Secret ET Technologies

[ NOTE The video ( above ), amidst its computer graphic interface ( CGI ), manipulates many of the actual ‘image document layout photographs of symbolics technology’ and ‘laboratory premise photos of components and sub-structures’ ( removed from the U.S. government classified laboratory Project CARET ), plus ‘select photos’ of unidentified flying objects ( UFO ) bearing similar symbolics worked on by an individual using the alias name “Issac” who publicly released partial details about this story. ]

Secret ET Technologies
by, Concept Activity Research Vault ( CARV )

November 22, 2010 12:37:42 ( PST ) Update ( Published: October 23, 2010 )

USA, California, Menlo Park – November 22, 2010 – What some perceived as chicken footprints  may likely be extraterrestrial symbolic construct technologies. Years ago, an individual – using the alias name “Issac” – conveyed a multi-page report ( ” CARET ” ), laboratory photographs, and detailed personal encounters ( from at least 1984 through 1987 ) on what was believed a U.S. Department of Defense ( DoD ) Defense Advanced Research Projects Agency ( DARPA ) Program recruiting to work on a specific Project ( believed Phase II or Phase III ) studying what was ‘officially briefed’ to Issac – amongst his task team –  as highly complex relatives of  ’extraterrestrial’ structures, materials, components, construct language symbolics.

Unwanted Publicity Intelligence Annex report ( herein ) will only provide more detailed analysis on Issac provided information that news media organizations half-heartedly carried to the public years ago.

Extraterrestrial materials, although highly complex to what Issac’s group had ever seen in their lives before, saw supercomputers lumber under tasking extremely complex substrates and geometric symbolics, amongst other secret-sensitive items, that Issac and others analyzed and deciphered.

Within the building, amongst other secret-sensitive items, combinatoric studies were not limited to extremely complex substrates, symbolics, and more that developed an extremely complex ‘primer’ in which Issac’s report is named “Commercial Applications Research for ExtraTerrestrial Technology” ( C.A.R.E.T. or CARET ).

Issac’s personal accounting ( further below ) reports the aforementioned work was conducted within what first appeared as only an upscale industrial office complex ‘building’, presumably located in the State of California County of Santa Clara.

Issac describes his facility adjacencies being multi-compartmentalized ‘individual government contractor offices’ – believed assigned to various sensitive tasks for the United States government – whereupon, amongst other compartmentalized secret characteristics ( never mentioned the facility being a ’self-sealing building’ ), were five ( 5 ) underground floors hidden.

Five ( 5 ) stories down, sub-surface levels – not reported by Issac – but easily ascertained must have included:

– One [ 1 ] underground level dedicated parking for ‘secondary staff’ and/or ‘special visitors ( e.g. military officials, etc. ) standard passenger vehicles; and,

– Two [ 2 ] underground level dedicated parking for ‘equipment delivery’ trucks; and,

– Three [ 3 ] underground level dedicated parking for ‘militarized troop personnel’ vans and/or buses.

Carefull observation, when combining all the aforementioned, initially bring a ‘few new questions’ followed by a few ‘remote suppositions’ ( immediately below ):

1. Could Issac’s seemingly ‘personal account’ have actually been ‘cleverly ghost written’ for ‘someone else’?

2. Could Issac have actually been a ‘female’?

3. Could the ‘name’ of the author, “Issac,” have actually been derived from the ‘name’ of a ‘male sibling or spouse’?

4. Could Issac’s seemingly ‘personal account’ have actually ‘taken place geographically elsewhere’?

“Issac” ‘reports’ ( further below ) begin ‘personal accountings’ by ‘laying a foundation scene’ surrounding the State of California County of Santa Clara “Silicon Valley” industrial technology history. Issac then simply includes a report ‘cover page’ entitled, “Palo Alto CARET Laboratory” so, for all intents and purposes readers may ‘then instantly gravitate with the assumption’ that Issac’s ‘personal account took place in Palo Alto, California’, but then “Issac” mentions – but does not detail – only very few ‘building characteristics’ and uses the most ‘general of terms’. Might Issac have ‘purposely laid such a foundation’ after ‘altering the true facility name on he report’ to only be known as the “Palo Alto CARET Laboratory” or “PACL” when the ‘building’ may have actually been ‘remotely located elsewhere’ albeit within or under a ‘temporary U.S. government contract project’ and/or ‘adjunct’ of yet another larger organization.

Was Issac’s ‘reported building’ just a stand-alone upscale city street-side industrial office building made of normal iron re-enforced concrete / cement walled tilt-up construction?

At the time, of Issac’s personal account’, the former ROCKWELL SCIENCE CENTER PALO ALTO LABORATORY ( 444 High Street, Suite #400, Palo Alto, California 94301 ) existed near a plethora of ‘other such organization buildings’ performing secret-sensitive work in the Silicon Valley area of northern California.

Plenty of such ‘remotely located buildings’ exist.

To name a ‘few’, are ‘buildings remotely situated’ at the U.S. National Laboratory in Los Alamos, New Mexico and although ‘such buildings and private contractors are geographically situated there’, funding secrets are hidden under ‘administrative domain auspices’ of the ‘University of California’.

But where do “Issac’s” reported ‘armed military personnel’ easily appear from in such a ‘building’?

Other ‘remotely situated buildings’ also exist – under U.S. government contract to private companies – on military reservations such as the United States Air Force Research Laboratory ( ARL ) that oversees “PHILIPS Laboratory” secret-sensitive work performed and tested ‘near but not within’ Kirtland Air Force Base, New Mexico but secretly hidden on that huge ‘reservation’.

[ PHOTO ( above): PHILIPS Laboratory at Kirkland Air Force Base, New Mexico ( USA ) NOTE: click to enlarge photo details. ]

In southern California, Edwards Air Force Base reservation holds unique offerings, amongst other secrets, where after a vehicle passes the ‘entrance sign’ it must continue to be driven an additional 20-miles further before even reaching the ‘main gate’ to gain ‘official admittance’ but with ‘further restricted movement’, whereupon scattered – all around that ‘reservation’ – are a plethora of ‘remotely situated buildings’ under ‘use’ by ‘private business U.S. government contract holders performing, amongst other things, U.S. government secret-sensitive work within a complex of buildings such as  those seen inside Area 51 ( also known as ) the Lazy G Ranch ( also known as ) The Ranch ( Nevada, USA ).

[ PHOTO ( above): Area 51 (aka) Lazy G Ranch (aka) The Ranch ‘main gate’ ( Nevada, USA ) circa 1970s. NOTE: click to enlarge photo details. ]

[ PHOTO ( above): Area 51 (aka) Lazy G Ranch (aka) The Ranch ( Nevada, USA ) circa 1970s. NOTE: click to enlarge photo details. ]

But even Area 51 (aka) the Lazy G Ranch (aka) The Ranch located in the Nevada desert cannot be compared ( here ) to its secret-sensitive  ’sister reservation’ that is only known as a ’proving ground’ someone named ”Dugway” ( Utah, USA ).

In  1968, the U.S. Navy had private contractors build its secret-sensitive China Lake Naval Weapons Station ( near Trona, California ) whereon that ‘reservation’ holds one ( 1 ) building, with eight ( 8 ) subterrainean story floor levels, that is stuck out in the middle of the southern California desert. If the U.S. Navy is a military ship sailing and aircraft flying defense organization, what is it doingwith an 8-story subterrainean building in the middle of a desert?

From within Issac’s given parameter basics describing the reported ‘upscale city industrial office building’ complex – with five ( 5 ) subterrainian stories – the closest resemblance ‘within the State of California County of Santa Clara Silicon Valley area’ that was the  ’unknown building predecessor’ of what later became known as the ‘first privately-owned and operated business’ belonging to the U.S. Central Intelligence Agency ( CIA ) named QIC ( believed known as ) QUANTUM INTEFACE CENTER ( formerly known as ) IN-Q-IT CORPORATION ( formerly known as ) IN-Q-TEL ( affectionately nicknamed ) CIA-IN-Q-TEL where the CIA business ’special technology’ research and development ( R&D ) was performed – although ‘never fully reported’ about – on ‘applications’ for what would later also be known as ” Commercial Off The Shelf ” ( C.O.T.S. / COTS ) product development of secret-sensitive technologies – ‘products’ in-essence, there would accumulate plenty of, for later distribution –  to be eventually traded for ‘other valuable considerations’ ( only very little press coverage reported it, as “… products to be sold to …”  ) ‘in-exchange’ for which a few ‘private companies’ ( e.g. ‘foreign based company’ PHILIPS, and a few select others ) could possibly offer ‘in-exchange’ for what they ‘could’ or ‘were already providing’ under U.S. government contract(s) that could ‘then’  secretly return U.S. Congress ‘budget approved’ U.S. Department of the Treasury funds by re-routing or mirroring bank wire transferred monies back into the U.S. Central Intelligence Agency ( CIA ) private business that could then re-route those monies as deemed fit secretly into yet other out-of U.S. Congressional scrutinized intelligence projects and programs.

But could all this ‘really happen’?

The webpage links ( above ) show who was initially put in-charge and what senior executives were selectively chosen from key private industries that led the private U.S. Central Intelligence Agency business so, it really should come as no surprise to a few understanding mechanics behind international stock market trading and international bank wire transfers between domestic and foreign operations of the United States Federal Reserve System.

[ PHOTO ( above ) : U.S. Central Intelligence Agency ( CIA ) business IN-Q-TEL CORPORATION logo. ]

A few such secret-sensitive self-sealing rad-hard ( anti-radiation hardening concrete / cement via ‘gamma radiation saturation’ ) buildings reposturate – ‘prior to the onslaught of’ a U.S. national emergency – via remote triggering such buildings to submerge their entire mass into underground special covering multi-story holes dug in the ground beneath them.

So, did Issac’s ‘reported building’ have such ‘additional capacities’ or ‘more’?

One might consider such to be more distinct possibilities based on what the “CARET” report entailed and according to “Issac’s” ‘personal accountings’ surrounding such.

Courtesy: Unwanted Publicity Information Group

====

My Experience With The CARET Program And Extra-Terrestrial Technology

by, Isaac [ alias moniker used by the original author ]

June 2007

This letter is part of a package I’ve assembled for Coast to Coast AM [ a nightly broadcast radio station located in the United States of America ] to distribute to its audience. It is a companion to numerous ‘document’ and ‘photo’ scans and should not be separated from them.

You can call me Isaac, an alias I’ve chosen as a simple measure of protection while I release what would be called tremendously ‘sensitive information’ even by todays standards.

‘Sensitive’ is not necessarily synonymous with ‘dangerous’, though, which is why my conscience is clear as I offer this material up for the public.

My government [ United States of America ] has its reasons for its continual secrecy, and I sympathize with many of them, but the truth is that I’m getting old and I’m not interested in meeting my maker one day with any more baggage than necessary.

Furthermore, I put a little more faith in humanity than my former bosses do, and I think that a release of at least some of this information could help a lot ‘more’ than it could ‘hurt’, especially in today’s world.

I should be clear before I begin, as a final note:

I am not interested in making myself vulnerable to the consequences of betraying the trust of my superiors and will not divulge any personal information that could determine my identity.

However my intent is not to deceive, so ‘information that I think is too risky to share’ will be simply ‘left out’ rather than obfuscated in some way ( aside from my alias, which I freely admit is not my real name ).

I would estimate that with the information contained in this letter, I could be narrowed down to one [ 1 ] of maybe 30 to 50 people at best, so I feel reasonably secure.

Some Explanation for the Recent Sightings –

For many years I’ve occasionally considered the release of at least some of the material I possess, but the recent wave of photos and sightings has prompted me to cut to the chase and do so now.

I should first be clear that I’m not directly familiar with any of the crafts seen in the photos in their entirety. I’ve never seen them in a hangar or worked on them myself or seen aliens zipping around in them. However, I have worked with and seen many of the parts visible in these crafts, some of which can be seen in the Q3-85 Inventory Review scan found at the top of this page.

More importantly though, I’m very familiar with the ‘language’ on their [ craft(s) ] ‘undersides’ [ under bellies ] seen clearly in photos by Chad, Rajman, and – ‘another form’ – in the Big Basin photos.

One question I can answer – for sure – is why they are suddenly here.

These crafts have probably existed – in their current form – for decades, and I can say – for sure – that the technology behind [ abut ] them has existed for decades before that.

The ‘language’, in fact – I’ll explain shortly why I keep putting that in quotes – was the subject of ‘my work’ in years past. I’ll cover ‘that’ as well.

The reason they [ extraterrestrial craft(s) ] are suddenly ‘visible’, however is ‘another matter’ entirely.

These crafts – assuming they’re anything like the hardware I worked with in the 1980s ( assuming they’re better, in fact ) – are equipped with technology that enables invisibility. That ‘ability’ can be controlled both ‘on board’ the craft, and ‘remotely’.

However, what’s important in this case is that this ‘invisibility’ can also be ‘disrupted’ by ‘other technology’. Think of it like ‘radar jamming’.

I would bet my life savings ( since I know this has happened before ) that these craft are ‘becoming visible’ and then ‘returning to invisibility’ arbitrarily – probably unintentionally – and undoubtedly for only ‘short periods’ due to the ‘activity of a kind’ of ‘disrupting technology’ [ sonic flocculation ] being ‘set-off elsewhere’ but ‘near-by’.

I’m especially sure of this in the case of the Big Basin sightings where the witnesses themselves reported seeing the craft just ‘appear’ and ‘disappear’.

This is especially likely because of the way the witness described one [ 1 ] of the appearances being only a ‘momentary flicker’, which is consistent with the ‘unintentional’, ‘intermittent triggering’ of such a ‘device’.

It’s no surprise that these sightings are all taking place in ‘California’ ( USA ), and especially the Saratoga Bay / South Bay area.

Not far from Saratoga is Mountain View, California ( USA ) / Sunnyvale, California ( USA ) home to Moffett Field [ formerly, a United States Army Air Corps military airfield / United States Air Force Base ( USAFB ) ] and the [ National Aeronautic Space Administration ] NASA Ames Research center.

Again, I’d be willing to bet – just about anything – that the device capable of hijacking the cloaking of these nearby craft was inadvertently triggered, probably during some kind of experiment, at the exact moment they were being seen.

