NASA UFO Alien Encounters

[ PHOTO ( above ): NASA Space Shuttle STS 115 official mission photo of a an “ExtraTerrestrial BioSynthetic Entity” ( EBSE ), a mobius waveform propulsion system spaceborn infant that is also known by what others refer to as part of a “Space Serpent” that a NASA astronaut refers to as an “eel” ( click to enlarge ) ]

NASA UFO Alien Encounters
by, Concept Activity Research Vault ( CARV )

December 1, 2011 14:22:08 (PST) Updated ( Originally Published: January 27, 2011 )

CALIFORNIA, Los Angeles – December 1, 2011 – NASA? We may ‘all’ have a problem! Over the past several decades multiple space flight missions from the United States and Russia have officially documented strange encounters occuring in outer space with astronauts.

Not just ‘unidentified flying objects’ ( UFO ), but other unreferenceable object encounters such as serpent like entities that appear to be biosynthetic lifeforms, plus other spaceborne phenomena that astronauts referred to as being their ”visitors.”

While all this initially sounds totally unbelievable, official audio and video film clip transmissions ( see below ) between space missioning astronauts and their mission ground control central proving NASA UFO Alien Encounters are officially very real.

Several prominent United States astronauts have now gone on public record revealing their personal experiences with official U.S. government encounters surrounding nonreferenceable objects and entities ( UFOs & Aliens ):

http://www.youtube.com/watch?v=XkOCwATi3tw

Introduction

The following additional ’official video clips and audio broadcasts’ ( below ) will reveal some amazing things for you if  these two ( 2 ) ’basic principles’ are remembered while viewing them:

1.  Meteorites ‘do not suddenly change direction’ and ‘do not make left-hand turns, right-hand turns or U turns’ like a ’piloted spacecraft’; and,

2. Debris in outer space, known as ‘space junk’ ( e.g. pieces of rocket boosters, expended satellites, etc. ), does not exit the Earth’s gravitational pull ( that extends – at a much lesser strength – into outerspace ) nor does it at high rates of speed’ either, but will either ‘float around in outer space’ and/or ‘return ( in a ‘decaying orbit’ ) to Earth’s atmosphere where it may either burn-up or fall to the surface of the Earth.

A few of the documentary motion picture film clips ( below ) are in ’full color’, ’black and white’, or ’tinted green’ screen resolutions – many of which are comprised of ’time-elapsed monitoring film sped-up’ so, ‘objects being monitored may not be moving as fast as they appear’, however ’other films may have objects moving in real speed ( e.g. ‘slow docking arms and astronaut manuevers’ or ‘fast electronic movements’ of ’camera lens housings’ that ‘spin around quickly’ to ‘catch a view of other objects moving in any direction at any time’ ).

Nevertheless, always keep in-mind the two ( 2 ) ‘outerspace principles’ that only ‘spacecraft make course corrections’ – turning and going in different directions – ‘not meteorites, comets, asteroids or space debris’.

Now, please enjoy watching ‘these specific four ( 4 ) videos’ ( below ) especially selected after careful analysis from ou-of ’hundreds of others found with flaws’:

By 1971, a NASA Apollo 14 rocket carried a Lunar Excursion Module ( LEM ) camera providing the following photo ( below ):

[ PHOTO ( above ): official NASA LEM camera photo of moon in background with UFO lights in right foreground ( click to enlarge ) ]

In the above photo, was there a ‘piece of lighted extermal equipment’ outside the NASA spacecraft? No. Was there any ‘distortion in the camera lense or reflection’? No.

In 1967, four ( 4 ) years before the aforementioned 1971 LEM launch, PACIFIC OPTICAL ( El Segundo, California ) generated thousands of LEM camera rose quartz glass lenses polished to perfection and tested for ‘any possible distortion factors’ using special ‘lightwave measurement instruments’ set according to ’government standards for approval’ long before being installed within those cameras used aboard the LEM, within an incredible number of NASA space rocket missions, and U.S. Air Force National Reconnaisance Office ( NRO ) missions. How are those facts known? I personally know those particular camera lenses ’do not capture any destortion whatsoever from glare or image reflections’ because I ‘personally worked on those lenses’, knew what they consisted of, as well as their unique characteristics also used in weaponized missiles and unmanned aerial vehicles.

As far back as 1966, when I was still attending high school, I also worked the graveyard shift at the McDonnel Douglas Space Systems Center ( now BOEING ) where within a special area then-known as “The Quad” a famous defecting Russian astrophysicist secretly worked for the U.S. government on the Mercury mission space capsules. Yes, and there were two ( 2 ) such capsules! Not much comes as much of a mystery to me, especially after four ( 4 ) decades of researching intelligence for the U.S. government.

The aforementioned films and broadcats document previously unknown ’new hazards surfacing in space’, believed one of the primary reasons why ‘all NASA spacecraft insurance policy coverage was cancelled’ as NASA lost its direct U.S. government funding when it became apparent to the U.S. government intelligence directorate ( CIA Science and Technology Division ) need of private-sector corporate market bids on future space mission contracts – swinging the axe into the heart of the NASA empire given its final ”tally-ho.”

That decision made perfect economic sense to the U.S. government because now its ‘secret private-sector enterprise takes on far more financial risk than it does just space mission challenges’ where shareholder investment returns will consequently realize less profit from having to absorb the costs associated with higher insurance policy coverages directly related to ‘new risk management assessments’ ( see official films and broadcasts above ) where insurance company policy directive issuances placed on ‘future mission spacecraft’ see more financial burden placed onto thebacks of ’investors’ while essening ever-growing financial burdens on U.S. Department of the Treasury foreign debt repayment plans the Federal Reserve Board decided NASA was just costing too much money and something had to be done about getting rid of the NASA burden without jeopardizing U.S. global space superiority. What began during 1985 as an intelligence mission to bury secret technology effortings within closely guarded private-sector enterprises satisfies corporate promises of long ago.

It’s simply a case of one hand washing another at the expense of the people, is all, where a new space tax that may have been pulled from tomorrow shelf concepts of George Orwell for those living in futuristic societies. Unfortunately, such activity already broke plenty of pencil point lead in private-sector workshop sessions at FANX III ( Ft. George G. Meade, Maryland ) in 1998 supporting private sector funded public insurance investment programs as yet another economic means by which U.S. Social Security Administration insurance may likely receive its axe because of the ever-looming baby boomer debt crisis the U.S. government faces dead ahead as next on its big aggenda. NASA was likely but a precursor government primer for what’s in-store next for the ‘little people’. Up, up and away, that beautiful balloon – that not so beautiful balloon anymore.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Advertisements

Alien Contactee Movements

Colleen Thomas alien contactee fraudster

[ PHOTO ( above ): Colleen Thomas ‘alien contactee movement leader’ ( click to enlarge ) ]

Alien Contactee Movements
by, Kentron Intellect Research Vault ( KIRV )

November 8, 2011 13:22:08 ( PST ) Updated ( March 9, 2011 )

SACRAMENTO -November 8, 2011 – Although an avid following of X-Files television series and movie aficionados still believe the “Truth Is Out There,” few know the real facts surrounding what became of a plethora of radical New Age quasi-religious fundamentalists, festering national malcontents and environmental domestic terrorists that went in to hiding beneath anti-government anti-tax protest groups for decades that were under government microscopes until they resurfaced in a variety of ’new splinter groups’ – some entering what are known as ’extraterrestrial observation groups’ that for the most part remain untouched by law enforcement until ‘financial losses’ and /or ’deaths’ begin occurring on ’members of extraterrestrial alien groups’ – now known as the “Contactee Movement” that appears undergoing a new trend led by what some say is a seriously disturbed middle-class American woman named Colleen Thomas who’s not bashful about exhibiting sexy ways to get her points across to over now well over 60,000 followers she crosses-over many lines with including what some believe unlawful.

Interviewed recently on several news television broadcasts, claimed ‘alien contactee’ Colleen Mary Ellis ( also known as ) Colleen Thomas (aka) Archangel Destiny ( 2010 – California, USA ) promotes her ”alien agenda” history as a cover for an anti-tax and anti-government revolutionary movement, akin to other alien ‘contactee movement’ radical revolutionaries Ruth Norman ( 1954 – UNARIUS Academy Of Science – California, USA ), Lafayette Ron Hubbard (aka) L. Ron Hubbard ( 1952 – SCIENTOLOGY founder claiming aliens from planet Venus contacted him – California, USA ), George Admaski ( 1952 – claiming aliens from planet Venus contacted him – California, USA ), George Van Tassel, Howard Menger, Daniel Fry, those of The Order Of The Solar Temple ( see, e.g. October 1994 alien contactee movement deaths in Quebec, Canada and Switzerland ), Raelien and others claiming to be ’alien contactee’ leaders whom use a wide variety of ruses to attract money and more from a variety of gullible audiences.

Alien Contactee Movement – Frauds & Deaths

For those unfamiliar with how dangerous the “Contactee Movement” has become, telltale signs to be alerted to are provided in the investigative report video ( below ):

Colleen Thomas Alien Contactee – Russian Television RT News

[ Video ( above ): Russian Television ( RT ) News Interviews Colleen Thomas ( click arrow to watch video clip ) ]

Alien Contactee Movement Cults

Peering through an unfathomable pitch black sky, moon-bats may be flitting-about – either up in belfries or in cave group slumber conventions, however far beyond caverns and belfries people for centuries have gazed even-further upward to distant stars, not just stargazers but others – including some groups that congregate to discuss ‘extraterrestrials’ ( ET ) that some government officials refer to as ‘non-referenceable objects’ ( NRO ).

