Going Black – This is series of articles from www.bibliotecapleyades.net on where the money has gone – Audio and Text Versions

Spread the love



Text Version

by Catherine Austin Fitts
23 September 2002

from Scoop Website




Catherine Austin Fitts is the President of Solari, Inc., a former Assistant Secretary of Housing – Federal Housing Commissioner in the first Bush Administration and a former partner and member of the board of Dillon, Read & Co. Inc and President of Hamilton Securities.

She is a member of the advisory board of Sanders Research Associates http://www.sandersresearch.com/ in London and publishes a column in Scoop Media in New Zealand

http://www.scoop.co.nz/ called The Real Deal.

“Engrave this upon my heart: There isn’t anyone you couldn’t love once you’ve heard their story.”
 Mary Lou Kownacki

“What is relevant is what solves the problem. If we had thought through real relevancies, we would be on Sirius by now.”
Peter Medewar

It is time to deal with the 64 dollar question – the biggest crazy aunt in the living room.

The questions that need to be raised in any effort to find the truth about a significant event related to power and money in the US – and answered if we are to ever find the truth of how our world works – are:






I do not know the answer to these questions. What I do know is that asking these questions brings up a whole pile of challenging uncertainty.

(For background on my experience dealing with black budget/slush fund operations at FHA and Ginnie Mae at the Department of Housing and Urban Development – HUD – Justice, Treasury and the New York Federal Reserve Bank, see my article, “The Myth of the Rule of Law.”)

When dealing with challenging uncertainty, I find that many researchers simply delete the existence of such uncertainty from their reality. That is a big mistake – again pretending that we do not have a very big crazy aunt sitting in the living room.

George Orwell once said that,

“Omission is the greatest lie.”

Hence, our crazy aunt has to be dealt with.

If you listen to the Ferdinand video/audio depositions in the Carone/Tyree lawsuit, what you will hear is something I have heard many times.

Carone Ferdinand gives his family the sense of all of the organized crime operations by CIA, Army and Mafia through the 1970’s as legitimate for national security purposes that then got out of hand and turned bad in the 1980’s.

That is, what started out as justifiable got out of hand.

This begs the question,

Why Were Such Activities Considered Justifiable?

The way to deal with uncertainty is with scenario design and probability – i.e. to create a framework of the possible explanations with your best estimate of the plausible scenarios and the probability (all adding up to 100%) of each one being true based on intuition.

Maintaining such a framework allows data collection on key variables and assumptions and an evolution to occur that can enlighten – even determine – concrete questions and answers over time.

So, let me tell a story, give you my framework that I use to handle the fact that I do not have the answers and invite your framework.

I am not looking to hear only what is wrong with my framework. I am looking to improve mine or find a better one. Or better inform my estimate of the probabilities that this one or that one is true. Hence, I invite you to put forward your framework for managing this uncertainty. If we had the truth of the issue I am going to introduce, I dare say we could get to the bottom of 9-11 faster.

In 1998, I was approached by John Peterson, head of the Arlington Institute, a small high quality military think tank in Washington, DC. I had gotten to know John through Global Business Network and had been impressed by his intelligence, effectiveness and compassion. John asked me to help him with a high level strategic plan Arlington was planning to undertake for the Undersecretary of the Navy.

At the time I was the target of an intense smear campaign that would lead the normal person to assume that I would be in jail shortly or worse. John explained that the Navy understood that it was all politics – they did not care.

I met with a group of high level people in the military in the process – including the Undersecretary. According to John, the purpose of the plan – discussed in front of several military or retired military officers and former government officials – was to help the Navy adjust their operations for a world in which it was commonly known that aliens exist and live among us.

When John explained this purpose to me, I explained that I did not know that aliens existed and lived among us. John asked me if I would like to meet some aliens. For the only time in my life, I declined an opportunity to learn about something important.

I was concerned that my efforts with Arlington could boomerang and be connected with the smear campaign and the effects that I was managing. I regret that decision. At John’s suggestion I started to read books on the topic and read about 25 books over the next year on the alien question, the black budget, and alien technology.

I had to drop from the project due to the need to attend to litigation and the physical harassment and surveillance of me and some of the people helping me.

This process – which turned out to be incredibly time consuming – I now believe was connected with the black budget/slush fund activities connected with FHA and Ginnie Mae at HUD. (See, “The Myth of the Rule of Law”) John then asked me if I would join the board of the Arlington Institute.

When I attended one of my first meetings, I joined in discussion with about 10 people which included James Woolsey, former head of the CIA in the Clinton Administration, Napier Collyns, founder of Global Business Network and former senior Shell executive, Joe Firmage, and other members of the Arlington board.

The main topic of discussion was whether or not the major project for the coming year should be a white paper on how to help the American people adjust to aliens existing and living among us.

I said nothing – just listened. Not that long after, I dropped from the board due to the continued demands related to litigation with the Department of Justice and their informant.

To cut a series of additional long stories short, when I talk with my few sources from the military and intelligence community, I hear the same themes:

  1. Aliens exist and live among us;

  2. In part for this reason as well the accumulated investment over the last 50 years, the technology we have access to through the black budget is far more advanced than is commonly understood;

  3. The black budget/slush fund construct was created to deal with this issue, which is why reasonable people thought selling drugs to the children who were US citizens was the better of several options – including the option of telling the American public the truth and funding the expenses on budget.

As a result of these experiences, here is my framework for dealing with this very large pile of uncertainty.



    The alien question is the single largest and most expensive disinformation campaign in the history of our race.

    A portion of the human race has advanced technologically so far beyond the rest of us – and is attributing various things to aliens as a way of managing their resulting risk – that we have become as aliens to each other.

    To fully understand this scenario, we need to try to understand the use of individual mind control such as criminal hypnosis to effect financial and government fraud and corruption and the truth, whatever it is, of wider subliminal programming and brainwashing. These are slippery subjects for most people to deal with unless they have the training and ability to do so.

    % PROBABILITY SCENARIO #1 IS TRUE ______ (You fill in)


    Aliens exist and live among us. Planet earth is subject to the politics, economics and laws and/or lawlessness of a larger system or systems.

    The transfer of advanced technology into a society that has not evolved governance and legal systems to manage a world with the presence of such technology and the influence of such other system(s) helps to explain current events.

    To fully understand this scenario, we must also try to understand the use of individual mind control such as criminal hypnosis to effect financial and government fraud and corruption and the truth, whatever it is, of wide subliminal programming and brainwashing.

    Again, these are slippery subjects for most people to deal with unless they have the training and ability to do so.

    % PROBABILITY SCENARIO #2 IS TRUE ______ (You fill in)

  •  SCENARIO #3 – MUDDLED: Some combination of (1) and (2) above.

    % PROBABILITY SCENARIO #3 IS TRUE ______ (You fill in)


Could my experiences with Arlington and the Navy or any subsequent contacts fit with a disinformation scenario? Absolutely.

I have no evidence to support any scenario. The only evidence I believe I have is my experience dealing with tremendous amounts of money siphoned off over the years, whether through Iran-Contra S&L, HUD and BCCI fraud, or the latest round of money missing from the federal government in the last five years.

This is all documented in the articles below. This cash flow and the operations and syndicates it appears to fund are important to what drives the governance and allocation of resources in this country and around the globe.

There is a reason that power and money are centralizing and the rich are getting richer. I want to know what it is.

Whichever scenario is true  – and I do not know which one is  – if we had the truth it will help us grapple with 9-11 and the War on Terrorism. It would also help us better understand all the efforts to press for centralization of economic and political power that have grown as the black budget has grown since WWII. The reality is the possibilities of why 9-11 occurred and how it was operationalized are impacted by the facts of the US black budget and the advanced technology it has developed.

Why would sane and even decent people think it was the best option for the good of the whole? We must sit in the shoes of the person or people who gave the order – whoever they may be and wherever they may be – and understand how their power and money worked.

Why would a group with the operational and financial capacity to effect a 9-11 operation give the green light to plan 9-11, finance 9-11, do 9-11, stand down so 9-11 could happen, take advantage of 9-11 or to make sure the truth was not illuminated? My experience in Washington and Wall Street would indicate that there is a reasonable chance that all these various people and many in the food chain Are Not Bad Or Irrational People.

That is, we have a better chance of finding the truth if for purposes of our explorations we assume that the people involved in all these roles were people like you and me – just with a different map of certain parts of the world and dealing with a variety of stress and pressures trying to build cooperation or achieve goals that we do not understand.

Watching the federal government contract announcements and without benefit of seeing the full budget and assuming The Disclosure Project allegations regarding the estimates of the black budget size, if I had to guess today my guess would be that 9-11 has been highly successful in permitting the black budget to be moved on budget, partly in the normal budget and partly in the budget that is only disclosed to the Congressional intelligence committees.

The solution to continued growth and funding of the black budget may have been to steal as much money and assets as possible from the federal budget and then to move the black budget on budget when control of media, Congress, Justice and Securities & Exchange Commission ensured that the legal budget was non-transparent, controlled by private government contractors and could not be harmed or fiddled with by Congress.

(See various stories on the disappearance of over $3.3 trillion from the federal government from fiscal 1998-2001)

Grossly oversimplified, by the end of the 2004 fiscal year, covert operations and the black budget may be fully legal, run and controlled by corporations and banks without interference from knowledgeable career civil service, taxpayer funded, and non-transparent.

Why do I say all of this?

We do not have time to pay attention to people who use smears like “conspiracy theorist” to waste our time. Money, budgets, finance… these are all facts. If something does not work, and it continues to not work, there is a reason.

Systems have a logic. They have a rationale. Money helps explain and illuminate that rationale. Anyone who would smear a serious researcher or writer for trying to understand where a great deal of money is disappearing to as a “conspiracy theorist” is someone who would never be taken seriously or associated with in the circles in which I travel.

The exception is if the person doing the smearing is a professional being paid to smear those who have the scent of “the real deal” – Cointelpro or related public relations. The number of people paid to do such things are many and growing.

9-11 was an operation that was implemented by a conspiracy. To get to the bottom of what happened and why one must develop and use conspiracy theories to research in what can only be described as a conspiracy reality.

We know in regards to 9-11 one of two scenarios must be true – some portion of the US military and intelligence are,

  1. complicit and/or

  2. guilty of criminal gross negligence

We also know that the official story is not truthful. Either scenario and the reality of the official story beg the question, “why?”

This course always leads us to consider the fact that US military and intelligence have enjoyed significant expansion of their budgets and powers as a result of 9-11. We are rewarding failure. 9-11 was great for business. Lockheed Martin’s stock is up over 50% in a falling stock market. The oil companies have their pipeline.

When a system does not work and continues to not work, there is something that prevents its learning.

Ultimately what we must understand that the problem is not that the system does not work and that it is not learning. The problem is that the system is controlled and operated by the most powerful forces in that system and that the system is indeed working and learning in the general direction they want it to go.

This happens in a manner that is highly organic and requires lots of planning, trial and error and factionalism that involves competition and cooperation over time in the pursuit of the system’s real goals. Hence, the system is working and is learning. It is our construct that is wrong. We do not understand the system and the goals of the system.

Once we are clear that the system is working and is learning, once we stop falling back on scapegoating as a technique to explain events, we can start to understand the real system that we are a part of. This is how power and money work in reality.

The amount of money and power spent to keep the general population from understanding this – and focused on things like scapegoating which keep us from building a good map of “the real deal” or gaining the power to impact events by using our money and time as a vote in the marketplace in which the banks and corporations must thrive – is immense.

That is why I strongly encourage reading Jon Rappoport‘s back interviews on his Infomonster and becoming a subscriber for his ongoing interviews.

For those would like to know more, I would refer you to articles on all the money missing from the US Treasury and the manipulation of the gold markets as well as the Disclosure Project video of their event at the National Press Club

As for me, I do not have the answers. I wish I did.

That is why I am so appreciative of efforts like UnAnswered Questions and the effort of researchers networking and collaborating globally to illuminate, research and answer the right questions.

Let me close with the unanswered questions with which I began and which I believe are critical to our ongoing collaboration:






August 29, 2013

from CommonDreams Website

Latest revelations

made possible by Edward Snowden

give unprecedented view of

how taxpayer funds are use

to “collect it all”.
Jon Queally

staff writer

In the latest revelation made possible by NSA whistleblower
Edward Snowden, the Washington Post on Thursday published an investigative analysis and interactive map of America’s so-called “Black Budget” which details the $52.6 billion allotment of taxpayer money that funds the government’s “intelligence-gathering colossus” that has previously remained insulated from the eyes of the American public.