Miles away, in Big Basin, the witnesses were in the right place – at the right time – and saw the results of this disruption with their own eyes.

God knows what else was suddenly appearing in the skies at that moment, and who else may have seen it.

I’ve had some direct contact with this device, or at least a device capable of the same thing, and this kind of mistake is not unprecedented.

I am personally aware of at least one [ 1 ] other incident in which this kind of technology was accidentally set off, resulting in the sudden visibility of normally invisible things.

The only difference is that these days, cameras are alot more common!

The technology itself is ‘not’ ours, or at least it was ‘not in the 1980s.

Much like the technology, in these crafts themselves, the device capable of remotely hijacking vehicle clacking comes from a non-human source too.

Why we were given this technology has never been clear to me, but it’s responsible for a lot.

Our having access to this kind of device, along with our occasionally hap-hazard experimentation on them, has lead to everything from cloaking malfunctions like this to full-blown crashes.

I can assure you that most ( and in my opinion all) incidents of UFO crashes or that kind of thing had more to do with our meddling with extremely powerful technology at an inopportune time than it did mechanical failure on their part.

Trust me, those things don’t fail unless something even more powerful than them makes them fail ( intentionally or not ). Think of it like a stray bullet. You can be hit by one at any time, without warning, and even the shooter did ‘not’ intend to hit you.

I can assure you heads are rolling over this as well.

If anyone notices a brilliant but sloppy ‘physicist’ patrolling the streets of Baghdad [ Iraq ] in the next couple weeks, I’d be willing to guess how he got there. ( I kid – of course – as I certainly hope that has ‘not’ actually happened in this case ).

I would now like to explain how it is that I know this.

The CARET Program –

My story begins the same as it did for many of my co-workers, with graduate and post-graduate work at university in electrical engineering. And I had always been interested in computer science, which was a very new field at the time, and my interest piqued with my first exposure to a Tixo during grad school.

In the years following school I took a scenic route through the tech industry and worked for the kinds of companies you would expect, until I was offered a job at the United States Department of Defense [ DoD ] and things took a very different turn.

My time at the DoD [ United States Department of Defense ] was mostly uneventful but I was there for quite a while. I apparently proved myself to be reasonably intelligent and loyal.

By 1984 these qualities along with my technical background made me a likely candidate for a new program they were recruiting for called “CARET.”

Before I explain, what CARET was, I should back up a little.

By 1984, Silicon Valley had been a juggernaut of technology for decades. In the less than 40-years since the appearance of Shockley’s transistor, this part of the world had already produced a multi billion dollar computer industry and made technological strides that were unprecedented in other fields – from hypertext and online collaboration in 1968 to the Alto in 1973.

Private industry in Silicon Valley was responsible for some of the most incredible technological leaps in history and this fact did not go unnoticed by the US government and military.

I don’t claim to have any special knowledge about Roswell [ New Mexico, USA incident believed to be an extraterrestrial flying object ( UFO ) crash ] or any of the other alleged early UFO events, but I do know that whatever the exact origin, the ‘military’ was hard at work trying to understand and use the ‘extraterrestrial artifacts’ it had in its ‘possession’.

While there had been a great deal of progress overall, things were not moving as quickly as some would have liked.

So, in 1984, the CARET program was created with the aim of harnessing the abilities of private industry in silicon valley and applying it to the ongoing task of understanding extra-terrestrial technology.

One of the best examples of the power of the tech sector was XEROX PARC, a research center in Palo Alto, California [ USA ].

XPARC was responsible for some of the major milestones in the history of computing.

While I never had the privilege of working there [ XEROX PARC ( Palo Alto, California, USA ], myself, I ‘did’ know many of the people who ‘did’ and I can say that they were among the brightest engineers I ever knew.

XPARC served as one [ 1 ] of the models for the CARET program’s first incarnation, a facility called the PALO ALTO CARET LABORATORY ( PACL ) – lovingly pronounced, “packle” during my time there.

This [ Palo Alto CARET Laboratory ] was where [ Palo Alto, California, USA ] I worked, along with numerous other civilians, under the auspices of military brass who were eager to find out how the tech sector made so much progress so quickly.

My time at the DoD [ U.S. Department Of Defense ] was a major factor behind why I was chosen, and in fact about 30+ [ 30 or more ] others – who were hired around the same time – had also been at the Department [ U.S. Department Of Defense ] about as long but this was not the case for everyone.

A couple of my co-workers were plucked right from places like IBM [ INTERNATIONAL BUSINESS MACHINES ] and, at least two [ 2 ] of them came from XPARC [ XEROX PARC ( Palo Alto, California, USA ] itself.

My DoD [ U.S. Department Of Defense ] experience did make me more eligable [ eligible ] for positions of management, however, which is how I have so much of this material [ documents, photos, etc. ] in my possession to begin with.

So, in other words, civilians ( like myself ) who had – at most – some decent experience working for the DoD [ U.S. Department Of Defense ] but no actual military training or involvement were suddenly finding ourselves in the same room as highly classified extra-terrestrial technology.

Of course they spent about 2-months briefing us all before we saw or did anything, and did their best to convince us that if we ever leaked a single detail about what we were being told, they’d do everything short of digging up our ancestors and putting a few slugs in them too – just for good measure.

It seemed like there was an armed guard in every corner of every room.

I’d [ I had ] worked under some pretty hefty NDAs [ Non-Disclosure Agreements ] in my time but this was so far out of my depth. I didn’t think I was going to last 2-weeks in an environment like that. But amazingly things got off to a good start.

They wanted us, plain and simple, and our industry – had shown itself to be so good at what it did – that they were just about ready to give us carte blanche.

Of course, nothing with the military is ever that simple, and as is often the case they wanted to have their cake and eat it too. What I mean by this is that despite their interest in picking our brains and learning whatever they could from our way of doing things, they still wanted to do it ‘their way’ often enough to frustrate us. At this point I’m going to gloss over the emotional side of this experience, because this letter isn’t intended to be a memoir, but I will say that there’s almost no way to describe the impact this kind of revelation has on your mind.

There are very few moments in life in which your entire world view is turned forever upside down, but this was one of them.

I still remember that turning point – during the briefing – when I realized what he’d just told us, and that I hadn’t heard him wrong, and that it wasn’t some kind of joke.

In retrospect, the whole thing feels like it was in slow motion, from that ‘slight pause’ he took – just before the term “extra-terrestrial” came out for the first time – to the way the room itself seemed to go off kilter as we collectively tried to grasp what was being said.

My reflex kept jumping back and forth between trying to look at the speaker, to understand him better, and looking at everyone else around me, to make sure I wasn’t the only one that was hearing this.

At the risk of sounding melodramatic, it’s a lot like a child learning his parents are divorcing. I never experienced that myself, but a very close friend of mine did when were boys, and he confided in me a great deal about what the experience felt like. A lot of what he said would aptly describe what I was feeling in that room.

Here was a ‘trusted authority figure’ telling you something that you just don’t feel ready for, and putting a burden on your mind that you don’t necessarily want to carry. The moment that first word comes out, all you can think about it is, what it was like only ‘seconds ago’, and knowing that life is never going to be as simple as it was ‘then’.

After all that time at the DoD [ U.S. Department Of Defense ], I thought I at least had some idea of what was going on in the world, but I’d never heard so much as a peep about this.

Maybe one day I’ll write more on this aspect, because it’s the kind of thing I really would like to get off my chest, but for now I’ll digress.

Unlike traditional research in this area, we weren’t working on new toys for the air force.

For numerous reasons, the CARET people decided to aim its efforts at ‘commercial applications’ rather than ‘military’ ones.

They basically wanted us to turn these ‘artifacts’ into something they could ‘patent’ and ‘sell’.

One of CARET’s most ‘appealing promises’ was the revenue generated by these product-ready technologies, which could be funneled right back into ‘black projects’. Working with a ‘commercial application’ in-mind was also yet another way to keep us in a familiar mind state. Developing technology for the military is very different than doing so for the ‘commercial sector’, and not having to worry about the difference was another way that CARET was very much ‘like private industry’.

CARET shined, in the way it let us work the way we were used to working. They wanted to recreate as much of the environment we were used to as they could without compromising issues like security. That meant we got ‘free reign to set up’ our own ‘workflow’, ‘internal management structure’, ‘style manuals’, ‘documentation’, and the like. They wanted this to look and ‘feel like private industry’, ‘not the military’. They ‘knew’ this was ‘how to get the best work out of us’, and they were right.

But things didn’t go as smoothly when it came to matters like access to classified information.

They were exposing what is probably their single biggest secret to a group of people who had never even been through basic training and it was obvious that the gravity of this decision was never far from their minds.

We started the program with a small set of ‘extra-terrestrial artifacts’ along with ‘fairly elaborate briefings’ on ‘each’ as well as ‘access to a modest amount of what research had already been completed’.

It wasn’t long before we realized ‘we needed more’ though, and getting them to provide even the smallest amount of new material was like pulling teeth.

CARET stood for “Commercial Applications Research for Extra-Terrestrial Technology”, but we often joked that it should have stood for “Civilians Are Rarely Ever Trusted.”

PACL [ PALO ALTO CARET LABORATORY ] was located in Palo Alto [ California, USA ], but unlike XPARC [ XEROX XPARC ( Palo Alto, California, USA ], it wasn’t at the end of a long road in the middle of a big complex surrounded by rolling hills and trees.

PACL was hidden in an ‘office complex’ – owned entirely by the military but ‘made to look like an unassuming tech company’.

From the street, all you could see was what appeared to be a normal ‘parking lot’ with a ‘gate’ and a ‘guard [ security ] booth’, and a 1-story building inside with a ‘fictitious name’ and ‘[ fictitious ] logo’.

What was ‘not visible’ – from the street – was that ‘behind’ the very ‘first set of doors’ was enough ‘armed guards’ to invade Poland, plus five [ 5 ] additional underground stories [ levels ].

They wanted to be as close as possible to the kinds of people they were looking to hire, and be able to bring them in with a minimum of fuss.

Inside, we had everything we needed. State of the art hardware and a staff of over 200 computer scientists, electrical engineers, mechanical engineers, physicists and mathematicians.

Most of us were civilians, as I’ve said, but some were military, a few of them had been working on this technology already.

Of course, you were never far from the barrel of a ‘machine gun’ – even ‘inside the labs’ themselves ( something many of us never got used to ) – and ‘bi-weekly tours’ were made by ‘military brass’ to ensure that not a single detail was out of line. Most of us underwent extensive searches on our way into and out of the building. There it was, probably the biggest secret in the world, in a bunch of parts spread out on laboratory tables in the middle of Palo Alto so you can imagine their concern.

One ‘downside’ to CARET was that it was ‘not’ as ‘well-connected’ as ‘other operations’ undoubtedly ‘were’.

I ‘never got to see’ any ‘actual extra-terrestrials’ ( not even photos ), and in fact ‘never even saw’ one [ 1 ] of their ‘complete vehicles’ – ’99% of what I saw’ was ‘related to the work at-hand’, all of which was conducted within a very narrow context on ‘individual artifacts only’. The remaining ’1% came from people’ I met through the program, many of which ‘working more closely’ with “the good stuff” or ‘had [ worked with ] in the past’.

In fact, what was especially amusing about the whole affair was the way that our ‘military management’ almost ‘tried to act’ as if the ‘technology’ – we were essentially ‘reverse engineering’ – was ‘not extra-terrestrial’ at all.

Aside from the word “extra-terrestrial,” itself, we rarely heard any other terms like “alien” or “UFO” or “outer space” or anything. ‘Those aspects’ were ‘only mentioned briefly’ when absolutely ‘necessary to explain something’.

In many cases it was necessary to ‘differentiate’ between the different ‘races’ and ‘their’ respective ‘technology’, and they did ‘not’ even use the word “races.” They were referred to simply as different “sources.”

The Technology –

A lot of the technology we worked on was what you would expect, namely ‘anti-gravity’. Most of the ‘researchers’ ( on the staff ) – with ‘backgrounds’ in ‘propulsion’ and ‘rocketry’ – were ‘military’ men, but the ‘technology’ we were dealing with was so ‘out of this world’ that it didn’t really matter all that much what your background was because none of it applied.

All we could hope to do was use the ‘vocabulary’ of our respective fields as a way ‘to model’ the extremely bizarre ‘new concepts’ we were very slowly ‘beginning to understand’ as best we could.

A ‘rocket engineer’ doesn’t usually rub elbows much with a ‘computer scientist’, but inside PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ], we were all ‘equally mystified’ and were ready to ‘entertain any and all ideas’.

The ‘physicists’ made the most headway, initially because out of all of our skills, their’s ‘overlapped the most’ with the ‘concepts behind this technology’ ( although that isn’t saying much! ). Once they [ physicists ] got the ball rolling though, we began to find that many of the ‘concepts found in computer science’ were applicable as well, albeit in very vague ways.

While I didn’t do a lot of work with the antigrav [ anti-gravity ] ‘hardware’, myself, I was occasionally involved in the ‘assessment’ of ‘how’ that ‘technology’ was meant to ‘interface’ with its ‘user’.

The antigrav [ anti-gravity ] was amazing, of course, as were the ‘advances’ we were making with ‘materials engineering’ and so on.

But what interested me most then, and still amazes me most to this day, was something completely unrelated.

In fact, it was this ‘technology’ that immediately jumped out at me when I ‘saw’ the Chad and Rajman ‘photos’, and even more-so in the ‘Big Basin photos’.

The “Language” –

I put the word Language in quotes because calling what I am about to describe a “language” is a misnomer, although it is an easy mistake to make.

Their [ extraterrestrial ] ‘hardware’ was ‘not’ operated in quite the same way as ours.

In our technology, even today, we have a combination of ‘hardware and software’ running almost everything on the planet.

Software is more abstract than hardware, but ultimately it needs hardware to run it.

In other words, there’s no way to write a computer program on a piece of paper, set that piece of paper on a table or something, and expect it to actually do something.

The most powerful ‘code’ in the world still ‘does not actually do anything’ until a piece of ‘hardware interprets it [ software ]‘ and ‘translates’ its ‘commands’ into ‘actions’.

But ‘their [ extraterestrial ] technology’ is ‘different’.

