About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Politics
Anarchism
Central Intelligence Agency (CIA)
Corporatarchy - Rule by the Corporations
Economic Documents
Federal Bureau of Investigation (FBI)
Foreign Military & Intelligence Agencies
Green Planet
International Banking / Money Laundering
Libertarianism
National Security Agency (NSA)
Police State
Political Documents
Political Spew
Right to Keep and Bear Arms
Terrorists and Freedom Fighters
The Nixon Project
The World Beyond the U.S.A.
U.S. Military
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

U.S. Military

Why of course the people don't want war... It is the leaders...who determine the policy and it is always a simple matter to drag the people along...all you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country. - Hermann Goering, 1936

75th Ranger Regiment
 The 75th Ranger Regiment plans and conducts special military operations in support of US policy and objectives. Its specially organized, equipped, and trained soldiers provide the National Command Authority (NCA) the capability to rapidly deploy a credible military force to any region of the world. In addition, Rangers are often called upon to perform missions in support of general purpose forces (GPF).
A Detailed History of U.S. Special Forces
 As conflict continues to threaten dozens of U.S. allies throughout the world, the Defense Department looks for an answer more and more to the unique training and experience of the Green Berets. Fort Bragg's Special Warfare Center and School is training more men than ever for Special Forces qualification and dangerous tasks like freefall parachuting, escape missions and maritime operations.
ALMAR 226/96: Revised INTEL Markings
 Military intelligence document classifications: beyond "SECRET"...
ALMAR 294/96: Delay in Revision of INTEL Control Markings
 ALMAR 294/96: Delay in Revision of INTEL Control Markings
Anti-Drug Military Cooperation in South America by Adam Isacson
 U.S. anti-drug activities in the region are being carried out in a way that avoids scrutiny and oversight. While some secrecy is needed to protect U.S. personnel and to keep from alerting traffickers, we need more information in order to gauge the policy's effectiveness, to be more alerted to the risks involved, to guarantee an informed debate, and - let's face it - to prevent incidents like last Friday's shootdown from occurring again in the future.
Chemical Warfare by Sir Francis Drake
 Irritants and chemical warfare
Civilian Detention Camps by Carl Jensen
 REX-84 also provided for the closing of military bases around the country, of which some would then be turned into detention camps. One of the ten military bases that were setup as detention camps, was Camp Krome in Florida. This camp was designated as a joint FEMA-Immigration Service interrogation center.
Community War by Captain Larry Seaquist, U.S. Navy
 While the military was busy revolutionizing military affairs, war put on new clothes and moved away. As the Navy was developing high-tech reach from the sea and becoming network-centric, war spent the 1990s transforming itself into some homely but exceedingly deadly forms largely immune to our precision arms.
Conditions at Shebarghan Prison, Northern Afghanistan by PHR
 Conditions at Shebarghan are in grave violation of international standards for those held in detention or as prisoners of war. The facilities are entirely inadequate for the care of the number of people now held there, the food is insufficient in quantity and nutrition, the water supply unclean, sanitation virtually absent, clothing meager, and barred walls open to the elements expose the inhabitants to winter conditions. Disease is rampant.
Copernicus: C4I For the 21st Century by U.S. Navy
 Because our forward posture allows the Navy to be in position when crises develop, we can use IW to slow and influence the enemy's decision making cycle, to prepare the battlespace before the start of open hostilities, and to dictate the battle on our terms. Information-based warfare, employing advanced IW with its rapid, reliable and secure communications, permits integration of battlefield information and increases effects from offensive firepower.
Corporate Soldiers: The U.S. Government Privatizes Force by Daniel Burton-Rose and Wayne Madsen
 After having privatized in whole or in part nearly all other government functions, the U.S. government is now outsourcing the use of force. The latest stage in the privatization of military functions is the contracting out of training of Third World armies.
Critical Analysis on the Defeat of Task Force Ranger by Maj. Clifford E. Day
 On Sunday, 3 October 1993, the relative success of UNOSOM II suddenly turned violent when a US Task Force came under heavy fire from Somali gunmen. The US Task Force, code named Task Force RANGER, was ill-prepared to cope with the type of urban guerrilla warfare prevalent in Mogadishu, and ultimately led to mission failure.
DED Culprit in Orbiter Breakup by Plautus
 Did the Directed Energy Diretorate target and strike the orbiter with a high-power laser? They have the laser technology. They have the tracking technology. They were tracking the orbiter and it broke up over their skies.
