishna, Domino Pizza connection of long ago that saw an unidentified female  named “Barbara” ( last name unknown ) – with excellent ties to Cpaitol Hill ( Washington, D.C. ) – assisted the United States in a covert domestic and covert foreign CIA operation. Barbara ( LNU ) was not just involved in the fetal stage of the Domino’s Pizza organization, but it was also ‘she’ who handled the start-up for the Hari Krishna movement in America for the U.S. Central Intelligence Agency ( CIA ).

Iran – and elsewhere – usually never see highly secret groups of its people in-place being provided indirect funding from within U.S. sources supporting covert CIA war efforts on behalf of United States secret-sensitive interests where ‘those partnering in those efforts’ knew or not. Primarily, and for the most part, those involved ‘never actually knew’ what real purpose they were ‘becoming involved’ with, but only saw what what had mattered most that drew them in.

[ NOTE: In 2005, a 'secret' but 'prime example of this' saw a Portland, Oregon ( USA ) international businessman - suspected of considerable offshore fraud - using the alias Van Arthur Brink who was called to several meetings with the chief and senior commanders of the SPLA secretly designed to operate from partially funded CIA sources for the destabilization of Libya for U.S. oil interests, and in Yemen for other interests. Did Van Brink know this? No, 'he only knew' what he was led to believe, which was by going to those secret SPLA meetings in Africa, Brink believed he was going to make considerable sums of money on several planned projects ( New Sudan developments and new currency manufacturing ). In 2005, Brink died ( Wilsonville, Oregon, USA ) under what some believe were 'mysterious circumstances'. ]

Domino’s Pizza connection to the CIA had sources involved in ‘liquid white’ heroin trade manufacturing from an Afghanistan underground location the size of a small city, and those were dealing with members of the Brotherhood Of Eternal Love ( BEL ), young neuvo-riche American businessmen that appeared as nothing more than a group of young jet-setting millionaires operating out of the Newport Beach, California area who wanted to spend their millions on Afghanistan ‘liquid white’, and in-exchange they would deliver small arms and more to Usama bin Laden company affiliate warehouses to support “Afghan Freedom Fighters” against the Russia Soviet military advisors in Afghanistan and the Marxist led and funded Northern Alliance in Afghanistan. In short, a remote control war between the United States and Russia whom were both utilizing ‘surrogates’, whom for the most-part, had absolutely no clues as to ‘how-far their support was coming from’. All these surrogates knew was only ‘what mattered to them’.

Other more prominent persons like H. Ross Perot and other ancilliary companies were also involved with funneling millions upon millions of dollars into U. S. Central Intelligence Agency ( CIA ) interests with remote efforts to overthrow Soviet Red Army occupations of the Afghanistan government and others.

In short, the United States of America made it extremely difficult for the Union Of Soviet Socialist Republics military to win their war in Afghanistan, much in the same way the CCCP made it difficult for the U.S. to win its war in Viet Nam. Tit for tat perhaps, but at ‘what price’ do ‘others come to pay’ for ‘serious but small intercontinental war games’? Is it still best to ‘sacrifice the few for the many’?

In the process of making it economically no longer feasible for Russia to ‘sustain food supplies to its Soviet military soldiers’ [ see: the business financial commodity trading and currency exchange frauds conducted by Robert Earl Palm in Russia, Ukraine, Finland, and China ] unable to ever take full control over Afghanistan and its natural resources, the U.S. intelligence directorate created a new type of military strategist monster, Usama bin Laden (aka) Osama bin Laden and others worldwide using the religious movement of Islam as its war cry.

We established great allies back in the late 1970s and early 1980s, the likes of whom Usama bin Laden was only one ( 1 ) of several whom were virtually – and in some cases indirectly hand-picked by the CIA. A Yemeni billionaire whose Saudi Arabia business interest family member was – at one time – our Usama bin Laden financial “Afghan Freedom Fighter” who showed us how to float around other places, i.e. Southwest Asia, Central Asia, Africa, plus twenty-two ( 22 ) other Middle East and Arabian Pennisula territorial nations.

The U.S. Presidential George W. Bush Sr. Administration was in U.S. Gongress Senate Hearings surrounding the infamous Iran – Contra” scandal directed by U.S. National Security Agency ( NSA ) U.S. Navy Support Group ( NSG ) front-man U.S. Marine Corps Colonel Oliver North and others whom were involved with one ( 1 ) particular ‘dangerous undertaking’ named “Enterprise,” that was mistaken for being a secret parallel government to re-write the United States Constitution, when in-fact “Enterprise” was actually something diffeent but more familiar to U.S. Department of Defense ( DOD ) advanced technology program personnel whom are involved with reshaping how the United States defends itself in an entirelynew defense mechanism for 21st Century warfaring.