It really did operate like the magical piece of paper sitting on a table, in a manner of speaking.

They had something akin to a ‘language’ that could quite literally ‘execute’ itself – at least in the ‘presence’ of a very specific type of ‘field’ [ ‘field presence execution’ ].

The ‘language’, a term I am still using very loosely, is a ‘system’ of ‘symbols’ ( which does admittedly very much resemble a written language ) along with ‘geometric forms’ and ‘[ geometric ] patterns’ that fit together [ ‘interlocking’ ] to ‘form diagrams’ that are themselves ‘functional’.

Once they [ interlocking symbolic format diagrams ] are ‘drawn’ – so to speak – on a suitable ‘surface’ made of a suitable ‘material’ and in the ‘presence’ of a certain type of ‘field’, they immediately begin performing the desired tasks. It really did seem like magic to us, even after we began to understand the principles behind it.

I worked with these ‘symbols’ – more than anything [ else ] – during my time at PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ], and ‘recognized them’ the moment I saw them in the ‘photos’.

They appear in a very simple ‘form’ on Chad’s ‘craft’, but appear in the ‘more complex diagram form’ on the ‘underside’ of the ‘Big Basin craft’ as well.

Both are unmistakable, even at the small size of the Big Basin photos.

An example of a diagram in the style of the Big Basin craft is included with this in a series of scanned pages from the [ mistitled ] “Linguistic Analysis Primer”.

We needed a copy of that diagram to be utterly precise, and it took about a [ one – 1 ] month [ 30-days ] for a team of six [ 6 ] to ‘copy’ that ‘diagram’ into our drafting program!

Explaining everything I learned about this technology would fill up several volumes, but I will do my best to explain at least ‘some’ of the ‘concepts’ – as long as I am taking the time to write all this down.

First of all, you wouldn’t open-up their [ extraterrestrial ] ‘hardware’ to find a CPU here, and a data bus there, and some kind of memory over there.

Their [ extraterrestrial ] ‘hardware’ appeared to be ‘perfectly solid’, and consistent, in terms of ‘material’ – from one side to the other. Like a rock or a hunk of metal.

But upon [ much ] closer inspection, we began to learn that it was actually one [ 1 ] big ‘holographic computational substrate’ – each “computational element” ( essentially, individual ‘particles’ ) can ‘function independently’ but are ‘designed to function together’ in tremendously ‘large clusters’.

I say its ‘holographic’ because you can ‘divide it up into the smallest chunks’ you want and still find a scaled-down but complete representation of the whole system.

They produce a ‘non-linear computational output’ when ‘grouped’.

So four [ 4 ] elements, working together, is actually more than four [ 4 ] times ‘more powerful than’ one [ 1 ].

Most of the internal “matter” in their [ extraterrestrial ] ‘crafts’, usually everything – except the outermost housing – is actually ‘this [ extraterestrial] substrate’ and can ‘contribute to computation’ at ‘any time’ and in ‘any state’.

The ‘shape’ of these [ extraterrestrial ] “chunks” of ‘substrate’ also had a profound ‘effect’ on its [ extraterrestrial ] ‘functionality’, and often served as a “shortcut” to achieve a goal that might ‘otherwise’ be more ‘complex’.

So back to the language.

The language is actually a “functional blueprint.”

The ‘forms’ of the ‘shapes’, ‘symbols’ and ‘arrangements’ thereof is itself ‘functional’.

What makes it all especially ‘difficult to grasp’ is that every ‘element’ of each “diagram” is ‘dependant on’ and ‘related to’ every ‘other element’ [ elements ], which means ‘no single detail’ can be ‘created’, ‘removed’ or ‘modified’ independently.

Humans like written language because each element of the language can be understood on its own, and from this, complex expressions can be built.

However, their “language” is entirely ‘context sensitive’, which means that ‘a given symbol’ could mean as little as a ’1-bit flag’ in ‘one [ 1 ] context’, or – quite literally – contain the entire human genome or a galaxy star map in another.

The ability for a single, small symbol to contain, not just represent, tremendous amounts of data is another counter-intuitive aspect of this ‘concept’.

We quickly realized that even ‘working in groups’ of ten [ 10 ] or more on the ‘simplest of diagrams’, we found it virtually impossible to get anything done. As each new feature was added, the ‘complexity of the diagram exponentially grew’ to unmanageable proportions.

For this reason we began to develop computer-based systems to manage these details and achieved some success, although again we found that a threshold was quickly reached beyond which even the supercomputers of the day were unable to keep up.

Word was that the ‘extraterrestrials could design’ these ‘diagrams’ as ‘quickly’, and [ as ] easily as a human programmer could write a [ computer language ] Fortran program.

It’s humbling to think that even a ‘network of supercomputers’ was ‘not’ able to ‘duplicate’ what they could do in their [ extraterrestrial ] own heads.

Our entire system of language is based on the idea of assigning meaning to symbols.

Their [ extraterrestrial ] technology, however, somehow ‘merges’ the ‘symbol’ and the ‘meaning’, so a subjective audience is not needed.

You can put whatever meaning you want on the symbols, but their behavior and functionality will not change, any more than a transistor will function differently if you give it another name.

Here’s an example of how complex the process is.

Imagine I ask you to incrementally add random words to a list such that no two [ 2 ] words use any of the same letters, and you must perform this exercise entirely in your head, so you can’t rely on a computer or even a pen and paper.

If the first [ 1st ] in the list was, say, “fox”, the second [ 2nd ] item excludes all words with the letters F, O and X.

If the next word you choose is “tree”, then the third [ 3rd ] word in the list can’t have the letters F, O, X, T, R, or E in it.

As you can imagine, coming up with even a third [ 3rd ] word might start to get just a bit tricky, especially since you can’t easily visualize the excluded letters by writing down the words.

By the time you get to the fourth [ 4th ], fifth [ 5th ] and sixth [ 6th ] words, the problem has spiraled out of control.

Now imagine trying to add the billionth [ 1,000,000,000 ] word to the list ( imagine also that we’re working with an ‘infinite alphabet’ so you don’t run out of letters ) and you can imagine how difficult it is for even a computer to keep up.

Needless to say, writing this kind of thing “by hand” is orders of magnitude beyond the capabilities of the brain.

My background lent itself well to this kind of work though. I’d spent years ‘writing code’ and ‘designing’ both ‘analog’ and ‘digital’ circuits, a process that at least visually resembled these diagrams in some way.

I also had a personal affinity for ‘combinatorics’, which served me well as I helped with the ‘design of software’ running on ‘supercomputers’ that could juggle the often trillions [ 1,000,000,000,000 ] of rules necessary to create a ‘valid diagram’ of any ‘reasonable complexity’.

This overlapped quite a bit with ‘compiler theory’ as well, a subject I always found fascinating, and in particular ‘compiler optimization’, a field that was ‘not’ half [ 50% ] of what it is today back then.

A running joke among the linguistics team was that Big-O notation couldn’t adequately describe the scale of the task, so we’d substitute other words for “big”.

By the time I left I remember the consensus was “Astronomical-O” finally did it justice.

Like I said, I could go on for hours about this subject, and would love to write at least an introductory book on the subject if it was not – still completely – ‘classified’, but that’s not the point of this letter so I’ll try to get back on track.

The last thing I’d like to discuss is how I got copies of this material, what else I have in my possession, and what I plan to do with it in the future.

My Collection –

I worked at PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] from 1984 to 1987, by which time I was utterly burned out.

The sheer volume of details to keep in mind while working with the diagrams was enough to challenge anyone’s sanity, and I was really at the end of my rope with the military attitude towards our “need to know”. Our ability to get work done was constantly hampered by their reluctance to provide us with the necessary information, and I was tired of bureaucracy getting in the way of research and development [ R&D ].

I left somewhere in the middle of a 3-month bell curve in which about a quarter of the entire PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] staff left for similar reasons.

I was also starting to disagree with the direction the leadership wanted to take as far as the subject of extra-terrestrials went.

I always felt that at least some form of disclosure would be beneficial, but as a lowly CARET ‘engineer’ I wasn’t exactly in the position to call shots.

The truth is, our management didn’t even want us discussing – even among ourselves – non-technical aspects of this subject ( such as ethical or philosophical issues, as they felt it was enough of a breach of security to let civilians like us anywhere near this kind of thing in the first place.

So, about 3-months before I resigned ( which was about 8-months before I was really out – since you don’t just walk out of a job like that with a 2-week notice ) – I decided to start taking advantage [ remove PACL work documents, etc. ] of my ‘position’ [ a ‘situational position’ wherein his ( Issac ) PACL ‘security inspections’ on his ( Issac ) ‘person’ became lessened or ‘weak’ upon his ( Issac ) ‘departures from the PACL facility’ ].

As I mentioned earlier, my DoD [ United States Department Of Defense ] experience got me into an internal management role sooner than some of my colleagues, and after about a [ one – 1 ] year of that kind of status, the outgoing [ departing ] searches [ security inspections ] each night became slightly less rigorous.

Normally, we were to empty out any containers, bags or briefcases, then remove our shirt and shoes and submit to a kind of frisking. Work was never allowed to go home with you, no matter who you were.

For me, though, the briefcase search [ secuity inspection ] was [ had become ] eventually enough [ all that the security inspection became on him ( Issac ) ].

Even before I [ Issac ] actually decided to do it [ remove PACL work documents, etc. ], I was sure that I would be able to sneak certain materials out with me.

I wanted to do this [ remove PACL work documents, photos, etc. ] because I knew the day would come when I would want to write something like this, and I knew I’d regret it until the day I died if I didn’t at least leave the possibility open to do so.

So I started photocopying [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] documents and reports by the dozen.

I had then [ 3-months before he ( Issac ) resigned from PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] put the papers [ documents, etc. ] under my shirt around my lower back, tucked enough into my belt to ensure they wouldn’t fall out.

I could do this [ ‘physically able to do’ but ‘not authorized to do’ ] in any one of a few ‘short windowless hallways’ on some of the ‘lower floors’, which were among the few places that did ‘not’ have an ‘armed guard watching’ my every move.

I would walk in one end [ of the ‘short windowless hallways’ ] with a stack of papers large enough that when I came out the other end [ of the ‘short windowless hallways’ ] with some of them [ documents, photos, etc. ] in my shirt – there would ‘not’ be a visible [ observational ] difference in what I was holding.

You absolutely cannot be too careful if you’re going to pull a stunt like this.

As long as I walked carefully they would ‘not’ make a crinkling noise [ paper flex rustling upon movement ].

In fact, the more papers I took, the less noise they made, since they were ‘not’ as flimsy [ resistant to flex upon restricted movement ] that way.

I’d often take upwards of 10-pages up to 20-pages at once [ each time ].

By the time I was done, I had made out with [ unlawfully removed documents, photos, etc. away from PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ‘hundreds’ [ 200+ or more ] of ‘photocopies’, as well as a few ‘originals’ and a ‘large collection’ of ‘original photographs’.

With this ‘initial letter’, I have attached high resolution scans of the following:

– One [ 1 ] page is from a [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] “inventory review” with a ‘photo’ – appears to depict one ( 1 ) of the ‘parts’ found in the Rajman sighting and ‘parts’ very similar to the Big Basin craft;

– The first [ 1st ] nine ( 9 ) pages of one ( 1 ) of our [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ‘quarterly’ research ‘reports’;

– Scans of the ‘original photographs’ used ‘in that report’ – since the ‘photocopies obscure’ most of the ‘details’; and

– Five [ 5 ] pages from a ‘report’ on our [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ongoing analysis of the “language” ( inappropriately titled “linguistic analysis” ) depicting the kind of diagram – just barely visible on the underside of the Big Basin craft.

This material is the most, ‘relevant’ and ‘explanatory’, I could find on ‘short notice’.

Now that these are up [ on the internet ], ‘if’ I decide to release more in the future, I’ll be able to take my time and better search this rather large collection of mine that I’ve sadly never organized.

I’m not sure what I’ll be doing with the rest of the collection in the future.

I suppose I’ll wait and see how this all plays out, and then play it by ear.

There are certainly risks involved in what I’m doing, and if I were to actually be identified and caught, there could be rather serious consequences.

However, I’ve taken the proper steps to ensure a ‘reasonable level of anonymity’ and am quite secure in the fact that the information I’ve so far provided is by ‘no means unique’ among many of the CARET participants [ had access to ].

Besides, part of me has always suspected that the [ United States of America ] government ‘relies on the occasional leak’ – like this – and actually wants them to happen, because it ‘contributes to a steady slow-paced path towards revealing’ the ‘truth’ of this ‘matter’.

Since Leaving CARET –

Like I said, I left PACL in 1987, but have kept in touch with a great many of my friends and co-workers from those days.

Most of us are retired by now, except – of course – for those of us that went-on to get ‘teaching jobs’, but a few of us ‘still hear things’ [ ‘still told of these matters’ ] through the grapevine.

As for CARET itself, I’m not sure what’s become of it.

Whether it’s still known by the same name, I’m quite sure it’s ‘still active’ in ‘some capacity’, although who knows where.

I heard from a number of people that PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] closed up shop a few years after I left, but I’ve still yet to get a clear answer on why exactly that happened.

But I’m sure ‘the kind of work we did there’ [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] is ‘still going’ strong.

I’ve heard from a lot of friends that there are multiple sites like PACL in Sunnyvale, California ( USA ) and Mountain View, California ( USA ) also disguised to look like ‘unremarkable office space’.

But this is all second-hand information so you can make of it what you will.

Around 2002, or so, I came across Coast to Coast AM [ radio station in the United States of America ] and have been hooked ever since.

I admit, I don’t take most of the [ radio program ] show’s content as anything more than entertainment, but there have been occasions when I could be sure a guest was clearly speaking from experience or a well-informed source.

For me, there’s just something very ‘surreal about hearing all this speculation’ and ‘so-called inside information’ about UFOs [ Unidentified Flying Objects ] ( and the like ) but [ my ( Issac ) ] being ‘personally able to verify’ at least ‘some of it’ as being true or false. It’s [ Coast to Coast AM radio program ( USA ) ] also a ‘nightly’ [ time period, when Coast to Coast AM radio is broadcasted ] reminder of how hectic things were in those days, which helps me enjoy my retirement all the more.

