NASA UFO Alien Encounters

[ PHOTO ( above ): NASA Space Shuttle STS 115 official mission photo of a an “ExtraTerrestrial BioSynthetic Entity” ( EBSE ), a mobius waveform propulsion system spaceborn infant that is also known by what others refer to as part of a “Space Serpent” that a NASA astronaut refers to as an “eel” ( click to enlarge ) ]

NASA UFO Alien Encounters
by, Concept Activity Research Vault ( CARV )

December 1, 2011 14:22:08 (PST) Updated ( Originally Published: January 27, 2011 )

CALIFORNIA, Los Angeles – December 1, 2011 – NASA? We may ‘all’ have a problem! Over the past several decades multiple space flight missions from the United States and Russia have officially documented strange encounters occuring in outer space with astronauts.

Not just ‘unidentified flying objects’ ( UFO ), but other unreferenceable object encounters such as serpent like entities that appear to be biosynthetic lifeforms, plus other spaceborne phenomena that astronauts referred to as being their ”visitors.”

While all this initially sounds totally unbelievable, official audio and video film clip transmissions ( see below ) between space missioning astronauts and their mission ground control central proving NASA UFO Alien Encounters are officially very real.

Several prominent United States astronauts have now gone on public record revealing their personal experiences with official U.S. government encounters surrounding nonreferenceable objects and entities ( UFOs & Aliens ):

http://www.youtube.com/watch?v=XkOCwATi3tw

Introduction

The following additional ’official video clips and audio broadcasts’ ( below ) will reveal some amazing things for you if  these two ( 2 ) ’basic principles’ are remembered while viewing them:

1.  Meteorites ‘do not suddenly change direction’ and ‘do not make left-hand turns, right-hand turns or U turns’ like a ’piloted spacecraft’; and,

2. Debris in outer space, known as ‘space junk’ ( e.g. pieces of rocket boosters, expended satellites, etc. ), does not exit the Earth’s gravitational pull ( that extends – at a much lesser strength – into outerspace ) nor does it at high rates of speed’ either, but will either ‘float around in outer space’ and/or ‘return ( in a ‘decaying orbit’ ) to Earth’s atmosphere where it may either burn-up or fall to the surface of the Earth.

A few of the documentary motion picture film clips ( below ) are in ’full color’, ’black and white’, or ’tinted green’ screen resolutions – many of which are comprised of ’time-elapsed monitoring film sped-up’ so, ‘objects being monitored may not be moving as fast as they appear’, however ’other films may have objects moving in real speed ( e.g. ‘slow docking arms and astronaut manuevers’ or ‘fast electronic movements’ of ’camera lens housings’ that ‘spin around quickly’ to ‘catch a view of other objects moving in any direction at any time’ ).

Nevertheless, always keep in-mind the two ( 2 ) ‘outerspace principles’ that only ‘spacecraft make course corrections’ – turning and going in different directions – ‘not meteorites, comets, asteroids or space debris’.

Now, please enjoy watching ‘these specific four ( 4 ) videos’ ( below ) especially selected after careful analysis from ou-of ’hundreds of others found with flaws’:

By 1971, a NASA Apollo 14 rocket carried a Lunar Excursion Module ( LEM ) camera providing the following photo ( below ):

[ PHOTO ( above ): official NASA LEM camera photo of moon in background with UFO lights in right foreground ( click to enlarge ) ]

In the above photo, was there a ‘piece of lighted extermal equipment’ outside the NASA spacecraft? No. Was there any ‘distortion in the camera lense or reflection’? No.

In 1967, four ( 4 ) years before the aforementioned 1971 LEM launch, PACIFIC OPTICAL ( El Segundo, California ) generated thousands of LEM camera rose quartz glass lenses polished to perfection and tested for ‘any possible distortion factors’ using special ‘lightwave measurement instruments’ set according to ’government standards for approval’ long before being installed within those cameras used aboard the LEM, within an incredible number of NASA space rocket missions, and U.S. Air Force National Reconnaisance Office ( NRO ) missions. How are those facts known? I personally know those particular camera lenses ’do not capture any destortion whatsoever from glare or image reflections’ because I ‘personally worked on those lenses’, knew what they consisted of, as well as their unique characteristics also used in weaponized missiles and unmanned aerial vehicles.

As far back as 1966, when I was still attending high school, I also worked the graveyard shift at the McDonnel Douglas Space Systems Center ( now BOEING ) where within a special area then-known as “The Quad” a famous defecting Russian astrophysicist secretly worked for the U.S. government on the Mercury mission space capsules. Yes, and there were two ( 2 ) such capsules! Not much comes as much of a mystery to me, especially after four ( 4 ) decades of researching intelligence for the U.S. government.

The aforementioned films and broadcats document previously unknown ’new hazards surfacing in space’, believed one of the primary reasons why ‘all NASA spacecraft insurance policy coverage was cancelled’ as NASA lost its direct U.S. government funding when it became apparent to the U.S. government intelligence directorate ( CIA Science and Technology Division ) need of private-sector corporate market bids on future space mission contracts – swinging the axe into the heart of the NASA empire given its final ”tally-ho.”

That decision made perfect economic sense to the U.S. government because now its ‘secret private-sector enterprise takes on far more financial risk than it does just space mission challenges’ where shareholder investment returns will consequently realize less profit from having to absorb the costs associated with higher insurance policy coverages directly related to ‘new risk management assessments’ ( see official films and broadcasts above ) where insurance company policy directive issuances placed on ‘future mission spacecraft’ see more financial burden placed onto thebacks of ’investors’ while essening ever-growing financial burdens on U.S. Department of the Treasury foreign debt repayment plans the Federal Reserve Board decided NASA was just costing too much money and something had to be done about getting rid of the NASA burden without jeopardizing U.S. global space superiority. What began during 1985 as an intelligence mission to bury secret technology effortings within closely guarded private-sector enterprises satisfies corporate promises of long ago.

It’s simply a case of one hand washing another at the expense of the people, is all, where a new space tax that may have been pulled from tomorrow shelf concepts of George Orwell for those living in futuristic societies. Unfortunately, such activity already broke plenty of pencil point lead in private-sector workshop sessions at FANX III ( Ft. George G. Meade, Maryland ) in 1998 supporting private sector funded public insurance investment programs as yet another economic means by which U.S. Social Security Administration insurance may likely receive its axe because of the ever-looming baby boomer debt crisis the U.S. government faces dead ahead as next on its big aggenda. NASA was likely but a precursor government primer for what’s in-store next for the ‘little people’. Up, up and away, that beautiful balloon – that not so beautiful balloon anymore.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Advertisements

Quantum Crypto Keys

Quantum Cryptographic Control screen QCrypt QKey

[ IMAGE ( above ): Quantum Cryptographic Control QCrypt QKey Display Screen. Click on image to enlarge. ]

Quantum Crypto Keys
by, Concept Activity Research Vault ( CARV )

November 19, 2011 11:34:08 ( PST ) Update ( Published: November 4, 2010 )

USA, Virginia, Tysons Corner – November 19, 2011 – What business continually builds its inventory, no matter what happens anywhere in the world, and never stops building it?

While some may fear big brother, others are financially profiting from carefully researching otherwise unknown private sector business investment portfolios strategically partnered with government intelligence agencies.

Quantum Cryptography –

Expect quantum cryptography to become known in the future as the first practical application for “Quantum Communications.”

Quantum cryptography is a form of cryptography exploiting quantum theory, in-particular with uncertainty principle stating it is impossible to measure all aspects of an object with absolute certainty.

Background –

Im 1984, Charles H. Bennett ( fellow at IBM THOMAS J. WATSON RESEARCH CENTER ) and Gilles Brassard ( researcher at the University of Montreal, Canada ) first devised quantum cryptography as part of their study of relationships between physics and information.

They were not searching for a new cryptographic method but applying basic principles of quantum mechanics to real world uses and discovered quantum mechanics ideally suited for cryptography because of photons one-wayness. [49.]

In 1989, Charles H. Bennett and IBM colleagues built the first working quantum cryptographic prototypes sending photons a distance of 30 centimeters through the air of a laboratory.

Many authorities predicted at least 25-years would pass before any form of quantum cryptography would have practical utility, however at least three ( 3 ) manufacturers now have ‘quantum cryptography products on the market’ and developing more technology such as ‘range’ plus more in the future.

Some of the latest cryptologic technologies are still subject to continuing scientific investigation or are already in research and development stages, although early commercial products exist where standards are under development for some new technologies.

In the increasingly competitive Information Age – where the Internet spreads knowledge rapidly – protecting U.S. next-generation weapon systems, empirical SE&I, M&S applications, and intellectual property sees technical data became critical.

Cryptologic scientific investigations and developing technologies are closely related to those in the area of information technology ( IT ) because information security modules, components, and systems must be tightly integrated with – if not an integral component or module of – basic information processing hardware and software architecture where many applications now incorporate high-performance features and metaprocessing techniques shortening cryptanalytic time required for an exhaustive key search.

– –

Zero-Knowledge Proofs ( ZNP ) –

Zero-knowledge proofs ( ZNP ) are methods for proving knowledge of a secret without revealing any information about the secret.

Technology Parameter(s)

1. Prove knowledge of a secret without revealing any knowledge of the secret; 92

2. Prove identification;

3. Provide verification;

4. Reproducible results that significantly enhance or degrade current U.S. military zero-knowledge proof schemes; and,

5. Significantly enhance or degraded existing cryptographic capabilities for U.S. government ( USG ) Class A and Class B cryptographic systems.

Critical Materials: None identified.

Unique Test, Production, Inspection Equipment: None identified.

Unique Software

ZNP models.

Major Commercial Applications –

ZNP characteristic of anonymity is an important part of some concepts for e-commerce transactions.

For example, proof of certain generic authority or credit ‘credentials’ might be provided for e-commerce without revealing identity by using ZNP systems.

E-commerce transactions that protect privacy.

Like all requirements for security on the Internet, the threats from independent hackers and from nation states, rogue states, terrorists, and international criminals drive this technology.

Affordability Issues: Not an issue at this time.

Background –

ZNP allows a prover to demonstrate knowledge ( of a secret ) while revealing no information ( whatsoever of use to the verifier ) in conveying this demonstration of knowledge beyond what the verifier was able to deduce before the protocol run.

Only a single bit of information has to be conveyed, namely:

That the prover actually does know the secret.

ZNP protocols provide trusted authentication mechanisms and anonymity.

For example, one could prove U.S. citizenship without providing any other specific information such as name, address, sex, or exact age.

A protocol that is a proof of knowledge has the zero-knowledge property if it can be simulated in the following sense:

There exists an expected polynomial-time algorithm ( simulator ) which can produce – upon input of the assertion(s) to be proven but without interacting with the real prover – transcripts indistinguishable from those resulting from interaction with the real prover.

The zero-knowledge property implies that a prover – executing the protocol, even when interacting with a malicious verifier – does not release any information about its ( prover’s ) secret knowledge other than the particular assertion itself is true, not otherwise computable in polynomial time from public information alone.

Thus, participation does not increase the chances of subsequent impersonation.

A protocol is computationally zero-knowledge if an observer – restricted to probabilistic polynomial time tests – cannot distinguish real from simulated transcripts.

For perfect zero-knowledge, the probability distributions ( of the transcripts ) must be identical.

Zero-knowledge means computational zero-knowledge, when not qualified by further convention.

In the case of computational zero-knowledge, real and simulated transcripts are said to be polynomially indistinguishable ( indistinguishable using polynomial-time algorithms ).

Any information extracted by a verifier – through interaction with a prover – provides no advantage to the verifier within polynomial time.

Interesting work has been done in statistical zero-knowledge work performed by Jan Camenisch and Markus Michels exemplifying ‘statistical zero-knowledge protocols to prove statements’ saw these three ( 3 ) protocols:

– A committed number is a prime;

– A committed ( or revealed ) number is the product of two ( 2 ) safe primes, i.e. primes p and q such that (p-1)/2 and (q-1)/2 are prime; and,

– A given integer has large multiplicative order modulo, a composite number consisting of two ( 2 ) safe prime factors.

Main building blocks of aforementioned protocols are statistical zero-knowledge proofs of knowledge that are of independent interest where there has been proof of the correct computation of a modular addition, a modular multiplication, and a modular exponentiation whereby all values – including the modulus – are committed-to but not publicly known. Apart from the validity of the equations, no other information about the modulus ( e.g., a generator whose order equals the modulus ) or any other operand is exposed.

These techniques can be generalized to prove that any multi-variate modular polynomial equation is satisfied where only commitments to the variables of the polynomial – and to the modulus – need be known. Thus improving previous results where the modulus is publicly known.

– –

Digital Data Steganography –

Steganography is that branch of cryptology that attempts to obscure the existence of data through the use of subliminal channels.

Cleartext or encrypted information can be randomly embedded in the quantization noise of ‘digital images’ or other ‘imprecise digital data files, without noticeably increasing the size of the host file.

Background –

Image steganography can be used to conceal an encrypted message.

Technique by ‘combining image steganography and encryption or multiple-encryption could present a challenge to National Security and law enforcement agency cryptanalysts whereby ‘even if a message were known to exist in an electronic image’, the ‘message bits’ would have to be ‘identified’ and ‘isolated’ in cryptanalysis processing that could make ‘plain text recovery incredibly time consuming’ – if not ‘impracticable’. Steganography, in various forms, are ‘not strictly digital image steganography’.

Banks make use of a code-word execution technique when they need to send highly secure “action” messages to execute preplanned actions. Predetermined and mutually agreed actions are then set in motion, with instructions implicit in one short phrase embedded in routine banking message traffic.

Key critical to profiting from private intelligence investments in private sector arenas is to aquire even better predictives than what intelligence agencies currently understand future necessities will be.

Predictives, in brief formats presented to government directorates, are typically derived from a broad ‘studies and analysis collective’.

Predictives are rarely derived from only one ( 1 ) individual – save for leadership occassional fortune tellers – because few fluidly exercise simultaneous abilities quickly, i.e. identifying target specific information, limitedly broadening core targets outward to key multiple arenas requiring in-depth research and then analyzing all combinatorically with trend based progressive direction. Finding someone who can do all this, albeit step-by-step, could possibly benefit some leadership while even wiser leadership might add ‘socio-economic analysis’ in that mix to more effectively buffet any social unrest outcomes.

While considering one ( 1 ) individual doing it all, the word ‘impossible’ may initially come to mind, however that may not necessarily be true. Even ‘without mind reading’ or Mensa abilities, one ( 1 ) key to sucessfully profiting from investing in private sector businesses – tied to emerging government intelligence agency venture capital investments – may only require special skill sets in researching and analyzing what already slipped past intelligence information technology ( IT ) software protocols or think-tank collectives that would have otherwise already hammered-out an intelligence business investment shelf-ready decision awaiting a key trigger for implementation.

The first and easiest task to perform is becoming knowledgeable in historical intelligence business investments and where new knowledge will precisely profit in the not too distant future – thereby beating lumbering bears, busy bees and pesky flies – to ‘their honey’.

Profiting from those inept is not unlawful – at least not ‘yet’ – and so long as the insatiable sweet tooth of bears and bees can have the ‘majority of their honey’ they ‘might not mind sharing a little new honey’ shown them. Then again, ‘maybe not’.

For some, what is involved may only be tantamount to collecting a finder’s fee for doing some treasure hunting, however one must know how and where to look for some ‘old technology’ lost in yesterday’s bureaucratic confusion.

To place a bet, on a private business or the stock market, one needs to research more carefully than others – never underestimating machine-to-machine communications ( M2M ) either.

The following initial report ( below ) is only but a related research exercise that may prepare financial freedom futures.

– – – –

Circa: 2002 – 2008

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION 2500 Sand Hill Road – Suite 113 Menlo Park, California 94025 – 7061 USA TEL: +1 (650) 234-8999 TEL: +1 (650) 234-8983 FAX: +1 (650) 234-8997 WWW: http://www.inqtel.com WWW: http://www.in-q-tel.org WWW: http://www.in-q-tel.com

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION P.O. Box 12407 Arlington, Virginia 22219 USA TEL: +1 (703) 248-3000 FAX: +1 (703) 248-3001

– –

IN-Q-TEL focus areas, surround:

– Physical Technologies; – Biological Technologies; – Security; and, – Software Infrastructure.

– –

IN-Q-TEL

Investments –

Strategic Investments, Targeted Returns

In-Q-Tel is ‘building’ a ‘portfolio of companies’ that are ‘developing innovative solutions’ in ‘key technology areas’

Similar to many ‘corporate strategic venture’ firms, In-Q-Tel seeks to ‘optimize potential returns’ for our clients — the CIA and the broader Intelligence Community— by investing in companies of strategic interest.

In-Q-Tel engages ‘start-ups’, ‘emerging’ and ‘established’ companies, universities and research labs.

In-Q-Tel structure attractive win-win relationships through ‘equity investments’, as well ‘strategic product development funding’, and ‘innovative intellectual property arrangements’ and ‘government business development guidance’.

An Enterprising Partner –

In-Q-Tel ‘portfolio companies’ value a ‘strategic relationship’ with a ‘proactive partner’.

Companies, that work through In-Q-Tel due diligence process, know their technologies have the potential to address the needs of one of the most discriminating enterprise customers in the world.

In-Q-Tel takes a hands-on approach, working closely with our ‘portfolio companies’ to help ‘drive their success’ in the ‘marketplace’ and to ‘mature [ ‘grow’ ] their technologies’.

In-Q-Tel ‘investment goals’ are focused on ‘return’ on technology – a ‘blend of factors’ that will ‘deliver strategic impact’ on the Agency [ CIA ] mission:

– Effective ‘deployments’ of innovative technologies to the CIA; – Commercially successful ‘companies that can continue’ to ‘deliver’ and ‘support’ innovate technologies; and, – Financial ‘returns to fund further technology investments’ to ‘benefit the Intelligence Community’.   Investing In Our National Security –

In just a few short years, In-Q-Tel has ‘evaluated’ nearly two thousand [ 2,000 ] ‘proposals’:

75% [ 1,500 ] of which have come from companies that had never previously considered working with the government.

To date, In-Q-Tel ‘established strategic relationships’ with more than ‘twenty’ ( 20 ) of these ‘companies’.

Read more about our ‘portfolio companies’ and ‘technology partners’, or learn how to submit a business plan to In-Q-Tel.

Areas Of Focus –

IN-Q-TEL focuses on next generation technologies for gathering, analyzing, managing and disseminating data. Learn more about our areas of focus:

Knowledge Management: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/km.html ];

Security and Privacy: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sp.html ];

Search and Discovery: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sd.html ];

Distributed Data Collection: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/dd.html ]; and,

Geospatial Information Services: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/gi.html ].

Submit A Business Plan –

“In-Q-Tel also has garnered a reputation in the tech and VC [ Venture Capital ] worlds for being hard-nosed during due diligence. Unlike some venture firms, In-Q-Tel is staffed with hard-core techies who know how to put a program through the ringer. They’ve also got one of the roughest testing domains: the computer systems of the CIA.” – Washington Business Journal ( November 19, 2001 )

– View our criteria [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/submit/index.html ] for submission, and apply for consideration online.

Media Resources –

– Investment Portfolio: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf ].

Reference

http://web.archive.org/web/20020630223724/www.inqtel.com/invest/index.html

– – – –

Circa: 2002

IN-Q-TEL

Investments –

Technology Partners ( 2002 ) –

INKTOMI [ http://www.inktomi.com ] ( Leading Edge Search and Retrieval Technology )

INKTOMI, based in Foster City, California ( USA ), has offices elsewhere in North America, Asia and Europe.