Though a series of revelations have flowed from the Snowden leaks over recent months, this is the first detailed financial picture of how public monies are used to fund programs that Americans still know very little about.

Critiqued as a “collect it all” strategy by those concerned about Constitutional and privacy violations, the vast surveillance network has been slammed at home and abroad.

According to the Post, the “Black Budget,”

…maps a bureaucratic and operational landscape that has never been subject to public scrutiny.

Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.

The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Washington Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods.

Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

A view into what the newspaper terms the US “espionage empire,” the blueprint and summary documents obtained by the Post,

“provides a detailed look at how the U.S. intelligence community has been reconfigured by the massive infusion of resources that followed the Sept. 11 attacks” in 2001.

According to the reporting, the $52.6 billion far-exceeded estimates about the amount of money being spent on clandestine spying and surveillance operations and that figure does not even include an additional $23 billion specifically geared to CIA and NSA operations done in direct support of the U.S. military.

In addition to providing what is repeatedly referred to as an “unprecedented” look inside the financial operations of the both the CIA and the NSA, the summary report leaked by Snowden also shows the enormous rate of operational growth at the CIA in the last decade, including a,

“surge in resources for the agency funded,

  • secret prisons

  • a controversial interrogation program

  • the deployment of lethal drones

  • a huge expansion of its counterterrorism center.”

In an additional and ironic twist, the documents trace the development of internal counterterrorism efforts at the NSA and how to prevent sensitive leaks from occurring “from within” the US intelligence system.

As the Post reports:

The document describes programs to “mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests.”

The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands, emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks.

For this year, the budget promised a renewed “focus… on safeguarding classified networks” and a strict “review of high-risk, high-gain applicants and contractors” – the young, nontraditional computer coders with the skills the NSA needed.

Among them was Snowden, then a 29-year-old contract computer specialist who had been trained by the NSA to circumvent computer network security.

He was copying thousands of highly classified documents at an NSA facility in Hawaii, and preparing to leak them, as the agency embarked on a security sweep.

U.S. Spy Network’s Successes, Failures and Objectives Detailed in…

Black Budget’ Summary
by Barton Gellman and Greg Miller
August 29, 2013

from WashingtonPost Website


U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget.

The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former ­intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny.

Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress.

The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods.

Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

“The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes,

  • wars in Iraq and Afghanistan

  • the Arab Spring

  • the proliferation of weapons of mass destruction technology

  • asymmetric threats in such areas as cyber-warfare,”

…Director of National Intelligence James R. Clapper Jr. wrote in response to inquiries from The Post.

“Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he said.

Among the notable revelations in the budget summary:

  • Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community.

  • The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”

  • Long before Snowden’s leaks, the U.S. intelligence community worried about “anomalous behavior” by employees and contractors with access to classified material. The NSA planned to ward off a “potential insider compromise of sensitive information” by re-investigating at least 4,000 people this year who hold high-level security clearances.

  • U.S. intelligence officials take an active interest in friends as well as foes. Pakistan is described in detail as an “intractable target,” and counterintelligence operations “are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel.” The latter is a U.S. ally but has a history of espionage attempts against the United States.

  • In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five “mission ob­jectives.” Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of the intelligence program’s spending.

  • The governments of Iran, China and Russia are difficult to penetrate, but North Korea’s may be the most opaque. There are five “critical” gaps in U.S. intelligence about Pyongyang’s nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the “top-secret” blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012.

Congress may have made changes before the fiscal year began on Oct 1. James Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage, and conducting cyber-operations.

In an introduction, Clapper said the threats facing the United States “virtually defy rank-ordering.” He warned of “hard choices” as the intelligence community – sometimes referred to as the “IC” – seeks to rein in spending after a decade of often double-digit budget increases.

The current budget proposal envisions that spending will remain roughly level through 2017 and amounts to a case against substantial cuts.

“Never before has the IC been called upon to master such complexity and so many issues in such a resource-constrained environment,” Clapper wrote.

An espionage empire

The summary provides a detailed look at how the U.S. intelligence community has been reconfigured by the massive infusion of resources that followed the 2001 attacks.

The United States has spent more than $500 billion on intelligence during that period, an outlay that U.S. officials say has succeeded in its main objective: preventing another catastrophic terrorist attack in the United States.

The result is an espionage empire with resources and a reach beyond those of any adversary, sustained even now by spending that rivals or exceeds the levels at the height of the Cold War.

The current total budget request was 2.4 percent below that of fiscal 2012. In constant dollars, it was about twice the estimated size of the 2001 budget and 25 percent above that of 2006, five years into what was then known as the “global war on terror.”

Historical data on U.S. intelligence spending is largely nonexistent. Through extrapolation, experts have estimated that Cold War spending probably peaked in the late 1980s at an amount that would be the equivalent of $71 billion today.

Spending in the most recent cycle surpassed that amount, based on the $52.6 billion detailed in documents obtained by The Post plus a separate $23 billion devoted to intelligence programs that more directly support the U.S. military.

Lee H. Hamilton, an Indiana Democrat who chaired the House Intelligence Committee and co-chaired the commission that investigated the Sept. 11 attacks, said that access to budget details will enable an informed public debate on intelligence spending for the first time, much as Snowden’s disclosures of NSA surveillance programs brought attention to operations that had assembled data on nearly every U.S. citizen.

“Much of the work that the intelligence community does has a profound impact on the life of ordinary Americans, and they ought not to be excluded from the process,” Hamilton said.

“Nobody is arguing that we should be so transparent as to create dangers for the country,” he said. But, he added, “there is a mind-set in the national security community:

Leave it to us, we can handle it, the American people have to trust us.’

They carry it to quite an extraordinary length so that they have resisted over a period of decades transparency… The burden of persuasion as to keeping something secret should be on the intelligence community, the burden should not be on the American public.”

Experts said that access to such details about U.S. spy programs is without precedent.

“It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007,” said Steven Aftergood, an expert at the Federation of American Scientists, a Washington-based organization that provides analyses of national security issues.

“But a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”

The only meaningful frame of reference came in 1994, when a congressional subcommittee inadvertently published a partial breakdown of the National Intelligence Program.

At the time, the CIA accounted for just $4.8 billion of a budget that totaled $43.4 billion in 2012 dollars. The NSA and the National Reconnaissance Office, which operates satellites and other sensors, commanded far larger shares of U.S. intelligence budgets until years after the Cold War ended.

During the past decade, they have taken a back seat to the CIA.

The NSA was in line to receive $10.5 billion in 2013, and the NRO was to get $10.3 billion – both far below the CIA, whose share had surged to 28 percent of the total budget.

Overall, the U.S. government spends 10 times as much on the Defense Department as it does on spy agencies.

“Today’s world is as fluid and unstable as it has been in the past half century,” Clapper said in his statement to The Post.

“Even with stepped up spending on the IC over the past decade, the United States currently spends less than one percent of GDP on the Intelligence Community.”

Dominant position

The CIA’s dominant position is likely to stun outside experts. It represents a remarkable recovery for an agency that seemed poised to lose power and prestige after acknowledging intelligence failures leading up to the 2001 attacks and the 2003 U.S.-led invasion of Iraq.

The surge in resources for the agency funded secret prisons, a controversial interrogation program, the deployment of lethal drones and a huge expansion of its counterterrorism center. The agency was transformed from a spy service struggling to emerge from the Cold War into a paramilitary force.

The CIA has devoted billions of dollars to recruiting and training a new generation of case officers, with the workforce growing from about 17,000 a decade ago to 21,575 this year.

The agency’s budget allocates $2.3 billion for human intelligence operations and $2.5 billion to cover the cost of supporting the security, logistics and other needs of those missions around the world. A relatively small amount of that total, $68.6 million, was earmarked for creating and maintaining “cover,” the false identities employed by operatives overseas.

There is no specific entry for the CIA’s fleet of armed drones in the budget summary, but a broad line item hints at the dimensions of the agency’s expanded paramilitary role, providing more than $2.6 billion for “covert action programs” that would include,

  • drone operations in Pakistan and Yemen

  • payments to militias in Afghanistan and Africa

  • attempts to sabotage Iran’s nuclear program

The black budget illuminates for the first time the intelligence burden of the wars in Afghanistan and Iraq. For 2013, U.S. spy agencies were projected to spend $4.9 billion on “overseas contingency operations.”

The CIA accounted for about half of that figure, a sum factored into its overall $14.7 billion budget.

Those war expenditures are projected to shrink as the United States withdraws forces from Afghanistan. The budget also indicates that the intelligence community has cut the number of contractors it hires over the past five years by about 30 percent.

Critical gaps

Despite the vast outlays, the budget blueprint catalogues persistent and in some cases critical blind spots.

Throughout the document, U.S. spy agencies attempt to rate their efforts in tables akin to report cards, generally citing progress but often acknowledging that only a fraction of their questions could be answered – even on the community’s foremost priority, counterterrorism.

In 2011, the budget assessment says intelligence agencies made at least “moderate progress” on 38 of their 50 top counterterrorism gaps, the term used to describe blind spots. Several concern Lebanon’s Hezbollah movement, an enemy of Israel that has not attacked U.S. interests directly since the 1990s.

Other blank spots include questions about the security of Pakistan’s nuclear components when they are being transported, the capabilities of China’s next-generation fighter aircraft, and how Russia’s government leaders are likely to respond to,

“potentially destabilizing events in Moscow, such as large protests and terrorist attacks.”

A chart outlining efforts to address key questions on biological and chemical weapons is particularly bleak.

U.S. agencies set annual goals for at least five categories of intelligence collection related to these weapons. In 2011, the agencies made headway on just two gaps; a year earlier, the mark was zero.

The documents describe expanded efforts to “collect on Russian chemical warfare countermeasures” and assess the security of biological and chemical laboratories in Pakistan.

A table of “critical” gaps listed five for North Korea, more than for any other country that has pursued or is pursuing a nuclear bomb.

The intelligence community seems particularly daunted by the emergence of “homegrown” terrorists who plan attacks in the United States without direct support or instruction from abroad, a threat realized this year, after the budget was submitted, in twin bombings at the Boston Marathon.

The National Counterterrorism Center has convened dozens of analysts from other agencies in attempts to identify “indicators” that could help law enforcement officials understand the path from religious extremism to violence. The FBI was in line for funding to increase the number of agents who surreptitiously track activity on jihadist Web sites.

But a year before the bombings in Boston, the search for meaningful insight into the stages of radicalization was described as one of the “more challenging intelligence gaps.”

High-tech surveillance

The documents make clear that U.S. spy agencies’ long-standing reliance on technology remains intact.

If anything, their dependence on high-tech surveillance systems to fill gaps in human intelligence has intensified.

A section on North Korea indicates that the United States has all but surrounded the nuclear-armed country with surveillance platforms. Distant ground sensors monitor seismic activity and scan the country for signs that might point to construction of new nuclear sites. U.S. agencies seek to capture photos, air-samples and infrared imagery “around the clock.”

In Iran, new surveillance techniques and technologies have enabled analysts to identify suspected nuclear sites that had not been detected in satellite images, according to the document.

In Syria, NSA listening posts were able to monitor unencrypted communications among senior military officials at the outset of the civil war there, a vulnerability that President Bashar al-Assad’s forces apparently later recognized. One of the NRO’s functions is to extract data from sensors placed on the ground near suspected illicit weapons sites in Syria and other countries.

Across this catalogue of technical prowess, one category is depicted as particularly indis­pensable: signals intelligence, or SIGINT.

The NSA’s ability to monitor e-mails, phone calls and Internet traffic has come under new scrutiny in recent months as a result of disclosures by Snowden, who worked as a contract computer specialist for the agency before stockpiling secret documents and then fleeing, first to Hong Kong and then Moscow.

The NSA was projected to spend $48.6 million on research projects to assist in “coping with information overload,” an occupational hazard as the volumes of intake have increased sharply from fiber-optic cables and Silicon Valley Internet providers.

The agency’s ability to monitor the communications of al-Qaeda operatives is described in the documents as,

“often the best and only means to compromise seemingly intractable targets.”

Signals intercepts also have been used to direct the flight paths of drones, gather clues to the composition of North Korea’s leadership and evaluate the response plans of Russia’s government in the event of a terrorist attack in Moscow.

The resources devoted to signals intercepts are extraordinary.

Nearly 35,000 employees are listed under a category called the Consolidated Cryptologic Program, which includes the NSA as well as the surveillance and code-breaking components of the Air Force, Army, Navy and Marines.

The NSA is planning high-risk covert missions, a lesser-known part of its work, to plant what it calls “tailored radio frequency solutions” – close-in sensors to intercept communications that do not pass through global networks.

