Why of course the people don't want war... It is the leaders...who determine the policy and it is always a simple matter to drag the people along...all you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country. - Hermann Goering, 1936
|
75th Ranger Regiment |
| The 75th Ranger Regiment plans and conducts special military operations in support of US policy and objectives. Its specially organized, equipped, and trained soldiers provide the National Command Authority (NCA) the capability to rapidly deploy a credible military force to any region of the world. In addition, Rangers are often called upon to perform missions in support of general purpose forces (GPF). |
|
A Detailed History of U.S. Special Forces |
| As conflict continues to threaten dozens of U.S. allies throughout the world, the Defense Department looks for an answer more and more to the unique training and experience of the Green Berets. Fort Bragg's Special Warfare Center and School is training more men than ever for Special Forces qualification and dangerous tasks like freefall parachuting, escape missions and maritime operations. |
|
ALMAR 226/96: Revised INTEL Markings |
| Military intelligence document classifications: beyond "SECRET"... |
|
ALMAR 294/96: Delay in Revision of INTEL Control Markings |
| ALMAR 294/96: Delay in Revision of INTEL Control Markings |
|
Anti-Drug Military Cooperation in South America |
by Adam Isacson |
| U.S. anti-drug activities in the region are being carried out in a way that avoids scrutiny and oversight. While some secrecy is needed to protect U.S. personnel and to keep from alerting traffickers, we need more information in order to gauge the policy's effectiveness, to be more alerted to the risks involved, to guarantee an informed debate, and - let's face it - to prevent incidents like last Friday's shootdown from occurring again in the future. |
|
Chemical Warfare |
by Sir Francis Drake |
| Irritants and chemical warfare |
|
Civilian Detention Camps |
by Carl Jensen |
| REX-84 also provided for the closing of military bases around the country, of which some would then be turned into detention camps. One of the ten military bases that were setup as detention camps, was Camp Krome in Florida. This camp was designated as a joint FEMA-Immigration Service interrogation center. |
|
Community War |
by Captain Larry Seaquist, U.S. Navy |
| While the military was busy revolutionizing military affairs, war put on new clothes and moved away. As the Navy was developing high-tech reach from the sea and becoming network-centric, war spent the 1990s transforming itself into some homely but exceedingly deadly forms largely immune to our precision arms. |
|
Conditions at Shebarghan Prison, Northern Afghanistan |
by PHR |
| Conditions at Shebarghan are in grave violation of international standards for those held in detention or as prisoners of war. The facilities are entirely inadequate for the care of the number of people now held there, the food is insufficient in quantity and nutrition, the water supply unclean, sanitation virtually absent, clothing meager, and barred walls open to the elements expose the inhabitants to winter conditions. Disease is rampant. |
|
Copernicus: C4I For the 21st Century |
by U.S. Navy |
| Because our forward posture allows the Navy to be in position when crises develop, we can use IW to slow and influence the enemy's decision making cycle, to prepare the battlespace before the start of open hostilities, and to dictate the battle on our terms. Information-based warfare, employing advanced IW with its rapid, reliable and secure communications, permits integration of
battlefield information and increases effects from offensive firepower. |
|
Corporate Soldiers: The U.S. Government Privatizes Force |
by Daniel Burton-Rose and Wayne Madsen |
| After having privatized in whole or in part nearly all other government functions, the U.S. government is now outsourcing the use of force. The latest stage in the privatization of military functions is the contracting out of training of Third World armies. |
|
Critical Analysis on the Defeat of Task Force Ranger |
by Maj. Clifford E. Day |
| On Sunday, 3 October 1993, the relative success of UNOSOM II suddenly turned violent when a US Task Force came under heavy fire from Somali gunmen. The US Task Force, code named Task Force RANGER, was ill-prepared to cope with the type of urban guerrilla warfare prevalent in Mogadishu, and ultimately led to mission failure. |
|
DED Culprit in Orbiter Breakup |
by Plautus |