Knowing I’m not part of that crazy world anymore really is something I enjoy on a daily basis, as much as I miss some of it.

Conclusion –

What I’ve shared so far is only a very small portion of what I have, and what I know.

Despite the very sheltered and insulated atmosphere within CARET, I did ultimately learn a great deal from various colleagues, and some of what I learned is truly incredible.

I’d also like to say that for what it’s worth, during my time [ 1983 – 1987 ] there [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] I never heard anything about invasions, or abductions, or many of the more frightening topics that often pop up on Coast to Coast AM [ radio program ( USA ) ].

That’s not to say that none of it is true, but in my time working alongside some of the most well-connected people in this field, it never came up.

So at the very least I can say my intent is not to scare anyone.

My view on the extra-terrestrial situation is very much a positive, albiet still highly secretive one.

One thing I can definitely say is that if they wanted us gone, we would have been gone a very, very long time ago, and we wouldn’t even have seen it coming.

Throw out your ideas about a space war or anything silly like that. We’d be capable of fighting back against them about as much as ants could fight back against a stampede of buffalo.

But that’s okay, we are the ‘primitive race’, they [ extraterrestrials ] are the ‘advanced races’, and that’s just the way it is.

The ‘other advanced races let them live through their primitive years’ back in ‘their day’, and there is no reason to think it will be any different for us.

They [ extraterrestrials ] are not in the market for a new planet, and even if they [ extraterrestrials ] were there are way too many planets out there for them [ extraterrestrials ] to care about ours enough to take it by force.

To reiterate my take on the recent sightings, I would guess that experimentation – done in the last couple months – on a device that, among other things, is capable of interfering with various crafts onboard invisibility has resulted in a sudden wave of sightings.

It may ‘not’ explain ‘all’ of the recent events, but like I said, I’d bet my life that ‘is’ exactly what happened at Big Basin – at least – and it’s probably related in some way to the Chad, Rajman and Tahoe [ Lake Tahoe, California / Nevada ( USA ) ] sightings [ of the unidentified flying object ( UFO ) ].

So, despite all the recent fanfare over this, I’d say this does ‘not’ mean much.

Most importantly, they are ‘not suddenly’ “here,” they [ extraterrestrials ] have been here for a long time, but just [ have ] happened to turn ‘intentionally visible’ for brief periods ‘recently’.

Lastly, there are so many people selling books, and DVDs, and doing lectures and all that so, I would like to reiterate the fact that I am ‘not’ here to ‘sell’ anything.

The material I’m sharing is ‘free to distribute’ provided it’s all kept intact and unmodified, and this letter is included.

I tend to question the motives of anyone charging money for their information, and will assure you that I [ Issac ] will never do such a thing.

And in the future, just to cover all the bases, anyone claiming to be ‘me’ [ Issac ] who ‘is’ selling a DVD or book is most certainly ‘not going to be me’ [ Issac ].

Any future releases from me [ Issac ] will come from the e-mail address I’ve used to contact Coast to Coast AM [ USA radio station ], and will be sent to them [ Coast to Coast AM ( USA radio station ) ] only.

I’d like to make this clear as well to ensure that people can be sure that any future information comes from the same source, although I must be clear:

At this time I do not have any future plans for additional information. Time will tell how long I will maintain this policy, but do not expect anything soon.

I’d really like to let this information “settle” for a while and see how it goes.

If I find out I’m getting an IRS [ United States Department of the Treasury, Office of Internal Revenue Service ( IRS ) ] audit tomorrow, then maybe this wasn’t too smart.

Until then, I’m going to take it slow.

I hope this information has been helpful.

– Issac

– –

One of the documents ( in the form of high resolution scans of the original ) uploaded was called “PALO ALTO CARET LABORATORY Q-4 1986 RESEARCH REPORT” – here are some excerpts:

1. OVERVIEW –

This document is intended as a primer for the tentative findings of the Q4 1986 research phase ( referred to herein as “Q-4 1986″ ) at the Palo Alto CARET Laboratory (aka) PACL. In accordance with the CARET program mission statement, the goal of this research has been achieving a greater understanding of extraterrestrial technology within the context of commercial applications and civilian use. Examples of such applications, in no particular order, include transportation, medicine, construction, energy, computing and communication.

The ultimate goal of this research is to provide a core set of advanced technologies in a condition suitable for patent review.

2. EXTRACTION –

The process of converting raw artifacts of extraterrestrial origin to usable, fully-documented human technology is termed extraction. The extraction process ultimately consists of two phases:

First [ 1st ] is the establishment of a complete theoretical and operational understanding of the artifact; and,

Second [ 2nd ] is a distillation of the artifact’s underlying principles into usable, product-oriented technology.

Suggestions of specific product applications on behalf of PACL have been encouraged, but are not considered mandatory or essential.

– –

From: Isaac Subject: Re: “Drones” Date: June 27, 2007

Isaac:

“There are a few misconceptions that I have noticed so far and would like to clear them up, and will also answer your questions:

1) I realize now that I did not make this clear, but I should clarify that I am not responsible for the blacking out of the Q4-86 report. Most of the copies I was able to make came from documents that were already archived, which meant that they had already been censored for use by outside parties that needed access to some, but not all, of CARET’s information. I’m trying to share this information, not hide it, but if I did feel that if a given topic was too sensitive for some reason, I would make it clear that I had personally covered it up and probably try to give a reason why.

2) I do not understand the question about why the diagram would be “formatted for 8.5 x 11″… As I mention in my letter, the diagram is a reproduction, not the original. We had a team of technical artists painstakingly copy the diagram from its original source, which was a slightly curved panel not unlike the one seen in the Big Basin craft, although this one was apparently inside the craft, not on the outside. We copied it into a drafting program over the course of about a month.

Our software was understandably primitive by today’s standards, but it was still orders of magnitude more powerful than a pencil and paper would have been. This made a task that would have otherwise been nearly impossible relatively feasible, albeit extremely time-consuming. I can assure you, “they” did not make anything particularly convenient for us. One of the reasons we chose to reproduce that particular diagram was because out of all the diagram-artifacts we had access to, it was on the flattest surface.

Since the geometry of the forms is extremely important, curvature of the surface it’s printed on must be “corrected” if it is to be reproduced in a surface with a different contour (such as a flat page). This can be done in a number of ways, by either using a mathematical model to reverse the effect of the surface curves on the diagram’s shapes, or by methods of physical measuring that allow precise measuring of irregular surfaces. In either case, however, it adds a significant new dimension of labor to an already extremely labor-intensive task, so it’s avoided whenever possible. We really just needed one or two accurately copied diagrams to serve as convenient examples for our own work in decoding and reproducing it, so luckily this was not something we had to do often. Some experimentation was being done on ways to “scan” the diagrams as well, using an almost completely automated process that could automatically account for curved surfaces, but during my time there, very little progress was made on this front.

3) I think the confusion over the quality of the documents stems from the fact that he (critic) is under the impression they (CARET document) were typeset. They were not. First of all, I’m no guru when it comes to graphics or design, but being in close contact with numerous people from places like XPARC will give you enough background to know the lay of the land. What’s first important to note is that systems capable of desktop publishing had been in development for many years before CARET, mostly starting with the Xerox Alto (in 1973), which XPARC developed themselves.

In fact, I once remember hearing from someone related to the original Alto team that Boeing (I believe) used the Alto to lay out and print the documentation for one of their planes (or something to that effect, I heard the story years ago). The joke was apparently that there was so MUCH documentation that the plane itself could essentially be filled with the pages. Furthermore, laser printing itself had also been around for many years (albeit in an extremely expensive form), and was also developed within XPARC (more or less). Other systems, such as PERQ and Lilith, also came out around the late 70′s and while none of them turned into major commercial products, they were not uncommon among large companies and [mostly] universities and were put to very productive use.

These systems were also the inspiration for the Apple Lisa and Macintosh, which was of course perhaps the biggest factor in the consumer-level desktop publishing boom of the late 80′s and early 90′s. By 1984, there were quite a few options available for producing these kinds of documents, they were just ABSURDLY expensive, so they weren’t on every street corner. Obviously it was nowhere near as turnkey and simple as it is today, but it was a very crude approximation of the same process with similar tools. We just had far less features and everything was a hell of a lot slower. But the point I’m trying to make is that while our method of documentation was somewhat advanced for its time, and also somewhat uncommon, it was hardly unattainable by a sufficiently motivated, financed, and well-connected organization.

I had very little contact with the technical writers for the most part, but I do know that we were using this kind of technology for both page layout and printing. CARET was expected to produce a massive amount of detailed, well-formatted documentation that could be easily modified and re-used for numerous drafts and revisions, and we would not have been able to keep up using traditional page layout and typesetting techniques. The mid-1980′s were a very transitional period for these fields, and I would suggest that people do not assume we were using run-of-the-mill standards.

One of the things I appreciated most about CARET was that if the technology was available, and we needed it to work better or more effectively, it was given to us with little debate. But typesetting and digital page layout are apples and oranges, so I think most of this is a moot point anyway.

The bottom line is that many people both inside and outside the engineering world frequently underestimate how long we’ve had a lot of the technology we have. 99% of the algorithms we use today were developed decades ago, they just didn’t have the same practical applications immediately available. Most of the engineers of the 60′s and 70′s would have been right at home with today’s developments and technologies. The only difference is that things have gotten smaller and faster. In the vast majority of technologies, that is the only thing that REALLY changes from one era to the next. If I told the average person that we had speech-synthesizing technology in 1936, they probably wouldn’t believe me.

I could show you a prototype of a simple drafting/design system that was operated by a light pen directly on a screen from the 1960′s. You could draw a shape freehand, then immediately rotate it, modify it, duplicate it, or whatever. You could draw lines connecting different objects, then erase them by simply drawing a squiggly line over it. The computer could interpret the squiggles as a sign to erase something, all in real time. And this was half a century ago, and decades before CARET. Think about that for a moment. The point is, most of what we have today is much older than we think. The only differences are that it’s faster, cheaper, and a marketing team has given it a glossy finish and found a commercial application for it. But if you take away some of the speed, power, ubiquity and consumer appeal, you’ll find a lot of today’s technology scattered throughout much of the 20th century. I hope this is helpful.

Isaac”

– –

From: Isaac Subject: Re: “Drones” Date: June 27, 2007

Isaac:

“1) While I wasn’t a major player in the (CARET) organization, I was hardly ‘some worker.’ My middle-management position is the only reason I was able to make out with what I did. Bear in mind that even someone in my position would never get the chance to leave with even the smallest of actual artifacts, but paperwork smuggling was feasible for anyone who wasn’t subjected to the frisking.

Also, let’s not forget that paperwork only proves so much. I’ll be the first to agree that everything I’ve provided could be faked, I suppose. It is, after all, just a series of images. While the powers that be obviously don’t want this material leaking if they can help it, they’re certainly aware that scans of documents aren’t in the same league as UFOs landing on the White House lawn. I’m not the first person to leak a document or a photo, and I won’t be the last. The information I’ve shared is very unlikely to change the world, and this is the reason I’m not worried about being literally murdered if I’m identified. I’ll face consequences to be sure, but it’s not the kind of thing they kill for.

2) Of course the manual doesn’t look anything like typical government and military documents. The entire purpose of CARET was to recreate the look and feel of silicon valley private enterprise, populate it with private industry engineers, and let it tackle the problem of extraterrestrial technology research. Style manuals were among the numerous things we brought with us from the ‘outside world.’ I’m not sure what else can be said about this. I agree it’s uncommon for non-standard documents to come out of this kind of research, but it’s even more uncommon for people like myself (and even more so for many of my co-workers) to be brought into this kind of project in the first place. Most of us were decidedly not military men. I find it a lot more bizarre than the fact that we were able to design our reports a certain way. CARET was an exception to many of the usual rules.

3) If he (one of many critics who emailed Earthfiles and which I shared with Isaac) believes the pictures are fake, I certainly can’t do or say anything to prove otherwise. He sounds very sure of himself.

4) Most importantly, be very wary of anyone who claims to ‘know the mind’ of extraterrestrials. The comments he’s made are, to put it lightly, naive and extremely presumptuous. Firstly, he’s referring to ‘the aliens’ as if there is a single collective group of them. The universe is not split into ‘humans’ and ‘non-humans,’ any more than Earth is split up into ‘Spanish’ and ‘non-Spanish’ or something equally arbitrary. There are numerous races – and again, like our own races of humans here on earth, they do things in very different ways.

His comment that ‘the aliens don’t do this or that’ is akin to saying ‘humans don’t speak Japanese.’ Well, many humans don’t, but Japanese humans certainly do. The point is not that his statement is right or wrong, but simply that it’s phrased illogically. He then goes on to suggest that the design of the drones is wasting space, which is again, alarming in its arrogance. We had some of the brightest minds in the world spending years just to understand a single facet of their technology, while this individual claims to be able to assess basically every detail of a given design after looking at a single photo and conclude that it’s inefficient. I’m not even sure such a statement should be dignified with a response, and I’m sure you can understand why.

To be honest, whoever this person is, I wrote him off as soon as he said ‘the aliens would never design as these pictures depict.’ That’s about as presumptuous (if not ignorant) as a statement on this subject can be, at least coming from a fellow human. Unless there’s an alien engineer on the other side of this email, there’s simply no way such statements could have merit. I’m really only writing this as a courtesy to you.

At best, he’s been exposed to technology from a radically different race, and at worst, he doesn’t know what he’s talking about. This individual may have access to real information, and he might not. If he is a fellow ‘whistle blower,’ then I’m not interested in attacking him. If he’s not, and is simply making things up, then I’m even less interested. Whatever he is or isn’t is not for me to say, but judging by the way he talks about this issue I have my doubts.

It’s a big world and these are complicated issues. A sense of humility and the admission we don’t know everything is one of our greatest assets.

Isaac”

====

Submitted for review and commentary by,

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

Quantum Crypto Keys

Quantum Cryptographic Control screen QCrypt QKey

[ IMAGE ( above ): Quantum Cryptographic Control QCrypt QKey Display Screen. Click on image to enlarge. ]

Quantum Crypto Keys
by, Concept Activity Research Vault ( CARV )

November 19, 2011 11:34:08 ( PST ) Update ( Published: November 4, 2010 )

USA, Virginia, Tysons Corner – November 19, 2011 – What business continually builds its inventory, no matter what happens anywhere in the world, and never stops building it?