Even the CIA devotes $1.7 billion, or nearly 12 percent of its budget, to technical collection efforts, including a joint program with the NSA called “CLANSIG,” a covert program to intercept radio and telephone communications from hostile territory.

The agency also is pursuing tracking systems,

“that minimize or eliminate the need for physical access and enable deep concealment operations against hard targets.”

The CIA has deployed new biometric sensors to confirm the identities and locations of al-Qaeda operatives.

The system has been used in the CIA’s drone campaign. Spending on satellite systems and almost every other category of collection is projected to shrink or remain stagnant in coming years, as Washington grapples with budget cuts across the government.

But the 2013 intelligence budget called for increased investment in SIGINT.


The budget includes a lengthy section on funding for counterintelligence programs designed to protect against the danger posed by foreign intelligence services as well as betrayals from within the U.S. spy ranks.

The document describes programs to,

“mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests.”

The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks.

For this year, the budget promised a renewed “focus… on safeguarding classified networks” and a strict “review of high-risk, high-gain applicants and contractors” – the young, nontraditional computer coders with the skills the NSA needed.

Among them was Snowden, then a 29-year-old contract computer specialist whom the NSA trained to circumvent computer network security.

He was copying thousands of highly classified documents at an NSA facility in Hawaii, and preparing to leak them, as the agency embarked on the new security sweep.

“NSA will initiate a minimum of 4,000 periodic reinvestigations of potential insider compromise of sensitive information,” according to the budget, scanning its systems for “anomalies and alerts.”

by Jackie
Exopolitics Graduate Paper #1 (Fall 2004)

from Exopolitics Website


Black budget operations have produced weapons and other experimental technologies that can be used in military operations or civilian control activities. According to Dr. Michael Salla, every year billions of dollars of Congressional appropriations are diverted from their congressionally sanctioned purposes to the CIA and DoD based intelligence agencies without knowledge of the public and with collusion of Congressional leaders.

This paper will discuss the latest Electromagnetic Frequency (EMF) weapons and other experimental technologies, some of which originated out of these black budget projects. With much of this technology, there are official, public descriptions of what these weapons or other technologies are used for, and then there are potential covert uses for these technologies that could have exopolitical significance. EMF weapons, by their nature, are the most insidious type of weapons, because the victim can’t visibly see them coming, nor necessarily immediately feel any adverse health affects from exposure to them. I will discuss both types of uses and their overall exopolitical significance.


The “official” information on the HAARP (High-Frequency Active Auroral Research Program) Program is that it is jointly managed by the US Air Force and US Navy, and is based in Gakona, Alaska. It is designed to “understand, simulate and control ionospheric processes that might alter the performance of communication and surveillance systems for both civil and defense purposes.” It intends to beam 3.6 Gigawatts of effective radiated power of high frequency radio energy into the ionosphere for these purposes:

To generate extremely low frequency (ELF) waves for communicating with submerge submarines
• To conduct geophysical probes to identify and characterize natural
ionospheric processes so that techniques can be developed to mitigate or control them
• To generate
ionospheric lenses to focus large amounts of high frequency energy, thus providing a means of triggering ionospheric processes that potentially could be exploited for Department of Defense purposes
• Electron acceleration for infrared (
IR) and other optical emissions which could be used to control radio wave propagation properties
• To generate geomagnetic field aligned ionization to control the reflection/scattering properties of radio waves
• To use oblique heating to produce effects on radio wave propagation, thus broadening the potential
military applications of ionospheric enhancement technology.

There is much speculation that this technology is being used for other and possibly more sinister purposes. One of the main “unofficial” uses for HAARP is as an incoming missile defense shield that is effective against missiles from Russia or China. It is believed that the decision to build HAARP was one of the major reasons for the collapse of the Soviet Union. HAARP works by knocking down missiles and aircraft by affecting their guidance systems and creating atmospheric disturbances that lead to them crashing. At lower power levels, it has the ability to look down from the ionosphere and detect cruise missiles and other incoming objects. The shield can be put down to fire weapons, and then put back up to defend against incoming missiles.

On the morning of February 1, 2003, the morning of Space Shuttle Columbia’s re-entrance into the Earth’s atmosphere over California, Marshall Smith, ex-NASA engineer/scientist, logged HAARP transmissions in the missile defense mode from 4:15 am to 7:20 am PST. These were the first HAARP transmissions since late 2002. He believes that Columbia was hit by the shield that heated up its left side and caused it to turn into a fireball. He also believes this was a terrorist act performed by Al-Quaida through a graduate student with an F1 student visa.

Another suggested use for HAARP technology is to detect and image subterranean features such as tunnels, bunkers, and other potential military targets. Research into the feasibility of using HAARP for this purpose is still underway.

HAARP has also been associated with the ability to control global weather and use it as a weapon. This includes climate modification, polar ice cap melting, ozone depletion, earthquakes, and ocean wave control.

There are health concerns associated with the use of radio frequency and microwave radiation (as in HAARP) in the form of chronic, nonthermal effects. These effects include behavioral aberrations, neural network disturbances, birth defects, cataracts, altered blood chemistry, and changes in the endocrine and immune systems. More insidious than these effects is the concern that this technology can be used to manipulate and disrupt human mental processes (mind control) of a very large population in selected regions over an extended period of time. The frequency needed to detect subterranean features is within the same range that is disruptive to human mental functions.

HAARP and Montauk

One of the most intriguing pieces of recent news with respect to
HAARP is that it is speculated to be operating at Montauk!  John Quinn, in his article entitled “HAARP’s Covert Agendas – The Big Picture” talks about the evidence to back up this assertion. I would like to talk about the evidence in some detail, as I think there is a significant exopolitical side to this development.

The story starts with the change of directorship and direction and focus for Brookhaven National Laboratories (BNL) on Long Island. Several of the Navy’s key HAARP personnel are now stationed at Brookhaven. Brookhaven has been associated with the Montauk Project and has a reputation for participating in clandestine projects. Particle accelerators are also known to underlie much of the area and are in use.

John Quinn’s allegation is that the photos taken of the HAARP complex in Gakona, Alaska that appear on the Navy’s official HAARP website have been doctored and that the REAL location of HAARP is in the Westhampton pine barrens on Long Island! Why Montauk? It is a major earth grid hot spot where various EMF, radio frequency, and gravitational processes all link together and can be amplified.

This has been confirmed by Preston Nichols, author of several books on the Montauk projects and a participant in some of its operations, and another independent source. Nichols also confirmed that he had been working with an Air Force contingent at Camp Hero’s subterranean complex when they were working with particle beam technology in planetary defense operations against the Hale-Bopp comet and an object claimed to be traveling in its wake. Since then, the Air Force contingent has moved out and been replaced with the Navy contingent associated with HAARP.

Preston is not absolutely sure what these particle accelerators and beam weaponry is being used for. However, on April 18, 1998, he received a FAX that he does not think is disinformation. It contains a lot of classified information that, in his opinion, could only come from deep within the U.S. Navy. The FAX reveals another agenda for HAARP that is more secret than the mind control and weather manipulation agendas. The document indicates that the particle beam accelerators are being used to effect interdimensional and time manipulations! The author speculates that because the time portal apparatus that was used during the Montauk project back in the late 1970’s-early 1980’s was destroyed in 1983; this is another chance to generate the portals. There is some evidence that the Navy has been experimenting with bringing various creatures through the portals such as seals and Macrihanish Chinook. It is speculated in Puerto Rico and Brazil where there are a number of “Chupacapra” sightings that these creatures are being brought through a portal into our dimension.

Microwaves Used as Weapons

Microwaves are key in the evolution of a new series of non-lethal weapons that the Military is interested in developing. These weapons could be capable of:

  • preventing voluntary muscular movements

  • control emotions (and thus actions)

  • produce sleep

  • transmit suggestions

  • interfere with both short-term and long-term memory

  • produce an experience set

  • delete and experience set

Microwaves used at low power densities can be used to induce sounds and words within a person’s head so that it appears that the person is hearing voices. This technology can be used in isolated individuals either to send instructions to soldiers in the field who are in combat situations or it can be used on the enemy to scare and/or disorient them (one of the non-lethal weapons being developed). There is also some evidence to suggest that this technology has the capability of remote mind reading.

Microwave Cell Phone Towers

Cell phone towers are popping up all over the US terrain. Because it is a multi-billion dollar industry, there is concern that the health effects from being exposed to the microwave radiation are not being addressed. It can cause body tissue to heat up and possibly alter DNA. This can lead to the development of pre-cursors for cancer. Common sources of microwave radiation include: cell phones; cordless phones; garage door openers; wireless PDAs and notebook computers; and microwave alarm system sensors.

Ted Twietmeyer, in his article ‘Dangerous Radiation from Hidden Cell Phone Towers” speculates that the proliferation of cell phone usage will force companies to add more microcells, thus many of the existing towers will become obsolete because they serve too large of an area. He thinks these towers will most likely be converted to other mind control and tracking activities. Ken Adachi, in his paper “ Mind Control – The Ultimate Terror” says that other towers whose antennae look like four slightly curved vertical plates about 2 feet in length and located in either 3 or 4 quadrants around the tower are being constructed. It is presumed that these are for cell phone usage but they produce power levels that far exceed cell phone requirements. He believes these towers are being used for mind control purposes as the frequency bandwidth chosen for cell phone use matches the second order waves that Wilhelm Reich discovered in the late 1940’s to effect thought transmission and allow the mind to be manipulated without the victim realizing it.

Exopolitical Issues Associated with the Use of This Technology

I think there is a real story here if we look at the combination of the
HAARP’s use to open portals to other dimensions and time, and the race to find stargate technology in Iraq and other locations around the world. Various scenarios come to mind that have exopolitical meaning.

Searching for ways to use HAARP to open up portals is consistent with Michael Salla’s assertion that a motive for driving the Bush administration to invade Iraq was to control ancient stargate technology that could be found there. If the goal for the US is to be the “unofficial” greeters of the Anunnaki when they arrive, then it makes sense that the US would want to offer the Anunnaki portals to come through that are controlled by the US. This includes both the ancient stargate technology as well as new portals that can be opened. If the US can’t figure out how to “restart” the ancient stargates, then they still have these new portals to use. This will give the US the edge in being the first to deal with the Anunnaki, find out what their intentions are towards humanity and Earth, and then make the appropriate “deals”.

Another scenario is one in which the US knows that if the Anunnaki come back, they may decide to destroy humankind because they want to end the experiment or they want to upgrade us and cull the population down to a useful number. In that case I would see the US wanting control of the ancient stargates to STOP the Anunnaki from entering into our dimension & time, especially if there was a concern that Saddam Hussein would let them in. Additionally HAARP technology could then be used as a shield to destroy any incoming spaceships of the Anunnaki, since it is thought that there are two forms of transportation that the Anunnaki use: stargate technology for the Anunnaki “elite” and spaceships for the “rank and file” Anunnaki. The HAARP portals could be used to allow helper ETs in, who could help us fight the Anunnaki.

It is not only in the interest of humanity that we not be completely destroyed, but it is also in the interest of the
Reptilians, since they use our emotional and psychic energy to feed off of. Making the assumption that the shadow government is the one supporting the grey/Reptilian presence on earth, these portals can be used to bring more Reptilians into our dimension and time to, perhaps, stop the Anunnaki from destroying us.

If the main goal for use of the portals and stargates is to bring in more Reptilians for a complete take-over of the planet, then using as many portals as possible to bring in these Reptilians seems logical. I am assuming that each type of being has its own frequency and that these frequencies can be controlled at the stargate or portal so that a frequency can be set to allow in entities of that particular frequency. At the same time, HAARP can be used to “keep out” the helper and watcher ETs by destroying spaceships as they arrive.

Another scenario is that the US does not want ANY Reptilians coming in through the portals and stargates so they want to again ensure that they are in control of who comes through, and use HAARP to find portals for the helper/watcher ETs to come through. HAARP’s shield would be used to keep the Reptilians away.

In the scenario where there could be a take-over of the planet either by the Anunnaki or the Reptilians, these EMF weapons and mind control mechanisms could be used on the general population to control them so the take-over would be relatively easy. Control can take many forms. Microwaves can be used to give commands to individuals to do something by disguising the voices as “God”, Angels, Satan, personal guides, or the higher self or whomever the person would listen to. On the other hand, microwaves can be used to render an individual in a zombie-like or confused state so they cannot fight back. I can imagine an easy take-over of major cities within the US just by turning on the microwaves that are broadcast through the cell phone towers to render the population harmless. Any resistance could be met with the use of the non-lethal weapons.