| Did the Directed Energy Diretorate target and strike the orbiter with a high-power laser? They have the laser technology. They have the tracking technology. They were tracking the orbiter and it broke up over their skies. |
|
DNA Database for the US Military |
| Two U.S. Marines, John Mayfield and Josheph Vlacovsky, recently
distinguished themselves by having the bravery to stand up against, and
thereby bring to the attention of the world to, a demand by the
Department of Defense that they consent to have their DNA samples added
to a military database. |
|
Declassified Army and CIA Manuals Used in Latin America |
by Lisa Haugaard |
| The unstated aim of the manuals is to train Latin American militaries to identify and suppress anti-government movements. The manuals provide detailed techniques for infiltrating social movements, interrogating suspects, surveillance, maintaining military secrecy, recruiting and retaining spies, and controlling the population. |
|
Defense Industrial Security: Weaknesses in U.S. Security Arrangements |
by GAO |
| Pursuant to a congressional request, GAO reviewed security arrangements used to protect sensitive information from foreign-owned U.S. defense contractors that perform on classified Department of Defense (DOD) contracts. |
|
Die for Oil, Sucker |
by Jello Biafra |
| you are just about the ripe age to be drafted. does that bother you?
do you even think about that? there was a sign at jonestown behind
jim jones' dead body and it said "those who do not remember the past
are condemned to repeat it." which would you rather sacrifice your hot
car or your life? die for oil, sucker. |
|
DoD Acronyms |
| DoD acronyms not included in the main ITG acronym list. |
|
DynCorp in Colombia: Outsourcing the Drug War |
by Jeremy Bigwood |
| A U.S.-made Huey II military helicopter manned by foreigners wearing U.S. Army fatigues crash lands after being pockmarked by sustained guerrilla fire from the jungle below. However, they were not part of the U.S. Armed Forces, but civilian employees of a private company called DynCorp, the new "privateer mercenaries" of a U.S. policy that now "outsources" its wars. |
|
Editorials from US papers about the Gulf War |
|
Espionage in Information Warfare |
by Christopher D. Noble |
| All these definitions appear to call for some form of human action, but this is not an absolute. Spying is done by entities most capable with respect to the information being collected. In cyberspace, digital agents are far more effective as spies than humans. |
|
Examining Biological Experimentation on U.S. Military |
| During the last 50 years, hundreds of thousands of military personnel have been involved in human experimentation and other intentional exposures conducted by the Department of Defense (DOD), often without a servicemember's knowledge or consent. In some cases, soldiers who consented to serve as human subjects found themselves participating in experiments quite different from those described at the time they volunteered. |
|
Expeditionary Warfare: The Landscape |
by U.S. Marine Corp |
| The certainty, structure, and stability that the Cold War provided have disappeared. The threat has shifted from the known enemies of the Cold War to a broader, heterogeneous set of potential competitors and adversaries and a variety of types of conflict. Some of these opponents are traditional nation-states, but many will be nonstate actors-such as terrorist groups and international organized crime networks. |
|
FM-21-75 Combat Skills Of The Soldier |
by US Army |
| The US Army Field Manual: Combat Skills Of The Soldier |
|
First Strike Guidelines - The Case of Iraq |
by Charles Knight |
| Assesses how the case of Iraq measures up within a set of guidelines for preemptive counterproliferation developed by the director of the Air Force Counterproliferation Center. Includes extensive notes with links to material relevant to making an informed decision about war. |
|
Flight 93: The Improbable Truth |
by Robb Magley |
| Article describing a history of RF weapons development, along with a theory and supporting evidence that they were used on 9/11 to bring down one of the airliners. |
|
Forget the Wag the Dog angle: The imminent strike on Iraq |
|
Fratricide at Umm Hajul: Gulf War Mistakes |
by Bo H. Friesen |
| I stood on the back of my tank commander's seat and raised a pair of dented, green binoculars to my eyes. Scanning the horizon, I saw the same thing I had been looking at for the past five months -- endless desert. No trees, no bushes and, most important, no Iraqis. |
|
Germ Warfare Hall of Shame |