Topics such as ‘unidentified flying objects’ ( UFO ), ‘extraterrestrial biological entities ( EBE ) and “Close Encounters” ( of various “Kinds” ) include anything from those who “want to believe” that either “Hey, I just saw a UFO!” some traverse far beyond the night sky to horror story ‘alien abductions’ ( abductees ) where ‘alien contactees’ ( depending on their particular stories ) may land in a ‘variety of phenomena categories’, amongst many, which psychologists diagnose as versions of Post-Traumatic Stress Syndrome ( PTSD ) involving anything from ‘past life experiences’ ( flash-backs ), ‘memory loss’ ( time travel ) and ‘foreign object implants’ documented by videotaped clinical removals from patients claiming inability to recall having been implanted with the retrieved  ’metallic object’ ( smaller than the diameter of a straight pin ).

Contactee movement stories, however are even more bizarre, claiming a wide variety of contacts albeit ‘in-body physical’ and/or via ‘extra sensory perceptions ( audio-visual and/or ESP ) or ’out-of-body interdimensional perceptions’ ( meaningful presence sensations with and/or without communications ( audio, visual and/or telepathic ) with ‘unknown entities’ that range anywhere in descriptions from:

– Humanoid figures in varying sizes ( child up-to giants ) displayed or projected as smoky wafts ( colors: charcoal grey, yellow, white and translucent ) ’with’ or ’without’ “wings” resembling ‘ghosts’;

– Android machines combinatoral  ’half human’ and ’half-machine’ referred to as ”man-chines” or “manchines”; and,

– Biological entities vary, to include:

– Alien hybrid bipeds varying in size ( height: 4-foot to 8-foot ), various skin tones ( colored: light grey, purple blue smoke ) various eye shapes ( small to large oval-like almond ) colored predominantly charcoal black with enlarged head shapes and skinny long arms;

– Humanoid bipeds varying in size ( 5-foot to 8-foot ), varying in skin tone ( colored: eggshell off-white tan or albino white ) with round eyes ( colored:light red, pink and red );

– Insect multilegs resembling an enlarged ’preying mantis’ with hexagonal faceted eyes;

– Reptile bipeds resembling a human-sized ‘lizard’, ‘tyrannosaur’, ‘dragon’ ( ‘with’ or ‘without’ “wings” ), ’serpent’ or ‘snake’ infamously referred-to as “Reptilians.”

Colleen Thomas claims, within her diatribe against the U.S. Department of Homeland Security ( see video “Colleen Thomas Demonstrating Symptoms of Paranoia Schizophrenia” further below ), that based solely on her own ’close observation’ of FOX News Rupert Murdoch that she wholeheartedly believes ‘he’ is actually a “Reptilian” who shape-shifted itself to resemble that man.

Alien contactee stories, of course, may be embellished-upon or enhanced for reasons unknown to the claimed contactee explaining-away their ‘unusual personal experiences’ as best they can. Some, however claim their ‘experience’ was spiritually “metaphysical” and that any ‘treatment’ they may have been subjected to was either ‘clinically extra high tech’ or ‘purely’ “holistic” whereby their ‘extraterrestrial alien visitor’ imparted within them an ‘enlightenment’, ‘awakening’ or  ’conveyance’ they believe was designed for only one ( 1 ) purpose – for the ‘contactee’ to share a ‘new belief system’ as a “message” passed-on from the alien ( in question ).

Contactee movement cult indoctrinates are predominantly ’co-dependent’ on ’peer acceptance’ that fades as the contactee’s peers do not typically share nor can they experience as much enthusiasm as the contactee wants from them, which typically results in an ever-growing insatiable thirst for acceptance by the contactee who then seeks-out those of a stature somewhat like themself. The contactee’s next step to ‘be accepted’ by ‘someone else’ is a mistake when they reach-out for ‘therapy sessions’ where clinicians typically lump the contactee in with all the rest of those needing as much – if not more- psychological help as the contactee, and typically the contactee ends-up in worse psychological shape than when they first arrived in ‘group therapy sessions’.

The fact is, the contactee ‘never finds peace within themself’ from ‘group therapy sessions’, which is ‘not designed to restore old order previous lives’ but to assist in allowing the patient to create a ‘newer more healthy life for themself’. Unfortunately, and because of these reasons, a contactee will likely veer down a dangerous road to emotional disaster while believing that ‘self-reliance’ was somehow to be ‘built on group acceptance’, which it isn’t nor will it ever be attained through ‘support group sessions’ or in Gestalt hot-seat therapy either. In short, the contactee becomes immmersed in their own unquenchable thirst to be accepted by like-minded individuals, which is what points contactees into extreme forms of therapy typically led by ‘occult practioners’ of ‘metaphysics therapy’ will – along with boat-loads of encouragement – convince contactees they ( alone ) ‘will be able to develop solutions to their own problems’ by ‘metaphysical focusing on their newly therapized inner strength’ by ‘leading others’ in what the ‘contactee knows best’ ( ‘not a practicing psychiatric clinician’ ). The contactee then goes off with what ‘they think they decided on their own’, which is to ‘start preaching to a larger audience’ about their ‘extraterrestrial interdimensional feelings of two-way telepath communications’, but ‘that communication’ is unfortunately ‘not founded in reality’ but within their inner self.

With external socialization deemed manditorily rampant amongst metaphysical like-mindeds, it’s only a matter of time before the contactee locates an ‘attractive supporter’ ( financially or otherwise beneficial in some fashion ) inspiring the contactee to launch themself either ‘into a cult’, as a ‘member’ who will grow-up through the rank and file structure learning most of what they need to know to get ‘other people’s money ( OPM ), or ‘start a fledgling a new cult’ and ‘lead it’ to such a point whereby the contactee’s ‘original financial supporter’ realizes some grateful benefit – one way or the other.

The ever-growing “Contactee Movement” is led by charismatic strategic thinkers able to articulate well-convincing stories designed to lead others to contribute something they otherwise might not do if they were not ‘followers’, ‘joiners’, and ‘risk-taking adventuresome spectators’.

Alien contactee movement leaders do not usually start-out with huge coffins filled with wealth, but usually sell all that is dear to them to obtain ‘seed money’, capital with which to grow a cult organization, and on their way kicking and scratching the eyes out-of anyone to get money, they start scamming others from a small group of followers by sucking as much out-of them as possible, while doling it back to themself as cash drawers fill fast.

Most alien contactee movement cults do ‘not pay taxes’, do ‘not even file taxes’, but instead hide the majority of fraudulent gained income through ‘real estate trusts’, ‘other name holding real estate assets’ that can be ‘liquidly portioned-off’, ‘corporate debenture’ profits, ‘stock derivative payments’ from interest on stock holdings, ‘corporate capitol holdings’, ‘corporate fluid inventory’ liquidations, ‘structured annuity payments’ ( scholastic, medical and other foundations ), and the list goes on besides the ‘old wall-safe’ or ‘sock’ trick where no trace of cash contributions can be frozen if otherwise deposited in a bank.

Alien contactee movement cults use subtle forms or blatant striking measures of intimidation on cult initiates whom receive claims of ‘protection from alien beings’ upon following instructions through guiding leaders of such groups. Let no one forget these venerable words: “We’re going to be murdered,” Marshall H. Applewhite told a reporter in 1972, “And when we are – after 3-1/2 days – we’re going to walk out into life in the next level above human.”

Colleen Thomas Alien Contactee – Anti-Christian Cult

[ Video ( above ): Colleen Thomas Contactee Anti-Religion & Anti-Government Pitch ( click arrow to view video ) ]

Colleen Thomas Alien Contactee – Government Threats

[ Video ( above ): Colleen Thomas Threatens U.S. President Barack Obama & Others ( click arrow on video to view ) ]

Colleen Thomas Alien Contactee – Sex Stunt Shows

Alien contactee leader Colleen Thomas used a ‘new publicity twist’ ( YouTube.Com videos and elsewhere on the internet ) by openly admitting she uses the oldest trick in the book – ”sex” – but not so subtle sexually suggestive techniques:

– Nudity ( total / partial ); – Deep cleavage displays ( bending over, hopping around, and a closet-full of more ); – Striptease ( tour bus group exposure and more ); and, – Pole dancing ( dirty-dancing and more ).

Alien contactee cult queen leader Colleen Thomas continues ‘bringing home the bacon’ ( OPM – ‘other people’s money’ ) by leading thousands of followers down the points ( ‘messages’ ) of her primrose pointed paths successfully growing her ‘extraterrestrial aficionado audience base’.

Colleen Thomas Alien Contactee – In A Nutshell

Information referenced ( immediately below ) includes ‘edited insertions’ [ ‘verified multiple named aliases’ ] for the purpose of ‘legal clarity’ to distinctly identify this particular “Colleen Thomas” as opposed to any others similarly named. Specifically, this Colleen Thomas ‘autobiography’ ( immediately below ) consists of ‘her self-written life story chosen by her as her public advertisement on the internet’ ( elsewhere ), it has been set-forth ‘herein otherwise’ to clearly demonstrate this one ( 1 ) example, amongst many others, surrounding a ‘leader’ within a trend setting ‘extraterrestrial alien’ themed “Contactee Movement” cult bordering on the occult, and while Colleen Thomas may not necessarily publicly promote the drinking of dead children’s blood, her ‘internet financial vampirical schemes’ are uniquely caught within the example ( immediately below ) of publicly ‘practicing fraudulent deceptions’ by espousing one’s self as an ‘alien contactee’, ‘claiming personal benefits to others upon their financial contributions’, ‘self financial enrichment’ using a ‘public artifice to defraud’ medium of the ‘internet’ as that ‘device’ or tool’ message pushing platform ‘simultaneously promoting non-payment of U.S. taxes’ ( against U.S. law ) to ’60,000 followers’, an array of malcontent bashing the U.S. government all of which is found being hosted from an ‘internet psychic hotline website’ ( immediately below ).

– – – –

Source: PREDICT MY FUTURE INC.

Colleen Thomas – Spiritual Light Worker

About

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was born into a large family in 1960. The family was plagued with mental illness and depraved individuals that preyed upon the young and the weak.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] is no stranger to evil, and has been confronted with the dark ones, even ‘to the point of attempts on her life’.