Enterprise is an intertesting ‘tool’ where overall it is a de facto or de jure bloodless scalpel to prevent Western coups for what was perceived in defense intelligence predictive analysis briefings as what would eventually take place, but could be used elsewhere to ‘control’ other country governments. Usama bin Laden (aka) Osama bin Laden, and others, are only ‘Human Inteligence’ ( HUMINT ) level ends of Enterprise, which in its ‘sanitized state’ is very much still an ongoing Program.

Enterprise, while being an absolute horror for some, can now be seen by others as very much a technological and socio-economic wonder when reading more about it.

Enterprise, was going on ‘before it was ever mentioned’ during the former U.S. Presidential George Bush Sr. Administration, years ago.

One may wonder – in-lieu of monumental proportion disasters – whether Enterprise is contuing forward with ‘radical changes’ sociological supported by ‘fear factoring’ yet ‘other launch pad platforms’.

Enterprise, said by then Colonel Oliver North, was to be a ‘secret parallel government’ – already operating within the U. S. government – specifically designed to be able to ‘suspend the U.S. Constitution’ and take over control of the United States and its citizenry.

Enterprise, a ‘bloodless coup defense technology tool program’ spanning several continents involving many foreign countries and their unwitting citizenry geniouses, that the vast majority of the rest of the worldwide public would never knew anything about until they pried themselves away from television screen distractions

Most people couldn’t or didn’t understand what it was occuring right in their own county a few years ago.

In fact, most people today, don’t recall anything about the Iran-Contra hearings or even what former U.S. Marine Colonel Oliver North was alluding to when he gave the name “Enterprise.”

While former American television news anchor Sam Donaldson remembers only what he was allowed to hear, his viewers could only hear and perhaps fathom what they were led to believe, however most were actually placed by U.S. Marine Corps Colonel Oliver North’s U.S. Senate hearing ‘sworn testimony’ that ‘served to deliver the populace with enough distraction to deliver them outside the real power curve’ of what Enterprise actually ‘was’ and ‘is’.

When information about the mere existence of the Enterprise and its associates were revealed to the American public over national televison networks, U.S. Congressional hearings were somewhat immediately ‘publicly suspended’ while Col. Ollie North went into ‘secret hearing sessions’. What happened? Not much, really. North just explained what “Enterprise” ‘really was’ and ‘conveyed his official authority to testify in ‘more simpler terms’ what would have otherwise been the ‘more complex version’ explanatory of what “Enterprise” really was / is – in the “interest of national security” of course – that served to fear factor another distraction away from ‘details’ of ‘what was really going on’, ‘how much’ Enterprise ‘encompassed, and ‘how far’ Enterprise had already spread – but only in ‘general terms’ of only ‘some’ of Enterprise ‘technological advancements’ the ‘private sector’ was handling for U.S. Department of Defense National Security.

Enterprise, according to the public testimony of former U.S. Marine Corps Colonel Oliver North, basically entailed re-writing of the United States of America ‘Constitution’ – to be suspended during United States national security measures requiring such – and implementation of a New World Order ‘defense control group’ of emergency management  ( FEMA ) leadership operating in conjunction with Office of Central Intelligence White House ( OCIWH ) administration, however all those ‘details’ were not revealed as precisely nor succinctly by Colonel North’s testimony.

Let’s hope that what we’re seeing with these terrorist stikes and the many changes taking place from the White House directorate, leading U.S. President executive orders, U.S. Congress legislative measures, and U.S. Supreme Court rulings for U.S. government powers of authority are not just ‘operating legacies’ of Enterprise.

American housewives and others who paid particularly close attention to the U.S. Congressional Committee’s televised trials of Oliver North, years ago, should be able to distinctly remember what was revealed at those trials in addition to the “Enterprise”.

The least revealing story was, the funneling of Iran weapons shipments through the funneling conduit ability of the CIA, for our covert support of the Contra rebels in Central America. Central America’s “Contra Rebels” was the “diversion storyline” fed to the World while the “real” story remained over in America and Afghanistan with our continued efforts to beef-up our new Islamic monster terrorists to fight the Soviets but, something went haywire. Something went terribly wrong.

Unlike the U.S.-fostered monstrocity creations of Iran’s Ayatollah Khomeni and Panama’s General Noreiga, the United States was unable to make a pre-emptive strike in an effort to control Usama bin Laden terrorist cell boy’s blowback which, is said to have resulted in the recent attack on America.

There exists today, a “self-said” former member of Usama bin Laden’s “al-Qaede”, a Morrocan man by the name of, L’Houssaine Kherchtou. Kherchtou was supposedly sent to Nairobi, Kenya in order to be trained as a pilot. The true degree and sophistication ( if any ) of his pilot training skills are not totally revealed except that it was said he, “only performed some crop-dusting on fields”. Today, Kherchtou and his family are safe within the U.S. Government’s, Witness Protection Program subsequent to his aid of information and cooperation with the U.S. Government. That specific aid and more, led to the arrest and conviction of the New York World Trade Center bombers which, happened years ago but just recently resulted in the conviction of those caught.