To conclude, I hope that our country is taking the high road and intends to use this technology to help us understand our origin and where we are going as a civilization. If the intent is to use this technology to help us communicate better with the helper/watcher ETs, it would be a goal worth pursuing. The use of non-lethal weapons is preferable to the use of weapons that kill, but we need to get to a place where weapons are altogether unnecessary.





by Steven J. Smith
from ScientificPapers Website


At what point shall we expect the approach of danger? By what means shall we fortify against it? Shall we expect some transatlantic military giant, to step the Ocean, and crush us at a blow? Never!

All the armies of Europe, Asia and Africa combined, with all the treasure of the earth in their military chest; with a Bonaparte for a commander, could not by force, take a drink from the Ohio, or make a track on the Blue Ridge, in a trial of a thousand years.

At what point then is the approach of danger to be expected? I answer, if it ever reach us, it must spring up amongst us. It cannot come from abroad. If destruction be our lot, we must ourselves be its author and finisher. As a nation of freemen, we must live through all time, or die by suicide.

Abraham Lincoln
January 27, 1838



Most people assume covert government projects are paid for with separate budget appropriations, passed by a vote of congress. They also assume that while congress may not know what the money is being used for, at least congress knows how much is being spent. Sadly, nothing could be farther from the truth. In the last 50 years, at least $40 trillion (in 2004 dollars) has been siphoned away from legitimate uses and spent on secret projects.

The diversion of public monies on a scale this vast can not be accomplished through conventional parliamentary mechanisms. It requires a coordinated effort at the very highest levels of government. It also requires a continuous flow of maladapted policies and legislation to supply the raw material. This raw material is human victims. In other words, you…

With less than 5% of the world population, America now consumes over 50% of the world’s natural resources and manufactured goods. If you’re a Japanese factory worker, or a Brazilian farmer, a Canadian cattle rancher, or a European banker. Chances are directly or indirectly, you’re working for America. The American people do not receive the fruits of your labors. Contrary to government generated statistics, the economic standard of living in America has been declining for decades.

What follows is a detailed description of the biggest theft in human history. A theft spanning half a century, and involving the diversion of wealth from an entire planet.

The master magicians:

The art of magic involves the skillful capture of attention. A magician says “watch closely while I make this rabbit disappear”. He must capture your full attention because without it, you will notice the slight-of-hand performed by his assistant, that creates the illusion of his magic. The diversion of federal government revenue into clandestine projects makes use of this same technique.

Every day on TV news programs, you see the political leaders of America engaged in a grand debate over how to make the world in general, and America in particular, a better place to live. And every few weeks another foreign dignitary makes a pilgrimage to the White House, in order to confer on momentous matters of world peace and security. These men and women are not America’s leaders, they are magicians. And you are not their constituency, you are their audience. Their proclamations are as meaningless as a magician’s pronouncement of abracadabra. They capture your attention, while their assistants pilfer your wallet, and plunder your children’s future.

Most people assume that congress and the president jointly determine how tax revenue is being spent. However, the money is actually spent by semi-autonomous bureaucratic empires, with names like Department of Defense, Department of Energy, Department of Homeland Security, Department of Housing and Urban Development (the list goes on and on)…

Each Department is managed by a secretary, nominated by the president, and approved by congress. These managers (secretaries) are the “magician’s assistants”. And they are responsible for stealing the rabbit, while your watching the magic show. As a general rule, the less public visibility a department secretary has, the more money that bureaucratic empire is diverting (stealing).

Each bureaucratic empire, guided by a magician’s assistant (the secretary), creates an annual budget that is submitted to congress and the president for review and approval. 90% of the time, approval is automatic. In other words, most of the time congress and the president don’t tell the bureaucratic empires how to spend money, just how much money to spend.

A typical department budget consists of hundreds (sometimes thousands) of individual items or programs with obscure names, and vague definitions. The diversion of American tax revenue into covert projects is accomplished piecemeal, through these budgetary items. A little bit from one item, a little more from another. No one really knows the exact amount of diversion taking place. Estimates run as high as 60% of the entire federal budget as being diverted into clandestine projects through this mechanism.

The trick behind the magic:

A short review of some department budget items will prove useful in understanding the mechanics of how the diversion is accomplished. I shall use the DOE (department of energy) proposed budget for fiscal year 2006. This document is publicly available at the DOE website.

According to the document, proposed DOE budget for 2006 is $23.4 billion dollars, and represents a decline of $475 million dollars from the 2005 budget which, and I quote: “shows DOE’s commitment to results-driven performance.” This is utter non-sense, as I shall demonstrate.

The following is a screen capture form the DOE 2006 proposed budget.

The DOE is requesting $9.4 billion dollars for something called the NNSA (national nuclear security administration). They claim this money will be used for national security activities. This is a very big number, beyond the comprehension of most people, so lets see if we can put it in perspective.

Assume the DOE pays an annual salary of $60,000 per “nuclear security worker”, then the DOE could hire an astounding 156,000 people with this money. But wait, it gets even better. The NNSA will work in partnership with the Department of Defense, and Department of Homeland Security. In other words, these other bureaucratic empires will also receive billions of dollars to pay for their end of the “partnership”.

Suppose each of the “partner empires” receives the same amount as the DOE. Combined, they could hire nearly half a million people! Since the population of America is roughly 300 million, this would translate into approximately one “nuclear security worker” for each 600 Americans.

Let’s be a bit more conservative. Assume only half of this $9.4 billion dollars is used to pay salaries (78,000 workers). Now according to government census data, the average American family is 3.86 individuals. So we have one nuclear security worker for each 996.4 American families.

But what about the “partner” bureaucratic empires? If they are included (assuming an equal work force in each empire), the number drops to roughly one nuclear security worker for each 332 American families. Do you believe that one person in each 332 families is (directly or indirectly) working on nuclear security? If not, then were did all that money go?

In all fairness, the DOE budget does break this $9.4 billion dollar figure down into smaller amounts for specific purposes. But a review of these “specific purposes” leads to the same conclusion, as the following examples illustrate.

The screen capture (below) is part of the $9.4 billion dollar NNSA budget breakdown.

The DOE proposes to spend $1.4 billion dollars on something called “Directed Stockpile Work“. And a list of “specific activities” is included with the budget item. The budget item goes on to mention “three weapons” so this item does not apply to ALL nuclear weapons, but just the warheads for three classes or types of weapons. The key issue is this budget item fails to mention how many warheads will be maintained and refurbished.

Would you buy a bottle of aspirin without knowing how many pills are in the bottle?

The DOE could maintain, refurbish, and certify just three warheads (one in each weapons class) to fulfill the terms of this budget item, and assuming they spent the extravagant sum of $100 million per warhead, that would still leave $1.1 billion tax payer dollars for diversion into clandestine schemes.

Next the DOE wants $2.1 billion dollars for “Facility Operations” and “Infrastructure Recapitalization”. Lets put this number in perspective. A 10 story apartment building with 500 luxury apartments, would cost in the neighborhood of $50 million ($100,000 per apartment). Therefore $2.1 billion would buy 42 of these apartment buildings, or 21,000 luxury apartments. This budget item also mentions “excess facilities”.

Why is DOE building new facilities, when it already has excess facilities? Why not sell these excess facilities to partially offset the cost of new facilities? The final irony is, this budget item might even be the truth, assuming the “infrastructure” is underground. (see companion paper entitled “Underground Infrastructure“)

The proposed federal budget for 2006 is in excess $2.5 trillion dollars. This is 2,500 billion dollars. Multiply the billion dollar examples above by 2,500 and you begin to understand the magnitude of diversion taking place.

This is why the master magicians work so hard to keep your attention fixated on their grand debates. And this is how the magician’s assistants have stolen your tax money and redirected it into clandestine schemes. Schemes of such stunning evil they must be shrouded in utmost secrecy.

As a side note, the DOE not only builds and maintains the American strategic weapons stockpile, but also funded the Human Genome Project.

The implications are both obvious and ominous.

Domestic revenue enhancement:

More government revenue, means more money is available for diversion into clandestine projects. A simple statement with disastrous consequences.

  • Do you ever wonder why consumer prices continue to rise?

  • Or why the border patrol can’t stop the flood of illegal immigrants?

  • Or why American jobs are being outsourced to other countries?

  • Or why America can’t supply its own energy needs?

The answer is two simple words. Revenue enhancement.

Let’s start with illegal immigration.

An illegal immigrant working in America, has taxes withheld from his or her paycheck, just like an American citizen. However, an illegal immigrant does not have a valid social security number, and therefore can not collect social security benefits, or file a valid tax return to receive a tax refund.

Since most illegal immigrants work at low paying jobs, if they could obtain a tax refund, it would nearly equal the tax they paid. So the federal government receives the tax revenue, but incurs no obligation to pay benefits or tax refunds. Assume you want to enhance (tax) revenue, then ask your self which worker is more profitable. An American citizen, or an illegal immigrant?

The CPI (consumer price index) is a measure of what goods and services cost. In other words, a measurement of inflation. Inflation is caused by an increase in the supply of money, without a corresponding increase in the supply of goods and services. Therefore if the amount of money, and the amount of goods and services were constant, the rate of inflation would be zero (the CPI would not change).

Your work creates the goods and services, and the federal government prints the money. If the federal government prints & spends more money, its revenue is enhanced, but the value of your paycheck is reduced. Assume you want to enhance revenue for diversion into covert government projects. Is inflation beneficial to this goal?

When you buy a Japanese car, where does the money you paid end up going? Sounds like a stupid question, doesn’t it? It goes to Japan, right? Wrong! The Japanese use that money to buy American government bonds.

Now consider… The federal government receives (through taxation) about 33% of an American car sale, but receives (through Japanese purchase of bonds) nearly 100% of a Japanese car sale. Assume you want to enhance (government) revenue. Is it better to have American workers building cars, or Japanese workers building cars?

Every day you see TV commercials showing how American energy companies are working hard to supply your energy needs. You see off-shore drilling platforms, and people in white lab coats staring intently at computer screens. The commercials always end with some humanizing image. A little girl, playing in a field full of wild flowers, or a house wife coming in out of the rain, and tuning on a light switch.

The implication is these companies are concerned about your welfare, and your future. This is a blatant lie. When you buy a gallon of gasoline refined from Saudi Arabian oil, where does that money end up going? Re-read the Japanese car example (above). If you want to enhance (government) revenues, which is better, American oil, or Saudi oil? Don’t blame the Arabs for high energy prices. They’re just helping the American government enhance its revenues.

Each of the four revenue enhancement techniques outlined above, requires as its precursor, maladapted government policies and legislation. Otherwise free market forces would quickly counteract the imbalance. The American government’s voracious appetite for revenue enhancement to finance its covert projects, is the true motivation behind the magic mantra of “free trade”.

Attention! Foreign Holders of American Government Notes and Bonds.

Do you honesty believe a country that produces less tangible value with each passing year, will ever repay this debt? I advise you to ponder this question long and hard, before purchasing bonds with 30 year maturities.

One additional technique for revenue enhancement is deserving of mention. The struggle against some perceived evil or threat has always been successful in persuading the American people to willingly tolerate greater tax burdens. In the past, communism served this goal admirably. Today it’s the threat of global terrorism.

However recent public opinion polls indicate that another attack on America may be required to revive the fading public hunger for:

“Another triumph of American righteous might over the evil forces of tyranny, no matter what it costs!”.

I leave you with this final observation. Since WWII, every conflict has been halted before victory was achieved. Perhaps the master magicians are worried they will run out of villains to use against the American tax payer, in their never ending quest for revenue enhancement…


Vote for Democrats because they’re looking out for the little guy. Vote for Republicans because they’re pro-business. But what ever you do, be sure to vote!

Suppose you saw the following help wanted ad in your local newspaper.


Wanted: Energetic person with good acting and communication skills. Must enjoy making speeches, shaking hands and kissing babies. No experience required, you will work from prepared scripts. Employment length, 4 years with possible 4 year extension. Salary: $400,000 per year. Non-refundable job application fee: $100,000,000


Would you apply for this job?

Yet this is the help wanted ad every presidential candidate answers. Do you believe those who contribute to political campaigns have patriotic ideals and altruistic motives? If someone contributes $10,000 to a political campaign, they expect at least 10 times that amount in return. After all, this is a risky investment. The “job applicant” might not get selected – oops I mean elected.

So once (s)elected, the president owes at least $1 billion dollars in what are euphemistically known as “political favors”. Where will he (or she) obtain that money (see 1.5.2 & 1.5.3 above). The “application fee” for congress, while smaller is still paid in the same manner.