At the age of 14 [ Colleen Mary Ellis ], the wild and virtually uncontrollable 8th grader [ Colleen Mary Ellis ], was sent away to live with a sister in Russellville, Arkansas where within 1-year the unsupervised wild girl [ Colleen Mary Ellis ] was sexual active and then pregnant.

Never having attended High School, and always being treated like she [ Colleen Mary Ellis (aka) Colleen Thomas ] were defective in her [ Colleen Mary Ellis (aka) Colleen Thomas ] mind because she [ Colleen Mary Ellis (aka) Colleen Thomas ] was not intelligent “like men are,” Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] let education go and became a full-time mother [ Colleen Mary Ellis (aka) Colleen Thomas ] of 5 children.

Were it not for her [ Colleen Mary Ellis (aka) Colleen Thomas ] personal ethics – that pained inside her every time she claimed to have graduated high school in order to look good on a job application – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] would likely still have an 8th grade education to this day.

At the age of 32 Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] took her [ Colleen Mary Ellis (aka) Colleen Thomas ] GED and did so well she [ Colleen Mary Ellis (aka) Colleen Thomas ] was ‘talked into taking classes’ at the community college she [ Colleen Mary Ellis (aka) Colleen Thomas ] had gone to for the test.

When the youngest [ Colleen Mary Ellis (aka) Colleen Thomas ] of 5 children started attending school all day, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] began a full-time Biological Sciences program at the University of Nevada Reno where Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] earned her nursing degree.

Over the course of her [ Colleen Mary Ellis (aka) Colleen Thomas ] lifetime Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has shown unusual resilience and tolerance for others, even those channeling the dark toward her [ Colleen Mary Ellis (aka) Colleen Thomas ] in frequently tormenting, even life threatening ways.

A chaotic military life [ the husband of Colleen Thomas ] made for a very adjustable pliable personality is Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] that is tough as nails – when times get hard – but completely flexible with life and people otherwise.

It was always in Colleen’s [ Colleen Mary Ellis’ (aka) Colleen Thomas’ ] nature to stick up for the underdog – even when it was her [ Colleen Mary Ellis (aka) Colleen Thomas ] – but especially when it was someone else.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has always been very adventurous and daring – too much so at times – getting into situations that could have cost her [ Colleen Mary Ellis (aka) Colleen Thomas ] her [ Colleen Mary Ellis (aka) Colleen Thomas ] life, but close calls never detoured her [ Colleen Mary Ellis (aka) Colleen Thomas ] from pressing herself [ Colleen Mary Ellis (aka) Colleen Thomas ] even harder the next time.

As a girl – and young woman – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was very much like a strong and powerful man; at 105-pounds and 5-foot 4-inches tall Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was like a toy poodle that chases after Great Dane’s unaware of the size issue.

Colleen’s [ Colleen Mary Ellis’ (aka) Colleen Thomas’ ] tough reputation was tried time and again, growing-up moving from one school district to another more often than she can count; all of them [ school districts ] always on the poor side of town where Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was ‘not always in the majority race’ [ ethnicity ].

Under such trying – and often times ‘dangerous gang conditions’ – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘learned how to put fear into those who challenged her [ Colleen Mary Ellis (aka) Colleen Thomas ]’ and how to be very diplomatic under fire – ‘resorting to blows’ – only as a last resort when attacked.

A lifetime of seemingly unrelenting hardships and hostility from the dark never killed Colleen’s [ Colleen Mary Ellis (aka) Colleen Thomas ] happy go lucky spirit, that is until her 28-year old daughter Victoria Amour Meckler (aka) Tory A. Meckler (aka) “Margaret Tracy” unexpectedly died 2-years ago.

For the first time in her life Colleen [ Colleen Mary Ellis (aka) Colleen Mary Thomas ] had lost all will to live, but lacked the will to die either; she [ Colleen Mary Ellis (aka) Colleen Thomas ] was simply ambivalent and adrift.

Three [ 3 ] hostile marriages, persistent problems with money, and 20-years in a ‘Christian cult’ came crashing in all at once as the anguish of losing a child overtook her [ Colleen Mary Ellis (aka) Colleen Thomas ].

In the depths of despair, a shift took place that caused Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] to call everything she [ Colleen Mary Ellis (aka) Colleen Thomas ] ever knew or believed into doubt; earlier this year that positionless place Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] found herself in – was finally jerked into a new reality through a ‘kundalini awakening’ that cleared all her [ Colleen Mary Ellis (aka) Colleen Thomas ] chakras at once on January 31st of this year.

On Valentine’s Day of this year a Pleiadian man – an 8-foot tall giant who is a gifted and talented astrophysicist known throughout the galaxy – melded minds with Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] causing her [ Colleen Mary Ellis (aka) Colleen Thomas ] to awaken – knowing things about physics she [ Colleen Mary Ellis (aka) Colleen Thomas ] had never learned before – and had sudden clarity on all the quantum physical matters that had puzzled and eluded her [ Colleen Mary Ellis (aka) Colleen Thomas ] understanding before.

For the last several weeks, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has become consciously aware of her [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘telepathic connection’ to ‘mother Earth’, ‘other planets’ and ‘stars’ and the ‘alien peace keeping forces’ that have the ‘dark’ pinned down here on Earth.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was given the all-clear, that humanity was safe ‘because the dark were on the run’ – as they realize that the aliens that had simply observed their activity in the past had suddenly began engaging Vril [ Third Reich era – Vril Society ] ships [ UFO disk shaped spaceships ] and ‘human nuclear weapons’ of war.

As a Pleiadian contactee, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] will no doubt have a ‘role to play’ in ‘building the world of tomorrow’ where the humans are free from the dark spirited carnivorous sentient reptilians who have been feeding on human suffering for 10,000 years.

Earth, will be restored to her original purpose, which is to serve as an oasis for star travelers to visit and enjoy in peace – a vacation destination of intergalactic fame.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has become a ‘virtual overnight hit’ with the ‘pop New Age culture’ and ‘spiritual people’ who have always been open to the possibility of sentient life from other star systems.

After launching her [ Colleen Mary Ellis (aka) Colleen Thomas ] first [ 1st ] speech on July 27th – to the public on her YouTube.Com [ http://www.youtube.com/colesakick ] website to report on her [ Colleen Mary Ellis (aka) Colleen Thomas ] new knowledge of physics and alien affairs – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has ‘attained International attention’ and ‘support’.

Over 60,000 people had tuned in to hear what Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] had to say, in just 8-weeks time clearly her [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘messages’ are as ‘timely’ as they are ‘beneficial to others’.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has joined this service [ PREDICT MY FUTURE INC., at: http://www.SpiritualLightWorkers.Com ] so she [ Colleen Mary Ellis (aka) Colleen Thomas ] can ‘earn a living’ as a ‘world teacher’ of ‘Pleiadian physics’, ‘spirituality’ and ‘new forms of community based governance without the need for a central government’ – that ‘only served to enslave Americans and other nations to paying taxes’ with over half their invested energies from working to earn a living. A ‘living need not be earned’ and the ‘abundance of nature need not be sold’; ‘bartering will be the new currency’ of ‘energy exchange’ in the ‘future economy’ that ‘replaces the one that collapsing now’.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] will be happy to answer any question you may have, with regard to ‘her personal life’, ‘alien affairs’ and ‘physics’.

Reference

http://www.spirituallightworkers.com/profile_colleen.html

– – – –

Colleen Thomas Alien Contactee Stripping For Fun, Money, Or More?

Colleen Thomas partying

Colleen Thomas admits publicly [ in one of her many YouTube.Com videos that ‘she personally posted’ ] to utilizing ’sex’as her ”creative marketing tools” capturing ‘financial support’ from those she claims are predominately ‘wealthy old men’ willing to donate money because of exhibiting her ‘special attractions’ – supporting her wantonly wicked lifestyle.

 Colleen Thomas office

Colleen Thomas Alien Contactee Nude Tour Bus Escort Service

From the privacy of her residence – or wherever she happens to be at the time – Colleen Thomas operates an ’alien contactee nude tour bus escort service’ for those attracted through her online ‘nude video chat’ – wanting to see more of ‘her’ and ‘she promises’ the extraterrestrial “Mothership” too, if  ’they send her money’ to be taken on her ‘fraudulent alien contactee gala bus ride’.

7 Colleen Thomas

Colleen Thomas on Tour Bus

Colleen Thomas, alien contactee ’nude tour bus guide’, escorts enthusiastic passengers on a sight-seeing tour bus visiting her various favorite ‘hotspots’ – up and down northern California west coastline of the Pacific Ocean – where out upon cliffs she points to various  ’natural sights’ ( daytime ocean seawater reflecting a spot of the Sun, sparkling glimmers in the ocean, etc. ) she points to and exclaims, “See, over there! That’s the extraterrestrial alien “Mothership!”

Colleen Thomas alien contactee nude tour bus escort service is a ‘device or artifice to defraud’ via her ‘alien nude platform’ or ’mood room’  filled by her with a gala atmosphere of music, drinking, jokes, laughter, dancing and yes, nudity, designed to loosen-up more customer monies from gullible gawkers looking for cheap nude thrills. Well? They get what they pay for, taken for a ride, the Colleen Thomas way!

Colleen Thomas, unfortunately cannot keep her clothes on for those ‘older men’ she taunts, claiming they’re the largest contributors of money to her, while the rest aboard her tour bus go for the ride witnessing part of ’her nude comedy act’  ( below ):

Has anybody complained about the ‘services’ Colleen Thomas continues providing? That was not easily discovered, until one man from the nude tour bus ride came forward with a complaint, however as for now – until eventually incarcerated by law enforcement for blatant displays of ‘indecent exposure’ and/or ‘accepting money under false pretenses’ ( fraud ) – both of which ‘she has delivered plenty of’ to-date – no criminal fraud charges have yet been filed against Colleen Thomas; or, any of her alien contactee movement co-conspirators.