While some may fear big brother, others are financially profiting from carefully researching otherwise unknown private sector business investment portfolios strategically partnered with government intelligence agencies.

Quantum Cryptography –

Expect quantum cryptography to become known in the future as the first practical application for “Quantum Communications.”

Quantum cryptography is a form of cryptography exploiting quantum theory, in-particular with uncertainty principle stating it is impossible to measure all aspects of an object with absolute certainty.

Background –

Im 1984, Charles H. Bennett ( fellow at IBM THOMAS J. WATSON RESEARCH CENTER ) and Gilles Brassard ( researcher at the University of Montreal, Canada ) first devised quantum cryptography as part of their study of relationships between physics and information.

They were not searching for a new cryptographic method but applying basic principles of quantum mechanics to real world uses and discovered quantum mechanics ideally suited for cryptography because of photons one-wayness. [49.]

In 1989, Charles H. Bennett and IBM colleagues built the first working quantum cryptographic prototypes sending photons a distance of 30 centimeters through the air of a laboratory.

Many authorities predicted at least 25-years would pass before any form of quantum cryptography would have practical utility, however at least three ( 3 ) manufacturers now have ‘quantum cryptography products on the market’ and developing more technology such as ‘range’ plus more in the future.

Some of the latest cryptologic technologies are still subject to continuing scientific investigation or are already in research and development stages, although early commercial products exist where standards are under development for some new technologies.

In the increasingly competitive Information Age – where the Internet spreads knowledge rapidly – protecting U.S. next-generation weapon systems, empirical SE&I, M&S applications, and intellectual property sees technical data became critical.

Cryptologic scientific investigations and developing technologies are closely related to those in the area of information technology ( IT ) because information security modules, components, and systems must be tightly integrated with – if not an integral component or module of – basic information processing hardware and software architecture where many applications now incorporate high-performance features and metaprocessing techniques shortening cryptanalytic time required for an exhaustive key search.

– –

Zero-Knowledge Proofs ( ZNP ) –

Zero-knowledge proofs ( ZNP ) are methods for proving knowledge of a secret without revealing any information about the secret.

Technology Parameter(s)

1. Prove knowledge of a secret without revealing any knowledge of the secret; 92

2. Prove identification;

3. Provide verification;

4. Reproducible results that significantly enhance or degrade current U.S. military zero-knowledge proof schemes; and,

5. Significantly enhance or degraded existing cryptographic capabilities for U.S. government ( USG ) Class A and Class B cryptographic systems.

Critical Materials: None identified.

Unique Test, Production, Inspection Equipment: None identified.

Unique Software

ZNP models.

Major Commercial Applications –

ZNP characteristic of anonymity is an important part of some concepts for e-commerce transactions.

For example, proof of certain generic authority or credit ‘credentials’ might be provided for e-commerce without revealing identity by using ZNP systems.

E-commerce transactions that protect privacy.

Like all requirements for security on the Internet, the threats from independent hackers and from nation states, rogue states, terrorists, and international criminals drive this technology.

Affordability Issues: Not an issue at this time.

Background –

ZNP allows a prover to demonstrate knowledge ( of a secret ) while revealing no information ( whatsoever of use to the verifier ) in conveying this demonstration of knowledge beyond what the verifier was able to deduce before the protocol run.

Only a single bit of information has to be conveyed, namely:

That the prover actually does know the secret.

ZNP protocols provide trusted authentication mechanisms and anonymity.

For example, one could prove U.S. citizenship without providing any other specific information such as name, address, sex, or exact age.

A protocol that is a proof of knowledge has the zero-knowledge property if it can be simulated in the following sense:

There exists an expected polynomial-time algorithm ( simulator ) which can produce – upon input of the assertion(s) to be proven but without interacting with the real prover – transcripts indistinguishable from those resulting from interaction with the real prover.

The zero-knowledge property implies that a prover – executing the protocol, even when interacting with a malicious verifier – does not release any information about its ( prover’s ) secret knowledge other than the particular assertion itself is true, not otherwise computable in polynomial time from public information alone.

Thus, participation does not increase the chances of subsequent impersonation.

A protocol is computationally zero-knowledge if an observer – restricted to probabilistic polynomial time tests – cannot distinguish real from simulated transcripts.

For perfect zero-knowledge, the probability distributions ( of the transcripts ) must be identical.

Zero-knowledge means computational zero-knowledge, when not qualified by further convention.

In the case of computational zero-knowledge, real and simulated transcripts are said to be polynomially indistinguishable ( indistinguishable using polynomial-time algorithms ).

Any information extracted by a verifier – through interaction with a prover – provides no advantage to the verifier within polynomial time.

Interesting work has been done in statistical zero-knowledge work performed by Jan Camenisch and Markus Michels exemplifying ‘statistical zero-knowledge protocols to prove statements’ saw these three ( 3 ) protocols:

– A committed number is a prime;

– A committed ( or revealed ) number is the product of two ( 2 ) safe primes, i.e. primes p and q such that (p-1)/2 and (q-1)/2 are prime; and,

– A given integer has large multiplicative order modulo, a composite number consisting of two ( 2 ) safe prime factors.

Main building blocks of aforementioned protocols are statistical zero-knowledge proofs of knowledge that are of independent interest where there has been proof of the correct computation of a modular addition, a modular multiplication, and a modular exponentiation whereby all values – including the modulus – are committed-to but not publicly known. Apart from the validity of the equations, no other information about the modulus ( e.g., a generator whose order equals the modulus ) or any other operand is exposed.

These techniques can be generalized to prove that any multi-variate modular polynomial equation is satisfied where only commitments to the variables of the polynomial – and to the modulus – need be known. Thus improving previous results where the modulus is publicly known.

– –

Digital Data Steganography –

Steganography is that branch of cryptology that attempts to obscure the existence of data through the use of subliminal channels.

Cleartext or encrypted information can be randomly embedded in the quantization noise of ‘digital images’ or other ‘imprecise digital data files, without noticeably increasing the size of the host file.

Background –

Image steganography can be used to conceal an encrypted message.

Technique by ‘combining image steganography and encryption or multiple-encryption could present a challenge to National Security and law enforcement agency cryptanalysts whereby ‘even if a message were known to exist in an electronic image’, the ‘message bits’ would have to be ‘identified’ and ‘isolated’ in cryptanalysis processing that could make ‘plain text recovery incredibly time consuming’ – if not ‘impracticable’. Steganography, in various forms, are ‘not strictly digital image steganography’.

Banks make use of a code-word execution technique when they need to send highly secure “action” messages to execute preplanned actions. Predetermined and mutually agreed actions are then set in motion, with instructions implicit in one short phrase embedded in routine banking message traffic.

Key critical to profiting from private intelligence investments in private sector arenas is to aquire even better predictives than what intelligence agencies currently understand future necessities will be.

Predictives, in brief formats presented to government directorates, are typically derived from a broad ‘studies and analysis collective’.

Predictives are rarely derived from only one ( 1 ) individual – save for leadership occassional fortune tellers – because few fluidly exercise simultaneous abilities quickly, i.e. identifying target specific information, limitedly broadening core targets outward to key multiple arenas requiring in-depth research and then analyzing all combinatorically with trend based progressive direction. Finding someone who can do all this, albeit step-by-step, could possibly benefit some leadership while even wiser leadership might add ‘socio-economic analysis’ in that mix to more effectively buffet any social unrest outcomes.

While considering one ( 1 ) individual doing it all, the word ‘impossible’ may initially come to mind, however that may not necessarily be true. Even ‘without mind reading’ or Mensa abilities, one ( 1 ) key to sucessfully profiting from investing in private sector businesses – tied to emerging government intelligence agency venture capital investments – may only require special skill sets in researching and analyzing what already slipped past intelligence information technology ( IT ) software protocols or think-tank collectives that would have otherwise already hammered-out an intelligence business investment shelf-ready decision awaiting a key trigger for implementation.

The first and easiest task to perform is becoming knowledgeable in historical intelligence business investments and where new knowledge will precisely profit in the not too distant future – thereby beating lumbering bears, busy bees and pesky flies – to ‘their honey’.

Profiting from those inept is not unlawful – at least not ‘yet’ – and so long as the insatiable sweet tooth of bears and bees can have the ‘majority of their honey’ they ‘might not mind sharing a little new honey’ shown them. Then again, ‘maybe not’.

For some, what is involved may only be tantamount to collecting a finder’s fee for doing some treasure hunting, however one must know how and where to look for some ‘old technology’ lost in yesterday’s bureaucratic confusion.

To place a bet, on a private business or the stock market, one needs to research more carefully than others – never underestimating machine-to-machine communications ( M2M ) either.

The following initial report ( below ) is only but a related research exercise that may prepare financial freedom futures.

– – – –

Circa: 2002 – 2008

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION 2500 Sand Hill Road – Suite 113 Menlo Park, California 94025 – 7061 USA TEL: +1 (650) 234-8999 TEL: +1 (650) 234-8983 FAX: +1 (650) 234-8997 WWW: http://www.inqtel.com WWW: http://www.in-q-tel.org WWW: http://www.in-q-tel.com

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION P.O. Box 12407 Arlington, Virginia 22219 USA TEL: +1 (703) 248-3000 FAX: +1 (703) 248-3001

– –

IN-Q-TEL focus areas, surround:

– Physical Technologies; – Biological Technologies; – Security; and, – Software Infrastructure.

– –

IN-Q-TEL

Investments –

Strategic Investments, Targeted Returns

In-Q-Tel is ‘building’ a ‘portfolio of companies’ that are ‘developing innovative solutions’ in ‘key technology areas’

Similar to many ‘corporate strategic venture’ firms, In-Q-Tel seeks to ‘optimize potential returns’ for our clients — the CIA and the broader Intelligence Community— by investing in companies of strategic interest.

In-Q-Tel engages ‘start-ups’, ‘emerging’ and ‘established’ companies, universities and research labs.

In-Q-Tel structure attractive win-win relationships through ‘equity investments’, as well ‘strategic product development funding’, and ‘innovative intellectual property arrangements’ and ‘government business development guidance’.

An Enterprising Partner –

In-Q-Tel ‘portfolio companies’ value a ‘strategic relationship’ with a ‘proactive partner’.

Companies, that work through In-Q-Tel due diligence process, know their technologies have the potential to address the needs of one of the most discriminating enterprise customers in the world.

In-Q-Tel takes a hands-on approach, working closely with our ‘portfolio companies’ to help ‘drive their success’ in the ‘marketplace’ and to ‘mature [ ‘grow’ ] their technologies’.

In-Q-Tel ‘investment goals’ are focused on ‘return’ on technology – a ‘blend of factors’ that will ‘deliver strategic impact’ on the Agency [ CIA ] mission:

– Effective ‘deployments’ of innovative technologies to the CIA; – Commercially successful ‘companies that can continue’ to ‘deliver’ and ‘support’ innovate technologies; and, – Financial ‘returns to fund further technology investments’ to ‘benefit the Intelligence Community’.   Investing In Our National Security –

In just a few short years, In-Q-Tel has ‘evaluated’ nearly two thousand [ 2,000 ] ‘proposals’:

75% [ 1,500 ] of which have come from companies that had never previously considered working with the government.

To date, In-Q-Tel ‘established strategic relationships’ with more than ‘twenty’ ( 20 ) of these ‘companies’.

Read more about our ‘portfolio companies’ and ‘technology partners’, or learn how to submit a business plan to In-Q-Tel.

Areas Of Focus –

IN-Q-TEL focuses on next generation technologies for gathering, analyzing, managing and disseminating data. Learn more about our areas of focus:

Knowledge Management: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/km.html ];

Security and Privacy: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sp.html ];

Search and Discovery: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sd.html ];

Distributed Data Collection: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/dd.html ]; and,

Geospatial Information Services: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/gi.html ].

Submit A Business Plan –

“In-Q-Tel also has garnered a reputation in the tech and VC [ Venture Capital ] worlds for being hard-nosed during due diligence. Unlike some venture firms, In-Q-Tel is staffed with hard-core techies who know how to put a program through the ringer. They’ve also got one of the roughest testing domains: the computer systems of the CIA.” – Washington Business Journal ( November 19, 2001 )

– View our criteria [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/submit/index.html ] for submission, and apply for consideration online.

Media Resources –

– Investment Portfolio: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf ].

Reference

http://web.archive.org/web/20020630223724/www.inqtel.com/invest/index.html

– – – –

Circa: 2002

IN-Q-TEL

Investments –

Technology Partners ( 2002 ) –

INKTOMI [ http://www.inktomi.com ] ( Leading Edge Search and Retrieval Technology )

INKTOMI, based in Foster City, California ( USA ), has offices elsewhere in North America, Asia and Europe.

INKTOMI division business, involves:

Network Products – comprised of industry leading solutions for network caching, content distribution, media broadcasting, and wireless technologies; and,

Search Solutions – comprised of general Web search and related services, and ‘enterprise’ search.

Inktomi ‘develops’ and ‘markets’ network infrastructure software essential for ‘service providers’ and ‘global enterprises’.

Inktomi ‘customer’ and ‘strategic partner’ base of leading companies, include:

MERRILL LYNCH; INTEL: AT&T; MICROSOFT; SUN MICROSYSTEMS; HEWLETT-PACKARD; COMPAQ; DELL; NOKIA; AMERICA ONLINE ( AOL ); and, YAHOO.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Lead System Integrator ( LSI ) – SAIC LSI [ http://www.saic.com/contractcenter/ites-2s/clients.html  ]

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ), founded in 1969 by Dr. J. R. Beyster who remained with SAIC for 30-years until at least November 3, 2003, has had as part of its management, and on its Board of Directors, many well known former U.S. government personnel, including:

– Melvin Laird, Secretary of Defense in the Richard Milhouse Nixon Presidential Administration;

– William Perry, Secretary of Defense in the William Jefferson Clinton Presidential Administration;

– John M. Deutch, U.S. Central Intelligence Agency ( CIA ) Director of Central Intelligence ( DCI ) in the William Jefferson Clinton Presidential Administration;

– U.S. Navy Admiral Bobby Ray Inman, U.S. National Security Agency ( NSA ) and U.S. Central Intelligence Agency ( CIA ) – various employed capacities in ‘both’ Agencies – in the Gerald Ford Presidential Administration, Billy Carter Presidential Administration and Ronald Reagan Presidential Administration;

– David Kay, who led the search for Weapons of Mass Destruction ( WMD ) – following the 1991 U.S. Persian Gulf War – for the United Nations ( UN ) and in the George W. Bush Sr. Presidential Administration following the 2003 U.S. invasion of Iraq.