| The United States has a long history of experimentation, on unwitting human subjects, which goes back to the beginning of this century. |
|
Ground Wave Emergency Network |
| Across America, the Air Force is constructing up to 400 towers specifically designed to allow the transmission of trigger-release codes for B-1 bomber and MX missile nuclear warheads at the beginning of nuclear war. This system of radio towers is called the Ground Wave Emergency Network(GWEN). |
|
Gulf War Syndrome |
by Dennis Bernstein |
| The Pentagon denies that U.S. soldiers were exposed to chemical
and biological warfare agents during the Gulf war, but its own
records contradict the official line. |
|
Gulf War Syndrome Defined |
by H. Lindsey Arison III |
| Gulf War Syndrome is the direct health consequence of prolonged (chronic) exposure to low (non-lethal) levels of chemical and biological agents released by direct Iraqi attack via missiles, rockets, artillery, or aircraft munitions; fallout from the destruction of Iraqi ammunition bunkers [such as Kamasiyah]; and by fallout from allied bombings of Iraqi chemical warfare munitions facilities during the 38-day air war. |
|
Gulf War Syndrome Defined: Evidence, Conclusions and Coverup |
by H. Lindsey Arison III |
| Archived meteorological data, including visible and infrared satellite imagery, illustrates irrefutably and conclusively that the toxic debris from the bombed facilities traveled directly towards U.S. military personnel. 14,000 chemical agent alarms deployed with U.S. forces in the Gulf sounded three times each per day, on average, according to sworn DoD testimony before the U.S. Senate. |
|
HAARP - The Cold, Hard Facts |
by Biffnix |
| Recently I heard about the U.S. Air Force's new "doomsday machine" called
HAARP, for High-frequency Active Auroral Research Program. From what I
understand, the Air Force plans to experiment with blowing a hole in our
ionosphere by directing intense high-frequency radio waves at it from
somewhere in Alaska... |
|
HUMINT/CI |
by LTC Perkins |
| This article provides an in-depth discussion of CI (Counter Intelligence) and HUMINT (Human Intelligence) activities conducted in support of the US-led ground Task Force Eagle, also called the Multi-National Division (MND) North. Three former warring factions, not only with significant combat power but with robust intelligence collection capabilities, were waiting for the arrival of NATO forces. Terrorists, organized crime, and petty criminals were also part of the threat. |
|
Handling of Sources |
by U.S. Army |
| The term Special Counterintelligence Agent (SA) refers to all those persons who convey or contribute in to counteract the collection of information of the multidisciplinary intelligence of hostile services. This booklet is primarily
directed to those persons involved in the control or execution of CI operations. |
|
Hawk Missile Sales to Iran |
| The more one delves into Independent Counsel Lawrence Walsh's
prosecution of former Defense Secretary Caspar Weinberger the more
furious one becomes. The chief charge in the Weinberger indictment
is that he, as Walsh's office puts it, "lied to Congress about his
knowledge of a shipment of U.S. Hawk missiles to Iran by Israel in
November 1985 in return for the release of American hostages held
in Lebanon." |
|
Homeland Security and US Military Vehicles for Spying on Civilians |
| How long before those trucks start showing up in our neighborhoods? Not very long. |
|
Human Radiation Experiments: Agency Records |
by CHRE |
| The Air Force provided a list of more than 600 human radiation experiments, approximately 90 of which predate 1975. Committee staff has asked the Air Force to provide available backup material it has identified regarding pre-1975 experiments. The Air Force reports that additional material is warehoused at
SAM's Texas facilities; however, records of many individual experiments appear to have been destroyed or taken by the investigators. |
|
Information on E.L.F. Waves |
| Information on E.L.F. waves. You might be affected by them without ever knowing, interesting and scary stuff at the same time. |
|
Letter From A Previous War |
by Richard Prestwich |
| A sniper from the 25th Infantry Division who served in Vietnam sums up what he saw. |
|
Military Bases in the United States and the Waco Anniversary |
| Military bases in the United States are being told to tighten security for the April 19 anniversary of the 1995 Oklahoma City bombing and the 1993 Branch Davidian siege in Waco, Texas, the Pentagon's top officer said Thursday. We will remind all commanders of the upcoming anniversary and urge them to take the measures appropriate in their particular areas, Army Gen. John Shalikashvili told reporters in response to questions |