Colleen Thomas exudes an inordinate amount of energy some say is financially driven. Those watching her emotional-ticks soon come to realize her soft parts are rapidly collapsing when delivering her ‘coven-fostered’ spider web of ‘out-of-touch with reality’ spacey broadcasts about ‘interplanetary doom and gloom’ she claims to receive updates from a fourth ( 4th ) dimension and/or fifth ( 5th ) ‘interdimensional being’ – another ‘imaginary man’ ( this one 8-feet tall ! ) in her life – warning her ( she claims ) about what is ‘about to befall everyone on the face of God’s green Earth’ at which point her message turns-to ‘woeth those not buying her psychobabble diatribe’ of ‘the sky is falling’ as she trails-off howling at the moon like a banshee ranting over ‘internet radio’, internet videos’, Twitter, Facebook, and a host of ‘internet blogcasts’ sufficient enough to even make a maggot puke over what some say is ‘just entertainment’.   Colleen Thomas’ gimmick is simply ‘kinky’, without typical ‘sex and violence’ additives, but applies ‘titillating sex’, ‘tantalizing stripteases’, and while encouraging audiences about ‘extraterrestrial interdimensional alien friendlies’, preaches the U.S. government is out to lock-up all its citizens, and then outlines an extremely violent ending for all mankind by claiming an Extinction Level Event ( ELE ) is coming to her audiences everywhere. She is impetuous about being brought-on talkshows and news programs to “warn everyone.”

Colleen Thomas’ gimmick is simply ‘kinky’, without typical ‘sex and violence’ additives, but applies ‘titillating sex’, ‘tantalizing stripteases’, and while encouraging audiences about ‘extraterrestrial interdimensional alien friendlies’, preaches the U.S. government is out to lock-up all its citizens, and then outlines an extremely violent ending for all mankind by claiming an Extinction Level Event ( ELE ) is coming to her audiences everywhere. She is impetuous about being brought-on talkshows and news programs to “warn everyone.”

Cult Queen Enjoying Galactic Immunity?

While this savvy buxom business matron may appear to have not covered her operation bases very well either, some of her most avid followers speculate that her protection from federal, state and local laws stretch to the planet Venus and beyond. What say you, U.S. revenuers?

Colleen Thomas was not always an ‘alien contactee movement sex idol’ thousands see her as today, but in Nevada as a ‘promiscuous nurse’ – according to a ‘few professionals’ intimately familiar with her personalware tradecrafts – who after attending a plethora of colleges, learned ‘how to easily manipulate human behavior’ and ‘administer dangerous chemotherapy drugs’ to weak an dying patients ( including children and the elderly ) suffering a variety of maladies associated with cancer and more.

Colleen Thomas rose through hospital ranks where with her eye keenly fixed on a position as an “Administrator,”  that is what led her into the midst of the Visiting Nurse Association ( VNA ) – dealing with healthcare providers where the eventual niche of ‘administration’ finally fell into place, but ‘not long being able to maintain herself’ as one of the ‘team players’ she saw arranged a relatively new ‘private practice’ niche and dove into it head-first.

In 1998, Colleen Thomas became a registered nurse in Nevada working for KAISER PERMANENTE HOSPITAL, CARSON TAHOE HOSPITAL, and SAINT MARY’S REGIONAL MEDICAL CENTER, dabbled in the field of ‘home healthcare’ ( GENTIVA HEALTH SERVICES and HOMECARE PLUS ), but as an “Administrator” for ‘visiting home nurse healthcare providers’ she appears self-employed working part-time out-of her home-office with ‘home healthcare administrative management’ ( REHABFOCUS HOME HEALTH INC. – Stockton, California ) as well as her ‘more publicly known other activities’ too.

While some question the ‘mental health’ of any alien contactee cult leader, Colleen Thomas previous drug abuse treatment at an Arizona drug rehabilitation center has had her ‘personal well-being’ well diagnosed by at least two ( 2 ) psychiatric professionals on two ( 2 ) seperate occassions.

Colleen Thomas Demonstrating Symptoms of Paranoia Schizophrenia

Colleen Thomas demonstrates her own seething personal attacks on the U.S. Department of Homeland Security, FOX News mogul Rupert Murdoch, and others within a video clip she produced and then published on the internet, at: http://www.youtube.com/watch?v=HsbOgTN40ME

Corporate Hospitality Tradecraft Tricks

Colleen Thomas claims a so-called “marketing background,” but from her apparent open public displays of ‘nudity marketing’, she may have been positioned for what Corporate America curiously uses as a “hospitality hostess” or ‘party-curious corporate girl’ suited better for performing ‘business relation services’ capturing ‘more hard-to-get contracts’ and eventual funding by keeping visiting representatives, brokers and businessmen ‘happily marketed’.

Colleen Thomas went on to apply her coven-like tradecrafts and personalwares hoping to boost a smaller business ( BLUESUMMITS LAND CAPITAL and AMICK ENTERPRISES – Roseville, California ), which only appeared at-first to pay-off but eventually encountered difficulties.

Alien Contactee Queen Has To Be Shasta Mountain Bound

Colleen Thomas visions, amongst a very long list of others, exclaim extraterrestrial interdimensional alien beings exist in an ancient alien underground safehaven city known – by followers of the “Hollow Earth” theory – as “Telos” further claimed secretly located deep down inside the base of Mr. Shasta in northern California where ‘only select enlightened ones’ will be allowed entry to unimaginable wonderful things, but with a catch – somewhat akin perhaps to the old rock ‘n roll song “Hotel California” ( “… you can get anything you want, but when you check-in you can never check-out …” ) – leading victims on a ‘fraud to nowhere’. Unless people are led to their demise ( e.g. as were those in the Jim Jones massacre ), law enforcement will continue failing its ’alert test’ on the Colleen Thomas alien contactee movement.

U.S. Marine Corps Married Life Tossed – Alien Style – By Queen Of Cult

In-addition to Colleen Thomas’ believed part-time work as a home healthcare “Administrator” and “Consultant” to a small group of curiously nearby ”satellite offices,” she not only maintains she’s a “Pleiadian” alien contactee ( spreading more than just words on what is about ready to come ) she goes on claiming she’s ”Executive Director” for QUANTUM AETHERDYNAMICS INSTITUTE and a “Theoretical Physicist” and “Inventor” for DESTINY TECHNOLOGIES – her “galactic plane” headquartered somewhere between the images in her mind, her ‘home office’ ( sewing room ) and ’main office’ ( garage ) where she sits piloting her almighty ”mothership” – an upscale Placer County home ( 1756 Park Oak Drive, Roseville, California, USA ) foreclosed upon her “galactic plane” in the suburbs.

Colleen Thomas XXX-Files Star Sees “The Truth Is Not Out There!”

Whether Colleen Thomas is in-front of an audience of her peers, shamans, witches, alien abductee fanatics or UFO aficionados, her other ‘abhorrent behavior patterns demonstrated’ remain, and although she’s certainly no Al Pacino ( Scarface ) or James Cagney ( White Heat ) – respective motion picture film stars seeing phrases coined such as “The World Is Yours” or “Top Of The World” it appears she’s the only one in-heat over implanted scars that should have her own neon sign blinking, “The Truth Is Not Out There!” ( XXX-Files ) because some – able to pierce veils of secrecy – see quite clearly through a myriad of far-more smoke and mirrors than she or whomsoever she’s taking instructions from could ever conger.

Should anyone know of someone who may have had a bad experience within a “Contactee Movement,” your replies ( by e-mail ) or comments ( below ) are helpful proactive steps to prevention of financial fraud and other serious crimes associated with these types of activities.

Submitted for review and commentary by,

Kentron Intellect Research Vault ( KIRV )
E-MAIL: KentronIntellectResearchVault@gmail.com
WWW: http://KentronIntellectResearchVault.WordPress.Com

References

http://www.youtube.com/watch?v=dKx4MeBybkc
http://www.youtube.com/watch?v=rpYpROtdiMQ
http://wink.com/p/Colleen-Thomas-p:1e0u8e1qs0b44
http://twitter.com/colesakick
http://www.intellectuallyhonestscience.com
http://www.myspace.com/colesakick
http://videogum.com/244851/colleen-thomas-explains-mondays-secret-missile-launch/webjunk/vlogging/
http://www.myspace.com/colesakick/blog
http://www.youtube.com/colesakick
http://www.intellectuallyhonestscience.com
http://www.blogtalkradio.com/The-Next-Paradigm-Shift
http://www.godlikeproductions.com/forum1/message1088335/pg1
http://www.linkedin.com/in/colleenthomas
http://www.spirituallightworkers.com
http://www.publicrecords.com/people-search-records/colleen-m-thomas-in-california
http://humansbeingthelight.ning.com/profile/ColleenMaryEllis
http://www.publicrecords.com/people-search-records/colleen-m-ellis-in-nevada
http://www.verifyphone.com/phone-lookup-reviews/916-784-0566
http://web.archive.org/web/20080422080325rn_2/www.bluesummits.com/content/home.html
http://sacramento.craigslist.org/reo/2128220568.html
http://sacramento.craigslist-real-estate.com/postings/reo/2139874195.html
http://sacramento-ca.americanlisted.com/houses/1200000-home-roseville-map_17471027.html
http://www.redfin.com/CA/Roseville/1756-Park-Oak-Dr-95661/home/19625369
http://www.myyp.com/Sacramento,CA/White-Pages/A/66/book
http://start.cortera.com/company/research/l1o2lyn5l/amick-enterprises/
http://www.zillow.com/profile/nevadabob/
http://www.abovetopsecret.com/forum/thread492937/pg#pid11055816
http://www.slideshare.net/Colesakick/american-fuel-centers
http://www.azteria.com/c/P5795658
http://store.payloadz.com/details/933074-Documents-and-Forms-Presentations-Alien-Contact-Movement-Uncensored.html

UFO Flight Training

[ PHOTO ( above ): Nellis AFB Range Test Site S4 UFO Flight Simulators ( click to enlarge ) ]

UFO Flight Training
by, Concept Activity Research Vault ( CARV )

November 10, 2011 13:22:08 ( PST ) Updated ( Originally Published: January 25, 2011 )

NELLIS AIR FORCE BASE – November 10, 2011 – Had one not been familiar with the official background on such subjects, they might have quickly nominated a certain gentleman ( reported about below ) to receive a U.S. Academy Award ‘secondary prize’ of ‘free mental health treatment’, but after carefully considering this subject to be reported, some may see where ‘this particular information’ certainly ‘pushes the envelope of reality’ – beyond where most professionals never venture.