DNA Database for the US Military
 Two U.S. Marines, John Mayfield and Josheph Vlacovsky, recently distinguished themselves by having the bravery to stand up against, and thereby bring to the attention of the world to, a demand by the Department of Defense that they consent to have their DNA samples added to a military database.
Declassified Army and CIA Manuals Used in Latin America by Lisa Haugaard
 The unstated aim of the manuals is to train Latin American militaries to identify and suppress anti-government movements. The manuals provide detailed techniques for infiltrating social movements, interrogating suspects, surveillance, maintaining military secrecy, recruiting and retaining spies, and controlling the population.
Defense Industrial Security: Weaknesses in U.S. Security Arrangements by GAO
 Pursuant to a congressional request, GAO reviewed security arrangements used to protect sensitive information from foreign-owned U.S. defense contractors that perform on classified Department of Defense (DOD) contracts.
Die for Oil, Sucker by Jello Biafra
 you are just about the ripe age to be drafted. does that bother you? do you even think about that? there was a sign at jonestown behind jim jones' dead body and it said "those who do not remember the past are condemned to repeat it." which would you rather sacrifice your hot car or your life? die for oil, sucker.
DoD Acronyms
 DoD acronyms not included in the main ITG acronym list.
DynCorp in Colombia: Outsourcing the Drug War by Jeremy Bigwood
 A U.S.-made Huey II military helicopter manned by foreigners wearing U.S. Army fatigues crash lands after being pockmarked by sustained guerrilla fire from the jungle below. However, they were not part of the U.S. Armed Forces, but civilian employees of a private company called DynCorp, the new "privateer mercenaries" of a U.S. policy that now "outsources" its wars.
Editorials from US papers about the Gulf War
Espionage in Information Warfare by Christopher D. Noble
 All these definitions appear to call for some form of human action, but this is not an absolute. Spying is done by entities most capable with respect to the information being collected. In cyberspace, digital agents are far more effective as spies than humans.
Examining Biological Experimentation on U.S. Military
 During the last 50 years, hundreds of thousands of military personnel have been involved in human experimentation and other intentional exposures conducted by the Department of Defense (DOD), often without a servicemember's knowledge or consent. In some cases, soldiers who consented to serve as human subjects found themselves participating in experiments quite different from those described at the time they volunteered.
Expeditionary Warfare: The Landscape by U.S. Marine Corp
 The certainty, structure, and stability that the Cold War provided have disappeared. The threat has shifted from the known enemies of the Cold War to a broader, heterogeneous set of potential competitors and adversaries and a variety of types of conflict. Some of these opponents are traditional nation-states, but many will be nonstate actors-such as terrorist groups and international organized crime networks.
FM-21-75 Combat Skills Of The Soldier by US Army
 The US Army Field Manual: Combat Skills Of The Soldier
First Strike Guidelines - The Case of Iraq by Charles Knight
 Assesses how the case of Iraq measures up within a set of guidelines for preemptive counterproliferation developed by the director of the Air Force Counterproliferation Center. Includes extensive notes with links to material relevant to making an informed decision about war.
Flight 93: The Improbable Truth by Robb Magley
 Article describing a history of RF weapons development, along with a theory and supporting evidence that they were used on 9/11 to bring down one of the airliners.
Forget the Wag the Dog angle: The imminent strike on Iraq
Fratricide at Umm Hajul: Gulf War Mistakes by Bo H. Friesen
 I stood on the back of my tank commander's seat and raised a pair of dented, green binoculars to my eyes. Scanning the horizon, I saw the same thing I had been looking at for the past five months -- endless desert. No trees, no bushes and, most important, no Iraqis.
Germ Warfare Hall of Shame
 The United States has a long history of experimentation, on unwitting human subjects, which goes back to the beginning of this century.
Ground Wave Emergency Network
 Across America, the Air Force is constructing up to 400 towers specifically designed to allow the transmission of trigger-release codes for B-1 bomber and MX missile nuclear warheads at the beginning of nuclear war. This system of radio towers is called the Ground Wave Emergency Network(GWEN).
Gulf War Syndrome by Dennis Bernstein
 The Pentagon denies that U.S. soldiers were exposed to chemical and biological warfare agents during the Gulf war, but its own records contradict the official line.