|
Military Intelligence as a Career |
by Anonymous |
| Within the Army, as there is in most intelligence activities, there are four principal disciplines: Imagery Intelligence (IMINT), Signals Intelligence (SIGINT), Human Intelligence (HUMINT), and (of course) Counterintelligence (CI). They all fall under the umbrella of Army Intelligence. Army Intelligence is not a independent cohort. It is prey to the combat arms which runs the Army, both in day-to-day activities and in policy development. |
|
Military Support for Civilian Law Enforcement Agencies |
by R. Barry Cronin, Major |
| If a cross-section of police chiefs were polled concerning their understanding of the Posse Comitatus Act, most would likely answer that the act prohibits U.S. military personnel from performing civilian law enforcement functions. (1)
However, to assume that Posse Comitatus prevents law enforcement agencies from obtaining any military support would be a mistake. |
|
Mission Creep: The Militarizing of America |
by Sam Smith |
| The nomination of General Barry McCaffrey as drug czar symbolizes the nation's dramatic retreat from the principle of separation of military and civilian power. It further demonstrates the degree to which the Posse Comitatus Act of 1878 is being ignored and undermined by both the drug warriors and the Clinton
administration.
|
|
National Industrial Security Program Operating Manual |
by DOD |
| This Manual is issued in accordance with the National Industrial Security Program (NISP). The Manual prescribes requirements, restrictions, and other safeguards that are necessary to prevent unauthorized disclosure of classified information and to control authorized disclosure of classified information released by U.S. Government Executive Branch Departments and Agencies to their contractors. |
|
National Missile Defense System |
| The objective of the National Missile Defense (NMD) program is to develop and maintain the option to deploy a cost effective, operationally effective, and Anti-Ballistic Missile (ABM) Treaty compliant system that will protect the United States against limited ballistic missile threats, including accidental or unauthorized launches or Third World threats. |
|
Naval Station Dumping Truck Loads Of What At Midnight |
by cimmarron |
| The Naval Station at Grand Praririe , Texas dumped truck loads of something at a dump site. |
|
Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster! |
by W. Scott Gureck |
| The question, then, is why not augment traditional, low-tech coordination tools such as the CMOC or LNOs, with a high-tech tool that extends the benefits of NCW to the many PVOs and NGOs who wage war against hunger and disease every day? As one of the U.S. government's principal mechanisms for assisting people at risk in complex emergencies, there should be a way to incorporate them into the military's NCW architecture. Indeed, I believe there is a way, and it can be found in the technology and business model behind Napster. |
|
Non-Lethal Weapons Research in the US: Calmatives and Malodorants |
by Sunshine Project |
| Militaries and domestic law enforcement agencies in the United States and elsewhere are closely following this research and, in some instances, participating. The non-lethal weapons research detailed here raises questions about protection of civil liberties, particularly freedoms of thought and expression. |
|
Northern Command - Additional Details |
by Colin Robinson,CDI |
| The Northern Command, or NORTHCOM, is somewhat different from the rest of the regional unified commands that control military operations around the world. Beyond the central mission of deterring and defending against threats to the United States within its assigned area of responsibility, NORTHCOM will have the additional task of providing 'military assistance to civil authorities including consequence management operations,' when directed by either the president or the secretary of defense. |
|
Occult Tactics in the Afghanistan War |
by Private Johnathan C. Ricardo |
| Great Britian released a report that Afghanistan is about to "implode" because of insurgents and warlords taking over the country, this is a first hand account on why this is happening, the Arabs are using Occult practices to raise an army of the undead to fight American troops. |
|
Operation Black Dog: The Gulf War Story No One Will Publish |
by David Guyatt |