INKTOMI division business, involves:

Network Products – comprised of industry leading solutions for network caching, content distribution, media broadcasting, and wireless technologies; and,

Search Solutions – comprised of general Web search and related services, and ‘enterprise’ search.

Inktomi ‘develops’ and ‘markets’ network infrastructure software essential for ‘service providers’ and ‘global enterprises’.

Inktomi ‘customer’ and ‘strategic partner’ base of leading companies, include:

MERRILL LYNCH; INTEL: AT&T; MICROSOFT; SUN MICROSYSTEMS; HEWLETT-PACKARD; COMPAQ; DELL; NOKIA; AMERICA ONLINE ( AOL ); and, YAHOO.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Lead System Integrator ( LSI ) – SAIC LSI [ http://www.saic.com/contractcenter/ites-2s/clients.html  ]

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ), founded in 1969 by Dr. J. R. Beyster who remained with SAIC for 30-years until at least November 3, 2003, has had as part of its management, and on its Board of Directors, many well known former U.S. government personnel, including:

– Melvin Laird, Secretary of Defense in the Richard Milhouse Nixon Presidential Administration;

– William Perry, Secretary of Defense in the William Jefferson Clinton Presidential Administration;

– John M. Deutch, U.S. Central Intelligence Agency ( CIA ) Director of Central Intelligence ( DCI ) in the William Jefferson Clinton Presidential Administration;

– U.S. Navy Admiral Bobby Ray Inman, U.S. National Security Agency ( NSA ) and U.S. Central Intelligence Agency ( CIA ) – various employed capacities in ‘both’ Agencies – in the Gerald Ford Presidential Administration, Billy Carter Presidential Administration and Ronald Reagan Presidential Administration;

– David Kay, who led the search for Weapons of Mass Destruction ( WMD ) – following the 1991 U.S. Persian Gulf War – for the United Nations ( UN ) and in the George W. Bush Sr. Presidential Administration following the 2003 U.S. invasion of Iraq.

In 2009, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) moved corporate headquarters to Tysons Corner at 1710 SAIC Drive, McLean, Virginia ( USA ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is a scientific, engineering and technology ‘applications company’ with numerous ‘state government clients’, ‘federal government clients’, and ‘private sector clients’.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) works extensively, with:

U.S. Department of Defense ( DOD ); U.S. Department of Homeland Security ( DHS ); U.S. National Security Agency ( NSA ); U.S. intelligence community ( others ); U.S. government civil agencies; and, Selected commercial markets.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Subsidiaries –

SAIC VENTURE CAPITAL CORPORATION; SCICOM TECHNOLOGIES NOIDA ( INDIA ); BD SYSTEMS ( BDS ); BECHTEL SAIC COMPANY LLC; BECK DISASTER RECOVERY ( BDR ); R.W. BECK; BENHAM; CLOUDSHIELD; DANET; EAGAN MCALLISTER ASSOCIATES INC.; HICKS & ASSOCIATES MEDPROTECT LLC REVEAL; SAIC-FREDERICK INC.; NATIONAL CANCER INSTITUTE ( NCI ); SAIC INTERNATIONAL SUBSIDIARIES; SAIC LIMITED ( UK ); CALANAIS ( SCOTLAND ); VAREC; APPLIED MARINE TECHNOLOGY CORPORATION; EAI CORPORATION; and, Others.

In 1991, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) received transference of the U.S. Department of Defense ( DOJ ), U.S. Army ( USA ), Defense Intelligence Agency ( DIA ) ‘Remote Viewing Program’ renamed STARGATE Project.

In January 1999, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) consultant Steven Hatfill saw SAIC vice president Joseph Soukup internally ( with no outside client ) commission ( with no outside client ) William C. Patrick – a retired leading figure in the legacy U.S. bioweapons program – see a report produced ( 28-pages on Feburary 1999 ) on terrorist anthrax attack possibilities via Unitd States postal mailings prior to 2001 anthrax attacks in the United States.

In March 2001, the U.S. National Security Agency ( NSA ) had SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) in ‘concept definition’ phase for what later became known as the NSA TRAILBLAZER Project, a “Digital Network Intelligence” system intended to ‘analyze data’ carried across computer ‘networks’.

In 2002, the U.S. National Security Agency ( NSA ) chose SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) to produce a ‘technology demonstration platform’ for the NSA TRAILBLAZER Project, a contract worth $280,000,000 million ( USD ).

TRAILBLAZER Project participants, included:

BOEING; COMPUTER SCIENCES CORPORATION ( CSC ); and, BOOZ ALLEN HAMILTON.

In 2005, TRAILBLAZER – believed by speculators ( http://www.PhysOrg.Com et. al. ) to be a continuation of an earlier data mining project THINTHREAD program – saw U.S. National Security Agency ( NSA ) Director Michael Hayden inform a U.S. Senate hearing that the TRAILBLAZER program required several hundred million dollars over budget – consequently trailing years behind schedule waiting for approvals.

From 2001 through 2005, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) was primary contractor for the $600,000,000 million ( USD ) TRILOGY Program, a three ( 3 ) part program – intended to replace obsolete FBI computers with a then-new state-of-the-art cutting edge technology ‘secure high-speed computer network system’ that would install 500 computer network servers, 1600 scanners and thousands of desktop computers in FBI field offices – that on December 2003 delivered to the U.S. Department of Justice ( DOJ ) Federal Bureau of Investigation ( FBI ) its SAIC “Virtual Case File” ( VCF ), a $170,000,000 million ( USD ) software system designed to speed tracking of terrorists, better accurize communications amongst agents fighting criminals with this FBI ‘critical case management system’, however nineteen ( 19 ) different government managers involved 36 contract modifications averaging 1.3 FBI changes everyday totaling 399 changes during 15-months afterwhich the FBI continued arguing ( through its own intermediary, AEROSPACE CORPORATION ) changes until the U.S. Department of Justice ( DOJ ) Inspector General ( IG ) criticized its ‘FBI handling’ of SAIC software, whereon February 2005 SAIC ‘recommended’ the FBI at-least ‘begin using’ the SAIC TRILOGY VCF ‘case management system’.

On September 27, 2006 during a special meeting of SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) stockholders, employee-owners voted by a margin of 86% to proceed with the initial public offering ( IPO ) whereupon completion SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) also paid – to existing stockholders – a ‘special dividend’ of $1,600,000,000 billion to $2,400,000,000 billion ( USD ).

On October 17, 2006 SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) conducted an initial public offering ( IPO ) of common stock offering of 86,250,000 shares priced at $15.00 per share. Underwriters – BEAR STEARNS and MORGAN STANLEY – exercised over-allotment options resulting in 11,025,000 million shares seeing the IPO raise $1,245,000,000 billion ( USD ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) had approximately 46,000 total employees, 16,000 employees were in McLean, Virginia ( USA ) and another 5,000 employees were in San Diego, California ( USA ).

SRA INTERNATIONAL INC. ( SRA ) [ http://www.sra.com/about-us/profile.php ]

SRA INTERNATIONAL INC., founded in 1978, headquartered in Fairfax, Virginia has additional U.S. offices.

SRA INTERNATIONAL INC. is a leading provider of information technology services and solutions to clients in national security, health care and public health, and civil government markets, requiring:

– Strategic Consulting; – Systems Design, Development, and Integration; – OutSourcing; and, – Operations Management.

SRA INTERNATIONAL INC. also delivers business solutions, for:

– Text mining; – Data mining; – Disaster and Contingency Response Planning; – Information Sssurance; – Environmental Strategies – Environmental Technology; – Enterprise Systems Management; and, – Wireless Integration.

SRA INTERNATIONAL INC. ORIONMagic ®

– –

Circa: 2002

IN-Q-TEL

Investments –

Portfolio Of Companies ( 2002 ) – Partial List

ARCSIGHT [ http://www.arcsight.com ] ( Security Management Software for The Enterprise )

ArcSight, founded in May 2000, is located in the heart of Silicon Valley, California ( USA ).

ArcSight is a leading supplier of enterprise software that provides the security “air traffic control system” for large, geographically dispersed organizations. These organizations are augmenting their network infrastructure with a wide variety of security devices such as firewalls, intrusion detection and identity management systems that produce a barrage of uncoordinated alarms and alerts that overwhelm the security staff.

With its ‘centralized view’ of ‘all security activity’ combined with ‘real time analysis’ of ‘events’, by both ‘operating at the perimeter and inside’ the organization, ArcSight provides a ‘single solution’, for:

Event capture; Log aggregation; Real time correlation; Incident investigation; and, Reporting.

ArcSight ‘separates’, the ‘true threats and attacks’ from the ‘millions of false alarms and non-threatening activities’ that occur each day, focusing attention and resources on high-priority problems.

The company has delivered enterprise, ‘security management solutions’ to leading ‘financial services’, ‘government’ and ‘manufacturing’ organizations while ‘attracting capital’ from ‘leading investors’, such as:

IN-Q-TEL; KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, SUMITOMO CORPORATION.

ATTENSITY CORPORATION [ http://www.attensity.com ] ( Text Extraction for Threat Detection )

Attensity Corp., founded in 2000, is a privately held company with dual headquarters in Mountain View, California ( USA ) and Salt Lake City, Utah ( USA ).

Attensity Corp. provides enterprise, ‘analytic software’ and ‘services’, to:

Government agencies; and,

Fortune 500 companies.

Attensity has developed breakthrough text extraction technology that transforms information captured in free form text into structured, relational data.

Attensity enables government agencies to dramatically expand their analytical capabilities in the area of ‘threat detection’ by, powering:

Link analysis; Trending; Exception reporting; Other advanced analytics; and, Knowledge management applications.

Attensity technology is the culmination of nearly a decade [ 10-years ] of research in computational linguistics.

Attensity Corporation customers include:

IN-Q-TEL, a strategic venture group funded by the CIA; WHIRLPOOL; and, JOHN DEERE.

ATTENSITY CORPORATION investor, is:

IN-Q-TEL

BROWSE3D [ http://www.browse3d.com ] ( Advanced Web Navigation )

BROWSE3D, founded in 2000, is located in the Dulles Technology Corridor of northern Virgina.

The company’s first Knowledge Management product, the Browse3D Browser, enables Internet users to browse Web sites using a dynamic, interactive, 3 dimensional ( 3-D ) display environment.

One year later [ 2001 ] the Browse3D Browser was recognized as the Best Internet Software of 2001 at the COMDEX Fall Technology Show ( Las Vegas, Nevada, USA ).

Browse3D launched its ‘consumer product’ in January 2002.

For the past 2-years [ since 2000 ], Browse3D has been working to re-invent the online researcher’s tool set. A researcher’s ability to ‘harvest relevant online data’ is often limited by the tools available to view that data.

Future products and technologies promise additional improvements in the way users ‘find’, ‘organize’, ‘save’ and ‘exchange’ web-based ‘content’.

BROWSE3D early-stage venture funding provided, by:

IN-Q-TEL; and, angel investors.

CANDERA INC. [ http://www.candera.com ] ( Enterprise Storage )

Candera Incorporated, founded in 2000, is a development stage stealth mode company headquartered in Milpitas, California ( USA ).

Candera Inc. is developing a new generation, purpose built, network based storage management platform that gives businesses unprecedented ‘control over’ and ‘visibility into’ their networked storage environments.

With the Candera Confluence solution, businesses can dramatically improve the utilization of their existing heterogeneous storage assets by consolidating them into a centrally managed storage pool. These can then be quickly and dynamically allocated to meet the needs of current and future network based applications, giving large enterprises a strategic advantage.

Candera is building the first [ 1st ] system, of a new generation of systems, that will enable customers to unleash the ultimate value of networked information storage.

CONVERA [ http://www.convera.com ] ( Mission Critical Enterprise Search and Categorization Software )

Convera RetrievalWare is a high-performance intelligent search system that allows broad flexibility and scalability for implementation across corporate intranets and extranets, enabling users to index and search a wide range of distributed information resources, including text files, HTML, XML, over 200 proprietary document formats, relational database tables, document management systems and groupware repositories. Convera RetrievalWare excels in distributed client environments and server environments with hundreds or thousands of users, documents, images and / or multiple media assets.

Advanced search capabilities include concept and keyword searching, pattern searching and query by example.

Convera is a leading provider of enterprise mission-critical ‘search’, ‘retrieval’ and ‘categorizing’ solutions.

More than 800 customers – in 33 countries – rely on Convera search solutions to power a broad range of mission critical applications, including enterprise:

Portals; Knowledge management; Intelligence gathering; Profiling; Corporate policy compliance; Regulatory compliance; Customer service; and, More.

DECRU [ http://www.decru.com ] ( Secure Networked Storage )

Decru, founded in April 2001, is headquartered in Redwood City, California ( USA ).

Decru solves the problem of secure data storage with a robust, wire-speed encryption appliance that fits transparently into any SAN or NAS storage environment, protecting data from both internal and external threats.

Markets include essentially any organization with a need to protect proprietary or confidential information ( e.g. government, technology, financial services, health care ).

Investors, include:

IN-Q-TEL; NEA; GREYLOCK; and, BENCHMARK.

GRAVITRON [ http://www.graviton.com ] ( Early Warning Detection and Notification System for Homeland Security Over Wireless Mesh Networks )

GRAVITON, founded in 1999, is located in La Jolla, California, USA.

Solomon Trujillo, former head of U.S. WEST ( baby bell telephone company ), leads GRAVITRON.

GRAVITON is on leading edge of a fledgling ( small ) industry, known as:

Machine to Machine Communications ( M2M ).

GRAVITON is developing an advanced integrated wireless sensor platform uniquely optimized for large-scale distributed sensor network applications working with Micro Electro Mechanical Systems ( MEMS ) sensor and spread spectrum wireless technologies licensed exclusively to GRAVITON from the U.S. National Laboratory at Oakridge ( also known as ) Oakridge National Laboratory ( Tennessee, USA ) – managed by the U.S. Department of Energy ( DOE ).

GRAVITON products and solutions integrate wireless, sensor and data management technology enabling enterprises to efficiently and transparently monitor, control, send, receive, and update system information from devices anywhere in the world.

GRAVITON is supported and funded by a number of corporate partners and investors, including:

IN-Q-TEL; GLOBAL CROSSING; ROYAL DUTCH SHELL ( oil / petroleum ); MITSUI; SIEMENS; QUALCOM; OMRON; MOTOROLA; and, SUN MICROSYSTEMS.

GRAVITON ‘primary’ financial investors, include:

MERRILL LYNCH;

GRAVITON ‘venture capital’ firms, include:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, EARLYBIRD.

INTELLISEEK [ http://www.intelliseek.com ] ( Enterprise Intelligence Solutions )

INTELLISEEK, founded in 1997, has since 1998 been changing the way organizations ‘understand’, ‘gather’ and ‘use’ enterprise ‘intelligence’.

INTELLISEEK ‘knowledge discovery tools’ [ as of: 2002 ] enable the nation’s largest enterprises with up-to-the-minute consumer, industry information and ‘competitive intelligence’.

INTELLISEEK ‘Enterprise Search Server’™ ( ESS ) search platform provides a suite of intelligent applications that automate ‘knowledge discovery’ and ‘knowledge aggregation’ from hundreds of disparate, and often hard-to-locate data sources.

INTELLISEEK ‘Knowledge Management’ and ‘Search and Discovery’ solutions solve the fundamental problem of “information overload” by identifying and searching relevant, targeted and personalized content from the internet, intranets and extranets.

INTELLISEEK clients, include:

FORD MOTOR COMPANY ( FOMOCO ); NOKIA; and, PROCTOR AND GAMBLE.

Investors include:

IN-Q-TEL; FORD VENTURES; RIVER CITIES CAPITAL; GENERAL ATLANTIC PARTNERS LLC; FLAT IRON PARTNERS; BLUE CHIP VENTURE COMPANY; NOKIA VENTURES; and, Other private investors.

METACARTA [ http://www.metacarta.com ] ( Geospatial Data Fusion )

MetaCarta, established in 1999, was launched on more than $1,000,000 million in funding from the U.S. Department Of Defense ( DOD ) Defense Advanced Projects Agency ( DARPA ) and private investors.

MetaCarta CEO John Frank, with a doctorate from the Massachusets Institute Of Technology ( MIT ) where during 1999 – as a Hertz Fellow in physics working on a PhD – conceived a new way to view – geographically – ‘collections of text’ that later saw MetaCarta combine his interests in algorithms, information design, and scientific models of real world phenomena.

Metacarta provides a new knowledge management platform that integrates ‘text data with geography’ providing a ‘cohesive system’ for ‘problem solving’.

METACARTA Geographic Text Search ( GTS ) appliance, the software solution, redefines how people interact with information, enabling analysts to view text reports and geographic information in one ( 1 ) logical view through integration of text and geography delivering new information not obtainable from any other source.

MetaCarta CEO John Frank graduated from Yale University.

MOHOMINE [ http://www.mohomine.com ] ( Transforming Unstructured Multi-Language Data Into Actionable Information )

MOHOMINE, founded in 1999, is privately-held and located in San Diego, California, USA.

MOHOMINE technology has been deployed by United States national security organizations.

MOHOMINE mohoClassifier for National Security Organizations ™ reviews ‘text information’ in ‘cables’, ‘e-mails’, ‘system files’, ‘intranets’, ‘extranets’ and ‘internet’ providing ‘automated document classification’, ‘routing’ – based upon ‘learn-by-example pattern recognition’ technology – and ‘reports’ on user defined properties such as ‘topic’, ‘subject’, ‘tone’ ( ‘urgent’, plus others ), ‘author’, ‘source’ ( geographic locations, ‘country’, etc. ), and more.

MOHOMINE mohoClassifier users can easily set up ‘filters’ to automatically ‘identify’ and ‘prioritize’ ( ‘read first’ requirement ) documents that are quickly processed – out-of large volumes of other data – and then quickly route prioritized information to quickly reach the proper people.

MOHOMINE, from Global 5000, currently [ since 2002 ] has more than one hundred fifty ( 150 ) customers across numerous vertical industries, including:

CITICORP; WELLS FARGO; INTEL; TEXAS INSTRUMENTS; PFIZER; BOEING; ORACLE; PEOPLESOFT; and, NIKE.

MOHOMINE investors, include:

IN-Q-TEL; HAMILTON APEX TECHNOLOGY VENTURES; and, WINDWARD VENTURES.

QYNERGY CORPORATION [ http://www.qynergy.com ] ( Long-Lasting Power Solutions For Multiple Applications And Small-Tech )

QYNERGY CORP., founded in 2001, is located in Albuquerque, New Mexico.

QYNERGY technology originated at the U.S. National Laboratory at Sandia ( also known as ) Sandia National Laboratories ( New Mexico, USA ) and at the University of New Mexico ( New Mexico, USA ).

QYNERGY Corp. develops leading-edge energy solutions based on QYNERGY proprietary QynCell ™ technology that made an exciting breakthrough – over other ‘battery’ or ‘portable energy’ devices – in ‘materials science’ allowing QYNERGY to possess several unique competitive advantages.

QYNERGY QynCell ™ is an ‘electrical energy device’ revolution, providing:

Long-lived Batteries – QynCell usable life is potentially over a period of ‘several decades’ ( 10-year multiples ), during which time the QynCell device ‘does not require external charging’;

Miniature and Micro Applications – QynCell™ technology is scaleable, thus can be ‘miniaturized’, for:

Micro Electro Mechanical Systems ( MEMS ); MicroPower™ applications; Small microelectronics; and, Power-on-a-chip applications.

SAFEWEB [ http://www.safewebinc.com ] ( Secure Remote Access )

SAFEWEB, established in April 2000, is based in Emeryville, California, USA.