Gulf War Syndrome Defined by H. Lindsey Arison III
 Gulf War Syndrome is the direct health consequence of prolonged (chronic) exposure to low (non-lethal) levels of chemical and biological agents released by direct Iraqi attack via missiles, rockets, artillery, or aircraft munitions; fallout from the destruction of Iraqi ammunition bunkers [such as Kamasiyah]; and by fallout from allied bombings of Iraqi chemical warfare munitions facilities during the 38-day air war.
Gulf War Syndrome Defined: Evidence, Conclusions and Coverup by H. Lindsey Arison III
 Archived meteorological data, including visible and infrared satellite imagery, illustrates irrefutably and conclusively that the toxic debris from the bombed facilities traveled directly towards U.S. military personnel. 14,000 chemical agent alarms deployed with U.S. forces in the Gulf sounded three times each per day, on average, according to sworn DoD testimony before the U.S. Senate.
HAARP - The Cold, Hard Facts by Biffnix
 Recently I heard about the U.S. Air Force's new "doomsday machine" called HAARP, for High-frequency Active Auroral Research Program. From what I understand, the Air Force plans to experiment with blowing a hole in our ionosphere by directing intense high-frequency radio waves at it from somewhere in Alaska...
HUMINT/CI by LTC Perkins
 This article provides an in-depth discussion of CI (Counter Intelligence) and HUMINT (Human Intelligence) activities conducted in support of the US-led ground Task Force Eagle, also called the Multi-National Division (MND) North. Three former warring factions, not only with significant combat power but with robust intelligence collection capabilities, were waiting for the arrival of NATO forces. Terrorists, organized crime, and petty criminals were also part of the threat.
Handling of Sources by U.S. Army
 The term Special Counterintelligence Agent (SA) refers to all those persons who convey or contribute in to counteract the collection of information of the multidisciplinary intelligence of hostile services. This booklet is primarily directed to those persons involved in the control or execution of CI operations.
Hawk Missile Sales to Iran
 The more one delves into Independent Counsel Lawrence Walsh's prosecution of former Defense Secretary Caspar Weinberger the more furious one becomes. The chief charge in the Weinberger indictment is that he, as Walsh's office puts it, "lied to Congress about his knowledge of a shipment of U.S. Hawk missiles to Iran by Israel in November 1985 in return for the release of American hostages held in Lebanon."
Homeland Security and US Military Vehicles for Spying on Civilians
 How long before those trucks start showing up in our neighborhoods? Not very long.
Human Radiation Experiments: Agency Records by CHRE
 The Air Force provided a list of more than 600 human radiation experiments, approximately 90 of which predate 1975. Committee staff has asked the Air Force to provide available backup material it has identified regarding pre-1975 experiments. The Air Force reports that additional material is warehoused at SAM's Texas facilities; however, records of many individual experiments appear to have been destroyed or taken by the investigators.
Information on E.L.F. Waves
 Information on E.L.F. waves. You might be affected by them without ever knowing, interesting and scary stuff at the same time.
Letter From A Previous War by Richard Prestwich
 A sniper from the 25th Infantry Division who served in Vietnam sums up what he saw.
Military Bases in the United States and the Waco Anniversary
 Military bases in the United States are being told to tighten security for the April 19 anniversary of the 1995 Oklahoma City bombing and the 1993 Branch Davidian siege in Waco, Texas, the Pentagon's top officer said Thursday. We will remind all commanders of the upcoming anniversary and urge them to take the measures appropriate in their particular areas, Army Gen. John Shalikashvili told reporters in response to questions
Military Intelligence as a Career by Anonymous
 Within the Army, as there is in most intelligence activities, there are four principal disciplines: Imagery Intelligence (IMINT), Signals Intelligence (SIGINT), Human Intelligence (HUMINT), and (of course) Counterintelligence (CI). They all fall under the umbrella of Army Intelligence. Army Intelligence is not a independent cohort. It is prey to the combat arms which runs the Army, both in day-to-day activities and in policy development.
Military Support for Civilian Law Enforcement Agencies by R. Barry Cronin, Major
 If a cross-section of police chiefs were polled concerning their understanding of the Posse Comitatus Act, most would likely answer that the act prohibits U.S. military personnel from performing civilian law enforcement functions. (1) However, to assume that Posse Comitatus prevents law enforcement agencies from obtaining any military support would be a mistake.