| In any event, Source B was concerned not with Black Cat - which I learned he knew about in some detail - but a second, far more sensitive mission known as "Black Dog." This mission had occurred around 25 February 1991 and involved biological weapons, I was told. Specifically the weapon was a bacterium that resulted in those contaminated drowning in their own bodily fluids. |
|
Pentagon Testing of Electronic Signal Weapons |
by Josie Stone |
| It was reported by CNN and USA in 2001 that the Pentagon had been testing the use of electromagnetic signals for the purpose of crowd control. Having been an involuntary subject of that testing, I feel it necessary to warn others of the sympltoms that are manifested when this technology is utilized |
|
Possible Locations of Classified Military Facilities |
by Paul McGinnis |
| I've been thinking about an interesting question lately -- are there
other places that are as classified as the secret U.S. Air Force air
base at Groom Lake, Nevada, and, if so, how would someone know
where to start looking for such a place? |
|
Project Argus |
| U.S. and Soviet nuclear detonations in space. |
|
Psychological Effects of Aerial Bombardment |
by Martin L. Fracker |
| Other examples might include the German bombing of London and the British bombing of German cities in World War II, as well as the coalition bombing of Iraqi soldiers in Operation Desert Storm. In at least one instance, psychological effect was a factor in aircraft design. |
|
Psychological Operations in the Gulf War |
| The 4th PSYOP Group began broadcasting the "VOICE OF THE GULF" radio network which on 19 January 1991. It operated continuously through 1 April 1991 with more than 210 hours of live broadcasting and 330 hours of prerecorded programs. A total of 2072 news items were aired along with 189 PSYOP messages. |
|
Psychological Operations/Warfare |
| Psychological Operations or PSYOP are planned operations to convey selected information and indicators to audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of organizations, groups, and individuals. |
|
Renewed Phase of U.S. Military Intervention in the Philippines |
by Roland G. Simbulan |
| The "war games" or "U.S.-Philippine joint military exercises" (code-named Kalayaan-Aguila 2002 or Balikatan 02-1) being held in Basilan and Zamboanga
are nothing but an outright military operation by U.S. military forces led by the Special Operations Forces (SOFs). |
|
Report from Iron Mountain |
by Leonard Lewin |
| Attached is the Report of the Special Study Group established by you in
August, 1963, 1) to consider the problems involved in the contigency of a
transition to a general condition of peace, and 2) to recommend procedures for
dealing with this contingency. |
|
Sensitive Compartmented Information Nondisclosure Agreement |
| I hereby accept the obligations contained in this Agreement in consideration of my being granted access to information or material protected within Special Access Programs, hereinafter referred to in this Agreement as Sensitive Compartmented Information (SCI). I have been advised that SCI involves or derives from intelligence sources or methods and is classified or is in the process of a classification determination . |
|
Soldiers of Fortune Ltd: A Profile of Today's Private Sector Corporate Mercenary Firms |
by David Isenberg |
| The past few years have seen increased prominence given to the re-emergence of an old phenomenon: the existence of mercenary organizations working solely for profit. The modern twist, however, is that rather than being ragtag bands of adventurers, paramilitary forces, or individuals recruited clandestinely by governments to work in specific covert operations, the modern mercenary firm is increasingly corporate. |
|
Special Forces: Delta Force Unit Profile |
by Even Steven |
| The U.S. Army's 1st Special Forces Operational Detachment-Delta (SFOD-D) is one of two of the U.S. government's principle unit tasked with counterterrorist operations outside the United States (the other being Naval Special Warfare Development Group). Delta Force was created by U.S. Army colonel Charles Beckwith in 1977 in direct response to numerous, well-publicized terrorist incidents that occurred in the 1970s. |
|
TAKEDOWN: Targets, Tools, & Technocracy |
by Robert David Steele |
| Everything we are doing today, from the PCCIP to the Information Operations activity at Fort Meade, to the billions of dollars being spent on the current and planned force structure, is out of touch with the reality that pioneers--Alvin Toffler, Martin Libicki, Winn Schwartau--have been trying to articulate.