– – –

IMPORTANT NOTICE:

All information – contained within this report ( below ) – was obtained from ‘official U.S. federal government sources’ ( applicable ‘quoted texts’, ‘images’ and ‘videos’ – below ), ‘worldwide mainstream news media public broadcasts ( ‘text’ and ‘videos’ – below )’, ‘multiple other officially recognized as being publicly reliable information sources’ plus all those are provided additionally in a long list of “References” ( found at the bottom of this report ). The only exception a ‘usual journalistic speculative digest of remarks ( text )’ aligning ‘official information’ with ‘enhanced clarity’ plus ‘information continuity formatting’ for ‘easier public reading comprehension’.

This website report ‘does not’ asbscribe to any version of ‘religious radicalism’, ‘doomsday prophetics’, ‘conspiratorial theories’ or any ‘other imaginings’ that may or may not be circulating on the internet.

This website publicly reports ‘only factually proven information’ through ‘ardous research’ in ‘adherence to strict principles’ only ‘obtaining official information’ from ‘official information sources’ confirmed by ‘no less than’ two ( 2 ) ‘additional independent sources’. While scientific and technological information may vary, amongst professionals, only those held in ‘good standing’ by a ‘worldwide list of prominent universities’ and ‘other prominent organizations’ provided additional factual support documentation.

This website maintains a ‘private database’ of ‘official documents’ and ‘other credible source information support material’ that ‘officially serves to substantiate all information’ contained in ‘all reports published’ here.

– – –

History may someday reveal more about what the now-late William Uhouse, a mechanical engineer ( 1966 – 1979 ), outlined surrounding ‘official U.S. government contract “business agreements” relating to ’private-sector’ high-risk work involving, amongst a myriad of others, engineering companies, contractors, sub-contractors, engineering consultants and engineers hired to perform extremely dangerous high-risk work involving secret hazards surrounding such work.

Disclosure, for the most-part, is predominantly not a favorite intelligence past time, for the less private-sector individuals know about what surrounds their contracted task assignments, all the better can government maintain its secrets  – until something goes terribly wrong on a U.S. government contractor job site.

A classic example of what could go wrong was presented by a patriotic American, the now-late ( deceased ) Paul Philip Schneider (aka) Phil Schneider, an engineering consultant hired by MORRISON-KNUDSEN INC. ( Tulsa, Okalahoma ) – a sub-contractor company for CER GEONUCLEAR CORP. ( Tulsa, Oklahoma ) that was a subsidiary of the U.S. government contractor company EG&G that maintained a super secret facility building on the ground inside a U.S. government highly restricted Range Test Site ( RTS ) known as the infamously spooky Area 51 near Groom lake, Nevada.

Much like Paul P. Schneider, William Uhouse –  another engineer – at a very late stage in his lifetime began revealing – and consequently became more comfortable ( to ‘some degree’ ) about what he revealed his first-hand knowledge of – and that was, at least ‘four’ ( 4 ) ‘Extraterrestrial Biological Entities’ ( EBE ) commonly referred to as  “Extra-Terrestrials” (aka) ETs (aka) aliens held under U.S. government command directives issued to work alongside private-sector engineers cleared to work on secret-sensitive classified government Programs and Projects at specifically selected locations.

See what I mean? Sounds just like “government conspiracy” material. Well, that too was my initial knee-jerk reaction while I was simultaneously pondering an the ‘free mental health treatment’ prize for ( were he still alive ) Uhouse, however in-lieu of that curious situation, I additionally considered handing myself a ‘similar prize’ for even having considered reporting about this, until looking further into the Uhouse case where eventually all doubt came to evaporate. Doing the research, was ‘no simple task’, especially when the claimant ( Uhouse ) turned-up dead.

According to Bill Uhouse ( see, I immediately start pointing my finger at him! ), these extraterrestrial biological entities ( EBE ) were extracted from an ‘underground bunker’ where supposedly thousands more extraterrestrial biological entities ( EBE ) – controlled by the U.S. government – held in Deep Underground  Military Bases ( D.U.M.B. ) through an elaborate network of tunnels leading to various and sundry equally deep underground pockets of caves / caverns.

I know, by now, those so-far reviewing this will ensure I receive the ‘crazy prize’ instead of ( posthumously ) Uhouse, but not to worry as it only gets worse until getting better when viewing the ‘official government films’ ( further below ), but ‘reading this report further will assist skeptics’ in understanding what can be identified within the videos. Jumping the gun by advancing to view the videos will net ‘little to no information’ so, I’m counting-on ‘official government speed readers’ ( reviewing this report ) to jump-the-gun and do exactly that so, hopefully I won’t be pestered ( by them ) later-on for having publicly reported something too sensitive. I just love doing reports like this.

Bill Uhouse goes on to described – in ‘very specific words’ ( as though he were sending a coded message to someone knowing more about these EBEs ) – the four ( 4 ) beings as what he calls ” Feeling Good Guys ” ( ” FGG ” ) especially selected – by U.S. government officials – for transport ‘away from’ one Nevada ( USA ) facility and ‘sent to’ another facility in New Mexico ( USA ) but then transported ‘back to’ to Nevada ( USA ) at a facility believed to be on the Nellis Air Force Base ( NAFB ) Range Test Site ( RTS ) known as “S4″ ( ’near’ – but ‘not at’ – the infamously spooky Area 51 ) where Uhouse claims these particular four ( 4 ) EBEs or ‘aliens’ were assigned – by an official U.S. government directive – to ‘work alongside private-sector members’ of his ( Uhouse’s ) engineering team assigned likewise to the same U.S. government Program Project.

William Uhouse specifically mentions but ‘one ( 1 ) alien’ ( a “Grey” – bluish-purple skin color type of ‘extraterrestrial biological entity’ – EBE ) intimately that he was told was nicknamed ” JAYROD ” ( also known as ) ” JROD ” ( aka ) ” JRD ” (aka) ” JERROD ” who was presented to him ( Uhouse ) as a ‘personally assigned’  “scientific translator.”

This is ‘not’ the first time the name “Jerrod” has surfaced surrounding Groom Lake, Nevada NAFB S4 and Area 51 extraterrestrial reverse-engineering Program Projects where Bob Lazar referenced someone he claimed was his “friend” he cleverly gave the name “Jerrod” to, and this “Jerrod” was claimed by Bob Lazar to have revealed ‘highly classified historical background information about’ surrounding certain government Program Project activities in the same location areas.

Bill Uhouse claims JAYROD ( the alien Grey ) – also known as – “Jarod” used ‘mental telepathic communication skills’ to receive questions he ( Uhouse ) presented to it ( the alien ), but before he ( Uhouse ) could purse his lips to begin asking audible questions about ’engineering configurations’, JayRod ( alien ) instantly and telepathically transmitted ‘mental telepathy replies’ as ’engineering instructions’ back to Uhouse.

Uhouse was believed to have been dealing with what had been presented elsewhere – during the 1980s – in what was leaked to the public – during the early 21st Century – as ‘alien symbolic construct science technologies’ studying translations of a ‘materials science language’ from a strange looking ‘map’ containing ‘patterned symbols and designs’, which Uhouse ( alone ) could not possibly comprehend in order to properly lead engineering teams into formulating ‘standard basic application designs’ enabling the U.S. government military to develop an actual UFO ‘flight simulator’ – or ‘lenticular craft simulator’ ( “flying disc simulator” ) – specifically designed so ‘only human astronautic experienced pilots’ – assigned to the National Reconaissance Office ( NRO ) and NASA – could learn how to fly UFO type spacecraft equipped with secret extraterrestrial ( ET ) technology capabilities.

Official U.S. Air Force ( USAF ) ‘motion picture film footage’ shows men near one type of “flying disc demonstrator” – wrapped and resting on its ‘container base’ with its ‘container cover’ suspended above it – and film footage of ‘teams of men’ guiding ‘suspended sub-sections’ of a ‘disc’ being ‘assembled’, and ‘partially assembled sub-sections’ of a ‘disc’, plus ‘more’ ( below ):

After carefully studying the video contents thoroughly and comparing all aspects thereof to what surrounded the AVRO ‘manned aerial vehicle’ ( circa: late 1950s – early 1960s ) – test-flown under a BELL LABORATORIES ( Canada ) ”business agreement” contract under U.S. Central Intelligence Agency ( CIA ) supervision ( from the late 1950s through early 1960s ) – these video contents are ‘definitely not’ films of ’any early developmental stages’ of the AVRO aerial vehicle, nor do video contents of any of the discs depicted therein even remotely represent ’test engineering’ or ‘manufacturing’ facilities where even pieces of the AVRO were ever housed – including BELL LABS ( Canada ) and the MITRE CORP. ( USA ).

Should those, reviewing this report, decide I should still be awarded the ‘free mental health treatment prize’ – alluded-to at the beginning of this report – for revealing what was contained herein, please notify me immediately – otherwise try not to appear so shocked as to what you eventually realized from this report – more-so than initially believed.

As for Extraterrestrial Biological Entities (aka) aliens (aka) ETs (aka) Ancient Earth Underground Dwellers (aka) Feeling Good Guys ( FGG ) – and films thereof – one may only be reminded to ask William Uhouse on their final travel.