Lets do some math and see if we can get a rough estimate of what your vote is costing you.




Application Fee


1 President $100 million $100 million
100 Senator $15 million $1.5 billion
435 Representative $5 million $2.175 billion
Total application fees $3.775 billion
Political favors owed (at 10:1 payback) $37.75 billion
Cost per voter (100 million voters) $377.50


Under federal law it’s illegal for you to sell your vote, but buying your vote is obviously BIG business!

Every magician (politician) knows exactly what you want, and has a detailed plan to make it happen. All you have to do is vote for him (or her) and the magician will appoint a blue ribbon commission to investigate the issue, which after lengthy deliberations, will make its recommendations.

The magician will say the magic word “abracadabra”, create a new bureaucratic empire (or modify an existing one), and everything will be fixed. If you hired a plumber to fix a leak, and when he was finished the leak was worse, you would not pay him. If a doctor performed an operation, and after he finished you were blind in one eye, paralyzed from the waist down, and suffering from hallucinations, your have the right to sue that doctor for malpractice.

Unfortunately, the master magicians do not work for you. They work for those who made their (s)election possible. All your get is a bill for the magic show, and you have no legal right to refuse payment. The real purpose for casting your ballot is to shift responsibility from those who are stealing, to those who are victimized. In other words, your vote is the magician’s license to commit larceny.

The choice you make on election day is an illusion. The difference between Democrats and Republicans is preference, not substance. Like the difference between card tricks and animal tricks. In that sense, there are no Democrats or Republicans.

Only Demo-Publican magicians

Regime adjustment (foreign revenue enhancement):

In the introduction I touched upon the topic of foreign subjugation. This section will bring that subject into sharp focus. As elsewhere, it is the unquenchable appetite of the American government for ever greater revenue, that motivates the plundering of other sovereign nations.

When an American master magician uses the phrase “regime change”, most people understand this means the over throw of a foreign government, and installation of a new government, sympathetic to American ambitions. However, regime change is actually the option of last resort.

The magicians prefer to use less blatant methods of coercion collectively known as “regime adjustment”. Many of these techniques have the common characteristic of appearing to be guided by desirable (often benevolent) goals, while simultaneously producing a hidden and very sinister result. In other words, these techniques capture attention, diverting it away from the real consequences, and therefore are nothing more than another class of magic tricks.

These tricks fall into four broad categories.

Political tricks:

The American master magicians are always extolling the virtues of democracy. They desire that people in every nation receive the same benefits bestowed upon American citizens. A population that believes it is master of its own fate is more easily manipulated. Furthermore as its social fabric unravels and its standard of living declines, a democracy is more likely to blame it self (self directed guilt), than to blame outside influences (externally directed anger).

One of the greatest achievements of the American master magicians is the nearly universal belief in representational democracy.

The range of options available to the master magicians for manipulating democratic governments and elections is truly spectacular. Remember that America has been a democracy longer than any other nation on earth, and therefore its master magicians have a vast pool of experience at rigging elections and coercing democratic governments.

What follows is a small sampling of the more commonly used options.

  1. Covert financing of an opposition candidate is always the first choice.

  2. Use of advanced American surveillance technology to uncover embarrassing information on a candidate or politician is also a favorite tactic.

  3. The dissemination of rumors and lies designed to discredit a candidate or politician is obviously useful (CIA & NSA have entire sections dedicated to this art).

  4. Creating political opposition pressure groups to intimidate an obstinate government has worked well in the past.

  5. Arranging an unsuccessful assassination attempt, will raise a candidate or politician’s popularity. Especially if the assassin is a member of some group that is despised by the general population.

  6. Of course real political assassination is best accomplished by arranging a fatal accident.

As a final note, the American movie entitled “Wag the Dog” is a very good exposé on the skillful use of media for political manipulation.

Financial tricks:

The American dollar is the de-facto currency of international trade. For this reason, the central banks of many nations hold the majority of their reserves in dollars or American government bonds. This allows the American magicians to exercise enormous leverage over these foreign central banks. With little more than a few key strokes on a computer keyboard, the American central bank (known as
the Federal Reserve, or just “FED”) can reduce the value of dollars and bonds held in a foreign central bank by any arbitrary amount.

This is possible because physical currency and bonds no longer move from nation to nation. Instead a method known as EFT (electronic funds transfer) is used, and what “moves” is nothing more than numbers in a computer memory.

For those nations that have chosen to hold their central bank reserves in other currencies (or precious metals), a physical trade embargo can be used. Enforced with American military power (if needed).

A particularly vicious trick, especially useful on poor nations, is American humanitarian aid. Suppose America gives 100,000 tons of free grain to a nation like Ethiopia. What happens to the farmers in Ethiopia? They are driven out of business because they can’t compete with free American grain, thereby destroying domestic Ethiopian food production.

Before American “humanitarian aid”, 10% of the people were starving. After American “humanitarian aid”, 100% of the people will starve. Of course the American master magicians will be happy to supply more humanitarian aid, providing the Ethiopian government will make some minor adjustments in its policies…

Military tricks:

When you mention the American military, the vision that most people have is of smart bombs, cruise missiles, and attack helicopters. Yet these weapons are reserved as a last resort, when all else fails. Less well known are the American military special forces, and exotic weapons systems. These weapons and personnel are used in clandestine intervention operations. And if used properly, leave no evidence directly traceable back to America.

Some examples follow.

  • An EMP (electro-magnetic pulse) bomb can be used to disrupt a national communications network or power grid at a critical moment. During a key political speech or rally for instance.

  • A special forces team can be deployed to blow up a factory or laboratory and make it look like the opposition political party is responsible.

  • An influenza epidemic can be triggered by aerosol dispersion over a city, using a stealth aircraft. Useful when low voter turnout favors one candidate over another, or when an anti-American demonstration is planed.

Another regime adjustment technique involves military equipment rather than military intervention. A nation that resists American hegemony, may find its neighbors are recipients of advanced military equipment, courtesy of the American master magicians.

This tactic is generally performed in three stages, thereby giving the uncooperative nation an opportunity to reconsider the wisdom of their behavior.

  1. The magician’s assistant in charge of the Department of State (American ministry of foreign affairs) makes a public proclamation that nation X needs new military equipment for self defense.

  2. The master magicians hold a public debate over the advisability of supplying nation X with this military equipment.

  3. The military equipment is sold to nation X on very favorable financial terms. And the Department of Defense trains nation X solders in its use.

Finally as Saddam Hussein and Manuel Noriega discovered, if regime adjustment fails, there is always forced regime change, carried out at the point of American military guns…

The trick of disaster:

During the last 15 years, America’s master magicians have acquired a whole new class of secret persuasion techniques for use against an unsuspecting world. These techniques involve the
intentional generation of what appear to be natural disasters.

They range from relatively mild calamities such as drought induced crop failures, to moderate disasters such as wild fires, to severe devastation such as killer earthquakes. These tactics are generally used (so far) as adjuncts to the more traditional methods of regime adjustment (outlined above).

Some examples follow.

  1. A crop failure (engineered drought) provides the perfect pretext for humanitarian aid.

  2. A hurricane can be steered at a population center to make a point during trade negotiations, then steered away after a successful conclusion.

  3. Wild fires can be used to destroy a timber resource, thereby making a nation less self sufficient, and more dependent international trade.

  4. Earthquakes can be used as a pretext for American military intervention to restore order and provide humanitarian aid (while simultaneously mapping natural resources for later plunder).

  5. A flood can be used to destroy dams and bridges, which will require American aid (loans & advisors) to rebuild. Of course these loans will have to be paid back with interest.

Weather engineering is also useful as an adjunct to military operations. During operation Iraqi Freedom prior to the final assault on Baghdad, a sand storm with winds blowing from the south provided cover for American military units as they rested and re-supplied. AND it also guaranteed that any poison gas used by Iraqi military units would be blown back over territory still held by Iraq forces.

Several companion papers provide details on the science and technology behind un-natural (engineered) disasters.


The American government and its master magicians have perverted democracy and free enterprise, turning them into instruments of tyranny and slavery. They have performed this seeming feat of magic by capturing your attention with their rhetoric, while their assistants (accomplices) pulled off the biggest theft in recorded history.

The picture I paint is a grim one.

An entire world, endlessly working to provide an ever greater source of wealth for diversion into clandestine schemes that benefit no one except the magicians and the power elite who make their (s)election possible. It may seem their hold over your lives is unassailable. However, if this were true the magicians would not labor so hard at deceiving you. By your work, you produce the wealth they steal. They need you. You do not need them. They have known this fact all along. Now you know it as well.

I can not offer any easy solutions. Under current America law, even discussing political change can be construed as conspiracy to commit terrorism. Just by exposing the “magic show”, I have no doubt made my self a target for further government harassment or possibly worse. Yet a solution must be found, otherwise you and your children will endure the cruelest trick of all.

Perpetual human slavery, at the hands of America’s master magicians.


But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.

From the Declaration of Independence – July 4, 1776


by Bill Sweetman

Jane’s Information Group 2000
Posted: 5 January 2000


On 8 January last year, around 6.45pm, residents of Delaware in the US were startled by a sonic boom, strong enough to shake walls, rattle windows and cause the citizens to call their local police offices, demanding explanations. This particular speeder, however, could not only outrun any highway-patrol cruiser in Delaware, but was beyond the reach of anyone else in the state. Even the US Air Force, with its surveillance radars at Dover Air Force Base, was unable to identify the miscreant.

The incident was not isolated. A rudimentary data search turns up a stream of such incidents since the early 1990s, from Florida to Nebraska, Colorado and California, with a similar pattern: a loud and inexplicable boom. The phantom boomers appear to avoid densely populated areas, and the stories usually go no further than the local paper. Only a few local papers have a searchable website, so it is highly probable that only a minority of boom events are reported outside the affected area.

The first conclusion from this data is that supersonic aircraft are operating over US. Secondly, we may conclude that the USAF and other services either cannot identify them, or that they are misleading the public because the operations are secret.

The latter case is supported by the existence of a massive secret structure, which can truly be described as a ‘shadow military‘, and which exists in parallel with the programs that the Department of Defense (DoD) discloses in public. It is protected by a security system of great complexity. Since 1995, two high-level commissions have reported on this system, and have concluded that it is too complex; that it is immensely expensive, although its exact costs defy measurement; that it includes systematic efforts to confuse and disinform the public; and that in some cases it favors security over military utility. The defense department, however, firmly resists any attempt to reform this system.

As the Clinton administration begins its last year in office, it continues to spend an unprecedented proportion of the Pentagon budget on ‘black’ programs – that is, projects that are so highly classified they cannot be identified in public. The total sums involved are relatively easy to calculate. In the unclassified version of the Pentagon‘s budget books, some budget lines are identified only by codenames. Other classified programs are covered by vague collective descriptions, and the dollar numbers for those line items are deleted. However, it is possible to estimate the total value of those items by subtracting the unclassified items from the category total.

In Financial Year 2001 (FY01), the USAF plans to spend US$4.96 billion on classified research and development programs. Because white-world R&D is being cut back, this figure is planned to reach a record 39% of total USAF R&D. It is larger than the entire army R&D budget and two-thirds the size of the entire navy R&D budget. The USAF‘s US$7.4 billion budget for classified procurement is more than a third of the service’s total budget.

Rise and rise of SAP

Formally, black projects within the DoD are known as unacknowledged Special Access Programs (SAPs). The Secretary or Deputy Secretary of Defense must approve any DoD-related SAP at the top level of the defense department. All SAPs are projects that the DoD leadership has decided cannot be adequately protected by normal classification measures. SAPs implement a positive system of security control in which only selected individuals have access to critical information. The criteria for access to an SAP vary, and the program manager has ultimate responsibility for the access rules, but the limits are generally much tighter than those imposed by normal need-to-know standards.

For example, a SAP manager may insist on lie-detector testing for anyone who has access to the program. Another key difference between SAPs and normal programs concerns management and oversight. SAPs report to the services, and ultimately to the DoD and Congress, by special channels which involve a minimum number of individuals and organizations. In particular, the number of people with access to multiple SAPs is rigorously limited.

In 1997, according to the report of a Senate commission (the Senate Commission on Protecting and Reducing Government Secrecy), there were around 150 DoD-approved SAPs. These included SAPs initiated by the department and its branches and those initiated by other agencies (for example, the Central Intelligence Agency [CIA] or the Department of Energy [DOE]) in which the DoD was involved. SAPs are divided into three basic types:

  • acquisition (AQ-SAP)

  • operations and support (OS-SAP)

  • intelligence (IN-SAP)

Within each group are two major classes – acknowledged and unacknowledged.