It is out of touch with the reality that Eric Bloodaxe, Emmanuel, Phiber Optic, Dark Angel, Andy Mueller-Maguhn and many, many others have been actively demonstrating. |
|
Ten Commandments Of SpecWar |
by Richard Marcinko |
| The Ten Commandments of Special Warfare according to Richard Marcinko. These rules could also apply to those of us who engage in covert revenge against those who have wronged us. |
|
Test Tube Republic: Chemical Weapons Tests in Panama |
by FOR |
| In the small isthmian nation of Panama, the United States had an active chemical weapons program from at least 1930 until 1968. From 1930 to 1946, this program focused on canal defense. From 1943 until 1968, the program aimed to test chemical munitions under tropical conditions. Dozens of tons of mustard gas and phosgene were stockpiled at a number of sites in Panama, particularly from the 1930s to the 1950s. Unused and dud chemical munitions were also abandoned in Panama. |
|
Testimony of Dr. Kenneth Alibek |
by Kenneth Alibek |
| Thank you for the opportunity to discuss the issues of biological weapons and biological defense preparedness with you. I am in a rather unique position to discuss these issues, since I developed biological weapons for the Soviet Union for nearly twenty years, until my defection in 1992. |
|
The Air Intelligence Agency |
| An Air Force field operating agency, AIA's mission is to exploit and defend
the information domain. The Agency's 16,000 people worldwide deliver flexible
collection, tailored air space intelligence, weapons monitoring and
information warfare products and services. |
|
The Attack on the Liberty: an "Accident"? |
by Reverdy S. Fishel |
| The U.S. Government had posted the Liberty off the coast of
Gaza, in international waters, to monitor developments in the
region during the Six-day War. (The Liberty's mission will be
discussed in detail below.) At dawn 8 June, Israeli aircraft
began reconnoitering the ship, some flying so close that the
pilots could clearly be seen, and as low as masthead height,
obviously photographing it. |
|
The Automated Nuclear, Biological and Chemical Information System |
| The Automated Nuclear, Biological and Chemical Information
System (ANBACIS) is a separate software program that resides on
the same Common Hardware System (CHS II) platform that
contains the MCS/P Baseline software. |
|
The Cuban Missile Crisis |
by dopeman421 |
| Some information and analysis on the Cuban missile Crisis. |
|
The Ethics of Information Warfare and Statecraft |
by Dan Kuehl |
| What constitutes an "act of war" in the "information age. This is a question that most members of the "IW community" have wrestled with, and it's a question that places one squarely on the horns of a dilemma: if you cannot easily answer whether an act belongs to the legal codes of war or peace, how can you make a determination of the act's ethical status? |
|
The Evolution of War: The Fourth Generation |
by LtCol Thomas X. Hammes |
| In essence, the world is organizing itself in a series of interconnected networks that while in contact with other networks are not controlled by them. Simultaneously, nation states find themselves torn in two directions-upward toward the international security, trade, and social organizations and downward by subnational movements that want to splinter the state. |
|
The Face of Anti-Urban Guerilla War |
by Eridu |
| A brief synopsis of the Army's new infantry carrier vechicle (ICV), the Stryker. An 8-wheel drive, 19 ton, hard-steel beast, the Stryker is an ideal urban assault vechicle currently being deployed in Iraq. |
|
The Information Warfare Mania |
| The most obvious (and widely circulated) spin on the IW morass is to focus on the offensive and defensive manipulation of information systems and networks -- i.e., "hacking" |
|
The International Legal Implications of Information Warfare |
by Richard W. Aldrich |
| One initial hurdle posed by the breadth and uniqueness of certain aspects of information warfare is the question of what constitutes an armed attack in the information age? The answer is less than clear, but appears to revolve around the threat the action poses to a government's authority over its people. |
|
The Internet as a National Security Studies Resource |
by William M. Arkin |
| The 1999 war in Yugoslavia was probably the first high-profile conflict in which both adversaries were completely "wired" societies. Not only then did the now-expected special websites emerge, but the Internet itself became a genuine factor in the war. The Yugoslav government deftly used the web to disseminate releases and photographs relating to civilian collateral damage. There were claims of hackers, and there was genuine government interference in Internet access. Computer network attack was a part of NATO's arsenal. |
|
The Iraq Study Group Report |
by James A. Baker III, Lee H. Hamilton, et al |
| Current U.S. policy is not working, as the level of violence in
Iraq is rising and the government is not advancing national reconciliation.