Domino’s Pizza connection to the CIA had sources involved in ‘liquid white’ heroin trade manufacturing from an Afghanistan underground location the size of a small city, and those were dealing with members of the Brotherhood Of Eternal Love ( BEL ), young neuvo-riche American businessmen that appeared as nothing more than a group of young jet-setting millionaires operating out of the Newport Beach, California area who wanted to spend their millions on Afghanistan ‘liquid white’, and in-exchange they would deliver small arms and more to Usama bin Laden company affiliate warehouses to support “Afghan Freedom Fighters” against the Russia Soviet military advisors in Afghanistan and the Marxist led and funded Northern Alliance in Afghanistan. In short, a remote control war between the United States and Russia whom were both utilizing ‘surrogates’, whom for the most-part, had absolutely no clues as to ‘how-far their support was coming from’. All these surrogates knew was only ‘what mattered to them’.

Other more prominent persons like H. Ross Perot and other ancilliary companies were also involved with funneling millions upon millions of dollars into U. S. Central Intelligence Agency ( CIA ) interests with remote efforts to overthrow Soviet Red Army occupations of the Afghanistan government and others.

In short, the United States of America made it extremely difficult for the Union Of Soviet Socialist Republics military to win their war in Afghanistan, much in the same way the CCCP made it difficult for the U.S. to win its war in Viet Nam. Tit for tat perhaps, but at ‘what price’ do ‘others come to pay’ for ‘serious but small intercontinental war games’? Is it still best to ‘sacrifice the few for the many’?

In the process of making it economically no longer feasible for Russia to ‘sustain food supplies to its Soviet military soldiers’ [ see: the business financial commodity trading and currency exchange frauds conducted by Robert Earl Palm in Russia, Ukraine, Finland, and China ] unable to ever take full control over Afghanistan and its natural resources, the U.S. intelligence directorate created a new type of military strategist monster, Usama bin Laden (aka) Osama bin Laden and others worldwide using the religious movement of Islam as its war cry.

We established great allies back in the late 1970s and early 1980s, the likes of whom Usama bin Laden was only one ( 1 ) of several whom were virtually – and in some cases indirectly hand-picked by the CIA. A Yemeni billionaire whose Saudi Arabia business interest family member was – at one time – our Usama bin Laden financial “Afghan Freedom Fighter” who showed us how to float around other places, i.e. Southwest Asia, Central Asia, Africa, plus twenty-two ( 22 ) other Middle East and Arabian Pennisula territorial nations.

The U.S. Presidential George W. Bush Sr. Administration was in U.S. Gongress Senate Hearings surrounding the infamous Iran – Contra” scandal directed by U.S. National Security Agency ( NSA ) U.S. Navy Support Group ( NSG ) front-man U.S. Marine Corps Colonel Oliver North and others whom were involved with one ( 1 ) particular ‘dangerous undertaking’ named “Enterprise,” that was mistaken for being a secret parallel government to re-write the United States Constitution, when in-fact “Enterprise” was actually something diffeent but more familiar to U.S. Department of Defense ( DOD ) advanced technology program personnel whom are involved with reshaping how the United States defends itself in an entirelynew defense mechanism for 21st Century warfaring.

Enterprise is an intertesting ‘tool’ where overall it is a de facto or de jure bloodless scalpel to prevent Western coups for what was perceived in defense intelligence predictive analysis briefings as what would eventually take place, but could be used elsewhere to ‘control’ other country governments. Usama bin Laden (aka) Osama bin Laden, and others, are only ‘Human Inteligence’ ( HUMINT ) level ends of Enterprise, which in its ‘sanitized state’ is very much still an ongoing Program.

Enterprise, while being an absolute horror for some, can now be seen by others as very much a technological and socio-economic wonder when reading more about it.

Enterprise, was going on ‘before it was ever mentioned’ during the former U.S. Presidential George Bush Sr. Administration, years ago.

One may wonder – in-lieu of monumental proportion disasters – whether Enterprise is contuing forward with ‘radical changes’ sociological supported by ‘fear factoring’ yet ‘other launch pad platforms’.

Enterprise, said by then Colonel Oliver North, was to be a ‘secret parallel government’ – already operating within the U. S. government – specifically designed to be able to ‘suspend the U.S. Constitution’ and take over control of the United States and its citizenry.

Enterprise, a ‘bloodless coup defense technology tool program’ spanning several continents involving many foreign countries and their unwitting citizenry geniouses, that the vast majority of the rest of the worldwide public would never knew anything about until they pried themselves away from television screen distractions

Most people couldn’t or didn’t understand what it was occuring right in their own county a few years ago.

In fact, most people today, don’t recall anything about the Iran-Contra hearings or even what former U.S. Marine Colonel Oliver North was alluding to when he gave the name “Enterprise.”