Some of the acknowledged SAPs – most of them – started as unacknowledged programs. This is the case with the F-117 and B-2, and (on the operations side) with army’s 160th Special Operations Air Regiment (SOAR). The existence of these programs is no longer a secret, but technical and operational details are subject to strict, program-specific access rules.

An unacknowledged SAP – a black program – is a program which is considered so sensitive that the fact of its existence is a ‘core secret‘, defined in USAF regulations as “any item, progress, strategy or element of information, the compromise of which would result in unrecoverable failure“. In other words, revealing the existence of a black program would undermine its military value.

The Joint Security Commission which was convened by then deputy Secretary of Defense Bill Perry in 1993, and which reported in 1995, concluded that SAPs had been used extensively in the 1980s “as confidence in the traditional classification system declined”. By the time the report was published, however, the DoD had taken steps to rationalize the process by which SAPs were created and overseen. Until 1994, each service had its own SAP office or directorate, which had primary responsibility for its programs. The Perry reforms downgraded these offices and assigned management of the SAPs to a new organization at defense department level. This is based on three directors of special programs, each of whom is responsible for one of the three groups of SAPsacquisition, operations and intelligence. They report to the respective under-secretaries of defense (acquisition and technology, policy and C4ISR).

The near-US$5 billion in black programs in the USAF research and development budget are in the acquisition category. They are overseen within the DoD by Maj Gen Marshal H Ward, who is director of special programs in the office of Dr Jacques Gansler, under-secretary of defense for acquisition, technology and logistics. Gen Ward heads an SAP Coordination Office and, along with his counterparts in the policy and C4ISR offices, is part of an SAP Oversight Committee (SAPOC), chaired by the Deputy Secretary of Defense, John Hamre, with Dr Gansler as vice-chair. The SAPOC is responsible for approving new SAPs and changing their status; receiving reports on their status; and, among other things, making sure that SAPs do not overlap with each other. This was a major criticism in the 1995 report: “If an acquisition SAP is unacknowledged,” the commissioners remarked, “others working in the same technology area may be unaware that another agency is developing a program. The government may pay several times over for the same technology or application developed under different special programs.”

This problem was particularly prevalent in the case of stealth technology: in the lawsuit over the A-12 Avenger II program, McDonnell Douglas and General Dynamics charged that technology developed in other stealth programs would have solved some of the problems that led to the project’s cancellation, but that the government did not supply it to the A-12 program. Today, Gen Ward is the DoD-wide overseer for all stealth technology programs. The SAPOC co-ordinates the reporting of SAPs to Congress. Whether SAPs are acknowledged or not, they normally report to four Congressional committees:

  • the House National Security Committee

  • the Senate Armed Services Committee

  • the defense subcommittees of the House and Senate Appropriations committees

Committee members and staffs are briefed in closed, classified sessions.

However, there are several serious limitations to Congressional reporting of SAPs. One of these is time. In the first quarter of 1999, the defense subcommittee of the House Appropriations committee scheduled half a day of hearings to review 150 very diverse SAPs. Another issue, related to time and security, is that the reporting requirements for SAPs are rudimentary and could technically be satisfied in a couple of pages.

A more substantial limitation on oversight is that some unacknowledged SAPs are not reported to the full committees. At the Secretary of Defense’s discretion, the reporting requirements may be waived. In this case, only eight individuals – the chair and ranking minority member of each of the four defense committees – are notified of the decision. According to the 1997 Senate Commission, this notification may be only oral. These “waived SAPsare the blackest of black programs.

How many of the SAPs are unacknowledged, and how many are waived, is a question which only a few people can answer:

  • eight members of Congress

  • the members of SAPOC (including the Deputy Secretary of Defense)

  • the Secretary of Defense

A final question is whether SAP reporting rules are followed all the time. Last summer, the House Defense Appropriations Committee complained that “the air force acquisition community continues to ignore and violate a wide range of appropriations practices and acquisition rules”. One of the alleged infractions was the launch of an SAP without Congressional notification. In their day-to-day operations, SAPs enjoy a special status. An SAP manager has wide latitude in granting or refusing access, and because their principal reporting channel is to the appropriate DoD-level director of special programs. Each service maintains an SAP Central Office within the office of the service secretary, but its role is administrative – its primary task is to support SAP requests by individual program offices – and its director is not a senior officer.

Within the USAF, there are signs that SAPs form a ‘shadow department‘ alongside the white-world programs. So far, no USAF special program director has gone on to command USAF Materiel Command (AFMC), AFMC’s Aeronautical Systems Center (ASC), or their predecessor organizations. These positions have been dominated by white-world logistics experts. On the other hand, several of the vice-commanders in these organizations in the 1990s have previously held SAP oversight assignments, pointing to an informal convention under which the vice-commander, out of the public eye, deals with highly sensitive programs. The separation of white and black programs is further emphasized by arrangements known as ‘carve-outs’, which remove classified programs from oversight by defense-wide security and contract-oversight organizations.

Cover mechanisms

A similar parallel organization can be seen in the organization of the USAF’s flight-test activities. The USAF Flight Test Center (AFFTC) has a main location at Edwards AFB, which supports most USAF flight-test programs. Some classified programs are carried out at Edwards’ North Base, but the most secure and sensitive programs are the responsibility of an AFFTC detachment based at the secret flight-test base on the edge of the dry Groom Lake, Nevada, and known as Area 51. The USAF still refuses to identify the Area 51 base, referring to it only as an ‘operating location near Groom Lake‘. It is protected from any further disclosure by an annually renewed Presidential order (see Map).

Area 51‘s linkage to Edwards is a form of ‘cover’ – actions and statements which are intended to conceal the existence of a black program by creating a false impression in public. The 1995 Commission report concluded that cover was being over-used. While conceding that cover might be required for “potentially life-threatening, high-risk, covert operations”, the report stated baldly that “these techniques also have increasingly been used for major acquisition and technology-based contracts to conceal the fact of the existence of a facility or activity”. The report added that “one military service routinely uses cover mechanisms for its acquisition [SAPs], without regard to individual threat or need”.

Cover mechanisms used by the DoD have included the original identification of the U-2 spyplane as a weather-research aircraft and the concealment of the CIA‘s Lockheed A-12 spyplane behind its acknowledged cousins, the YF-12 and SR-71. Another example of cover is the way in which people who work at Area 51 are nominally assigned to government or contractor organizations in the Las Vegas area, and commute to the base in unmarked aircraft.

After the first wave of ‘skyquake‘ incidents hit Southern California in 1991­92, and preliminary results from US Geological Service seismologists suggested that they were caused by overflights of high-speed aircraft, the USAF’s Lincoln Laboratory analyzed the signatures from one boom event and concluded that it was caused by navy fighter operations offshore. The confirmed DoD use of cover makes it impossible to tell whether the USAF report is genuine or a cover story. The fact that cover is extensively used to protect black programs adds weight to the theory that some white-world projects may, in fact, be intended as cover. One example is the X-30 National Aerospaceplane (NASP) project, which was launched in 1986, cut back in 1992 and terminated in 1994. In retrospect, the stated goal of NASP – to develop a single-stage-to-orbit vehicle based on air-breathing scramjet technology – seems ambitious and unrealistic.

Considered as a cover for a black-world hypersonic program, however, NASP was ideal. NASP provided a credible reason for developing new technologies – such as high-temperature materials and slush hydrogen – building and improving large test facilities, and even setting up production facilities for some materials. These activities would have been hard to conceal directly, and would have pointed directly to a classified hypersonic program without a cover story.

Vanishing project syndrome

Intentional cover is supported by two mechanisms, inherent in the structure of unacknowledged SAPs, that result in the dissemination of plausible but false data, or disinformation. Confronted with the unauthorized use of a program name or a specific question, an ‘accessed’ individual may deny all knowledge of a program – as he should, because its existence is a core secret, and a mere “no comment” is tantamount to confirmation. The questioner – who may not be aware that an accessed individual must respond with a denial – will believe that denial and spread it further.

Also, people may honestly believe that there are no black programs in their area of responsibility. For example, Gen George Sylvester, commander of Aeronautical Systems Division in 1977, was not ‘accessed’ into the ASD-managed Have Blue stealth program, even though he was nominally responsible for all USAF aircraft programs. Had he been asked whether Have Blue existed, he could have candidly and honestly denied it. Presented with a wall of denial, and with no way to tell the difference between deliberate and fortuitous disinformation, most of the media has abandoned any serious attempts to investigate classified programs.

The process of establishing an SAP is, logically, covert. To make the process faster and quieter, the DoD may authorize a Prospective SAP (P-SAP) before the program is formally reviewed and funded: the P-SAP may continue for up to six months. The P-SAP may account for the ‘vanishing project syndrome‘ in which a promising project simply disappears off the scope. Possible examples include the ultra-short take-off and landing Advanced Tactical Transport, mooted in the late 1980s; and the A/F-X long-range stealth attack aircraft, ostensibly cancelled in 1993.

A further defense against disclosure is provided by a multi-level nomenclature system. All DoD SAPs have an unclassified nickname, which is a combination of two unclassified words such as Have Blue or Rivet Joint.

  • Have, Senior and Constant are frequently used as the first word in Air Force programs

  • Tractor in the army

  • Chalk in the navy

Even in a program that has a standard designation, the SAP nickname may be used on badges and secured rooms to control access to information and physical facilities.

A DoD SAP may also have a one-word classified codename. In this case, full access to the project is controlled by the classified codename. The two-word nickname, in this case, simply indicates that a program exists, for budgetary, logistics or contractual purposes. The purpose, mission and technology of the project are known only to those who have been briefed at the codename level. Therefore, for example, Senior Citizen and Aurora could be one and the same.

Both the 1995 and 1997 panels recommended substantial changes to the classification system, starting with simplification and rationalization. SAPs are not the only category of classification outside the normal confidential/ secret/top secret system:

  • the intelligence community classifies much of its product as Sensitive Compartmented Information (SCI)
  • the Department of Energy uses Restricted Data (RD) and Critical Nuclear Weapons Design Information (CNWDI).

The panels called for a simplified system that would encompass SAPs, SCI and the DoE standards. Both commissions also accused the DoD and other agencies of protecting too much material within special access boundaries, and doing so in an inconsistent manner. As the 1995 report put it:

“Perhaps the greatest weakness in the entire system is that critical specially protected information within the various compartments is not clearly identified.”

One general told the commission that an SAP was like

“trying to protect every blade of grass on a baseball field. He had to have a hundred players to guard the entire field, when only four persons to protect home plate would suffice.”

Different services used different standards to determine how and when to establish SAPs, according to the 1995 commission. In one case, two services and the DoE were running concurrent programs with the same technology. One military service classified its program as Top Secret Special Access and protected it with armed guards. The other military service classified its program as Secret Special Access with little more than tight need-to-know protection applied. The DoE classified its program as Secret, adopting discretionary need-to-know procedures. “This problem is not uncommon”, the report remarked.

The commission gave up on efforts to measure the direct costs of security, saying that “no one has a good handle on what security really costs”. Direct costs, the commission estimated, ranged from 1% to 3% of total operating costs in an acknowledged SAP, and from 3% to 10% on a black project, although one SAP program manager estimated security costs could be as high as 40% of total operating costs. The commission found that there was no way to estimate the indirect costs of security, such as the lost opportunities to rationalize programs.

The 1995 commission also pointed out that the military utility of a breakthrough technology is limited if commanders do not know how to use it. A senior officer on the Joint Staff remarked that

“we still treat certain capabilities as pearls too precious to wear – we acknowledge their value, but because of their value, we lock them up and don’t use them for fear of losing them”.

The report implied that the SAP world keeps field commanders in the dark until the systems are ready for use and even then,

“they are put under such tight constraints that they are unable to use [SAP products] in any practical way”.


Risk management

Both the DoD’s own commission and the later Senate commission pushed for a simpler system, with more consistent rules, and based on the principle of risk management: that is, focusing security efforts to protect the information that is most likely to be targeted and would be most damaging if compromised.

Since 1995, the US Government has declassified some programs. Northrop’s Tacit Blue, a prototype for a battlefield surveillance aircraft, was unveiled in 1996, but it had made its last flight in 1985 and had not led to an operational aircraft. The USAF publicly announced the acquisition of MiG-29s from Moldova in 1998 – however, the previous history of the 4477th Test and Evaluation Squadron, which has flown Soviet combat aircraft from Area 51 since the 1970s, remains classified.