Making no changes in policy would simply delay
the day of reckoning at a high cost. Nearly 100 Americans are
dying every month. The United States is spending $2 billion a
week. Our ability to respond to other international crises is
constrained. A majority of the American people are soured on
the war. This level of expense is not sustainable over an extended
period, especially when progress is not being made. |
|
The Iraqi War and the Responsiblitiies of a Nation |
|
The Military Freudian Complex |
by Roulette |
| Psychoanalysis of U.S. military terminology |
|
The Multipurpose Security and Surveillance Mission Platform |
by D.W. Murphy |
| The Multipurpose Security and Surveillance Mission Platform (MSSMP) system is a distributed network of remote sensors mounted on vertical-takeoff-and-landing (VTOL) mobility platforms plus portable control stations. The system is designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of security operations and other tactical missions. |
|
The Patent for HAARP |
| High-frequency Active Auroral Research Program - A method and apparatus for altering a region in the Earth's atmosphere, ionosphere, and/or magnetosphere. |
|
The Pentagon's Info on HAARP |
| HAARP (High-frequency Active Auroral Research Program) is to
be a major Arctic facility for upper atmospheric and solar-terrestrial
research. HAARP is being built on a DoD-owned site near Gakona,
Alaska. |
|
The Tolicha Peak Electronic Combat Range |
| The Tolicha Peak Electronic Combat Range (TPECR) is a
substantial, but publicly little known, facility of the Nellis
Complex. It's located on Pahute Mesa, about 3 miles northeast of
Tolicha Peak, and about 2 miles north and slightly west of Quartz
Mountain. It is at least 20 miles south of the southerly boundary of
the Tonopah Test Range.
|
|
The U.S. Army Special Forces Special Operations Teams |
| The SOTs-A are the direct descendants of the United States Army Security Agency Special Operations Detachments (USASASODs). What follows is an "imprecise" history of thier existence. |
|
The Use of Covert Paramilitary Activity as a Policy Tool |
by Major D. H. Berger |
| From a pure cost-benefit analysis point of view, covert paramilitary operations conducted by the US between the end of World War II and the Korean conflict were a dismal failure. Manpower and money were allocated in tremendous amounts to the various operations, yet in every case the objectives of creating and expanding a viable anti-Communist resistance effort were not met. |
|
Treason 101 |
| Espionage is a high-risk criminal offense. The traitor must fear arrest for the rest of his or her life, as the statute of limitations does not apply to espionage. Former National Security Agency employee Robert Lipka was arrested in 1996 -- 30 years after he left NSA and 22 years after his last contact with Soviet intelligence. There are four principal ways by which spies are detected. |
|
Troops in Saudi Arabia Deserve Some Beer |
by Lewis Grizzard |
| The Saudis don't believe in beer. I'm not certain such a
country is worth defending, even against Saddam Hussein.