While former American television news anchor Sam Donaldson remembers only what he was allowed to hear, his viewers could only hear and perhaps fathom what they were led to believe, however most were actually placed by U.S. Marine Corps Colonel Oliver North’s U.S. Senate hearing ‘sworn testimony’ that ‘served to deliver the populace with enough distraction to deliver them outside the real power curve’ of what Enterprise actually ‘was’ and ‘is’.

When information about the mere existence of the Enterprise and its associates were revealed to the American public over national televison networks, U.S. Congressional hearings were somewhat immediately ‘publicly suspended’ while Col. Ollie North went into ‘secret hearing sessions’. What happened? Not much, really. North just explained what “Enterprise” ‘really was’ and ‘conveyed his official authority to testify in ‘more simpler terms’ what would have otherwise been the ‘more complex version’ explanatory of what “Enterprise” really was / is – in the “interest of national security” of course – that served to fear factor another distraction away from ‘details’ of ‘what was really going on’, ‘how much’ Enterprise ‘encompassed, and ‘how far’ Enterprise had already spread – but only in ‘general terms’ of only ‘some’ of Enterprise ‘technological advancements’ the ‘private sector’ was handling for U.S. Department of Defense National Security.

Enterprise, according to the public testimony of former U.S. Marine Corps Colonel Oliver North, basically entailed re-writing of the United States of America ‘Constitution’ – to be suspended during United States national security measures requiring such – and implementation of a New World Order ‘defense control group’ of emergency management  ( FEMA ) leadership operating in conjunction with Office of Central Intelligence White House ( OCIWH ) administration, however all those ‘details’ were not revealed as precisely nor succinctly by Colonel North’s testimony.

Let’s hope that what we’re seeing with these terrorist stikes and the many changes taking place from the White House directorate, leading U.S. President executive orders, U.S. Congress legislative measures, and U.S. Supreme Court rulings for U.S. government powers of authority are not just ‘operating legacies’ of Enterprise.

American housewives and others who paid particularly close attention to the U.S. Congressional Committee’s televised trials of Oliver North, years ago, should be able to distinctly remember what was revealed at those trials in addition to the “Enterprise”.

The least revealing story was, the funneling of Iran weapons shipments through the funneling conduit ability of the CIA, for our covert support of the Contra rebels in Central America. Central America’s “Contra Rebels” was the “diversion storyline” fed to the World while the “real” story remained over in America and Afghanistan with our continued efforts to beef-up our new Islamic monster terrorists to fight the Soviets but, something went haywire. Something went terribly wrong.

Unlike the U.S.-fostered monstrocity creations of Iran’s Ayatollah Khomeni and Panama’s General Noreiga, the United States was unable to make a pre-emptive strike in an effort to control Usama bin Laden terrorist blowback which, is said to have resulted in the recent attack on America.

INTELL PHOTOS

COSMIC INTELL

 

Magnetic North Energy Anomaly Parallel: Siberia vs. Yukon

Tunguska Meteor, Fireball, Or?

RUSSIA, Siberia, Tunguska – April 1, 2002 – The mystery described on the former American television program series X-FILES was indeed an actual Earth impact event that took place on June 30, 1908 at 7:17 a.m. near Tunguska, Siberia ( GEOREF: 101 degrees East, 62 degrees North, 92 kilometers north of the old Vanavara outpost used by fur traders and Tungus tribe people ).

The 1908 Tunguska, Siberia extraordinary magnitude of force energetics somehow did ‘not’ consist of a meteor explosion or impact on the ground surface of the Earth, but another type of explosive surface wave force ‘did’ occur.

Some explain the 1908 Tunguska, Siberia energy explosion anomaly attributable to an unavoidable natural underground build up of sulfur gas within the ever changing tundra heavily compacted by a surface of ice because no evidence of rock impact from a meteor existed.

The 1908 explosive force of the Tunguska event was estimated to have released about 40-megatons of energy, about 2,000 times even more powerful than the Hydrogen bomb ( H bomb ) dropped by the United States military on the civilian population of Nagasaki, Japan.

The 1908 Tunguska blast leveled and scorched huge tree timbers for approximately 2,150 square kilometers where thousands of miles of trees were quickly incinerated in a 9-mile ( 14.4 kilometer ) radius – out from the center ( ground zero ) of the 25-mile ( 40 kilometer ) energy blast radius deploying a ‘surface wave explosion’ – much in the same as military superpower nations today deploy an atmospheric ( 150-mile high ) nuclear bomb detonation.

Other speculations, on the 1908 Tunguska event, consider a huge extraterrestrial spacecraft experiencing skip off the Earth atmosphere with a consequential focus of high-energy directed downward onto the ground surface of the Earth causing a magnetic reactive energy force consequentiallyserving to buffet the large alien spacecraft back into and / or out into space.

This giant 1908 Tunguska, Siberia Russia fireball was said to have raced across the night sky, also killed herds of reindeer.

Night skies - as far away as West Europe - held evidence the Tunguska energy event did emit an orange color glow.