Some recent programs appear to combine an unclassified and a SAP element. One example is the Boeing X-36 unmanned test aircraft. The X-36 itself was disclosed in March 1996, when it was nearly complete: at the time, it was a McDonnell Douglas project, and it clearly resembled the company’s proposed Joint Strike Fighter design. However, it was also a subscale test vehicle for an agile, very-low-observables combat aircraft, incorporating a still-classified thrust vectoring system with an externally fixed nozzle. The nozzle itself remains classified, and it is likely that a full-scale radar cross-section model of the design was also built under a secret program.

Another hybrid is the USAF’s Space Maneuver Vehicle (SMV), originated by Rockwell but a Boeing project. This appears to have been black before 1997, with the designation X-40. (The USAF has reserved the designations X-39 to X-42 for a variety of programs.) A subscale, low-speed test vehicle was revealed in that year; it was described as the Miniature Spaceplane Technology (MiST) demonstrator and was designated X-40A, a suffix that usually indicates the second derivative of an X-aircraft. Late last year, Boeing was selected to develop a larger SMV test vehicle under NASA‘s Future-X program – this effort is unclassified, and is designated X-37. The question is whether the USAF is still quietly working on a full-scale X-40 to explore some of the SMV’s military applications, including space control and reconnaissance.

Another indication of greater openness is the fact that the three reconnaissance unmanned air vehicle (UAV) programs launched in 1994­95 – the Predator, DarkStar and Global Hawk – were unclassified. The General Atomics Gnat 750, which preceded the Predator, was placed in service under a CIA black program, and the DarkStar and Global Hawk, between them, were designed as a substitute for a very large, long-endurance stealth reconnaissance UAV developed by Boeing and Lockheed and cancelled in 1993. However, the budget numbers indicate that unacknowledged SAPs are very much alive. Neither has the DoD taken any drastic steps to rationalize the security system. Recent revelations over the loss of data from DoE laboratories have placed both Congress and Administration in a defensive posture, and early reform is unlikely.

A telling indication of the state of declassification, however, was the release in 1998 of the CIA‘s official history of the U-2 program. It is censored to remove any mention of the location of the program. However, an earlier account of the U-2 program, prepared with the full co-operation of Lockheed and screened for security, includes a photo of the Area 51 ramp area. It shows hangars that can still be located on overhead and ground-to-ground shots of the base, together with terrain that can be correlated with ridgelines in the Groom Lake area.

However, the DoD has opposed legislation – along the lines of the 1997 Senate report – that would simplify the current system and create an independent authority to govern declassification.

In the summer of 1999, Deputy Defense Secretary John Hamre said that the DoD was opposed to the entire concept of writing all security policies into law, because it would make the system less flexible. The DoD is also against the idea of a “balance of public interest” test for classification. Another major concern was that an independent oversight office would be cognizant of all SAPs.

Mark, director for defense research and engineering, defended the current level of SAP activity in his confirmation hearing in June 1998. SAPs, Mark said, “enable the DoD to accomplish very sensitive, high payoff acquisition, intelligence, and operational activities”. Without them, he said, “many of these activities would not be possible, and the effectiveness of the operational forces would be reduced as a result. I am convinced that special access controls are critical to the success of such highly sensitive activities.”

Industry’s role

Not only have SAPs held their ground, but their philosophy has also spread to other programs and agencies. NASA‘s ‘faster, better, cheaper’ approach to technology demonstration and space exploration has been brought to the agency by its administrator, Dan Goldin, who was previously involved with SAPs with TRW. The Advanced Concept Technology Demonstration (ACTD) programs conducted by the Defense Advanced Research Projects Agency (DARPA) are also based on similar principles to SAPs. In some cases – such as Frontier Systems’ A160 long-endurance helicopter demonstrator – DARPA contractors are providing effective security outside a formal SAP framework.

SAPs are visible in the prosperity of special-program organizations within industry. Boeing’s Phantom Works, founded in 1992 on the basis of existing black program work at McDonnell Douglas but with an added emphasis on low-cost prototyping, has been expanded by the new Boeing to include facilities and people at Palmdale and Seattle. While the headquarters of the Phantom Works is being moved to Seattle, this move directly affects only a small staff, and the St Louis operation still appears to be active. Its main white-world program has been the construction of the forward fuselages of the X-32 prototypes, but this only occupies one of many secure hangar bays. The X-32 prototypes are being assembled at Palmdale, in a hangar divided by a high curtain. Another test vehicle is being assembled in the same hangar, behind a high curtain, and background music plays constantly to drown out any telltale conversations.

In the early 1980s, Boeing expanded its military-aircraft activities and built large new facilities – including an engineering building and indoor RCS range at Boeing Field – which were specifically designed to support SAPs, with numerous, physically separate ‘vaults’ to isolate secure programs from each other. Boeing’s black-projects team at Seattle is considered to be one of the best in the industry.

Lockheed Martin’s Skunk Works has changed in character since the 1970s. The original Advanced Development Projects (ADP) unit was built around a core group of engineering leaders, who would tap people and resources from the ‘white-world’ Lockheed-California company when they were needed. In the 1980s, the Skunk Works grew in size and importance, while Lockheed-California diminished. Today, the Skunk Works is a large, stand-alone organization with 4,000-plus employees. As far as the world knows, its output in the past 10 years comprises two YF-22 prototypes, parts of two DarkStar prototypes, the X-33 RLV and the two X-35 JSF demonstrators.

In mid-1999, Lockheed Martin disclosed that a new advanced-technology organization had been set up within the Skunk Works, headed by veteran engineer Ed Glasgow, to explore the potential or revolutionary technologies. In the unclassified realm, these include a hybrid heavy-lift vehicle combining lighter-than-air and aerodynamic principles, and a supersonic-cruise vehicle with design features that virtually eliminate a sonic boom signature on the ground.

The Skunk Works’ renown has overshadowed another Lockheed Martin organization with a long-standing connection with SAPs, located within Lockheed Martin Tactical Aircraft Systems (LMTAS) at Fort Worth. This group has existed since the late 1950s, when General Dynamics sought special-programs work to keep its engineering workforce together between major projects. Notable projects include Kingfish, which was the ramjet-powered rival to Lockheed’s A-12 Blackbird and continued in development into the early 1960s, and the RB-57F, a drastically modified Canberra designed for high-altitude reconnaissance missions.

Big safari

More recently, the group worked on early stealth concepts – including the design which led to the Navy’s A-12 Avenger II attack aircraft – and has modified transport-type aircraft for sensitive reconnaissance missions under the USAF’s Big Safari program.

Northrop Grumman‘s major involvement in manned-aircraft SAPs may be winding down as the Pico Rivera plant – which housed the B-2 program – is closed down and its workforce disperses. However, the company’s acquisitions in 1999, including Teledyne Ryan Aeronautical (TRA) and California Microwave, indicate that it will remain a force in UAV programs, including SAPs. TRA has a long association with SAPs and SAP-like programs, dating back to Vietnam-era reconnaissance UAVs and the AQM-91 Firefly high-altitude, low-observable reconnaissance drone tested in the early 1970s.

Raytheon has acquired important SAP operations through acquisitions. The former Hughes missile operation was presumably involved in the classified air-breathing AMRAAM variant that was apparently used in Operation ‘Desert Storm’, and in subsequent extended-range air-to-air missile programs. Texas Instruments developed the ASQ-213 HARM Targeting System pod under a black program between 1991 and 1993, when it was unveiled. (HTS was a classic example of a ‘vanishing’ program: briefly mentioned in early 1990, it turned black shortly afterwards.) The former E-Systems has been heavily involved in intelligence programs since its formation.

Next stealth

One likely strategic goal of current SAPs is the pursuit of what one senior engineer calls “the next stealth” – breakthrough technologies that provide a significant military advantage. Examples could include high-speed technology – permitting reconnaissance and strike aircraft to cruise above M4­5 – and visual and acoustic stealth measures, which could re-open the airspace below 15,000ft (4,600m) to manned and unmanned aircraft.

The existence of high-supersonic aircraft projects has been inferred from sighting reports, the repeated, unexplained sonic booms over the US and elsewhere, the abrupt retirement of the SR-71 and from the focus of white-world programs, such as NASP and follow-on research efforts such as the USAFs HyTech program. The latter have consistently been aimed at gathering data on speeds in the true hypersonic realm – well above M6, where subsonic-combustion ramjets give way to supersonic-combustion ramjets (scramjets) – implying that speeds from M3 to M6 present no major unsolved challenges.

One researcher in high-speed technology has confirmed to IDR that he has seen what appear to be photographs of an unidentified high-speed aircraft, obtained by a US publication. In a recent sighting at Area 51, a group of observers claim to have seen a highly blended slender-delta aircraft which closely resembles the aircraft seen over the North Sea in August 1999. Visual stealth measures were part of the original Have Blue program, and one prototype was to have been fitted with a counter-illumination system to reduce its detectability against a brightly lit sky. However, both prototypes were lost before either could be fitted with such a system. More recent work has focused on electrochromic materials – flat panels which can change color or tint when subjected to an electrical charge – and Lockheed Martin Skunk Works is known to have co-operated with the DoE’s Lawrence Berkeley Laboratory on such materials.

Yet, the plain fact is that the public and the defense community at large have little idea of what has been achieved in unacknowledged SAPs since the early 1980s. Tacit Blue, the most recently declassified product of the black-aircraft world, actually traces its roots to the Ford Administration. If nothing else, the dearth of hard information since that time, shows that the SAP system – expensive, unwieldy and sometimes irrational as it might seem – keeps its secrets well. Whatever rattled the dinner tables of Delaware a year ago may remain in the shadows for many years.

‘The government may pay several times over for the same technology or application developed under different special programs’

‘Presented with a wall of denial, most of the media has abandoned any serious attempts to investigate classified programs’

  • In the late 1980s, this large hangar ­ with an uninterrupted opening around 60m wide and over 20m high ­ was constructed at Area 51, the USAF’s secret flight test center at Groom Lake, Nevada. The project that it was built to house remains secret. (click right image to enlarge)
  • The threat of armed force is used routinely to protect classified programs. Area 51 is defended by a force of armed security personnel who work for a civilian contractor and by helicopter patrols, and the eastern border of the site is ringed with electronic sensors. (click left image to enlarge)
  • Northrop’s Tacit Blue, an experimental low-observable aircraft designed to carry a Hughes battlefield-surveillance radar, was tested at Area 51 in 1982-85 and unveiled in 1996. Although the program originated under the Ford Administration, it is the most recent classified manned-aircraft program to have been disclosed.
  • The Boeing X-36 unmanned prototype started as a Special Access Program and was partly declassified in 1996 so that McDonnell Douglas could use its technology in its Joint Strike Fighter proposal. Some aspects of its design ­ including its use of stealth technology and its thrust-vectoring exhaust ­ remain classified.
  • Shoulder patch from the 4477th Test and Evaluation Squadron (TES), the covert USAF unit which has tested numerous Soviet aircraft at Area 51.
  • Boeing‘s X-37 spaceplane, being developed for NASA, was originally designed by Rockwell and supported by the USAF as a special access program. The designation X-40 applies to its military variants.
  • The now-cancelled Lockheed Martin/ Boeing DarkStar may have been a scaled-down version of a large, long-endurance stealth reconnaissance UAV which was cancelled in 1993 after at least $1 billion had been spent on its development.
  • The Lockheed YF-12C reconnaissance aircraft was disclosed before its first flight, but its testing and operation was used to mask the existence of its covert precursor, the CIA’s A-12. The latter was not disclosed until 1982, 14 years after its retirement.
  • The Soviet Union was presumably aware of the location of Area 51 by the early 1960s, when its first reconnaissance satellites began to survey the United States. However, the Pentagon continues to avoid acknowledging its existence. (click right image to enlarge)

by Steven J. Smith
from ScientificPapers Website



For many years there have been reports and rumors of a vast network of underground complexes and tunnels beneath the North American continent. Starting in the late 1980s, the American government has tried to deflect these rumors through a campaign of misdirection and misinformation. Disclosure of the
Greenbrier Congressional Shelter at White Sulphur Springs is a good example of this campaign.


To believe the existence of the Greenbrier complex was revealed against the wishes of the American government is the height of naiveté. This revelation was allowed to take place. The Greenbrier underground complex was no longer useful, so it was sacrificed to divert attention away from a much larger secret. In other words, a classic misdirection ploy.

While I do not have complete knowledge concerning the extent of America’s covert underground infrastructure, I do have detailed first hand experience with many sites near my home in Oregon. Based on my experiences, and assuming a roughly uniform distribution correlated with U.S. population demographics, the total number of covert underground facilities is in the tens of thousands.