As for documentation? Read the “IMPORTANT NOTICE:” ( above ), for without such this report would never have been written.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Unmanned Combat Aerial Submarine ( UCAS )

Unmanned Combat Aerial Submarine ( UCAS )
by, Concept Activity Research Vault ( CARV )

March 17, 2011 08:42:22 ( PST) Updated ( Originally Published: January 17, 2011 22:42 )

CALIFORNIA, Mojave – March 17, 2011 – U.S. Department of Defense ( DoD ) Advanced Research Projects Agency ( DARPA ) military science and technology ( S&T ) department has created yet ‘another’ Unmanned Combat Aerial Submersible Vehicle ( UCASV ) that can descend from Low Earth Orbit ( LEO ) flightpaths to approach and submerge a body of water ( oceanic or lake ) where the target is located.

From a remote-control underground desert facility ( Muroc, California ) this aerial combat submarine ( UCASV ) also employs a strategic morphing technology offense for approaching targets beneath the surface, afterwhich mission success this UCASV rises from sea depths with its delta wing ( hydrafoil ) design water-to-air surface breaking power engages its thrust-vectoring engine propulsion system aides short distance smooth water-to-air.

Not since the DARPA program LOCCAS powered LOCKHEED project U.S. Navy remote-controlled cruise torpedo or the DARPA program TACIT BLUE experimental BOEING project Bird of Prey combat aerial vehicle ( image above ) – combined – has a more advanced program developed, however since 2008 such proceeded beyond demonstrator development garnered several private-sector developer designs pushing a DoD DARPA project contract to have begun by 2011 building several versions.

[ PHOTO ( above ): ‘early version’ LOCCAS powered remote-controlled cruise torpedo  ( click to enlarge ) ]

[ PHOTO ( above ): latter version LOCCAS powered remote-controlled cruise torpedo  ( click to enlarge ) ]

[ PHOTO ( above ): DARPA program TACIT BLUE experimental BOEING project Bird of Prey combat aerial vehicle using ‘new Stealth design-cover’ on PRATT & WHITNEY ‘cylindrical-style single engine’ ( click to enlarge ) ]

While hydrodynamics and aerodynamics have similar principle aspects, profound technological challenges existed as Unmanned Aerial Submersible Combat Vehicle ( UASCV ) must be lightweight ( Dupont carbon fiber using 3M carbon resins ) – for minimal power consumption to become airborne – while simultaneously possessing sufficient material hull density to withstand oceanic pressures at variable depths.

Aircrafts that are ‘heavier-than-air’ obtain lift from wing airflow displacement, however submarines regulate buoyancy by pumping water in and out of ballasts within certain hull locations.

One method of getting around the latter problem is to design a ‘lighter-than-water’ submarine with an ‘upside-down flexible ( morphing technology ) batwing aerial submarine vehicle’ using reverseable lift generation alternating ‘delta bat-wing’ directional force design technology facilitating craft navigation through oceanic subsurfaces ( and upon surfacing therefrom ) where drag reduction is virtually eliminated by easily altering its ‘flexible whale tail angle of attack’ generating upward lift allowing a variable propulsion drive system to move the Unmanned Aerial Submersible Combat Vehicle ( UASCV ) amidst a variety of environments.

[ PHOTO ( above ): RocketDyne Division AeroSpike XRS-2200 thrust vector navigation ‘lateral-style engine’ on testbed in Sylmar, California ( click to enlarge ) ]

[ PHOTO ( above ): BOEING RocketDyne Division XRS-2200 AeroSpike thrust vector navigation ‘lateral-style engine’ diagramatic  ( click to enlarge ) ]

[ PHOTO ( above ): DARPA program HAVE BLUE project LOCKHEED Stealth Fighter F-117E using ‘legacy Stealth design-cover’ shielding the RocketDyne XRS-2200 thrust vector navigation ‘lateral-style engines’ ( click to enlarge ) ]

Modified versions of BOEING legacy Rocketdyne XRS-2200 AeroSpike thurst vector navigation ‘lateral engines’ ( 2 ) – based on those formerly used in the U.S. Air Force LOCKHEED F-117E Stealth Reconaissance Fighter ( image ‘immediately’ above ) – are used in miniature tandems ( 2 ) on Aerial Submersible Vehicles ( ASV ).

The Unmanned Aerial Submersible Combat Vehicle ( UASCV ) ’satellite blue-green laser-guided remote-controlled navigation propulsion and underwater optical sensing detectors and camera systems’ remains as sensitive as the DARPA LOCCAS powered remote-piloted submersible torpedo ‘satellite blue-green laser-guided remote-controlled navigation propulsion and underwater optical sensing detectors and camera systems’.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Secret ET Technologies

[ NOTE The video ( above ), amidst its computer graphic interface ( CGI ), manipulates many of the actual ‘image document layout photographs of symbolics technology’ and ‘laboratory premise photos of components and sub-structures’ ( removed from the U.S. government classified laboratory Project CARET ), plus ‘select photos’ of unidentified flying objects ( UFO ) bearing similar symbolics worked on by an individual using the alias name “Issac” who publicly released partial details about this story. ]

Secret ET Technologies
by, Concept Activity Research Vault ( CARV )

November 22, 2010 12:37:42 ( PST ) Update ( Published: October 23, 2010 )

USA, California, Menlo Park – November 22, 2010 – What some perceived as chicken footprints  may likely be extraterrestrial symbolic construct technologies. Years ago, an individual – using the alias name “Issac” – conveyed a multi-page report ( ” CARET ” ), laboratory photographs, and detailed personal encounters ( from at least 1984 through 1987 ) on what was believed a U.S. Department of Defense ( DoD ) Defense Advanced Research Projects Agency ( DARPA ) Program recruiting to work on a specific Project ( believed Phase II or Phase III ) studying what was ‘officially briefed’ to Issac – amongst his task team –  as highly complex relatives of  ’extraterrestrial’ structures, materials, components, construct language symbolics.

Unwanted Publicity Intelligence Annex report ( herein ) will only provide more detailed analysis on Issac provided information that news media organizations half-heartedly carried to the public years ago.

Extraterrestrial materials, although highly complex to what Issac’s group had ever seen in their lives before, saw supercomputers lumber under tasking extremely complex substrates and geometric symbolics, amongst other secret-sensitive items, that Issac and others analyzed and deciphered.

Within the building, amongst other secret-sensitive items, combinatoric studies were not limited to extremely complex substrates, symbolics, and more that developed an extremely complex ‘primer’ in which Issac’s report is named “Commercial Applications Research for ExtraTerrestrial Technology” ( C.A.R.E.T. or CARET ).

Issac’s personal accounting ( further below ) reports the aforementioned work was conducted within what first appeared as only an upscale industrial office complex ‘building’, presumably located in the State of California County of Santa Clara.

Issac describes his facility adjacencies being multi-compartmentalized ‘individual government contractor offices’ – believed assigned to various sensitive tasks for the United States government – whereupon, amongst other compartmentalized secret characteristics ( never mentioned the facility being a ’self-sealing building’ ), were five ( 5 ) underground floors hidden.

Five ( 5 ) stories down, sub-surface levels – not reported by Issac – but easily ascertained must have included:

– One [ 1 ] underground level dedicated parking for ‘secondary staff’ and/or ‘special visitors ( e.g. military officials, etc. ) standard passenger vehicles; and,

– Two [ 2 ] underground level dedicated parking for ‘equipment delivery’ trucks; and,

– Three [ 3 ] underground level dedicated parking for ‘militarized troop personnel’ vans and/or buses.

Carefull observation, when combining all the aforementioned, initially bring a ‘few new questions’ followed by a few ‘remote suppositions’ ( immediately below ):

1. Could Issac’s seemingly ‘personal account’ have actually been ‘cleverly ghost written’ for ‘someone else’?

2. Could Issac have actually been a ‘female’?

3. Could the ‘name’ of the author, “Issac,” have actually been derived from the ‘name’ of a ‘male sibling or spouse’?

4. Could Issac’s seemingly ‘personal account’ have actually ‘taken place geographically elsewhere’?

“Issac” ‘reports’ ( further below ) begin ‘personal accountings’ by ‘laying a foundation scene’ surrounding the State of California County of Santa Clara “Silicon Valley” industrial technology history. Issac then simply includes a report ‘cover page’ entitled, “Palo Alto CARET Laboratory” so, for all intents and purposes readers may ‘then instantly gravitate with the assumption’ that Issac’s ‘personal account took place in Palo Alto, California’, but then “Issac” mentions – but does not detail – only very few ‘building characteristics’ and uses the most ‘general of terms’. Might Issac have ‘purposely laid such a foundation’ after ‘altering the true facility name on he report’ to only be known as the “Palo Alto CARET Laboratory” or “PACL” when the ‘building’ may have actually been ‘remotely located elsewhere’ albeit within or under a ‘temporary U.S. government contract project’ and/or ‘adjunct’ of yet another larger organization.

Was Issac’s ‘reported building’ just a stand-alone upscale city street-side industrial office building made of normal iron re-enforced concrete / cement walled tilt-up construction?

At the time, of Issac’s personal account’, the former ROCKWELL SCIENCE CENTER PALO ALTO LABORATORY ( 444 High Street, Suite #400, Palo Alto, California 94301 ) existed near a plethora of ‘other such organization buildings’ performing secret-sensitive work in the Silicon Valley area of northern California.

Plenty of such ‘remotely located buildings’ exist.

To name a ‘few’, are ‘buildings remotely situated’ at the U.S. National Laboratory in Los Alamos, New Mexico and although ‘such buildings and private contractors are geographically situated there’, funding secrets are hidden under ‘administrative domain auspices’ of the ‘University of California’.

But where do “Issac’s” reported ‘armed military personnel’ easily appear from in such a ‘building’?

Other ‘remotely situated buildings’ also exist – under U.S. government contract to private companies – on military reservations such as the United States Air Force Research Laboratory ( ARL ) that oversees “PHILIPS Laboratory” secret-sensitive work performed and tested ‘near but not within’ Kirtland Air Force Base, New Mexico but secretly hidden on that huge ‘reservation’.