SAFEWEB built the world’s largest ‘online privacy network’, however in 2001 its ‘free online service’ was ‘concluded’ – to focus on developing its ‘enterprise’ product.

SAFEWEB is a leading provider of innovative security and privacy technologies that are effective, economical and simple.

SAFEWEB Secure Extranet Appliance ( SEA ), the first [ 1st ] SAFEWEB enterprise security release – reduces the cost and complexity traditionally involved in securing corporate network resources.

SAFEWEB Secure Extranet Appliance ( SEA ), named Tsunami, is a fundamental ‘redesign of extranet architecture’ integrating disparate technologies into a ‘modular plug-in network appliance’ ( SEA Tsunami).

SAFEWEB SEA Tsunami is an ‘all-in-one solution’ simplifying implementation of ‘extranets’ and ‘Virtual Private Networks’ ( VPN ) reducing Total Cost of Ownership ( TCO ) by innovative architecture letting companies build – in less than 1-hour – ‘secure extranets’ providing ‘remote stationed’ enablement of ‘employees’, ‘clients’ and ‘partners’ to access ‘internal applications’ and ‘secure data’ from anywhere using a standard internet website browser.

SAFEWEB delivers, through established strategic partnerships, customized versions of its Secure Extranet Appliance ( SEA ) Tsunami technology to U.S. intelligence [ CIA, etc. ] and communications agencies [ NSA, etc. ].

SAFEWEB investors, include:

IN-Q-TEL; CHILTON INVESTMENTS; and, KINGDON CAPITAL.

STRATIFY INCORPORATED [  ] ( Unstructured Data Management Software )

In 1999, PURPLE YOGI was founded by former INTEL Microcomputer Research Laboratory scientists Ramana Venkata and Ramesh Subramonian.

PURPLE YOGI, became known as STRATIFY INCORPORATED ( a privately-held company ).

In early 2001, ORACLE CORPORATION veteran and senior executive Nimish Mehta became president and chief executive officer ( CEO ).

STRATIFY INC., headquartered in Mountain View, California ( USA ), is [ 2002 ] the ‘emerging’ leader in ‘unstructured data management’ software.

STRATIFY Discovery System is a ‘complete enterprise software platform’ helping todays [ 2002 ] organizations ‘harness vast information overload’ by ‘automating the process’ of ‘organizing’, ‘classifying’ and ‘presenting’ business-critical unstructured information usually found in ‘documents’, ‘presentations’ and internet website pages.

STRATIFY Discovery System platform ‘transforms unstructured internal and external data’ into ‘immediately accessible relevant information’ automatically organizing millions of documents displayed in easy navigational hierarchy.

STRATIFY INC. clients, include:

INLUMEN and INFOSYS TECHNOLOGIES LIMITED, named in 2001 as one ( 1 ) of The Red Herring 100.

STRATIFY INC. received funding, from:

IN-Q-TEL; H & Q AT INDIA (also known as ) H & Q ASIA PACIFIC; SOFTBANK VENTURE CAPITAL ( now known as ) MOBIUS VENTURE CAPITAL; SKYBLAZE VENTURES LLC; and, INTEL CAPITAL.

SRD [ http://www.srdnet.com ] ( Near Real Time Data Warehousing and Link Analysis )

SYSTEMS RESEARCH & DEVELOPMENT ( SRD ), founded in 1983, develops software applications to combat fraud, theft, and collusion.

SYSTEMS RESEARCH & DEVELOPMENT Non-Obvious Relationship Awareness ™ ( NORA ™ ) was originally developed for the gambling casino gaming industry

SYSTEMS RESEARCH & DEVELOPMENT NORA software is designed to identify correlations across vast amounts of structured data, from hundreds or thousands of data sources, in near real-time, and alert users to potentially harmful relationships between and among people.

SRD NORA software technology leverages SYSTEMS RESEARCH & DEVELOPMENT proven expertise in ‘aggregating’, ‘warehousing’ and ‘leveraging people data’ and ‘transaction data’ to strengthen corporate management and security systems.

SYSTEMS RESEARCH & DEVELOPMENT clients [ 2002 ], include:

U.S. Depaartment of Defense ( DOD ); CENDANT; TARGET; MGM MIRAGE; MANDALAY BAY RESORT GROUP; and, Food Marketing Institute.

TACIT [ http://www.tacit.com ] ( Enterprise Expertise Automation )

TACIT, founded in 1997, is located in Palo Alto, California ( USA ) with regional sales offices in Virginia, Maryland, Pennsylvania and Illinois.

David Gilmour serves as president and chief executive officer ( CEO ).

TACIT Knowledge Systems is the pioneer and leader in ‘Enterprise Expertise Automation’.

TACIT products ‘automatically and continuously inventories’ the ‘skills’ and ‘work focus’ of an ‘entire organization’ for ‘dynamic location’ of ‘connections to expertise needed’ – when needed to make decisions, solve problems, and serve customers.

TACIT products also include its award winning flagship product KnowledgeMail™. In June 200, TACIT was voted one of the “Hot 100 Private Companies,” by Upside Magazine.

In 2000 and 2001, TACIT was one ( 1 ) of the “100 Companies that Matter,” by KM World [ Knowledge Management World ].

TACIT attracted a ‘world class advisory board’ with interest from ‘venture capital’ and Fortune 500 ‘clients’ of ‘enterprise’ and ‘customers’, including:

IN-Q-TEL; JP MORGAN; CHEVRON-TEXACO ( petroleum and chemical ); UNISYS; HEWLETT-PACKARD; NORTHROP-GRUMAN ( aerospace & defense ); and, ELI LILLY ( pharmaceuticals ).

TACIT investors, include:

IN-Q-TEL; DRAPER FISHER JURVETSON; REUTERS GREENHOUSE FUND; and, ALTA PARTNERS.

TRACTION SOFTWARE [ http://www.tractionsoftware.com ] ( Harvest and Use Information from All Sources )

TRACTION SOFTWARE, founded in 1996, is located in Providence, Rhode Island ( USA ).

TRACTION® Software is the leader in ‘Enterprise Weblog’ software, bringing together working ‘communications’, ‘knowledge management’, ‘content management’, ‘collaboration’, and the ‘writable intranet portal’.

TRACTION TeamPage™ product addresses the need for ‘unified on-demand view’ of ‘team content’ and ‘team communication’ from ‘all document sources’ in ‘context’ and over ‘time’.

TRACTION TeamPage deploys quickly and easily on an existing network and delivers a ‘capstone communication system’ by turning ‘e-mail’ and ‘web browser’ into powerful tools for end-users.

TeamPage targets ‘program teams’ and ‘product management teams’ in ‘government’ and ‘business’.

TRACTION also supports a wide range of applications and business processes, including but not limited, to:

Business Intelligence and Market Research;

Collection Highlighting and Media Distribution;

Investor Relations E-Mail and Public Relations E-Mail Triage and Response; and,

Tracking Exception Process and Reporting Exception Process.

TRACTION SOFTWARE investors, include:

IN-Q-TEL; SLATER CENTER FOR INTERACTIVE TECHNOLOGY; and, private investors.

ZAPLET INCORPORATED [ http://www.zaplet.com ] ( Enterprise Collaboration Tools For Email )

ZAPLET INC., founded in 1999, is located in Redwood Shores, California ( USA ).

ZAPLET INC. is an enterprise software and services company and creator of the Zaplet Appmail System™ collaboration software that brings application functionality directly to a user’s inbox to complete business processes.

ZAPLET INC. Appmail, using a server-based platform, combines power, ‘centralized control’ and ‘robust security’ for traditional enterprise application systems with the convenience and ease-of-use of e-mail.

ZAPLET Appmail in-box becomes the gateway to a protected server where the application functionality and data securely reside.

Zaplet™ Appmail can be used, to:

Manage and Streamline mission-critical business processes; Requires no additional client-side upgrades; and, Instantly expandable for work teams ‘beyond’ the ‘enterprise’.

ZAPLET INC. has received numerous awards, including:

Red Herring 100; Enterprise Outlook – Investors’ Choice; and, Internet Outlook – Investors’ Choice.

ZAPLET INC. customers, include leading companies, in:

Finance; Telecommunication; High technologies; and, Government.

ZAPLET INC. is backed by world class investors, including:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); ACCENTURE TECHNOLOGY VENTURES; QUESTMARK PARTNERS L.P.; RESEARCH IN MOTION LIMITED ( RIM ); INTEGRAL CAPITAL PARTNERS; ORACLE CORPORATION; CISCO SYSTEMS INC.; and, NOVELL INC.

– –

Circa: 2010

IN-Q-TEL

Investments –

Portfolio of Companies ( 2010 ) – Partial List

3VR Security AdaptivEnergy Adapx Arcxis Asankya Basis Technology Bay Microsystems CallMiner Cambrios Carnegie Speech CleverSafe ( SAIC ) CopperEye Destineer Elemental Technlogies Ember Corporation Endeca Etherstack FEBIT FireEye FluiDigm

Reference(s)

http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf http://www.iqt.org/technology-portfolio/orionmagic.html http://defense-ventures.com/in-q-tel/

– – – –

Now if you thought you graduated with honors magna cum laude – think again and begin reading ( below ):

QUCOMM – Long Distance Photonic Quantum Communication

Brief –

An overview of the work done at Los Alamos National Laboratory ( New Mexico, USA ) on Quantum Computation and Cryptography

The idea of quantum computation and cryptography is to use the laws of quantum mechanics for either computing or exchange secrets messages.

Los Alamos is a leader in Experimental Quantum Computation [ EQC ].

The recent discovery that it was possible to use Nuclear Magnetic Resonance ( NMR ) for quantum computation has made experimental work leap forward.

The 3-qubit quantum computer – using NMR techniques with the molecule trichloroethylene – is state-of-the-art at present ( winter 1998 ).

We have succeeded at creating a GHZ state.

This is the “big brother” of an Einstein-Podolsky-Rosen ( EPR ) state.

Using qubits with state |0> and |1>, we have created the state |000> + |111>. It is well known form the foundations of quantum mechanics.

Both the EPR and the GHZ state have properties that are non-classical. For more details see our paper NMR-GHZ [ http://xxx.lanl.gov/ps/quant-ph/9709025 ].

Quantum error correction is required to compensate for the fragility of the state of a quantum computer.

We report the first [ 1st ] experimental implementations of quantum error correction and confirm the expected state stabilization.

A precise study of the decay behavior is studied in alanine and a full implementation of error correction protocol is implemented in trichloroethylene.

In NMR computing, however, a net improvement in the signal-to-noise would require very high polarization.

The experiment implemented the 3-bit code for phase errors in liquid state-state Nuclear Magnetic Resonance ( NMR ).

Quantum mechanics provides spectacular new information processing abilities.

One of the most unexpected is a procedure called ‘quantum teleportation’ – suggested by Bennet, et al. [  http://www.research.ibm.com/quantuminfo/teleportation ] – that allows the ‘quantum state of a system’ to be ‘transported from one location to another’ – without moving through the intervening space.

We have implemented the ‘full quantum teleportation operation’ over ‘inter-atomic distances’ using ‘liquid state Nuclear Magnetic Resonance (NMR)’. [ see, e.g. Electronic Transfer In Mesoscopic Systems, Quantum Kinetics, Magnetoresistance Within Magnetic Layering, Liquid State NMR, etc. (http://www.quantiki.org/wiki/Liquid-state_NMR ) ]

The inclusion of the final stage enables – for the first [ 1st ] time – a teleportation implementation, that may be used as a ‘subroutine’ in ‘larger quantum computations’, or for ‘quantum communication’.

Our experiment also demonstrates the use of ‘quantum process tomography’, a procedure to ‘completely characterize the dynamics of a quantum system’.

Finally, we demonstrate a controlled exploitation of decoherence as a tool to assist in the performance of an experiment.

Using quantum mechanics – instead of classical mechanics – has huge advantages but also some drawbacks; quantum mechanics make the ‘applications much more powerful’ but at the same time much more ‘fragile’ against ‘noise’.

Organization Information –

KUNGLIGA TEKNISKA HOGSKOLAN Valhallavaegen 79 100 44 Stockholm SWEDEN

CONTACT: Anders Karlsson

TEL: +46-8-7521272

FAX: +46-8-7521240

E-MAIL: aandkar@ele.kth.se

WWW : http://www.ele.kth.se/QEO/qucomm ( Project website )

Long Distance Photonic Quantum Communication (aka) LDPQC interalia the QuComm Project, will:

1. Scale secure quantum communication towards longer distances;

2. Realize novel applications; and,

3. Identify and transfer ‘spin-off applications’ to ‘industry’ [ i.e. ‘private sector’ businesses ].

The physical resources explored, are:

Entangled quantum states having no classical counterpart.

Work will be pursued on novel sources, for:

1. Direct ‘generation of entangled photon states’ in ‘electrically pumped structures’;

2. Diode-laser pumped ‘non-linear optical crystals’; and,

3. Detectors or ‘multiphoton states’.

Basic quantum information building blocks, such as teleportation and entanglement swapping, will be developed. Field demonstrations will be used to validate the technology, both at 700nm – 800nm ( free space and optical fibers ) and at 1300 nm and 1550 nm ( telecommunication fibers and systems ).

The consortium consists of both ‘universities’ and ‘industries’ [ private sector businesses ] – those with a broad ‘physics’ and ‘technology’ background.

QuComm Objectives –

1. Extend experimental quantum communication protocols – notably ‘quantum teleportation entanglement swapping’ and ‘entanglement quantum cryptography’ towards ‘longer distances’. In particular, to explore ‘physical resource of entangled states’ of ‘multiple photons’ that otherwise lack finding a counterpart in classical physics;

2. Experimentally demonstrate quantum communication protocols for cryptographic applications in point-to-point and multiparty quantum cryptography – using ‘entangled quantum states’ to ‘achieve’ an ‘increased level of security’ – compared to ‘faint-pulse quantum cryptography’;

3. Validate optical quantum communication technologies – in an ‘application context’ through various field tests of the developed concepts and technologies; and,

4. Identify and transfer ‘spin off’ results – from ‘quantum communication technologies’ – to industries [ private sector businesses ] or to industries-to-be [ ‘emerging’ technology businesses’ ], notably SMEs.

Work Description –

The work will be divided into six [ 6 ] quantum state Work Packages ( WP ) [ ‘problem sets’ ], each with designated WP [ ‘problem set’ ] ‘leaders’:

WP0, leads – ‘Management’ [ i.e. IN-Q-TEL Quantum Interface Center ( QIC ) interalia CIA ], additionally dealing with ‘dissemination’ and ‘industrial take-up’ [ private sector transfers to private sector businesses ] of results [ ‘products’ / ‘solutions’ to ‘market’ for ‘profitability’ ];

WP1, leads – ‘Sources’ [ ‘partners’ ( i.e. ‘businesses’ / ‘institutions’ ]; and,

WP2, leads – ‘Analyzers’ ( i.e. ‘detectors’ / ‘analysts’ / ‘individuals’ ) enabling ‘building block formations’ for ‘subsequent work’.

[ NOTE: Once “sources” and “analyzers” ( ‘detectors’ interalia ‘analysts’ ) are available – in some cases, during project infancy – they will be transferred to later [ “subsequent” ] quantum state Work Packages. ]

WP3, leads – Entanglement enhanced quantum cryptography – focused on ‘entangled states’ – and ‘multi-party quantum cryptography’;

WP4, leads – Teleporting entanglement; and,

WP5, leads – Protocols ( multimode and multistate ) utilizing optimized sources and analyzers for the realization of quantum communication protocols, both ‘significantly improved versions’ of ‘earlier demonstrations’, as well as ‘entirely novel protocols’.  [ NOTE: In WP5, ALCATEL THALES III-V Lab ( Palaiseau Cedex, France ) will work on different schemes of ‘phase locked loop’ to ‘reduce phase noise’ of generated mmW, and will also facilitate exploitation of the ‘results’ achieved through small scale fabrication and/or ‘technology transfer’ ( http://www.ist-iphobac.org/partners/index.asp?id=3 ).

WP 6, leads – Field tests ‘assembled work’ – in earlier work packages ( WPs ) used – to ‘conduct trials outside the laboratory setting’.

By having a ‘separately delineated’ [ sensitive ‘compartmentalized’ information ( SCI ) ] work packages ( WP ) [ ‘problem sets’ ], it will be possible, to:

1. Assure ‘availability of test sites’;

2. Provide ‘coherence in goals’ of ‘field trials’; and,

3. Provide ‘joint experience’ for ‘realization of trials’.

The ‘management’ of the consortium [ http://www.ist-iphobac.org/login.asp ] will be with a ‘management committee’:

1. One [ 1 ] person from each ‘partner’ ( same person as the WP leader, in most cases ); and,

2. One [ 1 ] person from the ‘associated partner’.

The progress of work will be monitored through ‘bi-monthly management reports’ assembled by the WP leader and sent to the ‘coordinator’ [ ? ].

The consortium will meet every 6-months, to:

1. Highlight scientific work;

2. Discuss progress; and,

3. Discuss modifications to the project.

A small ‘industrial advisory committee’, will:

1. Monitor progress of the project; and,

2. Advise and assist in ‘transferring’ – industrial relevant – ‘results’.

The project will ‘disseminate results’, through:

1. Channels Established;

2. Industrial Advisors; and,

3. Community Others [ ‘select attendees’ of organized ‘joint meetings’ and ‘workshops’ ].

QuComm Member List –

Number | Name | Short name | Country

P01 Kungliga Tekniska Högskolan [ http://www.ele.kth.se/QEO/ ]  KTH S [ Sweden ]

P02 Ludwig-Maximilians-Universität München [ http://scotty.quantum.physik.uni-muenchen.de/ ]  LMU G [ Munich, Germany ]

P03 Institut Experimentalphysik der Universität Wien [ http://www.quantum.univie.ac.at/ ] EXPENIVIE A [ Vienna, Austria ]

P04 University of Oxford [ http://www.qubit.org/ ] Oxford UK [ United Kingdom ]

P05 University of Geneva, Group of Applied Physics [ http://www.gapoptique.unige.ch/ ] GAP CH [ Switzerland ]

P06 Los Alamos National Laboratory [ http://qso.lanl.gov/qc/ ] LANL US

P07 THOMSON-HOUSTON ( THALES ) LABORATOIRE CENTRAL DE RECHERCHES ( LCR ) [ http://www.thalesgroup.com/Press_Releases/Descartes_prize_awarded_to_a_European_project_invo/ ] THLCR F [ Domaine de Corbeville, 91400 Orsay, Cedex, FRANCE ] [ NOTE: Second ( 2nd ) largest participant in the UK defense industry. On December 6, 2000 was eventually renamed THALES OPTRONIQUE S.A. ( Elancourt, France ), an electronics company delivering information systems and services for aerospace, defense, and security markets. THALES GROUP is partially state-owned ( France ), operates in more than 50 countries, has 68,000 employees, generated €12.9 billion in 2009 revenues, ranked 485th world’s largest company by Fortune 500 Global, is the 9th largest defense contractor in the world, and sees military sales that are 63% of THALES GROUP total sales. ]

P08 Defence Evaluation and Research Agency [ http://www.dera.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm ] DERA UK

GAP-Optique

University of Geneva, Department of Physics [ http://mpej.unige.ch/physics.html ] ( Geneva, Switzerland )

University of Geneva [ http://www.unige.ch ] ( Geneva, Switzerland )

QRandom is a physical random number generator ( RNG ) based on the intrinsic randomness of quantum mechanics. The random process used is the choice of a photon between the two outputs of a beam-splitter.