In 2009, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) moved corporate headquarters to Tysons Corner at 1710 SAIC Drive, McLean, Virginia ( USA ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is a scientific, engineering and technology ‘applications company’ with numerous ‘state government clients’, ‘federal government clients’, and ‘private sector clients’.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) works extensively, with:

U.S. Department of Defense ( DOD ); U.S. Department of Homeland Security ( DHS ); U.S. National Security Agency ( NSA ); U.S. intelligence community ( others ); U.S. government civil agencies; and, Selected commercial markets.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Subsidiaries –

SAIC VENTURE CAPITAL CORPORATION; SCICOM TECHNOLOGIES NOIDA ( INDIA ); BD SYSTEMS ( BDS ); BECHTEL SAIC COMPANY LLC; BECK DISASTER RECOVERY ( BDR ); R.W. BECK; BENHAM; CLOUDSHIELD; DANET; EAGAN MCALLISTER ASSOCIATES INC.; HICKS & ASSOCIATES MEDPROTECT LLC REVEAL; SAIC-FREDERICK INC.; NATIONAL CANCER INSTITUTE ( NCI ); SAIC INTERNATIONAL SUBSIDIARIES; SAIC LIMITED ( UK ); CALANAIS ( SCOTLAND ); VAREC; APPLIED MARINE TECHNOLOGY CORPORATION; EAI CORPORATION; and, Others.

In 1991, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) received transference of the U.S. Department of Defense ( DOJ ), U.S. Army ( USA ), Defense Intelligence Agency ( DIA ) ‘Remote Viewing Program’ renamed STARGATE Project.

In January 1999, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) consultant Steven Hatfill saw SAIC vice president Joseph Soukup internally ( with no outside client ) commission ( with no outside client ) William C. Patrick – a retired leading figure in the legacy U.S. bioweapons program – see a report produced ( 28-pages on Feburary 1999 ) on terrorist anthrax attack possibilities via Unitd States postal mailings prior to 2001 anthrax attacks in the United States.

In March 2001, the U.S. National Security Agency ( NSA ) had SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) in ‘concept definition’ phase for what later became known as the NSA TRAILBLAZER Project, a “Digital Network Intelligence” system intended to ‘analyze data’ carried across computer ‘networks’.

In 2002, the U.S. National Security Agency ( NSA ) chose SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) to produce a ‘technology demonstration platform’ for the NSA TRAILBLAZER Project, a contract worth $280,000,000 million ( USD ).

TRAILBLAZER Project participants, included:

BOEING; COMPUTER SCIENCES CORPORATION ( CSC ); and, BOOZ ALLEN HAMILTON.

In 2005, TRAILBLAZER – believed by speculators ( http://www.PhysOrg.Com et. al. ) to be a continuation of an earlier data mining project THINTHREAD program – saw U.S. National Security Agency ( NSA ) Director Michael Hayden inform a U.S. Senate hearing that the TRAILBLAZER program required several hundred million dollars over budget – consequently trailing years behind schedule waiting for approvals.

From 2001 through 2005, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) was primary contractor for the $600,000,000 million ( USD ) TRILOGY Program, a three ( 3 ) part program – intended to replace obsolete FBI computers with a then-new state-of-the-art cutting edge technology ‘secure high-speed computer network system’ that would install 500 computer network servers, 1600 scanners and thousands of desktop computers in FBI field offices – that on December 2003 delivered to the U.S. Department of Justice ( DOJ ) Federal Bureau of Investigation ( FBI ) its SAIC “Virtual Case File” ( VCF ), a $170,000,000 million ( USD ) software system designed to speed tracking of terrorists, better accurize communications amongst agents fighting criminals with this FBI ‘critical case management system’, however nineteen ( 19 ) different government managers involved 36 contract modifications averaging 1.3 FBI changes everyday totaling 399 changes during 15-months afterwhich the FBI continued arguing ( through its own intermediary, AEROSPACE CORPORATION ) changes until the U.S. Department of Justice ( DOJ ) Inspector General ( IG ) criticized its ‘FBI handling’ of SAIC software, whereon February 2005 SAIC ‘recommended’ the FBI at-least ‘begin using’ the SAIC TRILOGY VCF ‘case management system’.

On September 27, 2006 during a special meeting of SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) stockholders, employee-owners voted by a margin of 86% to proceed with the initial public offering ( IPO ) whereupon completion SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) also paid – to existing stockholders – a ‘special dividend’ of $1,600,000,000 billion to $2,400,000,000 billion ( USD ).

On October 17, 2006 SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) conducted an initial public offering ( IPO ) of common stock offering of 86,250,000 shares priced at $15.00 per share. Underwriters – BEAR STEARNS and MORGAN STANLEY – exercised over-allotment options resulting in 11,025,000 million shares seeing the IPO raise $1,245,000,000 billion ( USD ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) had approximately 46,000 total employees, 16,000 employees were in McLean, Virginia ( USA ) and another 5,000 employees were in San Diego, California ( USA ).

SRA INTERNATIONAL INC. ( SRA ) [ http://www.sra.com/about-us/profile.php ]

SRA INTERNATIONAL INC., founded in 1978, headquartered in Fairfax, Virginia has additional U.S. offices.

SRA INTERNATIONAL INC. is a leading provider of information technology services and solutions to clients in national security, health care and public health, and civil government markets, requiring:

– Strategic Consulting; – Systems Design, Development, and Integration; – OutSourcing; and, – Operations Management.

SRA INTERNATIONAL INC. also delivers business solutions, for:

– Text mining; – Data mining; – Disaster and Contingency Response Planning; – Information Sssurance; – Environmental Strategies – Environmental Technology; – Enterprise Systems Management; and, – Wireless Integration.

SRA INTERNATIONAL INC. ORIONMagic ®

– –

Circa: 2002

IN-Q-TEL

Investments –

Portfolio Of Companies ( 2002 ) – Partial List

ARCSIGHT [ http://www.arcsight.com ] ( Security Management Software for The Enterprise )

ArcSight, founded in May 2000, is located in the heart of Silicon Valley, California ( USA ).

ArcSight is a leading supplier of enterprise software that provides the security “air traffic control system” for large, geographically dispersed organizations. These organizations are augmenting their network infrastructure with a wide variety of security devices such as firewalls, intrusion detection and identity management systems that produce a barrage of uncoordinated alarms and alerts that overwhelm the security staff.

With its ‘centralized view’ of ‘all security activity’ combined with ‘real time analysis’ of ‘events’, by both ‘operating at the perimeter and inside’ the organization, ArcSight provides a ‘single solution’, for:

Event capture; Log aggregation; Real time correlation; Incident investigation; and, Reporting.

ArcSight ‘separates’, the ‘true threats and attacks’ from the ‘millions of false alarms and non-threatening activities’ that occur each day, focusing attention and resources on high-priority problems.

The company has delivered enterprise, ‘security management solutions’ to leading ‘financial services’, ‘government’ and ‘manufacturing’ organizations while ‘attracting capital’ from ‘leading investors’, such as:

IN-Q-TEL; KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, SUMITOMO CORPORATION.

ATTENSITY CORPORATION [ http://www.attensity.com ] ( Text Extraction for Threat Detection )

Attensity Corp., founded in 2000, is a privately held company with dual headquarters in Mountain View, California ( USA ) and Salt Lake City, Utah ( USA ).

Attensity Corp. provides enterprise, ‘analytic software’ and ‘services’, to:

Government agencies; and,

Fortune 500 companies.

Attensity has developed breakthrough text extraction technology that transforms information captured in free form text into structured, relational data.

Attensity enables government agencies to dramatically expand their analytical capabilities in the area of ‘threat detection’ by, powering:

Link analysis; Trending; Exception reporting; Other advanced analytics; and, Knowledge management applications.

Attensity technology is the culmination of nearly a decade [ 10-years ] of research in computational linguistics.

Attensity Corporation customers include:

IN-Q-TEL, a strategic venture group funded by the CIA; WHIRLPOOL; and, JOHN DEERE.

ATTENSITY CORPORATION investor, is:

IN-Q-TEL

BROWSE3D [ http://www.browse3d.com ] ( Advanced Web Navigation )

BROWSE3D, founded in 2000, is located in the Dulles Technology Corridor of northern Virgina.

The company’s first Knowledge Management product, the Browse3D Browser, enables Internet users to browse Web sites using a dynamic, interactive, 3 dimensional ( 3-D ) display environment.

One year later [ 2001 ] the Browse3D Browser was recognized as the Best Internet Software of 2001 at the COMDEX Fall Technology Show ( Las Vegas, Nevada, USA ).

Browse3D launched its ‘consumer product’ in January 2002.

For the past 2-years [ since 2000 ], Browse3D has been working to re-invent the online researcher’s tool set. A researcher’s ability to ‘harvest relevant online data’ is often limited by the tools available to view that data.

Future products and technologies promise additional improvements in the way users ‘find’, ‘organize’, ‘save’ and ‘exchange’ web-based ‘content’.

BROWSE3D early-stage venture funding provided, by:

IN-Q-TEL; and, angel investors.

CANDERA INC. [ http://www.candera.com ] ( Enterprise Storage )

Candera Incorporated, founded in 2000, is a development stage stealth mode company headquartered in Milpitas, California ( USA ).

Candera Inc. is developing a new generation, purpose built, network based storage management platform that gives businesses unprecedented ‘control over’ and ‘visibility into’ their networked storage environments.

With the Candera Confluence solution, businesses can dramatically improve the utilization of their existing heterogeneous storage assets by consolidating them into a centrally managed storage pool. These can then be quickly and dynamically allocated to meet the needs of current and future network based applications, giving large enterprises a strategic advantage.

Candera is building the first [ 1st ] system, of a new generation of systems, that will enable customers to unleash the ultimate value of networked information storage.

CONVERA [ http://www.convera.com ] ( Mission Critical Enterprise Search and Categorization Software )

Convera RetrievalWare is a high-performance intelligent search system that allows broad flexibility and scalability for implementation across corporate intranets and extranets, enabling users to index and search a wide range of distributed information resources, including text files, HTML, XML, over 200 proprietary document formats, relational database tables, document management systems and groupware repositories. Convera RetrievalWare excels in distributed client environments and server environments with hundreds or thousands of users, documents, images and / or multiple media assets.

Advanced search capabilities include concept and keyword searching, pattern searching and query by example.

Convera is a leading provider of enterprise mission-critical ‘search’, ‘retrieval’ and ‘categorizing’ solutions.

More than 800 customers – in 33 countries – rely on Convera search solutions to power a broad range of mission critical applications, including enterprise:

Portals; Knowledge management; Intelligence gathering; Profiling; Corporate policy compliance; Regulatory compliance; Customer service; and, More.

DECRU [ http://www.decru.com ] ( Secure Networked Storage )

Decru, founded in April 2001, is headquartered in Redwood City, California ( USA ).

Decru solves the problem of secure data storage with a robust, wire-speed encryption appliance that fits transparently into any SAN or NAS storage environment, protecting data from both internal and external threats.

Markets include essentially any organization with a need to protect proprietary or confidential information ( e.g. government, technology, financial services, health care ).

Investors, include:

IN-Q-TEL; NEA; GREYLOCK; and, BENCHMARK.

GRAVITRON [ http://www.graviton.com ] ( Early Warning Detection and Notification System for Homeland Security Over Wireless Mesh Networks )

GRAVITON, founded in 1999, is located in La Jolla, California, USA.

Solomon Trujillo, former head of U.S. WEST ( baby bell telephone company ), leads GRAVITRON.

GRAVITON is on leading edge of a fledgling ( small ) industry, known as:

Machine to Machine Communications ( M2M ).

GRAVITON is developing an advanced integrated wireless sensor platform uniquely optimized for large-scale distributed sensor network applications working with Micro Electro Mechanical Systems ( MEMS ) sensor and spread spectrum wireless technologies licensed exclusively to GRAVITON from the U.S. National Laboratory at Oakridge ( also known as ) Oakridge National Laboratory ( Tennessee, USA ) – managed by the U.S. Department of Energy ( DOE ).

GRAVITON products and solutions integrate wireless, sensor and data management technology enabling enterprises to efficiently and transparently monitor, control, send, receive, and update system information from devices anywhere in the world.

GRAVITON is supported and funded by a number of corporate partners and investors, including:

IN-Q-TEL; GLOBAL CROSSING; ROYAL DUTCH SHELL ( oil / petroleum ); MITSUI; SIEMENS; QUALCOM; OMRON; MOTOROLA; and, SUN MICROSYSTEMS.

GRAVITON ‘primary’ financial investors, include:

MERRILL LYNCH;

GRAVITON ‘venture capital’ firms, include:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, EARLYBIRD.

INTELLISEEK [ http://www.intelliseek.com ] ( Enterprise Intelligence Solutions )

INTELLISEEK, founded in 1997, has since 1998 been changing the way organizations ‘understand’, ‘gather’ and ‘use’ enterprise ‘intelligence’.

INTELLISEEK ‘knowledge discovery tools’ [ as of: 2002 ] enable the nation’s largest enterprises with up-to-the-minute consumer, industry information and ‘competitive intelligence’.

INTELLISEEK ‘Enterprise Search Server’™ ( ESS ) search platform provides a suite of intelligent applications that automate ‘knowledge discovery’ and ‘knowledge aggregation’ from hundreds of disparate, and often hard-to-locate data sources.

INTELLISEEK ‘Knowledge Management’ and ‘Search and Discovery’ solutions solve the fundamental problem of “information overload” by identifying and searching relevant, targeted and personalized content from the internet, intranets and extranets.

INTELLISEEK clients, include:

FORD MOTOR COMPANY ( FOMOCO ); NOKIA; and, PROCTOR AND GAMBLE.