The only proof something happened during 1908 in Tunguska, Siberia was a quiver on a seismograph about 1,000 miles away in the city of Irkutusk where it was claimed heavily felt by seismic shockwaves, strong heat sensations, and black rain. Missing, however was harmful radiation, and although radiation readings were able to be collected by a few exploratory teams of geoscientists and others – equally credentialed – none obtained any significant or remarkable radiation readings or levels that might otherwise have evidenced an extraterrestrial rock ( meteor ) impact.

To this very day, strangely enough, there has been no evidence of any meteoric impact residual materials found in the area of Tunguska, Siberia.

Most scientists believed the 1908 Tunguska, Siberia event was a fireball – comet or meteor – from outer space, one ( 1 ) item is missing from that theory – namely the fact there was no impact crater.

Scientists believe the meteor measured about 5 meters across, weighing about 200 metric tons, when it detonated about 7.6 kilometers above the Earth, a theory supported by the fact trees in the center were not overturned, although trees found hundred of meters away from the center were.

Scientists did not visit that particular area of Tunguska, Siberia for another 19-years, but when they did they saw a place in utter devastation. They searched for a crater, a piece of an asteroid or meteorite, but found nothing. They did find eyewitnesses, in neighboring villages, whom recalled there had been a fireball streaking through the sky, a horrifying noise, and an enormous blast.

[ photo ( above ) Russia Dr. Leonid A. Kulik expeditionary team at Tunguska Lake in Siberia ( click to enlarge ) ]

From the camp, of Russia scientific explorer Leonid A. Kulik, daily trips were made out across this dead forest area of Tunguska, Siberia until he circled the entire area of ground zero where his observations saw that on every side of the swamp, fallen tree tops were laid down pointing outward indicating the center of the swamp was the initial drop zone point of the meteorite impact he was searching for, instead of finding a giant crater. Kulik saw a standing forest of what looked like telephone poles – trees scrapped bare of their branches and leaves – although tree trunks stood straight and tall but charred and stripped of branches.

In the very center of this forest, Dr. Leonid Kulik found a ‘peat marsh’ blasted and tortured into a fantastic landscape. “The solid ground,” wrote Leonid Kulik, “heaved outward from the spot in giant waves, like waves in water.”

Leonid Kulik also found dozens of “peculiar flat holes” ranging in size from 10-feet to 50-feet in diameter where each were discovered several yards in depth.

Had this 1908 Tunguska, Siberia meteor impacted, over a populated area, it would have been perhaps labeled as the greatest disaster in the history of mankind, but this event occurred long ago – until the incident over the Canada Yukon Territory in the year 2000, a 21st Century event that somehow went totally unnoticed, unreported, unannounced to the majority of the people on Earth.

[ motion picture color video photo ( above ) Tagish Lake Yukon Canada Meteor / Energy Event ]

Tagish Lake Meteor, Fireball, Or?

CANADA, British Columbia, Atlin – January 18, 2000 – One of the largest extraterrestrial events impacting Earth in the past 92 years occurred today at approximately 8:45 a.m. ( PST ) when a meteor exploded 15.6 miles ( 25 kilometers ) over a primarily unpopulated area of the Taku Arm of Tagish Lake region between the towns of Carcross, Yukon Territory ( Canada ) and Atlin, British Columbia ( Canada ) where a meteor detonated energy of between 2 kilotons to 3 kilotons of TNT displaying an extremely brilliant fireball first detected by U.S. Department of Defense ( DOD ) controlled Tracking Data and Relay Satellites ( TDRS ).

The meteor explosion effect on seismic ground monitoring instruments recorded two ( 2 ) types of sonic booms, plus an audible sizzling sound heard overhead by Alaska and northwest Canada residents.

The unexpected meteor, believed to have ionized itself on atmospheric entry, left a glowing vapor trail seen for 1-1/2 hours even after the event took place.

Two ( 2 ) bright green flashes were additionally observed, plus a foul odor was detected – perhaps, sulfur – in the region for hours after the event.

No major meteor showers were reported on January 18, 2000 except for this Yukon Territory ( Canada ) particular fireball believed by some astronomers to be a ‘sporadic meteor’ explained as what comes from inner solar system tiny dust particles that are bubbled off-of numerous comets passing close by the Sun causing these particles – known as ‘meteoroids’ – hitting the Earth from overhead random directions that usually produce two ( 2 ) or three ( 3 ) ‘sporadic meteors’ per hour every night.

On January 21, 2000 the U.S. government and others – wanting to study upper atmospheric ( stratosphere ) residuals of meteor trail dust and / or shattered rock particles – learned that NASA Dryden Flight Research Center launched from Edwards Air Force Base ( southern California ) a modified U-2 ( DragonLady ) surveillance aircraft ‘environmental reconnaissance version’ ER-2 that was tasked for a “data recovery mission,” however no specifics were publicly released.