The generator is easy to use ( USB plug’n play support and self-powered ) and sufficiently fast for cryptographic applications (100 kHz of raw bits rate ).

The generated files can be processed by the program RNG Tester. This program allows to acquire, to apply an unbiasing procedure and to test files of random bits.

See Photo:

BT Quantum Optics Group:

We live in a quantum world – something physicists have considered with amazement for more than seventy years. It is only now that we realize that quantum physics is more than a radical departure from classical physics. It also offers many new possibilities for information processing.

In particular, quantum theory is non-local: it predicts entanglement between distant systems leading to correlations that cannot be explained by any theory based only on local variables, as demonstrated by Bell inequality.

All experiments are in remarkable agreement with quantum theory. Hence, the physics community faces a very strange worldview: in theory, everything is entangled, but, in practice, decoherence makes it impossible to reveal this entanglement. In addition to its “experimental metaphysics” aspects, quantum entanglement has recently gained much interest and respect because it is at the heart of quantum information processing.

The general idea is that entanglement provides means to carry out tasks that are either impossible classically ( like quantum cryptography ) or that would require significantly more steps to perform on a classical computer ( like factorization ).

However, how robust is quantum entanglement?

How long can one maintain it under control? Over which distances?

Can one really exploit it?

It is worth to emphasize this psychological revolution: for decades entanglement was considered as a source for quantum paradoxes, now it is considered as a resource to achieve tasks classically impossible.

Our activities in experimental quantum optics started in 1993 with a project on cavity effects in silvered microfibers. Almost at the same time we performed a first simple experiment in Quantum Cryptography ( QC ) [ see, e.g. publications, look up ] just for fun.

Nobody then [ 1993 ] would have imagined that in 1999 we would be one of the world leaders in this field. In fact, during a 2-years project supported by SWISSCOM, we developed an automated [ see, e.g. QC-setup, News, Crypto 98, Plug & Play ] with unprecedented performances.

We are currently participating in the Esprit-Project ” European Quantum Cryptography and Single Photon Technologies ” ( EQCSPOT ) in order to develop a QC-prototype.

Within national projects we developed compact sources of entangled photon pairs. With such a source we performed a record-breaking Bell experiment [ see, e.g. QC, Publications, Look Up ] between two [ 2 ] villages near Geneva [ Switzerland ] separated by more than 10 kilometers [ km ].

More generally, we are studying now the relation between non-locality and relativity and the application of novel sources of entangled photons for quantum communication. Our basic research also led to practical results such as an original setup for chromatic dispersion measurements, a novel technique for absolute detector calibration and the development of single-photon detectors in the near infra-red [ IR ].

Reference

http://www.dstl.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm

Research

http://www.ist-optimist.unibo.it/pdf/network/projects_public/QUCOMM/Deliverables/D8.pdf

– – – –

Example

Since 2005, the THALES Group has successfully manufactured TV/4 format QWIP sensitive arrays in high rate production at the THALES Research and Technology Laboratory.

The full-TV array manufacturing started in 2007.

Uniformity and stability were the key parameters that led to the selection of this technology for thermal cameras.

Another widely claimed advantage for QWIPs was the versatility of the band-gap engineering and of III-V processing allowing custom design of quantum structures to fulfill the requirements of specific applications such as:

1. Very long wavelength ( VLWIR );

2. Multi-spectral detection; and,

3. Polarimetric detection.

Serial production of CATHERINE-XP and CATHERINE-MP has now started for the various programs for which both cameras have been selected. A review of the QWIP Production status, CATHERINE achievements and current programs are presented.

THALES based current strategy on very compact TI in order to address the largest range of platforms and applications.

THALES is working in cooperation with Sofradir and TRT / III-V lab on the evolution of product taking advantage of new capabilities offered by QWIP technology.

Future products are under development, based on:

1. Dual band;

2. Multi-band; and,

3. Polarimetric imagery.

Research

http://www.photonics.com/Article.aspx?AID=40105

http://meetings.aps.org/Meeting/MAR10/Event/121362

http://www.thalesgroup.com/Portfolio/Aerospace/LandJoint_Products_Optronic_self-protection_LWR/?pid=1568

http://www.thalesgroup.com/Markets/Security/Related_Activities/Hypervisor/Content/Next_generation_supervision_architecture/

http://www.ist-isis.org/index/isis-partners.html

http://web.archive.org/web/20080319045528/www.opera2015.org/links/default.asp

http://www.dtic.mil/mctl/DSTL/DSTLSec17gg.pdf

– – – –

To begin tying aforementioned information into a perspective where one needs further research, read these Unwanted Intelligence Annex I reports, at:

http://upintelligence.wordpress.com/2010/10/25/information-technology-directorate

http://upintelligence.wordpress.com/2010/10/23/extraterrestrial-information-technologies

When you’re ready, e-mail, for more.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/

 

Robot Combat Intelligence

[ PHOTO ( above ): W-88 miniature nuclear bomb property of USA ( click to enlarge ) ]

Robot Combat Intelligence
by, Concept Activity Research Vault ( CARV )

January 18, 2011 21:08:42 ( PST ) ( Originally Published: February 1, 2002 )

DISTRICT OF COLUMBIA, Washington – January 18, 2011 – Over 12-years ago, after the United States realized too late that its ‘miniature nuclear weapons technology delivery system’ ( W-88 ) secrets had already been stolen ( from the vault of its insurance carrier ) after the People’s Republic of China ( PRC ) rapidly produced their own version, ‘only a select few’ realized a secret U.S. decision took futuristic concepts into development for U.S. global military applications deploying technologies that only seemed to have been conceived from science-fiction motion picture films ( e.g. STAR TREK, STAR WARS, MATRIX, and more ) shocking audiences worldwide.   In 1999, U.S. secret defense endeavors forgings – with several universities and U.S. government contract private sector organizations – were led by the U.S. Department of Defense ( DoD ), Defense Advanced Research Projects Agency ( DARPA ) created even newer more advanced multiple Program stratagems employing various forms of ‘combinatoric’ technologies developed for globally deploying U.S. military dominance with various and sundry secret-sensitive devices and systems far beyond many imaginations.

DARPA SIMBIOSYS Program –

DARPA SIMBIOSYS Program entails, amongst other things, multi-functional microbiological nano technology robot android devices primarily for military applications, where such remained until just a few years ago, until it began being applied in some medical arenas today.

To understand what is ‘current’, one must first look briefly at DARPA Programs ‘past’ ( 1999 – 2002 ), which ( alone ) is enough to ‘still send chills down many people’s spines today’. Once realizing what DARPA was doing 12-years ago, it’s not all that unfathomable to comprehend where DARPA has taken and will continue taking many.

SIMBIOSYS ( 1999 – 2002 ) –

In 1999, DARPA SIMBIOSYS developed a combined quantitative understanding of various biological phenomena characteristics opening the DARPA door to what amounts to MicroElectroMechanical Systems ( MEMS ) integrating microphotonics in, amongst many things such as electro-optic spatial light modulators ( SLM ) combining very short pulse solid state lasers providing powerful new capabilities for secure communication up-links ( multi-gigabits per second ), ‘aberration free’ 3-D imaging and targeting performed at very long ranges ( greater than 1,000 kilometers away ), innovative design system integration of MEMS spatial light modulators ( SLM ) providing quantum wavefront control leaps in photonics and high speed electronics, and even ‘flexible cloth-like smart materials’ DARPA wants hardware placed into production devices and systems applications optimizing both U.S. and ‘its specially selected few other foreign nation U.S. friendlies’ ( Israel ) to hold in future warfaring battlespace management superiority over other foreign nation threats.

DARPA SIMBIOSYS includes classes of biological molecules ( i.e. antigens, antibodies, DNA, cytokines, enzymes, etc. ) for analyses and diagnoses studies, from:

1. Biochemical sensors, sensing ‘details from environments’; and,

2. Biochemical sensors, sensing ‘details from human body fluids’.

Specific examples under each of those two ( 2 ) groups being left up to the discretion of the PI.

Bio-molecules importance slect criteria, includes:

1. Microsystem sensors, for automated sampling and analyses, extendibility;

2. Bio-molecules simulant, to which it represents U.S. Department of Defense ( DoD ) relevant extents; and,

3. Bio-detection high degree of sensitivity and specificity processing, etc.

DARPA SIMBIOSYS emphasis is at the ‘molecular level’ for ‘sensing’ and ‘detection’.

SIMBIOSYS Program precludes human cells and human tissue based sensing because other DARPA programs currently address those issues in combination thereof.

SIMBIOSYS Goals –

SIMBIOSYS Program ‘stimulates multi-disciplinary research’ – bringing together biologists, chemists, engineers, physicists, computer scientists and others to address difficult and pressing challenges in advancing micro and nano-biotechnology.

SIMBIOSYS Program goal is to ‘utilize phenomena’ in ‘bio-fluidic transport’, ‘molecular recognition’ and ‘signal transduction from joint studies in modeling and experiments.

SIMBIOSYS Program joint effort expects results in ‘new hardware device, new hardware processes and new hardware production communities that will begin utilizing new models, new rules, new methods and new processes together enabling design and development of enhanced performance next generation bio-microdevices.

DARPA Advanced Projects –

DARPA is focusing on, amongst many, these advanced projects:

1. Bioengineering artificial intelligence ( AI ) systems sized from nanometers and meters up to large-scale robotic systems deployed globally;

2. Biological hybrid devices and systems, inspired from computational algorithms and models;

3. Biosynthesized composite materials incorporating synthetic enzymes and pathways from biochemical cellular engineered concepts for application productions;

4. Neural phenomena control over system science computation measurement application interfaces addressing humans;

5. Micro-scale reagents biochemically engineered;

6. Biosynthesis signal processing control platform studies;

7. Molecular biological population level behavior dynamic simulation modeling complexes; and,

8. Subcellular device physics affects and cellular device physics affects within biological component systems using real-time non-destructive observation study techniques.

[ PHOTO ( above ): legacy MicroFlyer, only a Microelectronic Aerial Vehicle – MAV ( click to enlarge ) ]

Bioengineered MicroBots Developed & Deployed –

Battlefields now require ‘unmanned combat aerial vehicles’ ( UCAV ) and ‘advanced weapons’ that self-navigate and self-reconfigure with autonomous communication systems accomplishing time-critical commands, however while many use Commercial Off The Shelf ( COTS ) products, such is not the case for developed and deployed bioengineered microrobots.

MicroBot AMR Control By MARS –

DARPA mobile autonomous robot software ( MARS ) Project is designed to develop and transition ‘currently unavailable software technologies programming’ operations of autonomous mobile robots ( AMR ) in partially known changing and unpredictable environments.

DARPA SIMBIOSYS Program aims provide new software removing humans from combat, conveyance, reconnaissance, and surveillance processes by:

1. Extending military hardware range;

2. Lowering manpower costs;

3. Removing human physiology for swifter concepts, designs, engineering, development, and deployment successes; and,

4. Researchers demonstrating autonomous navigation of humanoid robots, unmanned military vehicles, autonomous vehicles and interactions between humans.

DARPA indicates that robots – to be meaningful – must be fully integrated into human lives in military, commercial, educational and domestic usages must be capable of interacting in more natural human ways.

DARPA funded research and development of robots given similar bodies with human-like intelligence for humanoid interaction providing new ways for the human world.

COG Robot –

DARPA funded Massachusetts Institute of Technology ( MIT ) researchers, employing a set of sensors and actuators ( with small microcontrollers for joint level control, up to larger audio-visual digital signal network pre-processors for controlling different levels of its heterogeneous hierarchy network ) approximating human body sensory and motor dynamics, created the robot named COG that eventually allowed DARPA further development of deployable, modular, reconfigurable and autonomous robots.

[ PHOTO ( above ): legacy Biomorphic Explorers – Snakes and Bats ( click to enlarge ) ]

CONRO Robots –

CONRO robots, developed through DARPA, employed autonomous capabilities, of:

1. Self-repair; and, 2. Morphogenesis ( changing shapes ).

Examples, amongst many, included design styled:

Snake robots, able to move ‘in-to’ and ‘out-of’ tight spaces; and,

Insect robots, able to move faster ( covering more ground meeting military mission swifter needs ).

[ PHOTO ( above ): legacy Spider, and Payload biochemical delivery simulation ( click to enlarge ) ]

CONRO robots were design equipped to perform two ( 2 ) missions:

1. Reconnaissance ( activity detection, monitorization, and reporting – surveillance ); and,

2. Deliver small ‘military payloads’ ( bio-chemical weapons, etc. ) into ‘enemy occupied remote territory locations’ ( away-from friendly warfighters ).

CONRO robots are comprised of multiple SPIDERLINK modules.

In 1999, DARPA built both ‘snakes’ and ‘hexapods’ as ‘initially tethered’ prototypes termed 1-DOF, equipped with abilities to both ‘dock’ and ‘gait ambulate’ based on applied computational algorithms.

In 2000, DARPA had twenty ( 20 ) autonomous self-sufficient ‘modules’ – not mentioning what those resembled – built designated as 2-DOF, after:

1. Hormone based control developed and tested theory;

2. Hormone hexapods and snakes implemented motions ( for 2-DOF );

3. Quadrupeds, hexapods and snakes implemented locomotion with centralized control for 2-DOF;

4. Morphing self-repair ‘modules’ delivering small payloads used ‘miniature cameras’ that were designed and tested; and,

5. Snake head with snake tail with configured docking capabilities were implemented laboratory two dimensional ( 2-D ) testing.

CONRO DARPA Near-Term Milestones:

1. Modules’ reconfigurability ( morphogenesis ) robust automation designed and demonstrated ( for 2-DOF );

2. Topology ‘discovery’ ( automatic topography recognition ) demonstration;

3. Gait reconfiguration ( morphogenesis ) automation for ambulating a ‘given’ ( programmed instruction ) topology designed and demonstrated;

4. Gait reconfiguration ( morphogenesis ) automation for ambulating a ‘discovery’ ( automatic topography recognition ) designed and demonstrated;

5. Wireless ( radio frequency, infra-red, etc. ) control of miniature cameras demonstrated;

6. Pointing ( waving, mousepad, etc. ) control of miniature cameras demonstrated; and,

7. Large scale deployment of CONRO robots demonstrated.

[ PHOTO ( above ): DARPA BioBot named Blaberus ( click to enlarge ) ]

Deployer Robot ( DR ) –

Deployer Robots ( DR ) ‘support’ and ‘deploy’ distributed ‘teams of other smaller robots’ termed “Joeys” ( singular, “Joey” ) that perform either ‘hazardous tasks’ or ‘tedious tasks’.

Deployer Robots ( DR ) have two ( 2 ) roles, that:

1. Carry and launch given numbers of smaller Joey robots ( Joeys ); and,

2. Command and control ( C2 ) – after launching – Joey robots ( Joeys ).

[ PHOTO ( above ): legacy CyberLink HID test USAF personnel with DARPA robots ( click to enlarge ) ]

Robot Loop Pyramid –

Robot-in-the-Loop ( RIL ) concept, augments Human-in-Loop ( HIL ), building a ‘pyramid of robots’ – supervised by one ( 1 ) person.

‘Launch’ and ‘Command and Control’ ( C2 ) – of different Joey robots ( multiple, i.e. Joeys ) – two ( 2 ) goals are handled independently, as:

1. ‘Launch’ of robots, via grenade sized Joey robot clusters ( multiple ), developed under DARPA Deployer Robot ( DR ) Program availability of smaller Joeys; and,

2. ‘Command and Control’ ( C2 ), is investigated using ‘larger robots’ developed for DARPA ITO sister Software for Distributed Robotics ( SDR ) Program enabling fully leverage of both Deployer Robot ( DR Program and Software for Distributed Robotics ( SDR ) Program development of algorithms leveraging heterogeneous interaction between a ‘smart’ highly mobile ‘Deployer Robot’ ( DR ) and a ‘team’ of Joey robots that are more powerful, less computational and less mobile.

[ PHOTO ( above ): legacy Virtual Combiman digital glove waving battlespace management ( click to enlarge ) ]

DARPA key universal elements of robot deployment examined:

1. Emplacement – Launching and dynamically situating the Joeys for mission goals;

2. Operations – Maintaining the infrastructure to support the distributed front, including communications and error detection and recovery ( e.g., getting back on course after positional drift ); and,

3. Recovery – Collecting Joey robots data to analyze after delivery into a format useful for the human operator.

DARPA Deployer Robot ( DR ) Program development acquired and refitted two ( 2 ) Urban Robot Upgrades ( URU ) in new Deployer Robots ( DR ) types.

DARPA, investigated five ( 5 ) alternate launch strategies, but selected only one ( 1 ):

1. Grenade barrel launch, delivery of robots, into a three ( 3 ) story building.

2. Grenade barrel launcher was designed, equipped and developed, with:

3. Grenade Magazine contains ‘multiple Joey robots’ for ejection – supports full mobility integrity of the Deployer Robot ( DR );

4. Sensor mast ( collapsible ) – for Deployer Robot ( DR ) interaction with Joey robots launched on arrival at destination location; and,

5. Communication ( 916 MHz ) link between Deployer Robot ( DR ) and Joey robots.

DARPA SDR Program –

DARPA Software for Distributed Robotics ( SDR ) Program development designed and built Joey robot prototypes ( approximately 3-1/2 inch cube ) for ultimate fabrication in a production lot quantity of 120 Joey robot units.

DARPA Software for Distributed Robotics ( SDR ) Program leverage and adaptation controls swarms of Joey robots.

DARPA Near-Term Milestones:

1. Launch propulsion mechanisms ( C02 cartridge, .22 caliber shell, or other ) deployment testing of Joey robots into battlefield areas;

2. Launcher ( of multiple Joey robot deployment ) mechanism built on-board first ( 1st ) Deployer Robot ( DR ) named Bandicoot;

3. Sensor mast ( collapsible ) built and installed on-board second ( 2nd ) Deployer Robot ( DR ) named Wombat;

4. Radio Frequency ( RF ) development protocols for interaction between Deployer Robot ( DR ) and Joey robots;

5. Infra-Red ( IR ) deployment protocols for interaction mechanisms between Deployer Robot ( DR ) and Joey robots using IR ( Infra-Red );

6. Human Interface Device ( HID ) operator remote control unit ( ORCU ) development for Deployer Robot ( DR ).

DARPA SIMBIOSYS began over 12-years ago. All the photographs ( above ) are almost one decade ( 10-years ) old.

Current careful research on this subject further provides more information about where the U.S. stands today.

Submitted for review and commentary by,

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

Reference

http://web.archive.org/web/20021214110038/http://groups.msn.com/AnExCIA/rampdintell.msnw

Secret IT Directorate

CIA HQ former buildings

[ PHOTO ( above ): Former U.S. Central Intelligence Agency Headquarters ( click on image to greatly enlarge ) ]

Secret IT Directorate
by, Concept Activity Research Vault ( CARV )

November 22, 2011 11:45:08 ( PST ) Updated ( Originally Published: October 25, 2010 )

USA, Menlo Park, California – November 22, 2010 – Some may not recall the ‘first public announcement ( 2000 )’ of the United States Central Intelligence Agency ( CIA ) ‘private business corporation’ having been referred to as the IN-Q-TEL CORPORATION INTERFACE CENTER (aka) QIC, it was however fomerly known as IN-Q-TEL CORPORATION, but ‘that company name’ was even formerly known as IN-Q-IT CORPORATION (  ’not’ to be confused with the INTUIT CORPORATION business of software application programs QuickBooks and TurboTax ), however the CIA ’reversed’ its previous private business name change decisions back to it now being known as the IN-Q-IT CORPORATION ( IN-Q-IT ) today. Clear as mud, right?