Investors include:

IN-Q-TEL; FORD VENTURES; RIVER CITIES CAPITAL; GENERAL ATLANTIC PARTNERS LLC; FLAT IRON PARTNERS; BLUE CHIP VENTURE COMPANY; NOKIA VENTURES; and, Other private investors.

METACARTA [ http://www.metacarta.com ] ( Geospatial Data Fusion )

MetaCarta, established in 1999, was launched on more than $1,000,000 million in funding from the U.S. Department Of Defense ( DOD ) Defense Advanced Projects Agency ( DARPA ) and private investors.

MetaCarta CEO John Frank, with a doctorate from the Massachusets Institute Of Technology ( MIT ) where during 1999 – as a Hertz Fellow in physics working on a PhD – conceived a new way to view – geographically – ‘collections of text’ that later saw MetaCarta combine his interests in algorithms, information design, and scientific models of real world phenomena.

Metacarta provides a new knowledge management platform that integrates ‘text data with geography’ providing a ‘cohesive system’ for ‘problem solving’.

METACARTA Geographic Text Search ( GTS ) appliance, the software solution, redefines how people interact with information, enabling analysts to view text reports and geographic information in one ( 1 ) logical view through integration of text and geography delivering new information not obtainable from any other source.

MetaCarta CEO John Frank graduated from Yale University.

MOHOMINE [ http://www.mohomine.com ] ( Transforming Unstructured Multi-Language Data Into Actionable Information )

MOHOMINE, founded in 1999, is privately-held and located in San Diego, California, USA.

MOHOMINE technology has been deployed by United States national security organizations.

MOHOMINE mohoClassifier for National Security Organizations ™ reviews ‘text information’ in ‘cables’, ‘e-mails’, ‘system files’, ‘intranets’, ‘extranets’ and ‘internet’ providing ‘automated document classification’, ‘routing’ – based upon ‘learn-by-example pattern recognition’ technology – and ‘reports’ on user defined properties such as ‘topic’, ‘subject’, ‘tone’ ( ‘urgent’, plus others ), ‘author’, ‘source’ ( geographic locations, ‘country’, etc. ), and more.

MOHOMINE mohoClassifier users can easily set up ‘filters’ to automatically ‘identify’ and ‘prioritize’ ( ‘read first’ requirement ) documents that are quickly processed – out-of large volumes of other data – and then quickly route prioritized information to quickly reach the proper people.

MOHOMINE, from Global 5000, currently [ since 2002 ] has more than one hundred fifty ( 150 ) customers across numerous vertical industries, including:

CITICORP; WELLS FARGO; INTEL; TEXAS INSTRUMENTS; PFIZER; BOEING; ORACLE; PEOPLESOFT; and, NIKE.

MOHOMINE investors, include:

IN-Q-TEL; HAMILTON APEX TECHNOLOGY VENTURES; and, WINDWARD VENTURES.

QYNERGY CORPORATION [ http://www.qynergy.com ] ( Long-Lasting Power Solutions For Multiple Applications And Small-Tech )

QYNERGY CORP., founded in 2001, is located in Albuquerque, New Mexico.

QYNERGY technology originated at the U.S. National Laboratory at Sandia ( also known as ) Sandia National Laboratories ( New Mexico, USA ) and at the University of New Mexico ( New Mexico, USA ).

QYNERGY Corp. develops leading-edge energy solutions based on QYNERGY proprietary QynCell ™ technology that made an exciting breakthrough – over other ‘battery’ or ‘portable energy’ devices – in ‘materials science’ allowing QYNERGY to possess several unique competitive advantages.

QYNERGY QynCell ™ is an ‘electrical energy device’ revolution, providing:

Long-lived Batteries – QynCell usable life is potentially over a period of ‘several decades’ ( 10-year multiples ), during which time the QynCell device ‘does not require external charging’;

Miniature and Micro Applications – QynCell™ technology is scaleable, thus can be ‘miniaturized’, for:

Micro Electro Mechanical Systems ( MEMS ); MicroPower™ applications; Small microelectronics; and, Power-on-a-chip applications.

SAFEWEB [ http://www.safewebinc.com ] ( Secure Remote Access )

SAFEWEB, established in April 2000, is based in Emeryville, California, USA.

SAFEWEB built the world’s largest ‘online privacy network’, however in 2001 its ‘free online service’ was ‘concluded’ – to focus on developing its ‘enterprise’ product.

SAFEWEB is a leading provider of innovative security and privacy technologies that are effective, economical and simple.

SAFEWEB Secure Extranet Appliance ( SEA ), the first [ 1st ] SAFEWEB enterprise security release – reduces the cost and complexity traditionally involved in securing corporate network resources.

SAFEWEB Secure Extranet Appliance ( SEA ), named Tsunami, is a fundamental ‘redesign of extranet architecture’ integrating disparate technologies into a ‘modular plug-in network appliance’ ( SEA Tsunami).

SAFEWEB SEA Tsunami is an ‘all-in-one solution’ simplifying implementation of ‘extranets’ and ‘Virtual Private Networks’ ( VPN ) reducing Total Cost of Ownership ( TCO ) by innovative architecture letting companies build – in less than 1-hour – ‘secure extranets’ providing ‘remote stationed’ enablement of ‘employees’, ‘clients’ and ‘partners’ to access ‘internal applications’ and ‘secure data’ from anywhere using a standard internet website browser.

SAFEWEB delivers, through established strategic partnerships, customized versions of its Secure Extranet Appliance ( SEA ) Tsunami technology to U.S. intelligence [ CIA, etc. ] and communications agencies [ NSA, etc. ].

SAFEWEB investors, include:

IN-Q-TEL; CHILTON INVESTMENTS; and, KINGDON CAPITAL.

STRATIFY INCORPORATED [  ] ( Unstructured Data Management Software )

In 1999, PURPLE YOGI was founded by former INTEL Microcomputer Research Laboratory scientists Ramana Venkata and Ramesh Subramonian.

PURPLE YOGI, became known as STRATIFY INCORPORATED ( a privately-held company ).

In early 2001, ORACLE CORPORATION veteran and senior executive Nimish Mehta became president and chief executive officer ( CEO ).

STRATIFY INC., headquartered in Mountain View, California ( USA ), is [ 2002 ] the ‘emerging’ leader in ‘unstructured data management’ software.

STRATIFY Discovery System is a ‘complete enterprise software platform’ helping todays [ 2002 ] organizations ‘harness vast information overload’ by ‘automating the process’ of ‘organizing’, ‘classifying’ and ‘presenting’ business-critical unstructured information usually found in ‘documents’, ‘presentations’ and internet website pages.

STRATIFY Discovery System platform ‘transforms unstructured internal and external data’ into ‘immediately accessible relevant information’ automatically organizing millions of documents displayed in easy navigational hierarchy.

STRATIFY INC. clients, include:

INLUMEN and INFOSYS TECHNOLOGIES LIMITED, named in 2001 as one ( 1 ) of The Red Herring 100.

STRATIFY INC. received funding, from:

IN-Q-TEL; H & Q AT INDIA (also known as ) H & Q ASIA PACIFIC; SOFTBANK VENTURE CAPITAL ( now known as ) MOBIUS VENTURE CAPITAL; SKYBLAZE VENTURES LLC; and, INTEL CAPITAL.

SRD [ http://www.srdnet.com ] ( Near Real Time Data Warehousing and Link Analysis )

SYSTEMS RESEARCH & DEVELOPMENT ( SRD ), founded in 1983, develops software applications to combat fraud, theft, and collusion.

SYSTEMS RESEARCH & DEVELOPMENT Non-Obvious Relationship Awareness ™ ( NORA ™ ) was originally developed for the gambling casino gaming industry

SYSTEMS RESEARCH & DEVELOPMENT NORA software is designed to identify correlations across vast amounts of structured data, from hundreds or thousands of data sources, in near real-time, and alert users to potentially harmful relationships between and among people.

SRD NORA software technology leverages SYSTEMS RESEARCH & DEVELOPMENT proven expertise in ‘aggregating’, ‘warehousing’ and ‘leveraging people data’ and ‘transaction data’ to strengthen corporate management and security systems.

SYSTEMS RESEARCH & DEVELOPMENT clients [ 2002 ], include:

U.S. Depaartment of Defense ( DOD ); CENDANT; TARGET; MGM MIRAGE; MANDALAY BAY RESORT GROUP; and, Food Marketing Institute.

TACIT [ http://www.tacit.com ] ( Enterprise Expertise Automation )

TACIT, founded in 1997, is located in Palo Alto, California ( USA ) with regional sales offices in Virginia, Maryland, Pennsylvania and Illinois.

David Gilmour serves as president and chief executive officer ( CEO ).

TACIT Knowledge Systems is the pioneer and leader in ‘Enterprise Expertise Automation’.

TACIT products ‘automatically and continuously inventories’ the ‘skills’ and ‘work focus’ of an ‘entire organization’ for ‘dynamic location’ of ‘connections to expertise needed’ – when needed to make decisions, solve problems, and serve customers.

TACIT products also include its award winning flagship product KnowledgeMail™. In June 200, TACIT was voted one of the “Hot 100 Private Companies,” by Upside Magazine.

In 2000 and 2001, TACIT was one ( 1 ) of the “100 Companies that Matter,” by KM World [ Knowledge Management World ].

TACIT attracted a ‘world class advisory board’ with interest from ‘venture capital’ and Fortune 500 ‘clients’ of ‘enterprise’ and ‘customers’, including:

IN-Q-TEL; JP MORGAN; CHEVRON-TEXACO ( petroleum and chemical ); UNISYS; HEWLETT-PACKARD; NORTHROP-GRUMAN ( aerospace & defense ); and, ELI LILLY ( pharmaceuticals ).

TACIT investors, include:

IN-Q-TEL; DRAPER FISHER JURVETSON; REUTERS GREENHOUSE FUND; and, ALTA PARTNERS.

TRACTION SOFTWARE [ http://www.tractionsoftware.com ] ( Harvest and Use Information from All Sources )

TRACTION SOFTWARE, founded in 1996, is located in Providence, Rhode Island ( USA ).

TRACTION® Software is the leader in ‘Enterprise Weblog’ software, bringing together working ‘communications’, ‘knowledge management’, ‘content management’, ‘collaboration’, and the ‘writable intranet portal’.

TRACTION TeamPage™ product addresses the need for ‘unified on-demand view’ of ‘team content’ and ‘team communication’ from ‘all document sources’ in ‘context’ and over ‘time’.

TRACTION TeamPage deploys quickly and easily on an existing network and delivers a ‘capstone communication system’ by turning ‘e-mail’ and ‘web browser’ into powerful tools for end-users.

TeamPage targets ‘program teams’ and ‘product management teams’ in ‘government’ and ‘business’.

TRACTION also supports a wide range of applications and business processes, including but not limited, to:

Business Intelligence and Market Research;

Collection Highlighting and Media Distribution;

Investor Relations E-Mail and Public Relations E-Mail Triage and Response; and,

Tracking Exception Process and Reporting Exception Process.

TRACTION SOFTWARE investors, include:

IN-Q-TEL; SLATER CENTER FOR INTERACTIVE TECHNOLOGY; and, private investors.

ZAPLET INCORPORATED [ http://www.zaplet.com ] ( Enterprise Collaboration Tools For Email )

ZAPLET INC., founded in 1999, is located in Redwood Shores, California ( USA ).

ZAPLET INC. is an enterprise software and services company and creator of the Zaplet Appmail System™ collaboration software that brings application functionality directly to a user’s inbox to complete business processes.

ZAPLET INC. Appmail, using a server-based platform, combines power, ‘centralized control’ and ‘robust security’ for traditional enterprise application systems with the convenience and ease-of-use of e-mail.

ZAPLET Appmail in-box becomes the gateway to a protected server where the application functionality and data securely reside.

Zaplet™ Appmail can be used, to:

Manage and Streamline mission-critical business processes; Requires no additional client-side upgrades; and, Instantly expandable for work teams ‘beyond’ the ‘enterprise’.

ZAPLET INC. has received numerous awards, including:

Red Herring 100; Enterprise Outlook – Investors’ Choice; and, Internet Outlook – Investors’ Choice.

ZAPLET INC. customers, include leading companies, in:

Finance; Telecommunication; High technologies; and, Government.

ZAPLET INC. is backed by world class investors, including:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); ACCENTURE TECHNOLOGY VENTURES; QUESTMARK PARTNERS L.P.; RESEARCH IN MOTION LIMITED ( RIM ); INTEGRAL CAPITAL PARTNERS; ORACLE CORPORATION; CISCO SYSTEMS INC.; and, NOVELL INC.

– –

Circa: 2010

IN-Q-TEL

Investments –

Portfolio of Companies ( 2010 ) – Partial List

3VR Security AdaptivEnergy Adapx Arcxis Asankya Basis Technology Bay Microsystems CallMiner Cambrios Carnegie Speech CleverSafe ( SAIC ) CopperEye Destineer Elemental Technlogies Ember Corporation Endeca Etherstack FEBIT FireEye FluiDigm

Reference(s)

http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf http://www.iqt.org/technology-portfolio/orionmagic.html http://defense-ventures.com/in-q-tel/

– – – –

Now if you thought you graduated with honors magna cum laude – think again and begin reading ( below ):

QUCOMM – Long Distance Photonic Quantum Communication

Brief –

An overview of the work done at Los Alamos National Laboratory ( New Mexico, USA ) on Quantum Computation and Cryptography

The idea of quantum computation and cryptography is to use the laws of quantum mechanics for either computing or exchange secrets messages.

Los Alamos is a leader in Experimental Quantum Computation [ EQC ].

The recent discovery that it was possible to use Nuclear Magnetic Resonance ( NMR ) for quantum computation has made experimental work leap forward.

The 3-qubit quantum computer – using NMR techniques with the molecule trichloroethylene – is state-of-the-art at present ( winter 1998 ).

We have succeeded at creating a GHZ state.

This is the “big brother” of an Einstein-Podolsky-Rosen ( EPR ) state.

Using qubits with state |0> and |1>, we have created the state |000> + |111>. It is well known form the foundations of quantum mechanics.

Both the EPR and the GHZ state have properties that are non-classical. For more details see our paper NMR-GHZ [ http://xxx.lanl.gov/ps/quant-ph/9709025 ].