How can you stick all those soldiers out in the middle of
the desert and not provide them a little beer occasionally? |
|
Typical BW Aerial Spray Test |
| In August and September of 1958, Dugway ran six night trials on the Aerial Spray Grid. The tests used a low flying F-100A with a modified a 275-gallon fuel tank to act as the spray dispenser. |
|
U.S. Military Spying on Web Sites |
by SCP |
| Since 7 October 2001, when the United States government declared war on "terrorism" and began bombing Afghanistan, persuasion no longer seems necessary. The U.S. military is obviously spying on us and, no doubt, on lots of other people as well. |
|
U.S. Nuclear Weapons Complex: Security At Risk |
by POGO |
| In a test at the Rocky Flats nuclear production facility, Navy SEALs successfully "stole" enough material to make multiple nuclear weapons. In a test at a Los Alamos facility, the "terrorists" had enough time to construct an Improvised Nuclear Device. In addition, the theft of nuclear secrets remains as possible today as it was several years ago before the controversy over the downloading of classified information at Los Alamos. |
|
US Military Tests the Limits of Tyranny |
by Ian Williams Goddard |
| Unaware of the Cruise Missile Defense (CMD) protocol, many
people can't believe that the Navy would conduct CMD tests
off Long Island, where witnesses saw a rocket intercept TWA
800, because it is so close to inhabited areas where such
testing could hurt civilians. In other words: the military
wouldn't endanger the people because the military respects
people's boundaries. If you think that's true, think again. |
|
US Military to Target APC in "Netwar"? |
by Chris Bailey |
| A study prepared for the US military on what they call "Netwar" concludes that they must center attention on countering the activities of NGOs using Internet communication. |
|
War in Iraq |
by Congressman John P. Murtha |
| The war in Iraq is not going as advertised. It is a flawed policy wrapped in illusion. The American public is way ahead of us. The United States and coalition troops have done all they can in Iraq, but it is time for a change in direction. |
|
War in the Age of Invisible Machines |
by Thomas McCarthy |
| One of the highest hopes one can have for molecular manufacturing is that it will remove some of the causes of war, and contribute to a generally safer and more stable global environment. On the surface, there is cause to believe it will make the world safer, as there is a wide variety of conflicts that will be eased or even eliminated entirely by an advanced breed of this technology. |
|
War.com: The Internet and Psychological Operations |
by Angela Maria Lungu |
| Although current international law restricts many aspects of PSYOP either through ambiguity or non-currency, there is ample legal room for both the U. S. and others to conduct PSYOP using modern technology and media such as the Internet. Existing policy and legal restrictions, however, must be changed, allowing military PSYOP forces to both defend and counter adversarial disinformation and propaganda attacks which impact on the achievement of military objectives. |
|
We Need a Full Debate to Stop the Northern Command |
by Nancy B. Spannaus |
| As many military experts have testified, this expanded military power is not needed to combat a real national emergency, but it could indeed be used for domestic repression. |
|
What is a Security Clearance |
| Certain federal employees and certain employees in the private sector are required to have security clearances because their job requires them to have access to classified documents. The occupant of any such job is said to hold a "sensitive" position, defined as "any position, by virtue of its nature, could bring about a material adverse effect on national security". |
|
Who Are the Real Terrorists? |
by S. Brian Willson |
| The U.S. Army and Navy are conducting similar trainings in urban areas under the guise of preparing for "terrorist" threats. However, many warn that such trainings equally serve to prepare U.S. Armed Forces for quelling foreseeable domestic unrest and dissent. |
|
Who is Winning this War? |
by Syed Atiq ul Hassan |
| While the world is watching the Hollywood-style live adventure of US-coalition forces using the most devastating and technologically advanced weapons to strike as hard as these can be on Iraq to win and justify the war that unilaterally thrashed by Bush with his two knots Blair and Howard; even those who considered Saddam Hussain a secular dictator till the start of US bombardment on Iraq, are now holding the portraits of Saddam Hussain, as a Arab hero, on the streets of almost every Arab State in the marches of millions. |