[ PHOTO ( above): PHILIPS Laboratory at Kirkland Air Force Base, New Mexico ( USA ) NOTE: click to enlarge photo details. ]

In southern California, Edwards Air Force Base reservation holds unique offerings, amongst other secrets, where after a vehicle passes the ‘entrance sign’ it must continue to be driven an additional 20-miles further before even reaching the ‘main gate’ to gain ‘official admittance’ but with ‘further restricted movement’, whereupon scattered – all around that ‘reservation’ – are a plethora of ‘remotely situated buildings’ under ‘use’ by ‘private business U.S. government contract holders performing, amongst other things, U.S. government secret-sensitive work within a complex of buildings such as  those seen inside Area 51 ( also known as ) the Lazy G Ranch ( also known as ) The Ranch ( Nevada, USA ).

[ PHOTO ( above): Area 51 (aka) Lazy G Ranch (aka) The Ranch ‘main gate’ ( Nevada, USA ) circa 1970s. NOTE: click to enlarge photo details. ]

[ PHOTO ( above): Area 51 (aka) Lazy G Ranch (aka) The Ranch ( Nevada, USA ) circa 1970s. NOTE: click to enlarge photo details. ]

But even Area 51 (aka) the Lazy G Ranch (aka) The Ranch located in the Nevada desert cannot be compared ( here ) to its secret-sensitive  ’sister reservation’ that is only known as a ’proving ground’ someone named ”Dugway” ( Utah, USA ).

In  1968, the U.S. Navy had private contractors build its secret-sensitive China Lake Naval Weapons Station ( near Trona, California ) whereon that ‘reservation’ holds one ( 1 ) building, with eight ( 8 ) subterrainean story floor levels, that is stuck out in the middle of the southern California desert. If the U.S. Navy is a military ship sailing and aircraft flying defense organization, what is it doingwith an 8-story subterrainean building in the middle of a desert?

From within Issac’s given parameter basics describing the reported ‘upscale city industrial office building’ complex – with five ( 5 ) subterrainian stories – the closest resemblance ‘within the State of California County of Santa Clara Silicon Valley area’ that was the  ’unknown building predecessor’ of what later became known as the ‘first privately-owned and operated business’ belonging to the U.S. Central Intelligence Agency ( CIA ) named QIC ( believed known as ) QUANTUM INTEFACE CENTER ( formerly known as ) IN-Q-IT CORPORATION ( formerly known as ) IN-Q-TEL ( affectionately nicknamed ) CIA-IN-Q-TEL where the CIA business ’special technology’ research and development ( R&D ) was performed – although ‘never fully reported’ about – on ‘applications’ for what would later also be known as ” Commercial Off The Shelf ” ( C.O.T.S. / COTS ) product development of secret-sensitive technologies – ‘products’ in-essence, there would accumulate plenty of, for later distribution –  to be eventually traded for ‘other valuable considerations’ ( only very little press coverage reported it, as “… products to be sold to …”  ) ‘in-exchange’ for which a few ‘private companies’ ( e.g. ‘foreign based company’ PHILIPS, and a few select others ) could possibly offer ‘in-exchange’ for what they ‘could’ or ‘were already providing’ under U.S. government contract(s) that could ‘then’  secretly return U.S. Congress ‘budget approved’ U.S. Department of the Treasury funds by re-routing or mirroring bank wire transferred monies back into the U.S. Central Intelligence Agency ( CIA ) private business that could then re-route those monies as deemed fit secretly into yet other out-of U.S. Congressional scrutinized intelligence projects and programs.

But could all this ‘really happen’?

The webpage links ( above ) show who was initially put in-charge and what senior executives were selectively chosen from key private industries that led the private U.S. Central Intelligence Agency business so, it really should come as no surprise to a few understanding mechanics behind international stock market trading and international bank wire transfers between domestic and foreign operations of the United States Federal Reserve System.

[ PHOTO ( above ) : U.S. Central Intelligence Agency ( CIA ) business IN-Q-TEL CORPORATION logo. ]

A few such secret-sensitive self-sealing rad-hard ( anti-radiation hardening concrete / cement via ‘gamma radiation saturation’ ) buildings reposturate – ‘prior to the onslaught of’ a U.S. national emergency – via remote triggering such buildings to submerge their entire mass into underground special covering multi-story holes dug in the ground beneath them.

So, did Issac’s ‘reported building’ have such ‘additional capacities’ or ‘more’?

One might consider such to be more distinct possibilities based on what the “CARET” report entailed and according to “Issac’s” ‘personal accountings’ surrounding such.

Courtesy: Unwanted Publicity Information Group

====

My Experience With The CARET Program And Extra-Terrestrial Technology

by, Isaac [ alias moniker used by the original author ]

June 2007

This letter is part of a package I’ve assembled for Coast to Coast AM [ a nightly broadcast radio station located in the United States of America ] to distribute to its audience. It is a companion to numerous ‘document’ and ‘photo’ scans and should not be separated from them.

You can call me Isaac, an alias I’ve chosen as a simple measure of protection while I release what would be called tremendously ‘sensitive information’ even by todays standards.

‘Sensitive’ is not necessarily synonymous with ‘dangerous’, though, which is why my conscience is clear as I offer this material up for the public.

My government [ United States of America ] has its reasons for its continual secrecy, and I sympathize with many of them, but the truth is that I’m getting old and I’m not interested in meeting my maker one day with any more baggage than necessary.

Furthermore, I put a little more faith in humanity than my former bosses do, and I think that a release of at least some of this information could help a lot ‘more’ than it could ‘hurt’, especially in today’s world.

I should be clear before I begin, as a final note:

I am not interested in making myself vulnerable to the consequences of betraying the trust of my superiors and will not divulge any personal information that could determine my identity.

However my intent is not to deceive, so ‘information that I think is too risky to share’ will be simply ‘left out’ rather than obfuscated in some way ( aside from my alias, which I freely admit is not my real name ).

I would estimate that with the information contained in this letter, I could be narrowed down to one [ 1 ] of maybe 30 to 50 people at best, so I feel reasonably secure.

Some Explanation for the Recent Sightings –

For many years I’ve occasionally considered the release of at least some of the material I possess, but the recent wave of photos and sightings has prompted me to cut to the chase and do so now.

I should first be clear that I’m not directly familiar with any of the crafts seen in the photos in their entirety. I’ve never seen them in a hangar or worked on them myself or seen aliens zipping around in them. However, I have worked with and seen many of the parts visible in these crafts, some of which can be seen in the Q3-85 Inventory Review scan found at the top of this page.

More importantly though, I’m very familiar with the ‘language’ on their [ craft(s) ] ‘undersides’ [ under bellies ] seen clearly in photos by Chad, Rajman, and – ‘another form’ – in the Big Basin photos.

One question I can answer – for sure – is why they are suddenly here.

These crafts have probably existed – in their current form – for decades, and I can say – for sure – that the technology behind [ abut ] them has existed for decades before that.

The ‘language’, in fact – I’ll explain shortly why I keep putting that in quotes – was the subject of ‘my work’ in years past. I’ll cover ‘that’ as well.

The reason they [ extraterrestrial craft(s) ] are suddenly ‘visible’, however is ‘another matter’ entirely.

These crafts – assuming they’re anything like the hardware I worked with in the 1980s ( assuming they’re better, in fact ) – are equipped with technology that enables invisibility. That ‘ability’ can be controlled both ‘on board’ the craft, and ‘remotely’.

However, what’s important in this case is that this ‘invisibility’ can also be ‘disrupted’ by ‘other technology’. Think of it like ‘radar jamming’.

I would bet my life savings ( since I know this has happened before ) that these craft are ‘becoming visible’ and then ‘returning to invisibility’ arbitrarily – probably unintentionally – and undoubtedly for only ‘short periods’ due to the ‘activity of a kind’ of ‘disrupting technology’ [ sonic flocculation ] being ‘set-off elsewhere’ but ‘near-by’.

I’m especially sure of this in the case of the Big Basin sightings where the witnesses themselves reported seeing the craft just ‘appear’ and ‘disappear’.

This is especially likely because of the way the witness described one [ 1 ] of the appearances being only a ‘momentary flicker’, which is consistent with the ‘unintentional’, ‘intermittent triggering’ of such a ‘device’.

It’s no surprise that these sightings are all taking place in ‘California’ ( USA ), and especially the Saratoga Bay / South Bay area.

Not far from Saratoga is Mountain View, California ( USA ) / Sunnyvale, California ( USA ) home to Moffett Field [ formerly, a United States Army Air Corps military airfield / United States Air Force Base ( USAFB ) ] and the [ National Aeronautic Space Administration ] NASA Ames Research center.

Again, I’d be willing to bet – just about anything – that the device capable of hijacking the cloaking of these nearby craft was inadvertently triggered, probably during some kind of experiment, at the exact moment they were being seen.

Miles away, in Big Basin, the witnesses were in the right place – at the right time – and saw the results of this disruption with their own eyes.

God knows what else was suddenly appearing in the skies at that moment, and who else may have seen it.

I’ve had some direct contact with this device, or at least a device capable of the same thing, and this kind of mistake is not unprecedented.

I am personally aware of at least one [ 1 ] other incident in which this kind of technology was accidentally set off, resulting in the sudden visibility of normally invisible things.

The only difference is that these days, cameras are alot more common!

The technology itself is ‘not’ ours, or at least it was ‘not in the 1980s.

Much like the technology, in these crafts themselves, the device capable of remotely hijacking vehicle clacking comes from a non-human source too.

Why we were given this technology has never been clear to me, but it’s responsible for a lot.

Our having access to this kind of device, along with our occasionally hap-hazard experimentation on them, has lead to everything from cloaking malfunctions like this to full-blown crashes.

I can assure you that most ( and in my opinion all) incidents of UFO crashes or that kind of thing had more to do with our meddling with extremely powerful technology at an inopportune time than it did mechanical failure on their part.