Quantum error correction is required to compensate for the fragility of the state of a quantum computer.

We report the first [ 1st ] experimental implementations of quantum error correction and confirm the expected state stabilization.

A precise study of the decay behavior is studied in alanine and a full implementation of error correction protocol is implemented in trichloroethylene.

In NMR computing, however, a net improvement in the signal-to-noise would require very high polarization.

The experiment implemented the 3-bit code for phase errors in liquid state-state Nuclear Magnetic Resonance ( NMR ).

Quantum mechanics provides spectacular new information processing abilities.

One of the most unexpected is a procedure called ‘quantum teleportation’ – suggested by Bennet, et al. [  http://www.research.ibm.com/quantuminfo/teleportation ] – that allows the ‘quantum state of a system’ to be ‘transported from one location to another’ – without moving through the intervening space.

We have implemented the ‘full quantum teleportation operation’ over ‘inter-atomic distances’ using ‘liquid state Nuclear Magnetic Resonance (NMR)’. [ see, e.g. Electronic Transfer In Mesoscopic Systems, Quantum Kinetics, Magnetoresistance Within Magnetic Layering, Liquid State NMR, etc. (http://www.quantiki.org/wiki/Liquid-state_NMR ) ]

The inclusion of the final stage enables – for the first [ 1st ] time – a teleportation implementation, that may be used as a ‘subroutine’ in ‘larger quantum computations’, or for ‘quantum communication’.

Our experiment also demonstrates the use of ‘quantum process tomography’, a procedure to ‘completely characterize the dynamics of a quantum system’.

Finally, we demonstrate a controlled exploitation of decoherence as a tool to assist in the performance of an experiment.

Using quantum mechanics – instead of classical mechanics – has huge advantages but also some drawbacks; quantum mechanics make the ‘applications much more powerful’ but at the same time much more ‘fragile’ against ‘noise’.

Organization Information –

KUNGLIGA TEKNISKA HOGSKOLAN Valhallavaegen 79 100 44 Stockholm SWEDEN

CONTACT: Anders Karlsson

TEL: +46-8-7521272

FAX: +46-8-7521240

E-MAIL: aandkar@ele.kth.se

WWW : http://www.ele.kth.se/QEO/qucomm ( Project website )

Long Distance Photonic Quantum Communication (aka) LDPQC interalia the QuComm Project, will:

1. Scale secure quantum communication towards longer distances;

2. Realize novel applications; and,

3. Identify and transfer ‘spin-off applications’ to ‘industry’ [ i.e. ‘private sector’ businesses ].

The physical resources explored, are:

Entangled quantum states having no classical counterpart.

Work will be pursued on novel sources, for:

1. Direct ‘generation of entangled photon states’ in ‘electrically pumped structures’;

2. Diode-laser pumped ‘non-linear optical crystals’; and,

3. Detectors or ‘multiphoton states’.

Basic quantum information building blocks, such as teleportation and entanglement swapping, will be developed. Field demonstrations will be used to validate the technology, both at 700nm – 800nm ( free space and optical fibers ) and at 1300 nm and 1550 nm ( telecommunication fibers and systems ).

The consortium consists of both ‘universities’ and ‘industries’ [ private sector businesses ] – those with a broad ‘physics’ and ‘technology’ background.

QuComm Objectives –

1. Extend experimental quantum communication protocols – notably ‘quantum teleportation entanglement swapping’ and ‘entanglement quantum cryptography’ towards ‘longer distances’. In particular, to explore ‘physical resource of entangled states’ of ‘multiple photons’ that otherwise lack finding a counterpart in classical physics;

2. Experimentally demonstrate quantum communication protocols for cryptographic applications in point-to-point and multiparty quantum cryptography – using ‘entangled quantum states’ to ‘achieve’ an ‘increased level of security’ – compared to ‘faint-pulse quantum cryptography’;

3. Validate optical quantum communication technologies – in an ‘application context’ through various field tests of the developed concepts and technologies; and,

4. Identify and transfer ‘spin off’ results – from ‘quantum communication technologies’ – to industries [ private sector businesses ] or to industries-to-be [ ‘emerging’ technology businesses’ ], notably SMEs.

Work Description –

The work will be divided into six [ 6 ] quantum state Work Packages ( WP ) [ ‘problem sets’ ], each with designated WP [ ‘problem set’ ] ‘leaders’:

WP0, leads – ‘Management’ [ i.e. IN-Q-TEL Quantum Interface Center ( QIC ) interalia CIA ], additionally dealing with ‘dissemination’ and ‘industrial take-up’ [ private sector transfers to private sector businesses ] of results [ ‘products’ / ‘solutions’ to ‘market’ for ‘profitability’ ];

WP1, leads – ‘Sources’ [ ‘partners’ ( i.e. ‘businesses’ / ‘institutions’ ]; and,

WP2, leads – ‘Analyzers’ ( i.e. ‘detectors’ / ‘analysts’ / ‘individuals’ ) enabling ‘building block formations’ for ‘subsequent work’.

[ NOTE: Once “sources” and “analyzers” ( ‘detectors’ interalia ‘analysts’ ) are available – in some cases, during project infancy – they will be transferred to later [ “subsequent” ] quantum state Work Packages. ]

WP3, leads – Entanglement enhanced quantum cryptography – focused on ‘entangled states’ – and ‘multi-party quantum cryptography’;

WP4, leads – Teleporting entanglement; and,

WP5, leads – Protocols ( multimode and multistate ) utilizing optimized sources and analyzers for the realization of quantum communication protocols, both ‘significantly improved versions’ of ‘earlier demonstrations’, as well as ‘entirely novel protocols’.  [ NOTE: In WP5, ALCATEL THALES III-V Lab ( Palaiseau Cedex, France ) will work on different schemes of ‘phase locked loop’ to ‘reduce phase noise’ of generated mmW, and will also facilitate exploitation of the ‘results’ achieved through small scale fabrication and/or ‘technology transfer’ ( http://www.ist-iphobac.org/partners/index.asp?id=3 ).

WP 6, leads – Field tests ‘assembled work’ – in earlier work packages ( WPs ) used – to ‘conduct trials outside the laboratory setting’.

By having a ‘separately delineated’ [ sensitive ‘compartmentalized’ information ( SCI ) ] work packages ( WP ) [ ‘problem sets’ ], it will be possible, to:

1. Assure ‘availability of test sites’;

2. Provide ‘coherence in goals’ of ‘field trials’; and,

3. Provide ‘joint experience’ for ‘realization of trials’.

The ‘management’ of the consortium [ http://www.ist-iphobac.org/login.asp ] will be with a ‘management committee’:

1. One [ 1 ] person from each ‘partner’ ( same person as the WP leader, in most cases ); and,

2. One [ 1 ] person from the ‘associated partner’.

The progress of work will be monitored through ‘bi-monthly management reports’ assembled by the WP leader and sent to the ‘coordinator’ [ ? ].

The consortium will meet every 6-months, to:

1. Highlight scientific work;

2. Discuss progress; and,

3. Discuss modifications to the project.

A small ‘industrial advisory committee’, will:

1. Monitor progress of the project; and,

2. Advise and assist in ‘transferring’ – industrial relevant – ‘results’.

The project will ‘disseminate results’, through:

1. Channels Established;

2. Industrial Advisors; and,

3. Community Others [ ‘select attendees’ of organized ‘joint meetings’ and ‘workshops’ ].

QuComm Member List –

Number | Name | Short name | Country

P01 Kungliga Tekniska Högskolan [ http://www.ele.kth.se/QEO/ ]  KTH S [ Sweden ]

P02 Ludwig-Maximilians-Universität München [ http://scotty.quantum.physik.uni-muenchen.de/ ]  LMU G [ Munich, Germany ]

P03 Institut Experimentalphysik der Universität Wien [ http://www.quantum.univie.ac.at/ ] EXPENIVIE A [ Vienna, Austria ]

P04 University of Oxford [ http://www.qubit.org/ ] Oxford UK [ United Kingdom ]

P05 University of Geneva, Group of Applied Physics [ http://www.gapoptique.unige.ch/ ] GAP CH [ Switzerland ]

P06 Los Alamos National Laboratory [ http://qso.lanl.gov/qc/ ] LANL US

P07 THOMSON-HOUSTON ( THALES ) LABORATOIRE CENTRAL DE RECHERCHES ( LCR ) [ http://www.thalesgroup.com/Press_Releases/Descartes_prize_awarded_to_a_European_project_invo/ ] THLCR F [ Domaine de Corbeville, 91400 Orsay, Cedex, FRANCE ] [ NOTE: Second ( 2nd ) largest participant in the UK defense industry. On December 6, 2000 was eventually renamed THALES OPTRONIQUE S.A. ( Elancourt, France ), an electronics company delivering information systems and services for aerospace, defense, and security markets. THALES GROUP is partially state-owned ( France ), operates in more than 50 countries, has 68,000 employees, generated €12.9 billion in 2009 revenues, ranked 485th world’s largest company by Fortune 500 Global, is the 9th largest defense contractor in the world, and sees military sales that are 63% of THALES GROUP total sales. ]

P08 Defence Evaluation and Research Agency [ http://www.dera.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm ] DERA UK

GAP-Optique

University of Geneva, Department of Physics [ http://mpej.unige.ch/physics.html ] ( Geneva, Switzerland )

University of Geneva [ http://www.unige.ch ] ( Geneva, Switzerland )

QRandom is a physical random number generator ( RNG ) based on the intrinsic randomness of quantum mechanics. The random process used is the choice of a photon between the two outputs of a beam-splitter.

The generator is easy to use ( USB plug’n play support and self-powered ) and sufficiently fast for cryptographic applications (100 kHz of raw bits rate ).

The generated files can be processed by the program RNG Tester. This program allows to acquire, to apply an unbiasing procedure and to test files of random bits.

See Photo:

BT Quantum Optics Group:

We live in a quantum world – something physicists have considered with amazement for more than seventy years. It is only now that we realize that quantum physics is more than a radical departure from classical physics. It also offers many new possibilities for information processing.

In particular, quantum theory is non-local: it predicts entanglement between distant systems leading to correlations that cannot be explained by any theory based only on local variables, as demonstrated by Bell inequality.

All experiments are in remarkable agreement with quantum theory. Hence, the physics community faces a very strange worldview: in theory, everything is entangled, but, in practice, decoherence makes it impossible to reveal this entanglement. In addition to its “experimental metaphysics” aspects, quantum entanglement has recently gained much interest and respect because it is at the heart of quantum information processing.

The general idea is that entanglement provides means to carry out tasks that are either impossible classically ( like quantum cryptography ) or that would require significantly more steps to perform on a classical computer ( like factorization ).

However, how robust is quantum entanglement?

How long can one maintain it under control? Over which distances?

Can one really exploit it?

It is worth to emphasize this psychological revolution: for decades entanglement was considered as a source for quantum paradoxes, now it is considered as a resource to achieve tasks classically impossible.

Our activities in experimental quantum optics started in 1993 with a project on cavity effects in silvered microfibers. Almost at the same time we performed a first simple experiment in Quantum Cryptography ( QC ) [ see, e.g. publications, look up ] just for fun.

Nobody then [ 1993 ] would have imagined that in 1999 we would be one of the world leaders in this field. In fact, during a 2-years project supported by SWISSCOM, we developed an automated [ see, e.g. QC-setup, News, Crypto 98, Plug & Play ] with unprecedented performances.

We are currently participating in the Esprit-Project ” European Quantum Cryptography and Single Photon Technologies ” ( EQCSPOT ) in order to develop a QC-prototype.

Within national projects we developed compact sources of entangled photon pairs. With such a source we performed a record-breaking Bell experiment [ see, e.g. QC, Publications, Look Up ] between two [ 2 ] villages near Geneva [ Switzerland ] separated by more than 10 kilometers [ km ].

More generally, we are studying now the relation between non-locality and relativity and the application of novel sources of entangled photons for quantum communication. Our basic research also led to practical results such as an original setup for chromatic dispersion measurements, a novel technique for absolute detector calibration and the development of single-photon detectors in the near infra-red [ IR ].

Reference

http://www.dstl.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm

Research

http://www.ist-optimist.unibo.it/pdf/network/projects_public/QUCOMM/Deliverables/D8.pdf

– – – –

Example

Since 2005, the THALES Group has successfully manufactured TV/4 format QWIP sensitive arrays in high rate production at the THALES Research and Technology Laboratory.

The full-TV array manufacturing started in 2007.

Uniformity and stability were the key parameters that led to the selection of this technology for thermal cameras.

Another widely claimed advantage for QWIPs was the versatility of the band-gap engineering and of III-V processing allowing custom design of quantum structures to fulfill the requirements of specific applications such as:

1. Very long wavelength ( VLWIR );

2. Multi-spectral detection; and,

3. Polarimetric detection.

Serial production of CATHERINE-XP and CATHERINE-MP has now started for the various programs for which both cameras have been selected. A review of the QWIP Production status, CATHERINE achievements and current programs are presented.

THALES based current strategy on very compact TI in order to address the largest range of platforms and applications.

THALES is working in cooperation with Sofradir and TRT / III-V lab on the evolution of product taking advantage of new capabilities offered by QWIP technology.

Future products are under development, based on:

1. Dual band;

2. Multi-band; and,

3. Polarimetric imagery.

Research

http://www.photonics.com/Article.aspx?AID=40105

http://meetings.aps.org/Meeting/MAR10/Event/121362

http://www.thalesgroup.com/Portfolio/Aerospace/LandJoint_Products_Optronic_self-protection_LWR/?pid=1568

http://www.thalesgroup.com/Markets/Security/Related_Activities/Hypervisor/Content/Next_generation_supervision_architecture/

http://www.ist-isis.org/index/isis-partners.html

http://web.archive.org/web/20080319045528/www.opera2015.org/links/default.asp

http://www.dtic.mil/mctl/DSTL/DSTLSec17gg.pdf

– – – –

To begin tying aforementioned information into a perspective where one needs further research, read these Unwanted Intelligence Annex I reports, at:

http://upintelligence.wordpress.com/2010/10/25/information-technology-directorate

http://upintelligence.wordpress.com/2010/10/23/extraterrestrial-information-technologies

When you’re ready, e-mail, for more.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/