Mission Creep: The Militarizing of America by Sam Smith
 The nomination of General Barry McCaffrey as drug czar symbolizes the nation's dramatic retreat from the principle of separation of military and civilian power. It further demonstrates the degree to which the Posse Comitatus Act of 1878 is being ignored and undermined by both the drug warriors and the Clinton administration.
National Industrial Security Program Operating Manual by DOD
 This Manual is issued in accordance with the National Industrial Security Program (NISP). The Manual prescribes requirements, restrictions, and other safeguards that are necessary to prevent unauthorized disclosure of classified information and to control authorized disclosure of classified information released by U.S. Government Executive Branch Departments and Agencies to their contractors.
National Missile Defense System
 The objective of the National Missile Defense (NMD) program is to develop and maintain the option to deploy a cost effective, operationally effective, and Anti-Ballistic Missile (ABM) Treaty compliant system that will protect the United States against limited ballistic missile threats, including accidental or unauthorized launches or Third World threats.
Naval Station Dumping Truck Loads Of What At Midnight by cimmarron
 The Naval Station at Grand Praririe , Texas dumped truck loads of something at a dump site.
Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster! by W. Scott Gureck
 The question, then, is why not augment traditional, low-tech coordination tools such as the CMOC or LNOs, with a high-tech tool that extends the benefits of NCW to the many PVOs and NGOs who wage war against hunger and disease every day? As one of the U.S. government's principal mechanisms for assisting people at risk in complex emergencies, there should be a way to incorporate them into the military's NCW architecture. Indeed, I believe there is a way, and it can be found in the technology and business model behind Napster.
Non-Lethal Weapons Research in the US: Calmatives and Malodorants by Sunshine Project
 Militaries and domestic law enforcement agencies in the United States and elsewhere are closely following this research and, in some instances, participating. The non-lethal weapons research detailed here raises questions about protection of civil liberties, particularly freedoms of thought and expression.
Northern Command - Additional Details by Colin Robinson,CDI
 The Northern Command, or NORTHCOM, is somewhat different from the rest of the regional unified commands that control military operations around the world. Beyond the central mission of deterring and defending against threats to the United States within its assigned area of responsibility, NORTHCOM will have the additional task of providing 'military assistance to civil authorities including consequence management operations,' when directed by either the president or the secretary of defense.
Occult Tactics in the Afghanistan War by Private Johnathan C. Ricardo
 Great Britian released a report that Afghanistan is about to "implode" because of insurgents and warlords taking over the country, this is a first hand account on why this is happening, the Arabs are using Occult practices to raise an army of the undead to fight American troops.
Operation Black Dog: The Gulf War Story No One Will Publish by David Guyatt
 In any event, Source B was concerned not with Black Cat - which I learned he knew about in some detail - but a second, far more sensitive mission known as "Black Dog." This mission had occurred around 25 February 1991 and involved biological weapons, I was told. Specifically the weapon was a bacterium that resulted in those contaminated drowning in their own bodily fluids.
Pentagon Testing of Electronic Signal Weapons by Josie Stone
 It was reported by CNN and USA in 2001 that the Pentagon had been testing the use of electromagnetic signals for the purpose of crowd control. Having been an involuntary subject of that testing, I feel it necessary to warn others of the sympltoms that are manifested when this technology is utilized
Possible Locations of Classified Military Facilities by Paul McGinnis
 I've been thinking about an interesting question lately -- are there other places that are as classified as the secret U.S. Air Force air base at Groom Lake, Nevada, and, if so, how would someone know where to start looking for such a place?
Project Argus
 U.S. and Soviet nuclear detonations in space.
Psychological Effects of Aerial Bombardment by Martin L. Fracker
 Other examples might include the German bombing of London and the British bombing of German cities in World War II, as well as the coalition bombing of Iraqi soldiers in Operation Desert Storm. In at least one instance, psychological effect was a factor in aircraft design.
Psychological Operations in the Gulf War
 The 4th PSYOP Group began broadcasting the "VOICE OF THE GULF" radio network which on 19 January 1991. It operated continuously through 1 April 1991 with more than 210 hours of live broadcasting and 330 hours of prerecorded programs. A total of 2072 news items were aired along with 189 PSYOP messages.
Psychological Operations/Warfare
 Psychological Operations or PSYOP are planned operations to convey selected information and indicators to audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of organizations, groups, and individuals.