What follows is both a compendium of my observations, and a do-it-your-self field guide for those who wish discover the true extent of the American covert underground infrastructure.

Rabbit holes

The covert underground infrastructure serves many functions. Among these are strategic storage of materials and weapons, clandestine research and production facilities, alternant basing for military personnel and equipment, surface environment control systems (atmospheric lensing, synthetic earthquakes, weather modification, civilian population control, etc.), and of course sheltering essential government personnel during time of national crisis or war. This list is not complete, it is only indicative of the diverse ways in which the underground infrastructure is utilized.

It should be obvious that many of the uses listed above require both support from, and easy access to, the surrounding surface communities. I call these underground access points “rabbit holes”, and they represent a key detectable feature of the underground infrastructure.

It should also be obvious that many of these uses require the facilities to be interconnected by a network of tunnels. The construction of these tunnels creates surface evidence of their existence, albeit transitory.


From the perspective of detection, the transitory nature of the evidence makes tunnel construction less useful than covert underground access points, however as we shall see, the evidence itself is far more compelling.

Searching for Alice

As previously mentioned, many underground infrastructure functions require surface access, furthermore many underground facilities also make use of above ground support such as electrical utilities, generally as backup for their primary supply source. These requirements pose a design dilemma. The underground access points must be well hidden, and at the same time, easily accessible to personnel and/or vehicular traffic. What is true of covert underground access points, is also true to a lesser extent for utility supply points.

How do you hide traffic and personnel movement? By mixing it with a legitimate flow of people and vehicles, in locations already under government ownership or control. In rural areas, public parks and recreational facilities make ideal locations. For instance, at a public camp ground, who will notice if 20 cars go in, but only 15 come out? In urban areas, post offices and other purpose built government installations are used.


After all, who pays attention to the comings and goings at a post office? In other words, the underground access points are hidden in plain sight. This is both a strength and a weakness. It is a strength if nobody is paying close attention, however it is also tremendous weakness, since anyone wishing to observe the location will blend in to the general ebb and flow of activity. In some respects, rural underground access points are easier to locate, but more dangerous to investigate, since the level of human activity will be less.

Another aspect of rabbit hole location is proximity to some useful above ground resource. For instance, a public zoo makes a good source of genetic material for a bio-lab facility. It should be obvious that a major metropolitan hospital would make an ideal source for human genetic material, as well as the perfect location to “field test” some new weapon-ized bacteria or virus. What is true of urban access points, is also true for rural access points.


Many are located near the periphery of major urban populations. A large water reservoir, or a public camp ground located near a major highway, are good examples of useful above ground resources. Rural underground access points are favored as utility supply points, since the supply is less likely to be interrupted in time of national crisis.


As we shall see, this last observation can be used to great advantage in detecting rabbit hole locations.

Urban rabbit hole detection

The detection of urban access points requires both persistence, and a certain amount of luck. Quite often, it will be some apparently trivial detail that will be your first clue.


The following is a list of indicators that are cause for suspicion:

  1. A post office parking lot full of cars, with only one or two people visible inside the post office.

  2. Sporadic late night activity at a government office building.

  3. Security that is out of proportion with presumed facility use.

  4. Unbalanced traffic patterns. Example: people or vehicles go in but do not come out, or visa versa.

  5. Facility size is out of proportion to traffic flow. Example: many delivery vehicles at a small government office building.

  6. Utility services is out of proportion to facility size. Example: large electrical service supplying a small government office building.

  7. Deliveries are mismatched to presumed facility use. Example: 40 foot refrigerated truck, or medical supply truck unloading at social security office.

  8. Facility location is inappropriate for presumed use or function. Example: social security office located in an industrial district.

  9. Facility construction and/or layout is inappropriate for presumed use. Example: office building with oversized warehouse style loading dock.

  10. Facility staff size and/or type is inappropriate for presumed facility use or function. Example: large ratio of managerial personnel (business suites) to clerical personnel.

The above list is far from exhaustive. R


ather, the list is intended to illustrate what sort of details should be examined to uncover a rabbit hole. As can be seen from the list, many clues involve some activity that does not match the presumed use or function of the facility. Other clues involve a mismatch between the physical nature of the facility and it’s presumed function.

Once a suspected rabbit hole has been located, further observation is required to develop a profile of anomalous activity. Drive by the location at different times of the day and night. Keep detailed records of observations. Enlist the help of individuals who live within sight of the facility to monitor activity.


Does a medical supply truck show up every Tuesday at a social security office? Is there any discernable pattern to the traffic flow imbalance?


It is the details that will ultimately confirm the existence of a suspected rabbit hole.

Rural rabbit hole detection

As with urban access points, it will be a mismatch between activity and/or the physical nature of a facility, and it’s presumed use or function that will indicate the presence of a rural underground access point. In addition, there are several aspects of rural underground access points that appear to be unique.


Most rural underground access points employ a form of radiated electro-magnet field that functions as a wide area deterrent to birds, rodents, and insects. The purpose of the field being to act as a contamination shield or barrier for the underground access point entrance. Next, since rural underground access points receive less intense public scrutiny, their supporting above ground infrastructure is generally speaking, more blatant.


The presence of a well maintained home with around the clock human supervision of the suspected facility is common feature. These homes will have multiple satellite dishes, and/or radio antennas. Another common feature of rural rabbit holes is the presence of odd alpha-numeric markings on the reverse side of highway traffic signs located near the underground access point.

The following is a list of rural underground access point indicators.

  1. A well maintained branch road leading to a little used park or recreational facility.

  2. Electrical power lines that are routed near facility, when such routing results in longer line length and/or routing over a natural obstacle (mountain, river, etc.).

  3. Electrical power lines or substations much larger than visible local load requirements.

  4. Large reservoirs that serve no apparent useful function. Example: not needed for flood control or civilian water supply, or that have larger capacity than is required for presumed function.

  5. The presence of truck traffic on rural roads with no known destination, or inappropriate truck types for apparent destination.

  6. A public park or recreational facility that is maintained at a level well in excess of other nearby facilities, especially if facility less well known or used than other nearby facilities.

  7. Public facility personnel (park rangers, etc.) that are overly nosey and/or suspicious of your activities, especially if personnel occupy the site on a 24/7 basis.

  8. Public park or recreational facility where part of facility is fenced off, or accessed by a gated road, or otherwise made inaccessible to the general public.

  9. The presence of inappropriate or unusual structures and/or construction methods. Examples: small cinder block building with an electrical power feed normally used on major office buildings. An unmarked, but well maintained trail in public park. An old building (possibly abandoned) with a new door, and expensive lock.

  10. People at camp grounds that seem out of place. Example: improperly dressed, or using inappropriate equipment, or having unusual accents (these are people taking a recreational break from underground facilities).

  11. Well maintained roads that are not shown on maps, or follow a different route than shown on maps.

  12. A noticeable lack of wildlife (birds, small animals, insects, etc.) in a location that would normally support a large wildlife population (see 1.2.4 preface).

  13. Any of the applicable indicators listed under urban rabbit hole detection. Example: unbalanced traffic flows, etc.

As with urban rabbit hole detection, this list is far from complete. It is intended to illustrate what sort of indicators to look for, when searching for rural underground access points. Again, all of the techniques employed in urban rabbit hole discovery are applicable to rural underground access points.


However, it must be stressed that rural access point detection and observation is far more dangerous. Not only are there less people to hide your activities, but a larger faction of those people who are present will likely be rabbit hole occupants or guardians. Failure to exercise due caution may lead to becoming an unwilling underground guest.


For this reason, the author suggests one or more of the following precautions.

  1. Be very discreet in rural underground access point observation.

  2. Always inform a trusted friend of your intended destination and expected time of return.

  3. When possible, use a group recreational outing as cover for your activities.

  4. Spread your observation activities over several months, at random times and days of the week.

  5. Assume you are being watched at all times, and act appropriately. i.e. As somebody who is enjoying a day in the park.



Tunnel construction

The techniques used for
covert tunnel construction are very different than civilian tunnel construction. Covert tunnel construction makes use of a boring machine that actually melts earth and rock (by chemical valence disruption), thereby forming a glass like tunnel wall. This has several advantages over civilian tunnel boring methods.


From the perspective of secrecy, the biggest advantage is that little or no waste material (rock, dirt, etc.) is produced by the boring process, thereby alleviating the need for above ground disposal sites. Another advantage is that tunnels can be bored through lose rock, sand, etc. or other locations that would be unsuitable for civilian boring methods (for instance, a river bed). Large underground cavities are also constructed using this technique.

Covert tunnel boring produces several phenomena that are detectable by surface observation. These phenomena are transitory, and will disappear shortly after tunnel completion. However the presence of these phenomena is unmistakable evidence that covert tunnel construction is taking place.

The method used to melt earth and rock employs electro-magnetic energy to disrupt the chemical bonds within the material. This method produces little or no heat as a by product of the melting process, and is therefore very stealthy. However it does cause the evaporation of water to take place at an accelerated rate.


Since the method is electro-magnetic, there is a certain amount of “leakage” radiation, and this is detectable by the odd effect it produces on surface water. In particular, the water will appear to rise from the ground as wisps of steam, even though the ground is cold. This phenomena is very noticeable during rain storms on cold winter nights. The steam does not rise into the air, as it would if the ground was actually warm, but instead forms a layer just above the surface.

Another side effect of covert tunnel boring is a peculiar rippling in road surfaces. This rippling is very slight, and most noticeable while driving at highway speed (55 mph). It is more heard than felt. What sets this ripple apart from normal highway bumps and imperfections is it’s consistency. Assuming a constant driving speed, the ripple is perfectly constant. In some cases, the rippled road surface will continue for several miles, without the slightest change in pitch or intensity.

The “cold steam” phenomena is only observable while covert tunnel boring is actually taking place. However the “road ripple” phenomena will persist for several weeks after covert tunnel boring is finished.


These phenomena are best observed late at night.

Forty trillion dollars

Despite an ever increasing tax burden, the roads and bridges continue to decline, the cities continue to decay, social security and Medicare benefits continue to dwindle. Today with both husband and wife working full time jobs, the American standard of living is less than 1950 when the husband worked, and the wife stayed home.


In 1950, most government buildings were somewhat dilapidated, having a “well used” look about them, while most American homes were modern and well cared for. Today the cities are full of shinny new government office buildings, and many American homes look dilapidated and in need of repair. Government budgets and deficits continue their upward spiral, while the American family is learning how to “make do” with less.


Consumer prices continue to rise and wages continue to fall, as the American dream fades, replaced with the nightmarish specter of advancing middleclass poverty. Inexorably, despite every effort to reverse the trend, American wealth has been systematically striped from the people, and transferred to the government

Something has gone horribly wrong in America.

For the past several decades, there have been an unbroken chain of government scandals involving over billing and multiple invoicing for items ranging from toilet seats to bombers. Inevitably the media portray these scandals as unscrupulous corporations taking advantage of an inept government bureaucracy.


Sadly these incidents are more pervasive than media reporting indicates, and the truth is far more ominous than mere government incompetence or corporate greed. When the clandestine diversion of tax revenue was no longer sufficient to satisfy the requirements, a second method was instituted. American jobs were outsourced to other countries, thereby allowing the government to repatriate nearly 100% of product and/or service revenue through the foreign purchase of American government bonds.


Since the early 1960s, the American citizenry have been the unwitting victims of government fraud, perpetrated on a scale so vast that it staggers the imagination. When figured in 2004 dollars, the total amount exceeds 40 trillion dollars.

What did the American government and it’s corporate accomplices do with this almost inconceivable wealth?

The government has built a entirely new underground civilization beneath the abandoned factories, tattered homes, and crime ridden streets that litter the American landscape. In this new society, there is no poverty, no crime or illicit drug use. In this new society, healthcare is affordable, energy is free, public transport is efficient. And you, the American tax payer have paid for it all, without receiving any benefit whatsoever for your Herculean efforts.

As to why this monstrous crime was committed against the American people, is the topic for a future paper. Suffice it to say, you will not like the motive, nor the eventual disposition planed for you and your loved ones…


ALL information contained herein is derived from public sources, widely accepted scientific principles, and/or authors first hand experience. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America.


While the author advocates the discovery and disclosure of the American covert underground infrastructure, NO ATTEMPT should be made to interfere in any way whatsoever with the personnel and/or operations of said infrastructure.


The proper method for achieving discontinuance of these activities is through court ordered injunctive relief.

One thought on “Going Black – This is series of articles from www.bibliotecapleyades.net on where the money has gone – Audio and Text Versions

Leave a Reply