The ER-2 reached altitudes, including 65,000 feet ( + / – ), used an Aerosol Particulate Sampler ( APS ) system instrument consisting of two ( 2 ) small 5-inch by 4-inch paddles – containing an adhesive silicone oil on them – deployed simultaneously from the ER-2 left wing tip so, during exposure for a sufficient time to a particular airstream area, particles can be collected from the stratosphere.

ER-2 paddles are then withdrawn – into hermetically sealed enclosures – to avoid contamination from other atmospheric levels on ER-2 reentry and return to Dryden ( Edwards AFB, California ) where paddles are removed and sent to NASA Johnson Space Center ( Houston, Texas ) for analysis by U.S. Department of Defense ( DOD ) contract specialists determining the composition of the meteor, and provide space based surveillance sensor calibration for detecting other incoming objects from space.

ER-2 takes 8-mile wide panoramic photo swaths of regions that can interpret impact craters and other possible scarring on the ground, e.g. flattened forest trees or whatever else may have been affected by an explosive impact or impacts where multiple objects may have become separated.

Scientists are very interested in discovering the composition of the meteor in an effort to learn more about its origins and makeup.

[ photo ( above ) Jim Brook holds a piece of the Tagish Lake meteor ( click photo to enlarge ) ]

[ photo ( above ) Tagish Lake Yukon Canada meteor specimen found by discoverer Jim Brook ( click photo to enlarge ) ]

“I have never seen anything quite like this before,” said Joe Clarke ( Marsh Lake, Yukon ) who saw the meteor at 08:45 PST ( 16:45 UT ) on January 18, 2000. “When it started, the flash lit up the mountains 15-km away as bright as daylight, then it just drifted across the sky. The contrail looked to me like the ones left by shuttle launches. It just hung there for at least 30-minutes. [ It's the ] wildest thing I could ever imagine seeing.”

The fact remains that not all of the collected evidence has ever been released to the general public and no one has been willing to come forward and say with any true certainty, why. This time, however the theory of alien spaceships was dispelled as no witnesses at the Tagish Lake event saw anything skip back off the ground and up out into the atmosphere.

In layman terms, one ( 1 ) final theory is that the extraterrestrial rock material mineralogy composite – on approaching Earth core mineralogy magnetics and polar field strength could be creating an anomaly resembling a force experienced in super-collider experiments found by U.S. Department Of Energy ( DOE ) experiments. An explosive force where the extraterrestrial rock – may be emitting unchanneled energy at specific distances – when approaching the ground surface of the Earth causing it to be repelled away from the surface and thereby creating an incredible explosive force of energy causing the rock to shatter – like a glass marble being heated over an open flame and then placed in cold water causing many cracks in the glass marble. The U. S. Department of Defense does utilize channeled forms of energy technologies for some of its new variety of pulse weapons, electron-beam guns, and pulse-type energy engine propulsion systems under experiment wraps today.

The extremely brief video clip loop ( above ) is color film footage taken of the actual Tagish Lake ( Canada ) meteor event filmed by an eyewitness from ATLIN REALTY ( Canada ).

Large specimens of the Tagish Lake meteor was first discovered and collected by James Brook who turned some over to Canada and U.S. NASA scientists for analysis believed to be a carbonaceous chondrite, a rare extraterrestrial rock containing various forms of carbon and organics – basic building blocks of life – that later identified forty-five ( 45 ) element materials having traveled from when the solar system began.

The Jim Brook meteor discovery was potentially the single most important terrestrial recovery of an extraterrestrial rock on Earth from in less than 10-years.

The 1990 era secret discovery of self-heating continious energy rocks – found only in a certain region of Australia where the self-heating rocks were used for hundreds of years by Australia native Aboriginee tribes people – was ‘confirmed’, ‘verified’ and later ‘classified’ by the U.S. National Laboratory at Los Alamos, New Mexico ( LANL ) where it was already conducting unrelated experiments on a different type of hot rock project, hydrothermal liquid rock energy transmission tapped into from near the core of the Earth.

To-date, the Australia self-heating continious energy hot rocks have remained a classified secret with no photographs or stories released to the public except what the X-CIA FILES website obtained through independent sources.

For information on spacecraft, satellites, and unusual planetary circumstances and events, see: NEWS ALERTS! and COSMIC Photos at this X-CIA FILES website.

Reference

http://web.archive.org/web/20030816031414/groups.msn.com/AnExCIA/cosmicinteliii.msnw

PHA ( POTENTIALLY HAZARDOUS ASTEROID ) REPORTS

PEC ( PLANETARY EVENT CIRCUMSTANCE ) REPORTS

SURVEILLANCE SPACECRAFT MISSIONS

Space missions and explorations are a business venture which, goes hand-in-hand since, we do not travel to outer-space on leisure activities, to date but, some of us view for pleasure the most outer reaches of the universe. We are watching, listening and, hoping for some wild breakthrough which, will provide us all with an answer to our long-time submitted question of, “Are We Alone?”. Whether the eventual answer comes to us – as what we wanted to hear or not – we nevertheless want to continue our search for that answer.