Some wonder whether ”IN-Q-IT” is even ‘really’ the ’true name’ of this CIA ‘private business’ company today, or whether – within the intelligence community pea ‘n shell game of names – other company subsidiary names may have developed, but for now the IN-Q-IT CORPORATION is ‘currently known’ as being the U.S. Central Intelligence Agency ( CIA ) ‘venture capital’ private business corporation.

Important to understand precisely ‘what this CIA private business was supposed to be accomplishing’ versus ‘what the CIA actually did’ with its private business; more recently, however ’what it has become’ and ‘what it is supposed to be accomplishing’ today and for the future.

The curious state of affairs sees no one knowing anything more about the CIA QIC ( IN-Q-TEL Interface Center ) private business corporation than a few did when it began, but ‘now’ no one is even required to inform the public with an accounting to justify anything surrounding it. Why? Because it was meant to be a ‘private business’ company, ‘not’ a U.S. government entity, and ‘that’ was ‘how’ the CIA created it to remain – outside anyone’s purview – for a rather ‘complex’ reason.

The only method, by which an ‘even more complete’ and ‘even more accurate assessment’ may be formulated for an ’even more thorough understanding’ is quite involved and may at times be highly complex. One must not only review ‘multiple facet areas’ this CIA ‘private business company was originally designed to tackle but more-so what it was supposed to accomplish, and from within ‘both’ of those areas, go on to ’realize precisely’ what ‘were’ and ‘still are’ today’s “problem sets” facing the CIA and just ‘how’ they are juggling it all.

Some believe ‘members’ of U.S. Congressional committees’ and subcommittees’ ‘oversight’ had to attend ‘special educational lessons’ designed by the CIA. Did key members of Congress attend what basically amounted to a CIA ‘school’?

The CIA Congressional school was believed non-existent by many left to see other less palatable theories develop into the U.S. Congress having simply tired over too numerous CIA complex oversight reviews – and so much so that Congress relagated its own authority over to CIA in what some believed tantamount to the CIA ‘fox’ guarding its own global-sized intelligence ‘chicken coop’.

Some may now be enlightened to understand what the United States Central Intelligence Agency ( CIA ) decidely phrased as its own ”radical departure” away-from what it perceived as ‘inefficient economic budget support’ for solving its own ’quantum complexities’ within ’highly specific areas’ – still ‘classified’ in the interest of ‘national security’ – burdensomely producing an exponential growth of new ”problem sets” the CIA would only publicly explain – in the most general of terms – as such ‘experienced from within un-named areas’ of ‘science and technology research and development applications’ that the CIA was decidely viewing to establish ‘limits upon’ and go on to a’simultaneously’ establish as ‘marketable derivatives’ it called ”products” that CIA Office of Science and Technology ( S&T ) oversight could ‘manage distribution of information knowledge’ from but on an ‘in-exchange’ contractual agreement basis with ‘cooperative’ “private sector” ‘individuals’, ‘businesses’,  ’institutions’ and ‘organizations’ and thereby ‘establish who held proprietary keys’ to ‘special skill sets’ of what was already protected ’intellectual property rights’ of “existing” technology and CIA global establishment over all ”emerging” ( new upcoming future ) technology proprietary rights by sole marketeering ‘special talents’ and ‘special services’ could be harvested where incredible amounts of ‘profit’ could also be harnessed ( absorbed ) by the CIA.

To many of entrepeneurial independent spirit this CIA QIC private business corporation appeared, in-essence, out-of nowhere, like a new Borg structure infringing on private freedoms of what few once experienced of global marketplace past, and to others CIA QIC tenor was too Godfather-like – making people and entities an offer they couldn’t refuse. While the CIA foresaw such rumors and speculation coming,  in reality, what ‘was’ the ‘CIA’ doing by opening-up ‘its own private business corporation’?

Visionary dreams may be able to see the United States Central Intelligence Agency ( CIA ) ‘shed’ its ’government skin’ to become the ‘world’s largest multi-national corporation’ holding the ‘world’s largest monopoly’ on information technology ( IT ) research and development direction of much of the world’s finest talent resources, i.e. private ‘individuals’, ‘businesses’, ‘institutions’ and ‘organizations’ independently operating outside U.S. Congress ‘oversight, budget justification and related constraints’. Such clever restructuring in-place, CIA would cease to exist as the public knows it today, technically – by legal definition – becoming a wholly-owned ’non-profit organization’ – no longer requiring U.S. Department of the Treasury tax dollar funding. Set free, a new type of CIA would exist with ‘self-determined financing’ and stock market trading profits derived from a host of private sector corporate ‘mergers and acquisitions’ ( M&A ).

While surface dreams of such visionaries might at-first appear ingenious ‘how’ was ‘all’ this ‘actually assembled’?

Before 1999, it took the CIA Office of Legal Counsel less than 1-year to research various United States laws to locate legacy technicality provisions that the U. S. Congress approved allowing the CIA to exercise its own ”radical departure” plan.

By 2000, ’reality’ saw the fetal stages of this CIA private bussiness venture plan developing, leaving the public without hearing anymore further about its progress.

Some believed an ‘initial public offering’ ( IPO ) paying dividends to private individual investors and corporate trading of shares of ‘stock’ in what could have been misconstrued as potentially being the world’s largest ‘insider trading scheme’ headache of the United States Securities and Exchange Commission ( SEC ) whose predictives could only imagine manage the envelopment of multiple new technology area companies trading on ’stock exchange’ floors that could potentially carry forward ‘mutual profit secrets’ paying more funds than anticipated into the CIA private business plan – a “radical departure” away from what otherwise had long been understood as the status quo of world trading – where embarrassing implications might turn’terrorist fund reduction measures’ into ‘profits derived from CIA led secret private business developments in high technology products’. Could such a “radical departure” plan backfire or morphotherwise ’unsophisticated terrorists’ – utilizing improvised munition missions – into a new more powerful community of ’uncooperative competitive business terrorists’? Perhaps.

Implications of a CIA private business group of subsidiary businesses trading stock on ‘open stock market exchanges’ around the world could create an entirely ’new form of intelligence blowback’ of staggering global socio-economic business proportions for future generations.

Today, no overall clear pictures exist on what still remains cloaked in secrets – albeit ’government’ or ‘private’ – where outside both domains this CIA private business enterprise continues growing. But, in which directions?

Prior to 2001, the new CIA plan became a ’high-directional multi-tiered simulataneous growth-oriented economic support expansion’ for and of ‘key-critical secret-sensitive advanced “information technology” ( IT ) derivatives ( “products” )’ that could ‘only be implimented’ by the CIA “identifying” ( targeting ) and “partnering” ( obtaining ) ’exisiting information’ and ‘information tasking ability quotients’ from “global” ( worldwide ) “private sector” masses – an ”infinite” ( unlimited ) supply of ‘private individuals’, ‘private businesses’ and ‘institutions’ to become ‘dedicated taskers’ of controlled CIA “problem sets.”

The CIA private business futures would depend on successful simultaneous utilization of exercising better economic sense to its maximum potential immediately alongside highly specific advanced technological enhancements the United States ’intelligence community’ would be grown under a new ‘broad term secrecy’ commonly known but hidden within what the CIA termed only as ”information technology” ( IT ) that would necessarily require CIA controlled ’targeting’, ‘shaping’ and ‘acquisition’ of a plethora of private business sector information technology ( IT ) application research and development.

Truely a ”radical departure,” as the CIA publicly alluded to, when describing its ‘new mission focus’ – solving CIA “problem sets.”

Although CIA controlled ’special technology’ research and development ( R&D ) was on ‘applications’ that later becale known as ” Commercial Off The Shelf ” ( C.O.T.S. / COTS ) ‘products’ that were in-essence – during early stage informational development – the cruxt of what the CIA wanted presented on its ‘table’ whereupon the CIA would legitimatize and manage ‘mass information exchanges’ the CIA would ’trade’ for ‘other valuable considerations’ but to only a select few ‘private companies’ ( e.g. LOCKHEED, LUCENT, PHILIPS, AT&T, et al. ) that would in-return be ‘capable of offering’ through only ’United States government qualified’ contractual agreement exchanges of whatever the CIA deemed these companies ’could place of further interest’ or ’further the duration of continuing to provide’ what these select private ‘individuals’, ‘companies’, ‘institutions’ and ‘organizations’ were ‘already providing under U.S. government contract agreement harvests’.

The public, however only understood ‘press reports’ that kept all of the aforementioned very ’simple’ – indicating in the vaguest of terms – that ‘products would eventually be sold’ ”through the private sector.”

Secret-sensitive ‘products’, that were in all actuality ‘technological breakthroughs’ were to be traded between CIA selected and controlled business stock holdings, and the CIA IN-Q-TEL INTERFACE CENTER ( QIC ) would privately and thereby secretly manipulate all technology funds derived from what the CIA QIC publicly referred to as those being its ‘partners’ and ‘other vendors’ that would remain ’outside the purview U. S. Congress government budget oversight’ where all private companies remain to enjoy unfettered privledges of privacy.

By utilizing U.S. Department of the Treasury government tax funds – for U.S. government contract agreement funding to ‘private business partners’ – the United States Federal Reserve System follows in CIA footpath lock-step by ’mirroring’ private bank wire transfer monies directed and then redirected through a long chain series of foreign corporation named offshore bank accounts secretly routed back into the U.S. Central Intelligence Agency ( CIA ) IN-Q-IT CORPORATION (aka) QIC  private business enterprise handling ‘venture capital’ where new project funding amounts may be decidely broken down into smaller amounts or pooled into much larger amounts for dispersals to clandestine other secret-sensitive intelligence programs, projects and/or operations that gain the strength to easily remain ‘outside U.S. Congress intelligence oversight board committees and subcommittee scrutinization.

Directorate Central Intelligence ( DCI ) ochestral management arrangements within its IN-Q-IT INTERFACE CENTER ( QIC ) realizes from foreign historical prospectives that when a private business exercises ‘en masse privatized mind teams’ to understands today’s falabilities in-keeping with human frailties encountering CIA inherent procedural compartmentalization of secrets rule ( no “talking around” ) requiring those of such outside each task to be unable to quickly assemble an ‘overall picture’ of what overall CIA plans consist of – at least that’s how it’s supposed to work but rarely does – so, while that alone ( in and of itself ), became a “problem set” to solve that drastic measures needed taking. Hence, the CIA “radical departure” plan has another design serving to counteract intelligence information leaks.

Ingenious, is a very small word to describe even one ( 1 ) facet of this CIA private business plan where the public has its limited understanding confusingly ’shifted from what it perceives to be government secrets’ moved rapidly back and forth between ‘private sector secrets’ in what only but a few perceive to be a ‘new wave intelligence form’ or ‘combinatoric intelligence structuring’ producing a shield ( shell ) to protect even more secrets actually beneath what has become a new globally flexible CIA layered support group strengthening.

As an extremely large ’black budget’ intelligence missions funding source, CIA IN-Q-TEL INTERFACE CENTER would only be the recipient of limited and toned recommendations supplied by the QIC Board of Advisors ( CIA headquarters ) as measures to be reviewed for eventual implimentation by the QIC Board of Trustees for the essential discretionary manipulation of sophisticated:

1. Technologies [ i.e. XEROX PARC RESEARCH CENTER, et al. ];

2. Vendors [ i.e. LOCKHEED, et al. ];

2. Debt [ i.e. TELECREDIT INC., et al. ];

3. Capital [ i.e. MARSH & MCLENNAN CAPITAL INC. ];

4. Stock Market Trading [ i.e. GOLDMAN SACHS & CO. ]; plus,

5. More.

The report ( below ) shows ‘whom’ were initially placed in ‘experienced authoritative positions’ and shows ’whom’ were chosen as ’senior level executive advisors’, all selectively chosen by the CIA pulling them from ‘key critical private businesses’ to ‘guide’ the private U.S. Central Intelligence Agency business venture.

Such should really come as no surprise, at least to those understanding mechanics of international business, trading and finance where all domestic and foreign bank account transactions are mirrored under oversight by the United States Federal Reserve System ( FED ) and U.S. Securities And Exchange Commission ( SEC ), the latter two ( 2 ) of which are ‘overseen’ by the U.S. Central Intelligence Agency ( CIA ).

This information was dervived from, outside ’market sensitive‘ ( stock market trading ) material, a Critical Sensitive National Security report [ August 13, 2001 ] of the U.S. Congress, House of Representatives Subcommittee on Oversight and Investigations ( Subcommittee ) of the Committee on Financial Services relying on information supplied by, amongst others, the SEC Divisions of Enforcement and Corporation Finance, Offices of the Chief Accountant, General Counsel, Compliance, Inspections and Examinations, Office of the Comptroller, Office of Economic Analysis, the U.S. Central Intelligence Agency ( CIA ).

But, is all this ‘really going on’? See full report ( below ).

– – – –

Courtesy: Unwanted Publicity Information Group

Source: X-CIA Files [ now defunct MSN Group website ]

 

 

 

CIA Sends Hi-Tech Tsunami Warnings by, X-CIA Files – Staff Writer [ AnExCIA@bluewin.ch ]

March 12, 1999

USA, California, Menlo Park – The first ‘publicly open contract’ between a so-called ‘private firm’ partnering with the U.S. Central Intelligence Agency (CIA) where the private corporation whose CIA members conceived and funded it is known as the In-Q-Tel Corporation was formerly known as the In-Q-It Corporation.

In-Q-Tel is actually one of many CIA private-sector business partners, which is not all that uncommon a partnership, like what the CIA has had for decades with the MITRE CORPORATION (USA), BELL LABORATORIES ( Canada ), and TRW Power Thrusting Division ( Hawthorne, California, USA ), remote control center for CIA maneuvering Tracking Data and Relay Satellites ( TDRS ) and the Killer HUGHES ( KH-11 ) anti-satellite satellite ( space born destructive laser platform ) series.

The publicly revealed partnership between the CIA and IN-Q-TEL CORPORATION has sent another tsunami warning to Japan at its NIPPON ELECTRIC CORPORATION ( NEC ) high-technology monopoly, that has been right on the heels of advanced high-technology advancements seen within the RESEARCH TRIANGLE PARK ( North Carolina, USA ).

There is some doubt and controversy though between what the CIA says In-Q-Tel is, verses what Q-In-Tel says it is.

CIA claims ( on its website ) that Q-In-Tel is a “‘non-profit’ organization.”

IN-Q-TEL states it has had ’profitability in-mind for quite some time’.

Let’s see what the facts reveal (below), allowing casual observers to make up their own minds about just what IN-Q-TEL ‘really is’:

The In-Q-Tel Heirarchy

CIA IN-Q-TEL INTERFACE CENTER ( QIC ) players are stacked-up on a list that reads like something out-of a Robert Ludlum novel – filled with international intrigue high-tech corporatarchy.

CIA IN-Q-TEL INTERFACE CENTER ( QIC ) Board of Trustees is a Who’s-Who of ‘big corporate’ America:

– Gilman Louie, CEO of IN-Q-TEL CORPORATION, most recently was HASBRO INTERACTIVE Chief Creative Officer and General Manager of the GAMES.COM group ( responsible for creating the HASBRO internet game site ), previously serving as Chairman of the Board of MICROPOSE, CEO and Chairman of SPECTRUM HOLOBYTE, CEO of SPHERE INC., and is on the Boards of Directors of numerous software firms.;

– Lee Ault, Chairman, former Chairman and CEO of TELECREDIT INC.;

– Norman Augustine, former Chairman and CEO of LOCKHEED MARTIN CORPORATION;

– John Seely Brown, Chief Scientist, XEROX CORPORATION and President, XEROX PARC RESEARCH CENTER;

– Michael Crow, Executive Vice Provost of Columbia University;

– Stephen Friedman, Senior Principal of MARSH & MCLENNAN CAPITAL INC., and former Chairman of GOLDMAN SACHS AND CO.;

– Paul Kaminski, former U.S. Department Of Defense ( DoD ) Undersecretary for the U.S. Defense Acquisition and Technology Office, President and CEO of TECHNOVATIONS INC., and Senior Partner in GLOBAL TECHNOLOGY PARTNERS;

– Jeong Kim, President of CARRIER NETWORK, part of the LUCENT TECHNOLOGIES GROUP, and former founder of YURIE SYSTEMS;

– John McMahon, former Deputy Director of U.S. Central Intelligence Agency ( CIA ), former President and CEO of LOCKHEED MISSILE & SPACE COMPANY, and consultant to LOCKHEED-MARTIN CORPORATION;

– Alex Mandl, Chairman and CEO of TELIGENT, and former President and CEO of AT&T; and,

– William Perry, former U.S. Department Of Defense Secretary and currently Berberian Professor at Leiland Stanford University.

New CIA Use Of In-Q-Tel Interface Center ( QI.C )

In-Q-Tel is a new non-profit corporation funded by the CIA to seek Information Technology ( IT ) solutions to the Agency’s most critical needs. A unique venture, was formed to enable the Agency ( CIA ) to have access to ‘emerging and developing information technology’ in a timely manner.

QIC ( IN-Q-TEL INTERFACE CENTER ) is the ‘interface center’ linking the IN-Q-TEL CORPORATION to the Agency ( CIA ).

QIC – CIA Function

QIC develops a problem set for In-Q-Tel, partners with In-Q-Tel in the solution acceptance process and manages the Agency’s relationship with In-Q-Tel.

QIC plans and evaluates the partnership program, protects CIA security and CIA counter-intelligence interests and communicates the QIC / In-Q-Tel venture to the World.

CIA – QIC Function

The CIA, working in partnership with IN-Q-TEL, created the Agency’s ( CIA ) new found organization QIC.

QIC goals now, are to be the leading source for commercial, high impact IT solutions for the Agency ( CIA ), and will be herald as the single most important contributor to the Intelligence Community by the year 2001. QIC will create and use the full range of corporate processes needed to manage QIC (aka) the ” CIA-In-Q-Tel Partnership ” by delivering CIA-accepted IT solutions.

CIA Goals With QIC

Eventually, IN-Q-TEL will take on a life funded by the high-technology consumer public. QIC ( IN-Q-TEL Interface Center ) however, works comprehensively and collaboratively with Agency ( CIA ) IT specialists, customers, IN-Q-TEL experts, Agency ( CIA ) managers, the Chief Information Officer, the Chief Technology Officer, Chief Financial Officer, Agency directorates, and Executive Board to develop an annual coordinated and approved critical ‘problem set’ for IN-Q-TEL.

QIC, leads Agency participation in the partnership’s solution transfer planning, including resources, technology demonstration, and prototype testing and evaluation.

At the same time, QIC works with In-Q-Tel to assure that it addresses issues regarding the transfer of IT solutions into the Agency. QIC also works with Agency customers and their managers to create an environment conducive to the implementation and acceptance of partnership solutions and follow-on initiative.

In-Q-Tel Background

On September 29, 1999 the Central Intelligence Agency (CIA) was treated to something different. In many of the nation’s leading newspapers and television news programs a story line had appeared that complimented the Agency for its creativity and openness.

The media was drawn to a small corporation in Washington, D.C. that had just unveiled its existence and the hiring of its first CEO, Gilman Louie who described the Corporation called, the “IN-Q-IT CORPORATION“, as having been formed “…to ensure that the CIA remains at the cutting edge of information technology advances and capabilities.”

With that statement the Agency ( CIA ) launched a new era in ‘how it obtains cutting-edge technologies’.

In early January 2000, the name of the corporation ( IN-Q-IT CORPORATION ) was changed to IN-Q-TEL CORPORATION.