Renewed Phase of U.S. Military Intervention in the Philippines by Roland G. Simbulan
 The "war games" or "U.S.-Philippine joint military exercises" (code-named Kalayaan-Aguila 2002 or Balikatan 02-1) being held in Basilan and Zamboanga are nothing but an outright military operation by U.S. military forces led by the Special Operations Forces (SOFs).
Report from Iron Mountain by Leonard Lewin
 Attached is the Report of the Special Study Group established by you in August, 1963, 1) to consider the problems involved in the contigency of a transition to a general condition of peace, and 2) to recommend procedures for dealing with this contingency.
Sensitive Compartmented Information Nondisclosure Agreement
 I hereby accept the obligations contained in this Agreement in consideration of my being granted access to information or material protected within Special Access Programs, hereinafter referred to in this Agreement as Sensitive Compartmented Information (SCI). I have been advised that SCI involves or derives from intelligence sources or methods and is classified or is in the process of a classification determination .
Soldiers of Fortune Ltd: A Profile of Today's Private Sector Corporate Mercenary Firms by David Isenberg
 The past few years have seen increased prominence given to the re-emergence of an old phenomenon: the existence of mercenary organizations working solely for profit. The modern twist, however, is that rather than being ragtag bands of adventurers, paramilitary forces, or individuals recruited clandestinely by governments to work in specific covert operations, the modern mercenary firm is increasingly corporate.
Special Forces: Delta Force Unit Profile by Even Steven
 The U.S. Army's 1st Special Forces Operational Detachment-Delta (SFOD-D) is one of two of the U.S. government's principle unit tasked with counterterrorist operations outside the United States (the other being Naval Special Warfare Development Group). Delta Force was created by U.S. Army colonel Charles Beckwith in 1977 in direct response to numerous, well-publicized terrorist incidents that occurred in the 1970s.
TAKEDOWN: Targets, Tools, & Technocracy by Robert David Steele
 Everything we are doing today, from the PCCIP to the Information Operations activity at Fort Meade, to the billions of dollars being spent on the current and planned force structure, is out of touch with the reality that pioneers--Alvin Toffler, Martin Libicki, Winn Schwartau--have been trying to articulate. It is out of touch with the reality that Eric Bloodaxe, Emmanuel, Phiber Optic, Dark Angel, Andy Mueller-Maguhn and many, many others have been actively demonstrating.
Ten Commandments Of SpecWar by Richard Marcinko
 The Ten Commandments of Special Warfare according to Richard Marcinko. These rules could also apply to those of us who engage in covert revenge against those who have wronged us.
Test Tube Republic: Chemical Weapons Tests in Panama by FOR
 In the small isthmian nation of Panama, the United States had an active chemical weapons program from at least 1930 until 1968. From 1930 to 1946, this program focused on canal defense. From 1943 until 1968, the program aimed to test chemical munitions under tropical conditions. Dozens of tons of mustard gas and phosgene were stockpiled at a number of sites in Panama, particularly from the 1930s to the 1950s. Unused and dud chemical munitions were also abandoned in Panama.
Testimony of Dr. Kenneth Alibek by Kenneth Alibek
 Thank you for the opportunity to discuss the issues of biological weapons and biological defense preparedness with you. I am in a rather unique position to discuss these issues, since I developed biological weapons for the Soviet Union for nearly twenty years, until my defection in 1992.
The Air Intelligence Agency
 An Air Force field operating agency, AIA's mission is to exploit and defend the information domain. The Agency's 16,000 people worldwide deliver flexible collection, tailored air space intelligence, weapons monitoring and information warfare products and services.
The Attack on the Liberty: an "Accident"? by Reverdy S. Fishel
 The U.S. Government had posted the Liberty off the coast of Gaza, in international waters, to monitor developments in the region during the Six-day War. (The Liberty's mission will be discussed in detail below.) At dawn 8 June, Israeli aircraft began reconnoitering the ship, some flying so close that the pilots could clearly be seen, and as low as masthead height, obviously photographing it.
The Automated Nuclear, Biological and Chemical Information System
 The Automated Nuclear, Biological and Chemical Information System (ANBACIS) is a separate software program that resides on the same Common Hardware System (CHS II) platform that contains the MCS/P Baseline software.
The Cuban Missile Crisis by dopeman421
 Some information and analysis on the Cuban missile Crisis.
The Ethics of Information Warfare and Statecraft by Dan Kuehl
 What constitutes an "act of war" in the "information age. This is a question that most members of the "IW community" have wrestled with, and it's a question that places one squarely on the horns of a dilemma: if you cannot easily answer whether an act belongs to the legal codes of war or peace, how can you make a determination of the act's ethical status?