In our efforts to discover that answer, we have manned missions for close-range “outer-space” travel, to and from Earth and we have un-manned missions for distant travel ventures into what we refer to as “deep-space”. And, we’re still charting other galaxies which we don’t seem to be able to even reach today and so far, we haven’t found an end to that job. So, the universe continues to remain fully “un-charted”, to date by us and will probably remain so for some time to come.

Deep Space 1 & Borrelly Comet

MILKY WAY GALAXY, USA, Texas, Houston - September 21, 2001 - NASA Deep Space 1 ( DS-1- ) – unlike standard rocket-fueled engines – sees this spacecraft with an ‘ion engine’  or ‘electric engine’ ( also known as ‘nuclear power hydrazine propulsion’ ) accelerating nearly continuously, giving each ion a tremendous burst of speed.

Deep Space 1 ( DS1 ) ion engine provides about 10-times the specific impulse ( ratio of thrust to propellant used ) of chemical propulsion. DS-1 also has on-board a, Miniature Ion and Electron Spectrometer. The mass of this instrument that is considered a “space physics package” and is less than 25% that of currently used comparable instruments. It also requires about 50% less power than conventional instruments.

Deep Space 1′s risky encounter with the Borrelly Comet on September 22, 2001 has gone extremely well when the aging spacecraft successfully passed within 2,200 kilometers (about 1,400 miles) of the comet at 22:30 Universal Time (3:30 p.m. PDT), on this date. See, e.g., “COSMIC Photos” on this website for more.

The images and other data collected from the Borrelly Comet so far will help scientists learn a great deal about other intriguing members of the solar system family. DS-1 now has provided us with glimpses of the secrets that this comet has held since before the planets were formed.

Signals confirming the successful encounter were received on Earth at 3:43 p.m. PDT, and data containing the first clues to the composition of the comet came a few hours after the close brush with the comet.

Mission managers confirmed that the spacecraft was able to use all four of its instruments aimed at the Borrelly Comet. Data will be returned over the next few days as DS-1 sends to Earth black-and-white pictures, infrared spectrometer measurements, ion and electron data, and measurements of the magnetic field and plasma waves around the comet. Pictures of the comet will be released after they are all sent to Earth in the next few days.

Several hours before the encounter, the ion and electron monitors began observing the comet’s environment. The action increased about an hour and a half before the closest approach; when for two minutes the infrared spectrometer collected data that will help scientists understand the overall composition of the surface of the comet’s nucleus. Deep Space 1 began taking its black-and-white images of the comet 32-minutes before the spacecraft’s closest pass to the comet, and the best picture of comet Borrelly was taken just a few minutes before closest approach, as the team had planned. Two minutes before the spacecraft whizzed by the comet, its camera was turned away so that the ion and electron monitors could make a careful examination of the comet’s inner coma the cloud of dust and gas that envelops the comet.

Scientists on Deep Space 1 hope to find out the nature of the comet’s surface, measure and identify the gases coming from the comet, and measure the interaction of solar wind with the comet.

Deep Space 1 completed its primary mission testing ion propulsion and 11 other advanced, high-risk technologies in September 1999. NASA extended the mission, taking advantage of the ion propulsion and other systems to undertake this chancy but exciting encounter with the comet.

Deep Space 1 was launched in October 1998 as part of NASA’s New Millennium Program, which is managed by JPL for NASA’s, Office of Space Science, Washington, D.C.. The California Institute of Technology manages the Jet Propulsion Laboratory (aka) J.P.L. in Pasadena, California for the National Aeronautic & Space Administration (aka) N.A.S.A.. See, e.g., “COSMIC Photos” for more.

Deep Space 1 & Borrelly Comet ( UPDATE )

MILKY WAY GALAXY, Earth, USA, Texas, Houston - September 24, 2001 - In a risky fly-by, the NASA Deep Space 1 ( DS1 ) ailing spacecraft successfully navigated past the Borrelly Comet, giving researchers the best look ever inside the glowing core of icy dust and gas. The space probe’s close-capture and encounter occured successfully on, September 22, 2001.

Today, Deep Space 1 is nearly 1.5-times as far away as the Earth is to the Sun or, about 575-times as far away from the Earth to the Moon. At this distance, i.e. 220-million kilometers (137-million miles), radio signals – traveling at the universal speed limit for today’s deep-space communication transfers, i.e. the speed of light – takes about 24-1/2 minutes to make the round-trip from Deep Space 1 to Earth and back. See, e.g., “COSMIC Photos“, on this website for a better photo view.

Nibbling Away Our Milky Way

MILKY WAY GALAXY, Earth, USA, Texas, Houston - September 5, 2001 - Chandra deep-space surveillance spacecraft for NASA, has been busy looking around our galaxy and finally found something ‘huge’ in October of 2001. It wasn’t until astronomers interpreted Chandra image transmissions that they were able to finally figure it out that we ‘do in-fact have our very own’ “Black Hole.”