The ‘origins of the concept’ that has become IN-Q-TEL are traceable to Dr. Ruth David, former CIA Deputy Director for Science and Technology.

She and CIA Science And Technology Deputy Director, Joanne Isham, were the first senior Agency ( CIA ) officials to understand that the information revolution required the CIA to forge ‘new partnerships’ with the ‘private sector’ and ‘design a proposal for radical change’.

The timing of the proposal was fortuitous.

CIA Director of Central Intelligence ( DCI ), Mr. George Tenet, had just launched his own Strategic Direction Initiative ( SDI) – also known as “Star Wars“ – included technology as one of its areas for review.

The study made a direct link between Agency ( CIA ) ‘future technology investments’ and ‘improving’ its ‘information gathering’ and ‘analysis capabilities’.

By the summer of 1998, the Agency ( CIA ) had assembled a few senior Agency ( CIA ) ‘staff employees with an entrepreneurial bent’ and ‘empowered them’ to take the Dr. Ruth David original concept and flesh it out.

Aided by a ‘consulting group’ and a ‘law firm’, they ( CIA ) devoted the next 4-months to making the rounds in Silicon Valley ( California ) – and elsewhere – putting the concept through the wringer. Much of the ‘time was spent listening’.

Many they met with were often critical of one aspect or another of the concept.

But, whether they were ‘venture capitalists’, Chief Executive Officers ( CEO ), Chief Technical Officers ( CTO ) or men of Congress and staffers, all eagerly immersed themselves in spirited debates that enriched the Agency ( CIA ) team and ‘drove the concept in new directions’.

By the end of 1998, the Agency  CIA ) team reached a point at which the concept seemed about right.

Though’ it had changed considerably’ from that which had been proposed initially by Dr. Ruth David, it remained true to its core principles.

It was time to hand the ‘product’ of the Agency ( CIA ) work over to someone in the ‘private sector’ with the ‘experience’ and passion necessary ‘to start the Corporation’.

To the delight of the DCI and Agency ( CIA ) team, Norman Augustine, a former CEO of LOCKHEED-MARTIN and 4-time recipient of the Department of Defense highest civilian award, the Distinguished Service Medal, accepted the challenge.

By February 1999, the Corporation was established as a legal entity, and in March [ 1999 ] it [ IN-Q-TEL CORPORATION ] received its first [ 1st ] contract from the Agency ( CIA ). In-Q-Tel was in business, charged with ‘accessing information technology ( IT ) expertise and technology wherever it existed’ and brought it to bear on the’ information management’ challenges facing the Agency ( CIA ).

In-Q-Tel Creation

As an information based agency, the CIA must be at the cutting edge of information technology in order to maintain its competitive edge and provide its customers with intelligence that is both timely and relevant.

Many times the Agency and the federal government have been the catalysts for technological innovations. Examples of Agency ( CIA ) inspired breakthroughs, include the LOCKHEED AEROSPACE aircraft designed U-2 ( Dragon Lady ) and SR-71 ( Black Bird )reconnaissance aircraft and the CORONA ‘surveillance’ satellites, while the ‘parent of the Internet’ [ Advanced Research Projects Agency (aka) ARPA.NET ] was led forward with the Defense Advanced Research Projects Agency ( DARPA ).

By the 1990s, however – especially with the advent of the World Wide Web – the ‘commercial market’ was setting the pace in IT innovation.

And, as is the nature of a market-based economy, the ‘flow of capital’ and ‘talent’ has irresistibly ‘moved to the commercial sector’ where the prospect of huge profits from ‘initial public offerings‘ ( IPO ) and ‘equity-based compensation‘ has become ‘the norm’.

In contrast to the remarkable transformations taking place in Silicon Valley ( California ) and elsewhere, the Agency ( CIA ) – like many large Cold War era ‘private sector corporations’ – felt itself being ‘left behind’. It ( CIA ) was not connected to the creative forces that underpin the digital economy.

And, of equal importance, many in Silicon Valley ( California ) knew little about the Agency ( CIA ) IT ( information technology ) needs.

The opportunities and challenges posed by the information revolution to the Agency ( CIA ) core mission areas of ‘clandestine collection’ and ‘all-source analysis’ were growing daily.

Moreover, the [ CIA ] challenges are not merely from foreign countries, but also ‘transnational threats’.

Faced with these realities [ by 1997 ], the leadership of the CIA made a critical and strategic decision in early 1998.

The Agency’s leadership recognized that the CIA did not, and could not, compete for IT ( information technology ) innovation and talent with the same speed and agility that those in the ‘commercial marketplace’, whose businesses are driven by “Internet time” and ‘profit’, could.

The CIA mission ‘was’ intelligence collection and analysis, not IT innovation.

The leadership also understood that, in order to extend its reach and access a broad network of IT innovators, the Agency had to step outside of itself and appear not just as a buyer of IT but also as a seller.

The CIA had to offer Silicon Valley ( County of Santa Clara, California ) something of value, a business model that the Valley [ Silicon Valley ] understood; a model that ‘provides’ – for those who joined hands ( became partner affiliates ) with IN-Q-TEL – the ‘opportunity to commercialize’ their ‘innovations’. In addition, IN-Q-TEL ‘partner companies’ would also ‘gain another valuable asset’, access to very difficult CIA ‘problem sets’ that could become ‘market drivers’.

Once the Agency ( CIA ) leadership crossed these critical decision points, the path leading to IN-Q-TEL formation was clear.

In-Q-Tel – Close-Up

In-Q-Tel founder, Norm Augustine, established it as an independent non-profit corporation.

Its Board of Trustees, which now has 10 members, functions as any other board, initially guiding and overseeing the Corporation’s startup activities and setting its strategic direction and policies.

The CEO, who was ‘recruited’ by the Board [ Board of Trustees for IN-Q-TEL CORPORATION ], reports to them [ Board of Trustees for IN-Q-TEL CORPORATION ], and ‘manages’ IN-Q-TEL.

The Corporation [ IN-Q-TEL ] has offices in two ( 2 ) locations:

1. Washington, D.C.; and,

2. Menlo Park, California [ Silicon Valley ].

It [ IN-Q-TEL ] employs a ‘small professional staff’ and a ‘smaller group’ of ‘business consultants’ and ‘technology consultants’.

In-Q-Tel’s mission is to foster the development of new and ‘emerging information technologies’ and pursue ‘research and development’ ( R&D ) that produce solutions to some of the most difficult IT [ information technology ] problems facing the CIA.

To accomplish this, the Corporation [ IN-Q-TEL ] will network extensively with those in ‘industry’, the ‘venture capital’ community, academia, and any ‘others’ who are at the ‘forefront of IT [ information technology ] innovation’.

Through the business relationships that it establishes, In-Q-Tel will create environments for collaboration, product demonstration, prototyping, and evaluation.

From these activities will flow the IT solutions that the Agency ( CIA ) seeks and, ‘most importantly’, the ‘commercial opportunities’ for ‘product development’ by its ‘partners’.

To fulfill its mission, In-Q-Tel has designed itself to be:

– Agile to respond, rapidly to Agency needs and commercial imperatives;

– Problem driven, to link its work to Agency program managers;

– Solutions focused, to improve the Agency’s capabilities;

– Team oriented, to bring diverse participation and synergy to projects;

– Technology aware, to identify, leverage, and integrate existing products and solutions;

– Output measured, to produce quantifiable results;

– Innovative, to reach beyond the existing state-of-the-art in IT; and,

– Over time, self-sustaining, to reduce its reliance on CIA funding.

At its core, In-Q-Tel is designed to operate in the market place on an equal footing with its commercial peers and with the speed and agility that the IT world demands.

As an example, it [ IN-Q-TEL ] can ‘effect the full range of business transactions‘ common to the industry – it is ‘venture [ venture capital ] enabled’, can ‘establish joint ventures‘, ‘fund grants [ grant funding ]‘, sponsor open competitions, ‘award sole source contracts‘, etc. And, ‘because of the many degrees of freedom granted to it‘ [ IN-Q-TEL ] by the Agency ( CIA ), IN-Q-TEL ‘does not require Agency ( CIA ) approval for business deals it negotiates‘.

As such, In-Q-Tel represents a different approach to government R&D.

It [ IN-Q-TEL ] ‘moves away from the more traditional government project’ office model in which the program is managed by the government.

Instead, the Agency ( CIA ) has invested much of the decision-making in the Corporation [ IN-Q-TEL ].

Hence, In-Q-Tel will be judged on the outcomes produced, i.e. the solutions generated, and not by the many decisions it makes along the way.

In-Q-Tel – IT Space

As with many aspects of the In-Q-Tel venture, the Agency took a different approach in presenting its IT needs to the Corporation. It bounded the types of work that In-Q-Tel would perform – its IT operating “space” – by two ( 2 ) criteria:

In the first [ 1st ] instance, it made the decision that In-Q-Tel would initially conduct only unclassified IT work for the Agency ( CIA ).

Second [ 2nd ], to attract the interests of the private sector, it recognized that IN-Q-TEL would ‘principally invest in areas’ where there was both an Agency ( CIA ) need and ‘private sector interest’.

Whereas in the past, much of the commercial computing world did not focus on those technologies useful to the CIA, the intersection zone between intelligence and private sector IT needs has grown tremendously in recent years.

Many of the underlying technologies that are driving the information revolution are now directly applicable to the intelligence business. Examples of commercial applications that also support intelligence functions are:

1. Data warehousing and data mining; 2. Knowledge management; 3. Profiling search agents [ Search Engines and User search requests ]; 4. Geographic information systems [ Satellite Communication Information Systems ]; 5. Imagery analysis and pattern recognition; 6. Statistical data analysis tools; 7. Language translation; 8. Targeted information systems; 9. Mobile computing; and, 10. Secure computing.

Information Security or INFOSEC, a critical enabling technology for all intelligence information systems, is now a mainstream area of research and innovation in the commercial world, due in no small part to the exponential growth in Internet e-commerce.

Thus, there are a number of commercially available security technologies:

1. Strong encryption; 2. Secure community of interests; 3. Authentication and access control; 4. Auditing and reporting; 5. Data integrity; 6. Digital signatures; 7. Centralized security administration; 8. Remote users or traveling users; and, 9. Unitary log-in.

It is, no doubt, the case that the commercial investments flowing into information security outpace the spending made by the Intelligence Community.

Thus, In-Q-Tel will be poised to ‘leverage the investments of others to the benefit of the Agency ( CIA )‘.

Having bounded In-Q-Tel’s IT space with these 2 criteria – ‘unclassified work’ with ‘commercial potential’ – the Agency defined a set of strategic problem areas for the Corporation.

These four ( 4 ) areas have the added and obvious benefit of spanning the needs of all the Agency’s directorates and, hence, its core business functions of collection and analysis:

1. Information Security: Hardening, and intrusion detection, monitoring and profiling of information use and misuse, and network and data protection.;

2. Use of the Internet: Secure receipt of information, non-observable surfing, authentication, content verification, and hacker resistance.;

3. Distributed Architectures: Methods to interface with custom / legacy systems, mechanisms to allow dissimilar applications to interact, automatic handling of archived data, and connectivity across a wide range of environments.; and,

4. Knowledge Generation: Geospatial data fusion and multimedia data fusion or integration and, computer forensics.

Information Technology ( IT ) In-Q-Tel – CIA Occupancy

It will no doubt raise questions with some who will believe that it or the Agency ( CIA ) have other motives.

It is, therefore, important to highlight ‘what In-Q-Tel is not’ and what it [ IN-Q-TEL ] will not do.

First, it is not a front company for the Agency ( CIA ) to conduct any activities other than those spelled out in its Articles of Incorporation and its Charter Agreement.

As a non-profit – 501(c)3 – corporation, it will operate in full compliance with the Internal Revenue Service ( IRS ) regulations and, as with all similar non-profits, its IRS filing will be a matter public record.

In-Q-Tel is ‘openly affiliated with the Agency ( CIA )’, as was made obvious to the world during its press rollout on September 29, 1999.

Of equal importance, it will not initiate work in areas that lead to solutions that are put into so-called “black boxes” – that is, innovations that the government subsequently classifies. To do so would undercut In-Q-Tel credibility with its business partners to the detriment of the Agency.

Finally, IN-Q-TELis a solutions company‘, ‘not a product company‘.

Working through its business partners, it will demonstrate solutions to Agency problems but will not generate products for use by Agency components.

In-Q-Tel ‘inspired products‘ will be ‘developed through separate contractual arrangements‘ involving Agency ( CIA ) ‘components‘ and ‘other vendors‘.

In-Q-Tel – Structure & Staffing

Central to the In-Q-Tel business model are speed, agility, market positioning, and leveraging.

These attributes, taken together, have helped shape the evolving structure of the Corporation. It is one that intends to emphasize the “virtual” nature of the Corporation while minimizing “brick and mortar” costs, i.e. it will operate by facilitating data sharing, and decisionmaking via seamless communications using a private network with broadband connectivity to the Agency and its partners, while limiting direct infrastructure investments in laboratories and related facilities by leveraging the facilities of others.

To facilitate this intent, the In-Q-Tel Board and CEO decided to hire a small staff composed of people with strong technical and business skills.

At present, the Corporation has about ten ( 10 ) staff employees and, it is expected that, by the end of the year 2000, the total will number about thirty ( 30 ).

The CEO is currently designing In-Q-Tel management structure, but the parameters he has set for it indicate that it will be very flat and aligned for rapid decision-making.

How In-Q-Tel Works

One of the great leaps of faith the Agency took in this venture was to recognize, early on, that private sector businessmen were better equipped than it was to design the Corporation and create its work program.

The Agency’s critical role was to develop the initial concept, help form the best Board possible, give IN-Q-TEL a challenging problem set, and then design a ‘contractual vehicle‘ that ‘gave‘ the [ CIA ] CorporationQIC ] the ‘necessary degrees of freedom to design itself and operate in the market place‘.

All of this was accomplished in less than 1-year, to include the design of In-Q-Tel’s initial work program. In-Q-Tel’s current work program is built on a process of discrete, yet overlapping, elements – IT roadmapping, IT baselining, and R&D projects.

The underlying philosophy now driving the In-Q-Tel program is to gain an understanding of the many players occupying In-Q-Tel’s IT space – by roadmap analysis – and, concurrently, test and validate the performance and utility of existing products and technologies – by baseline testing – against current Agency needs.

If the test results are successful, the Agency ( CIA ) has the ‘option’ of quickly ‘purchasing’ the ‘products’ directly ‘from the vendor’.

However, in those ‘cases where there are no existing products or technologies‘, or where a gap exists between the baseline test results and the Agency ( CIA ) needs, IN-Q-TEL will launch R&D projects.

In this way, the Agency ( CIA ) obtains near-term solutions through the evaluation of those products considered “best-in-class” and can target its R&D projects more precisely – that-is, to where ‘commercial‘ or ‘other government [ contract ] IT investments [ $ ] are small‘ or nonexistent.

With its first [ 1st ] year budget of about $28,000,000 million, In-Q-Tel has focused its initial efforts on the IT roadmap and baseline elements of the program.

The roadmap project seeks, first, to ‘identify those in industry, government, and academia who occupy the same IT space as In-Q-Tel’ and, secondarily, to ‘spot existing technologies of potential interest’.

The results will also help In-Q-Tel leverage the technical advances made by others, assess the overall direction and pace of research, avoid duplicating work done by other government entities, and highlight [ identify and target ] potential business partners. The roadmap will be updated and refined by In-Q-Tel throughout the life of its work program.

Two ( 2 ) Team Incubators & Twenty ( 20 ) Hi-Tech Firms [ Businesses ]

These twenty (20) are executing the baseline-testing element of the In-Q-Tel work program. They were selected by an independent review panel of national IT experts convened by In-Q-Tel to evaluate multiple proposals.

Each of the two ( 2 ) teams is working on one ( 1 ) or more ‘incubator concepts’ derived by In-Q-Tel from the Agency ( CIA ) ‘problem set‘ enumerated above. The incubator teams will operate for over a [ 1 ] year. As the In-Q-Tel work program grows, it is possible that other baseline incubator teams will be established.

The R&D part of the program, which In-Q-Tel manages, will soon become the core of its activities, with a growing percentage of its funds directed towards a portfolio of research projects. In-Q-Tel is formulating its research thrusts based on the information and test results gathered under the roadmap and baseline work, aided by extensive interactions with the private sector and the Agency.

The design of the research projects will be set by In-Q-Tel and will vary to meet the mutual interests of the Agency ( CIA ), In-Q-Tel, and its prospective business partners.

As mentioned earlier, In-Q-Tel will ‘draw from a broad range of R&D competition‘ models to attract the business partners it seeks.

In some cases, it may assemble teams of companies that each has a necessary part, but not the whole, of the solution In-Q-Tel seeks.

In ‘other projects’ IN-Q-TEL might be a co-investor in a fledgling company with another business partner such as a venture capital firm.

Or, it could take a more traditional route, using a request for proposal.

In essence, In-Q-Tel will use whatever model most efficiently and effectively meets the needs of all parties to a transaction, with a constant eye towards leveraging its resources and solving the Agency’s IT needs.

Common to most or all of the R&D agreements that In-Q-Tel intends to use will be the subject of intellectual property (IP), or more precisely said, the ownership of IP and the allocation of IP generated revenues.

In the area of IT R&D, a deal is typically not struck until all of the parties’ IP rights are clearly established.

In-Q-Tel’s acceptance within the IT market place depends heavily on its ability to negotiate industry standard IP terms.

Recognizing this, the Agency ( CIA ) agreement with In-Q-Tel allows it and/or its partners to retain title to the innovations created and freely negotiate the allocation of IP derived revenues.

The only major stipulation is that the Agency ( CIA ) retain traditional “government purpose rights” to the ‘innovations‘.

Contract Model – In-Q-Tel

Before the partnership between In-Q-Tel and the Agency became a reality, the Agency ( CIA ) had to develop a new contract vehicle that granted the Corporation [ QIC ] the degrees of freedom it needed to operate in the market place.

Most Agency ( CIA ) contracts, including those in R&D, are based on the Federal Acquisition Regulations ( FAR ), however FAR is often viewed by industry as overly burdensome and inflexible. And, it has been the U.S. Department of Defense ( DoD ) experience that smaller companies often will not contract with the government because of the extra costs they would incur to be FAR compliant.

Because the Agency ( CIA ) wanted to encourage such companies to work with In-Q-Tel, it took a different approach and designed a non-FAR agreement with the IN-Q-TEL CORPORATION.

It [ CIA ] also adopted elements from the old internet Godfather, i.e. Advanced Research Projects Agency or ARPA and its model based on “Other Transactions ( OT )” authority granted to the DoD [ U.S. Department of Defense ] by Congress [ U.S. Congress ].

OT [ Other Transaction ] agreements ‘permit authorized government agencies’ [ e.g. CIA ] to design R&D agreements outside the FAR.

The hoped for result is to spur greater flexibility and innovation for the government. In addition, it permits well-managed businesses, large and small, to perform R&D for the government, using their existing business practices and procedures.

Using an ARPA model OT agreement as a guide, the Agency ( CIA ) designed a 5-year Charter Agreement that describes the broad framework for its relationship with IN-Q-TEL, sets forth general policies, and establishes the terms and conditions that will apply to future contracts. In addition, a short-term funding contract was negotiated that includes In-Q-Tel’s “Description of Work”.

Together these documents define the metes and bounds of the Agency ( CIA ) relationship with In-Q-Tel and permit IN-Q-TEL to negotiate agreements with its partners, absent [ without ] most government flow down requirements.