The Evolution of War: The Fourth Generation by LtCol Thomas X. Hammes
 In essence, the world is organizing itself in a series of interconnected networks that while in contact with other networks are not controlled by them. Simultaneously, nation states find themselves torn in two directions-upward toward the international security, trade, and social organizations and downward by subnational movements that want to splinter the state.
The Face of Anti-Urban Guerilla War by Eridu
 A brief synopsis of the Army's new infantry carrier vechicle (ICV), the Stryker. An 8-wheel drive, 19 ton, hard-steel beast, the Stryker is an ideal urban assault vechicle currently being deployed in Iraq.
The Information Warfare Mania
 The most obvious (and widely circulated) spin on the IW morass is to focus on the offensive and defensive manipulation of information systems and networks -- i.e., "hacking"
The International Legal Implications of Information Warfare by Richard W. Aldrich
 One initial hurdle posed by the breadth and uniqueness of certain aspects of information warfare is the question of what constitutes an armed attack in the information age? The answer is less than clear, but appears to revolve around the threat the action poses to a government's authority over its people.
The Internet as a National Security Studies Resource by William M. Arkin
 The 1999 war in Yugoslavia was probably the first high-profile conflict in which both adversaries were completely "wired" societies. Not only then did the now-expected special websites emerge, but the Internet itself became a genuine factor in the war. The Yugoslav government deftly used the web to disseminate releases and photographs relating to civilian collateral damage. There were claims of hackers, and there was genuine government interference in Internet access. Computer network attack was a part of NATO's arsenal.
The Iraq Study Group Report by James A. Baker III, Lee H. Hamilton, et al
 Current U.S. policy is not working, as the level of violence in Iraq is rising and the government is not advancing national reconciliation. Making no changes in policy would simply delay the day of reckoning at a high cost. Nearly 100 Americans are dying every month. The United States is spending $2 billion a week. Our ability to respond to other international crises is constrained. A majority of the American people are soured on the war. This level of expense is not sustainable over an extended period, especially when progress is not being made.
The Iraqi War and the Responsiblitiies of a Nation
The Military Freudian Complex by Roulette
 Psychoanalysis of U.S. military terminology
The Multipurpose Security and Surveillance Mission Platform by D.W. Murphy
 The Multipurpose Security and Surveillance Mission Platform (MSSMP) system is a distributed network of remote sensors mounted on vertical-takeoff-and-landing (VTOL) mobility platforms plus portable control stations. The system is designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of security operations and other tactical missions.
The Patent for HAARP
 High-frequency Active Auroral Research Program - A method and apparatus for altering a region in the Earth's atmosphere, ionosphere, and/or magnetosphere.
The Pentagon's Info on HAARP
 HAARP (High-frequency Active Auroral Research Program) is to be a major Arctic facility for upper atmospheric and solar-terrestrial research. HAARP is being built on a DoD-owned site near Gakona, Alaska.
The Tolicha Peak Electronic Combat Range
 The Tolicha Peak Electronic Combat Range (TPECR) is a substantial, but publicly little known, facility of the Nellis Complex. It's located on Pahute Mesa, about 3 miles northeast of Tolicha Peak, and about 2 miles north and slightly west of Quartz Mountain. It is at least 20 miles south of the southerly boundary of the Tonopah Test Range.
The U.S. Army Special Forces Special Operations Teams
 The SOTs-A are the direct descendants of the United States Army Security Agency Special Operations Detachments (USASASODs). What follows is an "imprecise" history of thier existence.
The Use of Covert Paramilitary Activity as a Policy Tool by Major D. H. Berger
 From a pure cost-benefit analysis point of view, covert paramilitary operations conducted by the US between the end of World War II and the Korean conflict were a dismal failure. Manpower and money were allocated in tremendous amounts to the various operations, yet in every case the objectives of creating and expanding a viable anti-Communist resistance effort were not met.
Treason 101
 Espionage is a high-risk criminal offense. The traitor must fear arrest for the rest of his or her life, as the statute of limitations does not apply to espionage. Former National Security Agency employee Robert Lipka was arrested in 1996 -- 30 years after he left NSA and 22 years after his last contact with Soviet intelligence. There are four principal ways by which spies are detected.