Now although we were just recently informed in September 2001 that, some monumental news awaited us, right here in our Milky Way galaxy. Our recent discovery was that our own galaxy, is shrinking to a much “smaller” size. Why? Because, we just discovered that we are all being sucked into our very own Black Hole. The final event won’t come for us, anytime soon though.

Our Milky Way galaxy’s Black Hole however, is having an effect on all many other stars in our galaxy though. Perhaps, even our own Sun. Some anomalies we are able to observe while others we haven’t even a clue about yet as to “why” some anomalies are occurring. The quick answer is, “Just blame it all on the Black Hole!”

The fact remains that, our Black Hole is extremely hungry and gobbling up stars and galaxies en masse. See, e.g., “COSMIC Photos“, on this website for more.

COSMIC PHOTOS

ETT BRIEFS

ETT PHOTOS

UFO BRIEFS

UFO STORIES

UFO PHOTOS

CRIME BRIEFS

CRIME STORIES

CRIME PHOTOS

EDITORIAL

White House & GovBot Changed

USA, Washington, D.C. – July 11, 2001 - The United States White House website was completely revamped from its formerly attractive and informative original format, shortly after the Bush Presidency took over. Gone instantly under The Presidential Administration of George Bush, went the Whitehouse’s “Virtual Library” and other advanced website-design features.

The Center For intelligent Information Retrieval (CIIR) - after eight (8) years of its hosting, suppling information to the general public on government issues of information and reserach - the search engine formerly known as GovBot ( an incredibly U.S. Government Search Engine source) all of a sudden dismantled, disbanded and/or, switch-modified into oblivion or, at least away from public viewing.

The newly revised and sanitized version replacement today for the U.S. Government Search Engine is now a different U.S. Government Search Engine designed for typical sanitized general public information dissemination. The site’s webpage is now at: FirstGov.

What exactly occured seemed to be uncertain at first however, the Whitehouse webpage underwent a total and major “downgrade”. The Whitehouse’s former webpage is no more. It use to have NO notification or broad publicized mention regarding the name of the President, etc.

An interesting note is, under the William Jefferson Clinton U.S. Presidential Administration, the Clinton Presidency ‘had its own webpage’ – completely separate from that of the U.S. government’s White House webpage – viewed, at:  U.S. Presidential Administration – Whitehouse Website.

But, under the George W. Bush Jr. Presidential Administration, George W. Bush Jr. has ‘his name’, etc. plastered and publicized throughout the U. S. government “White House” webpage, the ’downgraded’ website can be viewed, at: United States of America Government – Whitehouse Website.

What happened and what’s going on with the CIIR / GovBot Search Engine though?

It seemssomeone’s mistake created a reaction warranting prohibition public access to what used to be a substantial government-based information database search engine accessing a plethora of research material that happened to be mistakingly combined with ‘private sector’ webpage or website information proposed as a possible ‘threat to U.S. National Security’, however now being made available to certain ‘private sector’ professionals ( scientists, etc. ).

Was there ‘really’ a potential ‘threat to U.S. National Security’? Unfortunately, yes, apparently someone riddled the previous CIIR search engine database with what appeared to be mistakenly unguarded information that would otherwise perhaps, have been considered Sensitive Compartmented Information ( SCI ) consisting of back-channel shore-to-ship, ship-to-shore ( via satellite ) traffic messages the CIIR internet webpage database was able to produce, but it didn’t stop there because CIIR publicly provided an Optical Character Recognition ( OCR ) online internet translator handling not-so-legacy CIA, National Security Agency, SPACOM, SPAWARS, DOD and other U.S. government agency image document material automatically converted into text also publicly available.

The task to weed-out ( censor ) specific information considered critical – albeit special-sensitive, secret-sensitive or otherwise – was unable to be performed by ‘any private group or U.S. government agency so, the CIIR search engine database was taken offline for general public use.

Through an acquaintance, who at the time ( mid-1997 ) was employed with the U.S. National Security Agency ( NSA ), the U.S. government intelligence community was informed. Unfortunately, it took nearly 4-years for the U.S. Government to do something about all the information leaks. Bottomline? Closures, to U.S. government information public resources, but ‘at what price at such a late date as this?

EDITORIAL ( UPDATE )

Since the editorial ( above ) was posted on this website, the U.S. government finally responded to e-mails directed to both the Executive Branch and White House Web Administrator requesting they ‘upgrade their sloppy re-do job of the United States White House ‘website’, and that response was that they upgraded the U.S. White House webpage ”somewhat,” correcting all but one ( 1 ) other error – they left the U.S. President’s name in the upper-left hand corner on the Main Page, i.e. the White House Home Page.

LETTERS-TO-THE-EDITOR

Reference

http://web.archive.org/web/20020209205305/http://communities.msn.com/AnExCIA/archives.msnw