In-Q-Tel – Advancements

The In-Q-Tel venture is one that has challenged the Agency to think creatively and quickly to address the fundamental changes that the information revolution is having on its core business.

It responded by setting aside traditional policies and practices in many areas and established a new partnership with industry and academia, based on shared interest and mutual benefit.

But, one cannot ignore that this venture involves risk, both for the Agency and In-Q-Tel. From the Agency’s perspective there are three ( 3 ) major areas that will require constant attention:

1. Managing its relationship with IN-Q-TEL;

2. Solution transfer; and,

3. Security.

Perhaps the most important of the three is the first, managing the relationship without stifling In-Q-Tel’s competitive edge.

IN-Q-TEL is a small independent corporation ‘established to improve the mission performance of a much larger government Agency‘. [ ? National Secruity Agency ( NSA ) ? ]

The imperatives that led to In-Q-Tel have many parallels in industry. In fact, the IT sector is replete with examples of a large corporation seeking to improve its competitiveness by either purchasing a small start-up company or forming a subsidiary.

The ‘parent corporation‘ [ ? ] sees in ‘its offspring‘ traits that it no longer possesses – speed, agility, and expertise. But, for these traits to be realized, ‘the start-up‘ must operate unencumbered from the ‘parent corporation‘ [ ? ], whose natural tendency is to rein in and control it.

Similarly, the Agency ( CIA ) will have to restrain its natural inclination to micromanage IN-Q-TEL and, instead, allow the Corporation [ QIC ] the freedom to prosper. It must have continuous insight into In-Q-Tel’s activities, but must understand that In-Q-Tel is responsible for its own operations, including the design and management of the work program.

Acceptance by Agency ( CIA ) components of In-Q-Tel inspired solutions will be the most important measure of success in this venture. It is also likely to be the hardest.

While there is every expectation that In-Q-Tel will become commercially successful and seed innovative solutions, if they are not accepted and used by Agency line managers, then the overall venture will be judged a failure.

Although In-Q-Tel has a critical role in the solution transfer process, the burden rests with the Agency, since the challenges are as much managerial and cultural as they are technical.

The Agency ( CIA ) Chief Information Officer ( CIO ), directorate heads, and component directors will all have to work closely with IN-Q-TEL to overcome bureaucratic inertia and identify eager recipients of the innovations that the Corporation develops.

Agency ( CIA ) “product champions” for each IN-Q-TEL project should be identified early and should participate fully in its formulation, testing, and evaluation. Incentives should be considered for those Agency ( CIA ) components that commit to projects with unique risks or that require extensive personnel commitments.

These and other strategies will be employed to ensure that the return on the Agency’s investment in In-Q-Tel translates into measurable improvements in its mission performance.

The open affiliation between the CIA and In-Q-Tel is yet another unique aspect and challenge for this venture. Although the Corporation [ QIC ]will be doing only unclassified work for the Agency ( CIA ), the nature of its IT research and its association with a US intelligence agency will undoubtedly attract the interests of foreign persons, some with questionable motives.

The obvious security ramifications of this scenario were well considered in the decisionmaking process that led to In-Q-Tel’s formation. It was ultimately decided that the risks are manageable and, in many ways, are similar to those faced by any high-tech company trying to protect its IP and trade secrets.

IN-Q-TEL and the Agency ( CIA ) will be working closely to ensure that the Corporation [ QIC ] operates with a high degree of security awareness and support.

In-Q-Tel has a critical role in meeting these three ( 3 ) challenges. However, it’s most persistent challenge will be developing and sustaining a reputation as a business that:

1. sponsors leading edge research;

2. produces discoveries; that can be,

3. profitably commercialized.

Once it has established a record of accomplishment in these two areas, the high caliber IT talent the Agency hopes to reach through In-Q-Tel will be drawn to the Corporation.

In-Q-Tel Future

Those of us at the Agency who helped to create In-Q-Tel are endlessly optimistic about its prospects for success. The early indicators are all positive. Among them is the caliber of the people who stand behind and lead the Corporation and the initial reaction from industry and the trade press to its formation.

IN-Q-TEL Board of Trustees is at least the equal of any large corporation’s board. They are committed to the Agency ( CIA ) mission, the new R&D model that IN-Q-TEL represents, and have invested much of their time to its formation.

The Agency and the nation are in their debt.

The Board [ IN-Q-TEL Board of Trustees ] also recruited an outstanding CEO who brings with him the ‘experiences’ and ‘contacts’ of his Silicon Valley [ California ] base and an established reputation for starting and growing new IT companies.

The favorable press coverage of In-Q-Tel combined with the industry “buzz” engendered by the Board and CEO have brought a flood of inquiries by those interested in doing business with the Corporation. And, most importantly, its work program is already beginning to achieve results that the Agency ( CIA ) can use and that its ( CIA ) partners can commercialize.

Judging by the record to date, the road ahead appears promising. But, In-Q-Tel’s fate also rests in part on those institutions charged with oversight of the Agency and its budget.

Congress has supported the Agency as it launched this new venture. The U.S. Congress “seeded the venture with start-up funding” when it was still in its conceptual phase, but asked hard questions of the Agency throughout the design and formation of In-Q-Tel.

Members understood that starting an enterprise such as IN-Q-TEL is ‘not risk free‘. As with all R&D efforts in government and industry, there will be some home run successes but also some failures. That is the price the Agency must be prepared to pay if it wants to stay on the leading edge of the IT revolution.

With In-Q-Tel’s help plus the continued support of Congress [ U.S. Congress ] and Office of Management and Budget ( OMB ), as well as from the traditional Agency ( CIA ) ‘contractor community‘ and ‘others‘, an “e-CIA” of the next century [ 21st Century ] will evolve quickly, to the benefit of the President and the national security community.

Notes Of Interest

For the next one ( 1 ) or two ( 2 ) years [ 1999 – 2000 ], IN-Q-TEL will accept work only from the CIA‘.

All solutions that it provides to the CIA will be made available to the entire Intelligence Community.

Codified in a 5-year Charter Agreement with the CIA and a 1-year funding contract that is renewable annually. As stipulated in the Charter Agreement, “…the Federal Government shall have a nonexclusive, nontransferable, irrevocable, paid-up license to practice or have practiced for or on behalf of the United States the subject invention throughout the world for Government purposes”.

The Agency ( CIA ) component that has day-to-day responsibility for guiding the CIA relationship with IN-Q-TEL, including the ‘design and implementation of the contract’ and the ‘problem set’, is the IN-Q-TEL INTERFACE CENTER ( QIC ) which resides inside the CIA Directorate of Science and Technology.

Circa: 2002 – 2008

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION 2500 Sand Hill Road – Suite 113 Menlo Park, California 94025 – 7061 USA TEL: +1 (650) 234-8999 TEL: +1 (650) 234-8983 FAX: +1 (650) 234-8997 WWW: http://www.inqtel.com WWW: http://www.in-q-tel.org WWW: http://www.in-q-tel.com

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION P.O. Box 12407 Arlington, Virginia 22219 USA TEL: +1 (703) 248-3000 FAX: +1 (703) 248-3001

– –

IN-Q-TEL focus areas, surround:

– Physical Technologies; – Biological Technologies; – Security; and, – Software Infrastructure.

– –

IN-Q-TEL

Investments –

Strategic Investments, Targeted Returns

In-Q-Tel is ‘building’ a ‘portfolio of companies’ that are ‘developing innovative solutions’ in ‘key technology areas’

Similar to many ‘corporate strategic venture’ firms, In-Q-Tel seeks to ‘optimize potential returns’ for our clients — the CIA and the broader Intelligence Community— by investing in companies of strategic interest.

In-Q-Tel engages ‘start-ups’, ‘emerging’ and ‘established’ companies, universities and research labs.

In-Q-Tel structure attractive win-win relationships through ‘equity investments’, as well ‘strategic product development funding’, and ‘innovative intellectual property arrangements’ and ‘government business development guidance’.

An Enterprising Partner –

In-Q-Tel ‘portfolio companies’ value a ‘strategic relationship’ with a ‘proactive partner’.

Companies, that work through In-Q-Tel due diligence process, know their technologies have the potential to address the needs of one of the most discriminating enterprise customers in the world.

In-Q-Tel takes a hands-on approach, working closely with our ‘portfolio companies’ to help ‘drive their success’ in the ‘marketplace’ and to ‘mature [ ‘grow’ ] their technologies’.

In-Q-Tel ‘investment goals’ are focused on ‘return’ on technology – a ‘blend of factors’ that will ‘deliver strategic impact’ on the Agency [ CIA ] mission:

– Effective ‘deployments’ of innovative technologies to the CIA; – Commercially successful ‘companies that can continue’ to ‘deliver’ and ‘support’ innovate technologies; and, – Financial ‘returns to fund further technology investments’ to ‘benefit the Intelligence Community’.   Investing In Our National Security –

In just a few short years, In-Q-Tel has ‘evaluated’ nearly two thousand [ 2,000 ] ‘proposals’:

75% [ 1,500 ] of which have come from companies that had never previously considered working with the government.

To date, In-Q-Tel ‘established strategic relationships’ with more than ‘twenty’ ( 20 ) of these ‘companies’.

Read more about our ‘portfolio companies’ and ‘technology partners’, or learn how to submit a business plan to In-Q-Tel.

Areas Of Focus –

IN-Q-TEL focuses on next generation technologies for gathering, analyzing, managing and disseminating data. Learn more about our areas of focus:

Knowledge Management: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/km.html ];

Security and Privacy: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sp.html ];

Search and Discovery: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sd.html ];

Distributed Data Collection: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/dd.html ]; and,

Geospatial Information Services: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/gi.html ].

Submit A Business Plan –

“In-Q-Tel also has garnered a reputation in the tech and VC [ Venture Capital ] worlds for being hard-nosed during due diligence. Unlike some venture firms, In-Q-Tel is staffed with hard-core techies who know how to put a program through the ringer. They’ve also got one of the roughest testing domains: the computer systems of the CIA.” – Washington Business Journal ( November 19, 2001 )

– View our criteria [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/submit/index.html ] for submission, and apply for consideration online.

Media Resources –

– Investment Portfolio: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf ].

Reference

http://web.archive.org/web/20020630223724/www.inqtel.com/invest/index.html

– – – –

Circa: 2002

IN-Q-TEL

Investments –

Technology Partners ( 2002 ) –

INKTOMI [ http://www.inktomi.com ] ( Leading Edge Search and Retrieval Technology )

INKTOMI, based in Foster City, California ( USA ), has offices elsewhere in North America, Asia and Europe.

INKTOMI division business, involves:

Network Products – comprised of industry leading solutions for network caching, content distribution, media broadcasting, and wireless technologies; and,

Search Solutions – comprised of general Web search and related services, and ‘enterprise’ search.

Inktomi ‘develops’ and ‘markets’ network infrastructure software essential for ‘service providers’ and ‘global enterprises’.

Inktomi ‘customer’ and ‘strategic partner’ base of leading companies, include:

MERRILL LYNCH; INTEL: AT&T; MICROSOFT; SUN MICROSYSTEMS; HEWLETT-PACKARD; COMPAQ; DELL; NOKIA; AMERICA ONLINE ( AOL ); and, YAHOO.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Lead System Integrator ( LSI ) – SAIC LSI [ http://www.saic.com/contractcenter/ites-2s/clients.html  ]

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ), founded in 1969 by Dr. J. R. Beyster who remained with SAIC for 30-years until at least November 3, 2003, has had as part of its management, and on its Board of Directors, many well known former U.S. government personnel, including:

– Melvin Laird, Secretary of Defense in the Richard Milhouse Nixon Presidential Administration;

– William Perry, Secretary of Defense in the William Jefferson Clinton Presidential Administration;

– John M. Deutch, U.S. Central Intelligence Agency ( CIA ) Director of Central Intelligence ( DCI ) in the William Jefferson Clinton Presidential Administration;

– U.S. Navy Admiral Bobby Ray Inman, U.S. National Security Agency ( NSA ) and U.S. Central Intelligence Agency ( CIA ) – various employed capacities in ‘both’ Agencies – in the Gerald Ford Presidential Administration, Billy Carter Presidential Administration and Ronald Reagan Presidential Administration;

– David Kay, who led the search for Weapons of Mass Destruction ( WMD ) – following the 1991 U.S. Persian Gulf War – for the United Nations ( UN ) and in the George W. Bush Sr. Presidential Administration following the 2003 U.S. invasion of Iraq.

In 2009, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) moved corporate headquarters to Tysons Corner at 1710 SAIC Drive, McLean, Virginia ( USA ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is a scientific, engineering and technology ‘applications company’ with numerous ‘state government clients’, ‘federal government clients’, and ‘private sector clients’.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) works extensively, with:

U.S. Department of Defense ( DOD ); U.S. Department of Homeland Security ( DHS ); U.S. National Security Agency ( NSA ); U.S. intelligence community ( others ); U.S. government civil agencies; and, Selected commercial markets.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Subsidiaries –

SAIC VENTURE CAPITAL CORPORATION; SCICOM TECHNOLOGIES NOIDA ( INDIA ); BD SYSTEMS ( BDS ); BECHTEL SAIC COMPANY LLC; BECK DISASTER RECOVERY ( BDR ); R.W. BECK; BENHAM; CLOUDSHIELD; DANET; EAGAN MCALLISTER ASSOCIATES INC.; HICKS & ASSOCIATES MEDPROTECT LLC REVEAL; SAIC-FREDERICK INC.; NATIONAL CANCER INSTITUTE ( NCI ); SAIC INTERNATIONAL SUBSIDIARIES; SAIC LIMITED ( UK ); CALANAIS ( SCOTLAND ); VAREC; APPLIED MARINE TECHNOLOGY CORPORATION; EAI CORPORATION; and, Others.

In 1991, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) received transference of the U.S. Department of Defense ( DOJ ), U.S. Army ( USA ), Defense Intelligence Agency ( DIA ) ‘Remote Viewing Program’ renamed STARGATE Project.

In January 1999, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) consultant Steven Hatfill saw SAIC vice president Joseph Soukup internally ( with no outside client ) commission ( with no outside client ) William C. Patrick – a retired leading figure in the legacy U.S. bioweapons program – see a report produced ( 28-pages on Feburary 1999 ) on terrorist anthrax attack possibilities via Unitd States postal mailings prior to 2001 anthrax attacks in the United States.

In March 2001, the U.S. National Security Agency ( NSA ) had SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) in ‘concept definition’ phase for what later became known as the NSA TRAILBLAZER Project, a “Digital Network Intelligence” system intended to ‘analyze data’ carried across computer ‘networks’.

In 2002, the U.S. National Security Agency ( NSA ) chose SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) to produce a ‘technology demonstration platform’ for the NSA TRAILBLAZER Project, a contract worth $280,000,000 million ( USD ).

TRAILBLAZER Project participants, included:

BOEING; COMPUTER SCIENCES CORPORATION ( CSC ); and, BOOZ ALLEN HAMILTON.

In 2005, TRAILBLAZER – believed by speculators ( http://www.PhysOrg.Com et. al. ) to be a continuation of an earlier data mining project THINTHREAD program – saw U.S. National Security Agency ( NSA ) Director Michael Hayden inform a U.S. Senate hearing that the TRAILBLAZER program required several hundred million dollars over budget – consequently trailing years behind schedule waiting for approvals.

From 2001 through 2005, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) was primary contractor for the $600,000,000 million ( USD ) TRILOGY Program, a three ( 3 ) part program – intended to replace obsolete FBI computers with a then-new state-of-the-art cutting edge technology ‘secure high-speed computer network system’ that would install 500 computer network servers, 1600 scanners and thousands of desktop computers in FBI field offices – that on December 2003 delivered to the U.S. Department of Justice ( DOJ ) Federal Bureau of Investigation ( FBI ) its SAIC “Virtual Case File” ( VCF ), a $170,000,000 million ( USD ) software system designed to speed tracking of terrorists, better accurize communications amongst agents fighting criminals with this FBI ‘critical case management system’, however nineteen ( 19 ) different government managers involved 36 contract modifications averaging 1.3 FBI changes everyday totaling 399 changes during 15-months afterwhich the FBI continued arguing ( through its own intermediary, AEROSPACE CORPORATION ) changes until the U.S. Department of Justice ( DOJ ) Inspector General ( IG ) criticized its ‘FBI handling’ of SAIC software, whereon February 2005 SAIC ‘recommended’ the FBI at-least ‘begin using’ the SAIC TRILOGY VCF ‘case management system’.

On September 27, 2006 during a special meeting of SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) stockholders, employee-owners voted by a margin of 86% to proceed with the initial public offering ( IPO ) whereupon completion SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) also paid – to existing stockholders – a ‘special dividend’ of $1,600,000,000 billion to $2,400,000,000 billion ( USD ).

On October 17, 2006 SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) conducted an initial public offering ( IPO ) of common stock offering of 86,250,000 shares priced at $15.00 per share. Underwriters – BEAR STEARNS and MORGAN STANLEY – exercised over-allotment options resulting in 11,025,000 million shares seeing the IPO raise $1,245,000,000 billion ( USD ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) had approximately 46,000 total employees, 16,000 employees were in McLean, Virginia ( USA ) and another 5,000 employees were in San Diego, California ( USA ).

SRA INTERNATIONAL INC. ( SRA ) [ http://www.sra.com/about-us/profile.php ]

SRA INTERNATIONAL INC., founded in 1978, headquartered in Fairfax, Virginia has additional U.S. offices.

SRA INTERNATIONAL INC. is a leading provider of information technology services and solutions to clients in national security, health care and public health, and civil government markets, requiring:

– Strategic Consulting; – Systems Design, Development, and Integration; – OutSourcing; and, – Operations Management.

SRA INTERNATIONAL INC. also delivers business solutions, for:

– Text mining; – Data mining; – Disaster and Contingency Response Planning; – Information Sssurance; – Environmental Strategies – Environmental Technology; – Enterprise Systems Management; and, – Wireless Integration.

SRA INTERNATIONAL INC. ORIONMagic ®

– –

Circa: 2002

IN-Q-TEL

Investments –

Portfolio Of Companies ( 2002 ) – Partial List

ARCSIGHT [ http://www.arcsight.com ] ( Security Management Software for The Enterprise )

ArcSight, founded in May 2000, is located in the heart of Silicon Valley, California ( USA ).

ArcSight is a leading supplier of enterprise software that provides the security “air traffic control system” for large, geographically dispersed organizations. These organizations are augmenting their network infrastructure with a wide variety of security devices such as firewalls, intrusion detection and identity management systems that produce a barrage of uncoordinated alarms and alerts that overwhelm the security staff.

With its ‘centralized view’ of ‘all security activity’ combined with ‘real time analysis’ of ‘events’, by both ‘operating at the perimeter and inside’ the organization, ArcSight provides a ‘single solution’, for:

Event capture; Log aggregation; Real time correlation; Incident investigation; and, Reporting.

ArcSight ‘separates’, the ‘true threats and attacks’ from the ‘millions of false alarms and non-threatening activities’ that occur each day, focusing attention and resources on high-priority problems.

The company has delivered enterprise, ‘security management solutions’ to leading ‘financial services’, ‘government’ and ‘manufacturing’ organizations while ‘attracting capital’ from ‘leading investors’, such as:

IN-Q-TEL; KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, SUMITOMO CORPORATION.

ATTENSITY CORPORATION [ http://www.attensity.com ] ( Text Extraction for Threat Detection )

Attensity Corp., founded in 2000, is a privately held company with dual headquarters in Mountain View, California ( USA ) and Salt Lake City, Utah ( USA ).

Attensity Corp. provides enterprise, ‘analytic software’ and ‘services’, to:

Government agencies; and,

Fortune 500 companies.