Troops in Saudi Arabia Deserve Some Beer by Lewis Grizzard
 The Saudis don't believe in beer. I'm not certain such a country is worth defending, even against Saddam Hussein. How can you stick all those soldiers out in the middle of the desert and not provide them a little beer occasionally?
Typical BW Aerial Spray Test
 In August and September of 1958, Dugway ran six night trials on the Aerial Spray Grid. The tests used a low flying F-100A with a modified a 275-gallon fuel tank to act as the spray dispenser.
U.S. Military Spying on Web Sites by SCP
 Since 7 October 2001, when the United States government declared war on "terrorism" and began bombing Afghanistan, persuasion no longer seems necessary. The U.S. military is obviously spying on us and, no doubt, on lots of other people as well.
U.S. Nuclear Weapons Complex: Security At Risk by POGO
 In a test at the Rocky Flats nuclear production facility, Navy SEALs successfully "stole" enough material to make multiple nuclear weapons. In a test at a Los Alamos facility, the "terrorists" had enough time to construct an Improvised Nuclear Device. In addition, the theft of nuclear secrets remains as possible today as it was several years ago before the controversy over the downloading of classified information at Los Alamos.
US Military Tests the Limits of Tyranny by Ian Williams Goddard
 Unaware of the Cruise Missile Defense (CMD) protocol, many people can't believe that the Navy would conduct CMD tests off Long Island, where witnesses saw a rocket intercept TWA 800, because it is so close to inhabited areas where such testing could hurt civilians. In other words: the military wouldn't endanger the people because the military respects people's boundaries. If you think that's true, think again.
US Military to Target APC in "Netwar"? by Chris Bailey
 A study prepared for the US military on what they call "Netwar" concludes that they must center attention on countering the activities of NGOs using Internet communication.
War in Iraq by Congressman John P. Murtha
 The war in Iraq is not going as advertised. It is a flawed policy wrapped in illusion. The American public is way ahead of us. The United States and coalition troops have done all they can in Iraq, but it is time for a change in direction.
War in the Age of Invisible Machines by Thomas McCarthy
 One of the highest hopes one can have for molecular manufacturing is that it will remove some of the causes of war, and contribute to a generally safer and more stable global environment. On the surface, there is cause to believe it will make the world safer, as there is a wide variety of conflicts that will be eased or even eliminated entirely by an advanced breed of this technology.
War.com: The Internet and Psychological Operations by Angela Maria Lungu
 Although current international law restricts many aspects of PSYOP either through ambiguity or non-currency, there is ample legal room for both the U. S. and others to conduct PSYOP using modern technology and media such as the Internet. Existing policy and legal restrictions, however, must be changed, allowing military PSYOP forces to both defend and counter adversarial disinformation and propaganda attacks which impact on the achievement of military objectives.
We Need a Full Debate to Stop the Northern Command by Nancy B. Spannaus
 As many military experts have testified, this expanded military power is not needed to combat a real national emergency, but it could indeed be used for domestic repression.
What is a Security Clearance
 Certain federal employees and certain employees in the private sector are required to have security clearances because their job requires them to have access to classified documents. The occupant of any such job is said to hold a "sensitive" position, defined as "any position, by virtue of its nature, could bring about a material adverse effect on national security".
Who Are the Real Terrorists? by S. Brian Willson
 The U.S. Army and Navy are conducting similar trainings in urban areas under the guise of preparing for "terrorist" threats. However, many warn that such trainings equally serve to prepare U.S. Armed Forces for quelling foreseeable domestic unrest and dissent.
Who is Winning this War? by Syed Atiq ul Hassan
 While the world is watching the Hollywood-style live adventure of US-coalition forces using the most devastating and technologically advanced weapons to strike as hard as these can be on Iraq to win and justify the war that unilaterally thrashed by Bush with his two knots Blair and Howard; even those who considered Saddam Hussain a secular dictator till the start of US bombardment on Iraq, are now holding the portraits of Saddam Hussain, as a Arab hero, on the streets of almost every Arab State in the marches of millions.
 
This page Copyright © 1997-2006 totse.com.
 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
arturo gatti retires
You vs. Laila Ali in a boxing match
USA beats Brazil 2-1!!!
any othe fencers on totse?
Germany Vs. England
Mundene fight
Chris Benoit Dead
Kimbo Slice vs. Sgt. Ray Mercer June 23rd
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

 

TSHIRT HELL T-SHIRTS