Attensity has developed breakthrough text extraction technology that transforms information captured in free form text into structured, relational data.

Attensity enables government agencies to dramatically expand their analytical capabilities in the area of ‘threat detection’ by, powering:

Link analysis; Trending; Exception reporting; Other advanced analytics; and, Knowledge management applications.

Attensity technology is the culmination of nearly a decade [ 10-years ] of research in computational linguistics.

Attensity Corporation customers include:

IN-Q-TEL, a strategic venture group funded by the CIA; WHIRLPOOL; and, JOHN DEERE.

ATTENSITY CORPORATION investor, is:

IN-Q-TEL

BROWSE3D [ http://www.browse3d.com ] ( Advanced Web Navigation )

BROWSE3D, founded in 2000, is located in the Dulles Technology Corridor of northern Virgina.

The company’s first Knowledge Management product, the Browse3D Browser, enables Internet users to browse Web sites using a dynamic, interactive, 3 dimensional ( 3-D ) display environment.

One year later [ 2001 ] the Browse3D Browser was recognized as the Best Internet Software of 2001 at the COMDEX Fall Technology Show ( Las Vegas, Nevada, USA ).

Browse3D launched its ‘consumer product’ in January 2002.

For the past 2-years [ since 2000 ], Browse3D has been working to re-invent the online researcher’s tool set. A researcher’s ability to ‘harvest relevant online data’ is often limited by the tools available to view that data.

Future products and technologies promise additional improvements in the way users ‘find’, ‘organize’, ‘save’ and ‘exchange’ web-based ‘content’.

BROWSE3D early-stage venture funding provided, by:

IN-Q-TEL; and, angel investors.

CANDERA INC. [ http://www.candera.com ] ( Enterprise Storage )

Candera Incorporated, founded in 2000, is a development stage stealth mode company headquartered in Milpitas, California ( USA ).

Candera Inc. is developing a new generation, purpose built, network based storage management platform that gives businesses unprecedented ‘control over’ and ‘visibility into’ their networked storage environments.

With the Candera Confluence solution, businesses can dramatically improve the utilization of their existing heterogeneous storage assets by consolidating them into a centrally managed storage pool. These can then be quickly and dynamically allocated to meet the needs of current and future network based applications, giving large enterprises a strategic advantage.

Candera is building the first [ 1st ] system, of a new generation of systems, that will enable customers to unleash the ultimate value of networked information storage.

CONVERA [ http://www.convera.com ] ( Mission Critical Enterprise Search and Categorization Software )

Convera RetrievalWare is a high-performance intelligent search system that allows broad flexibility and scalability for implementation across corporate intranets and extranets, enabling users to index and search a wide range of distributed information resources, including text files, HTML, XML, over 200 proprietary document formats, relational database tables, document management systems and groupware repositories. Convera RetrievalWare excels in distributed client environments and server environments with hundreds or thousands of users, documents, images and / or multiple media assets.

Advanced search capabilities include concept and keyword searching, pattern searching and query by example.

Convera is a leading provider of enterprise mission-critical ‘search’, ‘retrieval’ and ‘categorizing’ solutions.

More than 800 customers – in 33 countries – rely on Convera search solutions to power a broad range of mission critical applications, including enterprise:

Portals; Knowledge management; Intelligence gathering; Profiling; Corporate policy compliance; Regulatory compliance; Customer service; and, More.

DECRU [ http://www.decru.com ] ( Secure Networked Storage )

Decru, founded in April 2001, is headquartered in Redwood City, California ( USA ).

Decru solves the problem of secure data storage with a robust, wire-speed encryption appliance that fits transparently into any SAN or NAS storage environment, protecting data from both internal and external threats.

Markets include essentially any organization with a need to protect proprietary or confidential information ( e.g. government, technology, financial services, health care ).

Investors, include:

IN-Q-TEL; NEA; GREYLOCK; and, BENCHMARK.

GRAVITRON [ http://www.graviton.com ] ( Early Warning Detection and Notification System for Homeland Security Over Wireless Mesh Networks )

GRAVITON, founded in 1999, is located in La Jolla, California, USA.

Solomon Trujillo, former head of U.S. WEST ( baby bell telephone company ), leads GRAVITRON.

GRAVITON is on leading edge of a fledgling ( small ) industry, known as:

Machine to Machine Communications ( M2M ).

GRAVITON is developing an advanced integrated wireless sensor platform uniquely optimized for large-scale distributed sensor network applications working with Micro Electro Mechanical Systems ( MEMS ) sensor and spread spectrum wireless technologies licensed exclusively to GRAVITON from the U.S. National Laboratory at Oakridge ( also known as ) Oakridge National Laboratory ( Tennessee, USA ) – managed by the U.S. Department of Energy ( DOE ).

GRAVITON products and solutions integrate wireless, sensor and data management technology enabling enterprises to efficiently and transparently monitor, control, send, receive, and update system information from devices anywhere in the world.

GRAVITON is supported and funded by a number of corporate partners and investors, including:

IN-Q-TEL; GLOBAL CROSSING; ROYAL DUTCH SHELL ( oil / petroleum ); MITSUI; SIEMENS; QUALCOM; OMRON; MOTOROLA; and, SUN MICROSYSTEMS.

GRAVITON ‘primary’ financial investors, include:

MERRILL LYNCH;

GRAVITON ‘venture capital’ firms, include:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, EARLYBIRD.

INTELLISEEK [ http://www.intelliseek.com ] ( Enterprise Intelligence Solutions )

INTELLISEEK, founded in 1997, has since 1998 been changing the way organizations ‘understand’, ‘gather’ and ‘use’ enterprise ‘intelligence’.

INTELLISEEK ‘knowledge discovery tools’ [ as of: 2002 ] enable the nation’s largest enterprises with up-to-the-minute consumer, industry information and ‘competitive intelligence’.

INTELLISEEK ‘Enterprise Search Server’™ ( ESS ) search platform provides a suite of intelligent applications that automate ‘knowledge discovery’ and ‘knowledge aggregation’ from hundreds of disparate, and often hard-to-locate data sources.

INTELLISEEK ‘Knowledge Management’ and ‘Search and Discovery’ solutions solve the fundamental problem of “information overload” by identifying and searching relevant, targeted and personalized content from the internet, intranets and extranets.

INTELLISEEK clients, include:

FORD MOTOR COMPANY ( FOMOCO ); NOKIA; and, PROCTOR AND GAMBLE.

Investors include:

IN-Q-TEL; FORD VENTURES; RIVER CITIES CAPITAL; GENERAL ATLANTIC PARTNERS LLC; FLAT IRON PARTNERS; BLUE CHIP VENTURE COMPANY; NOKIA VENTURES; and, Other private investors.

METACARTA [ http://www.metacarta.com ] ( Geospatial Data Fusion )

MetaCarta, established in 1999, was launched on more than $1,000,000 million in funding from the U.S. Department Of Defense ( DOD ) Defense Advanced Projects Agency ( DARPA ) and private investors.

MetaCarta CEO John Frank, with a doctorate from the Massachusets Institute Of Technology ( MIT ) where during 1999 – as a Hertz Fellow in physics working on a PhD – conceived a new way to view – geographically – ‘collections of text’ that later saw MetaCarta combine his interests in algorithms, information design, and scientific models of real world phenomena.

Metacarta provides a new knowledge management platform that integrates ‘text data with geography’ providing a ‘cohesive system’ for ‘problem solving’.

METACARTA Geographic Text Search ( GTS ) appliance, the software solution, redefines how people interact with information, enabling analysts to view text reports and geographic information in one ( 1 ) logical view through integration of text and geography delivering new information not obtainable from any other source.

MetaCarta CEO John Frank graduated from Yale University.

MOHOMINE [ http://www.mohomine.com ] ( Transforming Unstructured Multi-Language Data Into Actionable Information )

MOHOMINE, founded in 1999, is privately-held and located in San Diego, California, USA.

MOHOMINE technology has been deployed by United States national security organizations.

MOHOMINE mohoClassifier for National Security Organizations ™ reviews ‘text information’ in ‘cables’, ‘e-mails’, ‘system files’, ‘intranets’, ‘extranets’ and ‘internet’ providing ‘automated document classification’, ‘routing’ – based upon ‘learn-by-example pattern recognition’ technology – and ‘reports’ on user defined properties such as ‘topic’, ‘subject’, ‘tone’ ( ‘urgent’, plus others ), ‘author’, ‘source’ ( geographic locations, ‘country’, etc. ), and more.

MOHOMINE mohoClassifier users can easily set up ‘filters’ to automatically ‘identify’ and ‘prioritize’ ( ‘read first’ requirement ) documents that are quickly processed – out-of large volumes of other data – and then quickly route prioritized information to quickly reach the proper people.

MOHOMINE, from Global 5000, currently [ since 2002 ] has more than one hundred fifty ( 150 ) customers across numerous vertical industries, including:

CITICORP; WELLS FARGO; INTEL; TEXAS INSTRUMENTS; PFIZER; BOEING; ORACLE; PEOPLESOFT; and, NIKE.

MOHOMINE investors, include:

IN-Q-TEL; HAMILTON APEX TECHNOLOGY VENTURES; and, WINDWARD VENTURES.

QYNERGY CORPORATION [ http://www.qynergy.com ] ( Long-Lasting Power Solutions For Multiple Applications And Small-Tech )

QYNERGY CORP., founded in 2001, is located in Albuquerque, New Mexico.

QYNERGY technology originated at the U.S. National Laboratory at Sandia ( also known as ) Sandia National Laboratories ( New Mexico, USA ) and at the University of New Mexico ( New Mexico, USA ).

QYNERGY Corp. develops leading-edge energy solutions based on QYNERGY proprietary QynCell ™ technology that made an exciting breakthrough – over other ‘battery’ or ‘portable energy’ devices – in ‘materials science’ allowing QYNERGY to possess several unique competitive advantages.

QYNERGY QynCell ™ is an ‘electrical energy device’ revolution, providing:

Long-lived Batteries – QynCell usable life is potentially over a period of ‘several decades’ ( 10-year multiples ), during which time the QynCell device ‘does not require external charging’;

Miniature and Micro Applications – QynCell™ technology is scaleable, thus can be ‘miniaturized’, for:

Micro Electro Mechanical Systems ( MEMS ); MicroPower™ applications; Small microelectronics; and, Power-on-a-chip applications.

SAFEWEB [ http://www.safewebinc.com ] ( Secure Remote Access )

SAFEWEB, established in April 2000, is based in Emeryville, California, USA.

SAFEWEB built the world’s largest ‘online privacy network’, however in 2001 its ‘free online service’ was ‘concluded’ – to focus on developing its ‘enterprise’ product.

SAFEWEB is a leading provider of innovative security and privacy technologies that are effective, economical and simple.

SAFEWEB Secure Extranet Appliance ( SEA ), the first [ 1st ] SAFEWEB enterprise security release – reduces the cost and complexity traditionally involved in securing corporate network resources.

SAFEWEB Secure Extranet Appliance ( SEA ), named Tsunami, is a fundamental ‘redesign of extranet architecture’ integrating disparate technologies into a ‘modular plug-in network appliance’ ( SEA Tsunami).

SAFEWEB SEA Tsunami is an ‘all-in-one solution’ simplifying implementation of ‘extranets’ and ‘Virtual Private Networks’ ( VPN ) reducing Total Cost of Ownership ( TCO ) by innovative architecture letting companies build – in less than 1-hour – ‘secure extranets’ providing ‘remote stationed’ enablement of ‘employees’, ‘clients’ and ‘partners’ to access ‘internal applications’ and ‘secure data’ from anywhere using a standard internet website browser.

SAFEWEB delivers, through established strategic partnerships, customized versions of its Secure Extranet Appliance ( SEA ) Tsunami technology to U.S. intelligence [ CIA, etc. ] and communications agencies [ NSA, etc. ].

SAFEWEB investors, include:

IN-Q-TEL; CHILTON INVESTMENTS; and, KINGDON CAPITAL.

STRATIFY INCORPORATED [  ] ( Unstructured Data Management Software )

In 1999, PURPLE YOGI was founded by former INTEL Microcomputer Research Laboratory scientists Ramana Venkata and Ramesh Subramonian.

PURPLE YOGI, became known as STRATIFY INCORPORATED ( a privately-held company ).

In early 2001, ORACLE CORPORATION veteran and senior executive Nimish Mehta became president and chief executive officer ( CEO ).

STRATIFY INC., headquartered in Mountain View, California ( USA ), is [ 2002 ] the ‘emerging’ leader in ‘unstructured data management’ software.

STRATIFY Discovery System is a ‘complete enterprise software platform’ helping todays [ 2002 ] organizations ‘harness vast information overload’ by ‘automating the process’ of ‘organizing’, ‘classifying’ and ‘presenting’ business-critical unstructured information usually found in ‘documents’, ‘presentations’ and internet website pages.

STRATIFY Discovery System platform ‘transforms unstructured internal and external data’ into ‘immediately accessible relevant information’ automatically organizing millions of documents displayed in easy navigational hierarchy.

STRATIFY INC. clients, include:

INLUMEN and INFOSYS TECHNOLOGIES LIMITED, named in 2001 as one ( 1 ) of The Red Herring 100.

STRATIFY INC. received funding, from:

IN-Q-TEL; H & Q AT INDIA (also known as ) H & Q ASIA PACIFIC; SOFTBANK VENTURE CAPITAL ( now known as ) MOBIUS VENTURE CAPITAL; SKYBLAZE VENTURES LLC; and, INTEL CAPITAL.

SRD [ http://www.srdnet.com ] ( Near Real Time Data Warehousing and Link Analysis )

SYSTEMS RESEARCH & DEVELOPMENT ( SRD ), founded in 1983, develops software applications to combat fraud, theft, and collusion.

SYSTEMS RESEARCH & DEVELOPMENT Non-Obvious Relationship Awareness ™ ( NORA ™ ) was originally developed for the gambling casino gaming industry

SYSTEMS RESEARCH & DEVELOPMENT NORA software is designed to identify correlations across vast amounts of structured data, from hundreds or thousands of data sources, in near real-time, and alert users to potentially harmful relationships between and among people.

SRD NORA software technology leverages SYSTEMS RESEARCH & DEVELOPMENT proven expertise in ‘aggregating’, ‘warehousing’ and ‘leveraging people data’ and ‘transaction data’ to strengthen corporate management and security systems.

SYSTEMS RESEARCH & DEVELOPMENT clients [ 2002 ], include:

U.S. Depaartment of Defense ( DOD ); CENDANT; TARGET; MGM MIRAGE; MANDALAY BAY RESORT GROUP; and, Food Marketing Institute.

TACIT [ http://www.tacit.com ] ( Enterprise Expertise Automation )

TACIT, founded in 1997, is located in Palo Alto, California ( USA ) with regional sales offices in Virginia, Maryland, Pennsylvania and Illinois.

David Gilmour serves as president and chief executive officer ( CEO ).

TACIT Knowledge Systems is the pioneer and leader in ‘Enterprise Expertise Automation’.

TACIT products ‘automatically and continuously inventories’ the ‘skills’ and ‘work focus’ of an ‘entire organization’ for ‘dynamic location’ of ‘connections to expertise needed’ – when needed to make decisions, solve problems, and serve customers.

TACIT products also include its award winning flagship product KnowledgeMail™. In June 200, TACIT was voted one of the “Hot 100 Private Companies,” by Upside Magazine.

In 2000 and 2001, TACIT was one ( 1 ) of the “100 Companies that Matter,” by KM World [ Knowledge Management World ].

TACIT attracted a ‘world class advisory board’ with interest from ‘venture capital’ and Fortune 500 ‘clients’ of ‘enterprise’ and ‘customers’, including:

IN-Q-TEL; JP MORGAN; CHEVRON-TEXACO ( petroleum and chemical ); UNISYS; HEWLETT-PACKARD; NORTHROP-GRUMAN ( aerospace & defense ); and, ELI LILLY ( pharmaceuticals ).

TACIT investors, include:

IN-Q-TEL; DRAPER FISHER JURVETSON; REUTERS GREENHOUSE FUND; and, ALTA PARTNERS.

TRACTION SOFTWARE [ http://www.tractionsoftware.com ] ( Harvest and Use Information from All Sources )

TRACTION SOFTWARE, founded in 1996, is located in Providence, Rhode Island ( USA ).

TRACTION® Software is the leader in ‘Enterprise Weblog’ software, bringing together working ‘communications’, ‘knowledge management’, ‘content management’, ‘collaboration’, and the ‘writable intranet portal’.

TRACTION TeamPage™ product addresses the need for ‘unified on-demand view’ of ‘team content’ and ‘team communication’ from ‘all document sources’ in ‘context’ and over ‘time’.

TRACTION TeamPage deploys quickly and easily on an existing network and delivers a ‘capstone communication system’ by turning ‘e-mail’ and ‘web browser’ into powerful tools for end-users.

TeamPage targets ‘program teams’ and ‘product management teams’ in ‘government’ and ‘business’.

TRACTION also supports a wide range of applications and business processes, including but not limited, to:

Business Intelligence and Market Research;

Collection Highlighting and Media Distribution;

Investor Relations E-Mail and Public Relations E-Mail Triage and Response; and,

Tracking Exception Process and Reporting Exception Process.

TRACTION SOFTWARE investors, include:

IN-Q-TEL; SLATER CENTER FOR INTERACTIVE TECHNOLOGY; and, private investors.

ZAPLET INCORPORATED [ http://www.zaplet.com ] ( Enterprise Collaboration Tools For Email )

ZAPLET INC., founded in 1999, is located in Redwood Shores, California ( USA ).

ZAPLET INC. is an enterprise software and services company and creator of the Zaplet Appmail System™ collaboration software that brings application functionality directly to a user’s inbox to complete business processes.

ZAPLET INC. Appmail, using a server-based platform, combines power, ‘centralized control’ and ‘robust security’ for traditional enterprise application systems with the convenience and ease-of-use of e-mail.

ZAPLET Appmail in-box becomes the gateway to a protected server where the application functionality and data securely reside.

Zaplet™ Appmail can be used, to:

Manage and Streamline mission-critical business processes; Requires no additional client-side upgrades; and, Instantly expandable for work teams ‘beyond’ the ‘enterprise’.

ZAPLET INC. has received numerous awards, including:

Red Herring 100; Enterprise Outlook – Investors’ Choice; and, Internet Outlook – Investors’ Choice.

ZAPLET INC. customers, include leading companies, in:

Finance; Telecommunication; High technologies; and, Government.

ZAPLET INC. is backed by world class investors, including:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); ACCENTURE TECHNOLOGY VENTURES; QUESTMARK PARTNERS L.P.; RESEARCH IN MOTION LIMITED ( RIM ); INTEGRAL CAPITAL PARTNERS; ORACLE CORPORATION; CISCO SYSTEMS INC.; and, NOVELL INC.

– –

Circa: 2010

IN-Q-TEL

Investments –

Portfolio of Companies ( 2010 ) – Partial List

3VR Security AdaptivEnergy Adapx Arcxis Asankya Basis Technology Bay Microsystems CallMiner Cambrios Carnegie Speech CleverSafe ( SAIC ) CopperEye Destineer Elemental Technlogies Ember Corporation Endeca Etherstack FEBIT FireEye FluiDigm

Reference(s)

http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf http://www.iqt.org/technology-portfolio/orionmagic.html http://defense-ventures.com/in-q-tel/

– – – –

Research References

“Information Technology Trends And Their Impact On CIA,” January 1999, declassified report of the U.S. Central Intelligence Agency by, CIA Chief Information Officer.

– – – –

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/