Trust me, those things don’t fail unless something even more powerful than them makes them fail ( intentionally or not ). Think of it like a stray bullet. You can be hit by one at any time, without warning, and even the shooter did ‘not’ intend to hit you.

I can assure you heads are rolling over this as well.

If anyone notices a brilliant but sloppy ‘physicist’ patrolling the streets of Baghdad [ Iraq ] in the next couple weeks, I’d be willing to guess how he got there. ( I kid – of course – as I certainly hope that has ‘not’ actually happened in this case ).

I would now like to explain how it is that I know this.

The CARET Program –

My story begins the same as it did for many of my co-workers, with graduate and post-graduate work at university in electrical engineering. And I had always been interested in computer science, which was a very new field at the time, and my interest piqued with my first exposure to a Tixo during grad school.

In the years following school I took a scenic route through the tech industry and worked for the kinds of companies you would expect, until I was offered a job at the United States Department of Defense [ DoD ] and things took a very different turn.

My time at the DoD [ United States Department of Defense ] was mostly uneventful but I was there for quite a while. I apparently proved myself to be reasonably intelligent and loyal.

By 1984 these qualities along with my technical background made me a likely candidate for a new program they were recruiting for called “CARET.”

Before I explain, what CARET was, I should back up a little.

By 1984, Silicon Valley had been a juggernaut of technology for decades. In the less than 40-years since the appearance of Shockley’s transistor, this part of the world had already produced a multi billion dollar computer industry and made technological strides that were unprecedented in other fields – from hypertext and online collaboration in 1968 to the Alto in 1973.

Private industry in Silicon Valley was responsible for some of the most incredible technological leaps in history and this fact did not go unnoticed by the US government and military.

I don’t claim to have any special knowledge about Roswell [ New Mexico, USA incident believed to be an extraterrestrial flying object ( UFO ) crash ] or any of the other alleged early UFO events, but I do know that whatever the exact origin, the ‘military’ was hard at work trying to understand and use the ‘extraterrestrial artifacts’ it had in its ‘possession’.

While there had been a great deal of progress overall, things were not moving as quickly as some would have liked.

So, in 1984, the CARET program was created with the aim of harnessing the abilities of private industry in silicon valley and applying it to the ongoing task of understanding extra-terrestrial technology.

One of the best examples of the power of the tech sector was XEROX PARC, a research center in Palo Alto, California [ USA ].

XPARC was responsible for some of the major milestones in the history of computing.

While I never had the privilege of working there [ XEROX PARC ( Palo Alto, California, USA ], myself, I ‘did’ know many of the people who ‘did’ and I can say that they were among the brightest engineers I ever knew.

XPARC served as one [ 1 ] of the models for the CARET program’s first incarnation, a facility called the PALO ALTO CARET LABORATORY ( PACL ) – lovingly pronounced, “packle” during my time there.

This [ Palo Alto CARET Laboratory ] was where [ Palo Alto, California, USA ] I worked, along with numerous other civilians, under the auspices of military brass who were eager to find out how the tech sector made so much progress so quickly.

My time at the DoD [ U.S. Department Of Defense ] was a major factor behind why I was chosen, and in fact about 30+ [ 30 or more ] others – who were hired around the same time – had also been at the Department [ U.S. Department Of Defense ] about as long but this was not the case for everyone.

A couple of my co-workers were plucked right from places like IBM [ INTERNATIONAL BUSINESS MACHINES ] and, at least two [ 2 ] of them came from XPARC [ XEROX PARC ( Palo Alto, California, USA ] itself.

My DoD [ U.S. Department Of Defense ] experience did make me more eligable [ eligible ] for positions of management, however, which is how I have so much of this material [ documents, photos, etc. ] in my possession to begin with.

So, in other words, civilians ( like myself ) who had – at most – some decent experience working for the DoD [ U.S. Department Of Defense ] but no actual military training or involvement were suddenly finding ourselves in the same room as highly classified extra-terrestrial technology.

Of course they spent about 2-months briefing us all before we saw or did anything, and did their best to convince us that if we ever leaked a single detail about what we were being told, they’d do everything short of digging up our ancestors and putting a few slugs in them too – just for good measure.

It seemed like there was an armed guard in every corner of every room.

I’d [ I had ] worked under some pretty hefty NDAs [ National Defense Administrations ] in my time but this was so far out of my depth. I didn’t think I was going to last 2-weeks in an environment like that. But amazingly things got off to a good start.

They wanted us, plain and simple, and our industry – had shown itself to be so good at what it did – that they were just about ready to give us carte blanche.

Of course, nothing with the military is ever that simple, and as is often the case they wanted to have their cake and eat it too. What I mean by this is that despite their interest in picking our brains and learning whatever they could from our way of doing things, they still wanted to do it ‘their way’ often enough to frustrate us. At this point I’m going to gloss over the emotional side of this experience, because this letter isn’t intended to be a memoir, but I will say that there’s almost no way to describe the impact this kind of revelation has on your mind.

There are very few moments in life in which your entire world view is turned forever upside down, but this was one of them.

I still remember that turning point – during the briefing – when I realized what he’d just told us, and that I hadn’t heard him wrong, and that it wasn’t some kind of joke.

In retrospect, the whole thing feels like it was in slow motion, from that ‘slight pause’ he took – just before the term “extra-terrestrial” came out for the first time – to the way the room itself seemed to go off kilter as we collectively tried to grasp what was being said.

My reflex kept jumping back and forth between trying to look at the speaker, to understand him better, and looking at everyone else around me, to make sure I wasn’t the only one that was hearing this.

At the risk of sounding melodramatic, it’s a lot like a child learning his parents are divorcing. I never experienced that myself, but a very close friend of mine did when were boys, and he confided in me a great deal about what the experience felt like. A lot of what he said would aptly describe what I was feeling in that room.

Here was a ‘trusted authority figure’ telling you something that you just don’t feel ready for, and putting a burden on your mind that you don’t necessarily want to carry. The moment that first word comes out, all you can think about it is, what it was like only ‘seconds ago’, and knowing that life is never going to be as simple as it was ‘then’.

After all that time at the DoD [ U.S. Department Of Defense ], I thought I at least had some idea of what was going on in the world, but I’d never heard so much as a peep about this.

Maybe one day I’ll write more on this aspect, because it’s the kind of thing I really would like to get off my chest, but for now I’ll digress.

Unlike traditional research in this area, we weren’t working on new toys for the air force.

For numerous reasons, the CARET people decided to aim its efforts at ‘commercial applications’ rather than ‘military’ ones.

They basically wanted us to turn these ‘artifacts’ into something they could ‘patent’ and ‘sell’.

One of CARET’s most ‘appealing promises’ was the revenue generated by these product-ready technologies, which could be funneled right back into ‘black projects’. Working with a ‘commercial application’ in-mind was also yet another way to keep us in a familiar mind state. Developing technology for the military is very different than doing so for the ‘commercial sector’, and not having to worry about the difference was another way that CARET was very much ‘like private industry’.

CARET shined, in the way it let us work the way we were used to working. They wanted to recreate as much of the environment we were used to as they could without compromising issues like security. That meant we got ‘free reign to set up’ our own ‘workflow’, ‘internal management structure’, ‘style manuals’, ‘documentation’, and the like. They wanted this to look and ‘feel like private industry’, ‘not the military’. They ‘knew’ this was ‘how to get the best work out of us’, and they were right.

But things didn’t go as smoothly when it came to matters like access to classified information.

They were exposing what is probably their single biggest secret to a group of people who had never even been through basic training and it was obvious that the gravity of this decision was never far from their minds.

We started the program with a small set of ‘extra-terrestrial artifacts’ along with ‘fairly elaborate briefings’ on ‘each’ as well as ‘access to a modest amount of what research had already been completed’.

It wasn’t long before we realized ‘we needed more’ though, and getting them to provide even the smallest amount of new material was like pulling teeth.

CARET stood for “Commercial Applications Research for Extra-Terrestrial Technology”, but we often joked that it should have stood for “Civilians Are Rarely Ever Trusted.”

PACL [ PALO ALTO CARET LABORATORY ] was located in Palo Alto [ California, USA ], but unlike XPARC [ XEROX XPARC ( Palo Alto, California, USA ], it wasn’t at the end of a long road in the middle of a big complex surrounded by rolling hills and trees.

PACL was hidden in an ‘office complex’ – owned entirely by the military but ‘made to look like an unassuming tech company’.

From the street, all you could see was what appeared to be a normal ‘parking lot’ with a ‘gate’ and a ‘guard [ security ] booth’, and a 1-story building inside with a ‘fictitious name’ and ‘[ fictitious ] logo’.

What was ‘not visible’ – from the street – was that ‘behind’ the very ‘first set of doors’ was enough ‘armed guards’ to invade Poland, plus five [ 5 ] additional underground stories [ levels ].

They wanted to be as close as possible to the kinds of people they were looking to hire, and be able to bring them in with a minimum of fuss.

Inside, we had everything we needed. State of the art hardware and a staff of over 200 computer scientists, electrical engineers, mechanical engineers, physicists and mathematicians.

Most of us were civilians, as I’ve said, but some were military, a few of them had been working on this technology already.

Of course, you were never far from the barrel of a ‘machine gun’ – even ‘inside the labs’ themselves ( something many of us never got used to ) – and ‘bi-weekly tours’ were made by ‘military brass’ to ensure that not a single detail was out of line. Most of us underwent extensive searches on our way into and out of the building. There it was, probably the biggest secret in the world, in a bunch of parts spread out on laboratory tables in the middle of Palo Alto so you can imagine their concern.

One ‘downside’ to CARET was that it was ‘not’ as ‘well-connected’ as ‘other operations’ undoubtedly ‘were’.

I ‘never got to see’ any ‘actual extra-terrestrials’ ( not even photos ), and in fact ‘never even saw’ one [ 1 ] of their ‘complete vehicles’ – ’99% of what I saw’ was ‘related to the work at-hand’, all of which was conducted within a very narrow context on ‘individual artifacts only’. The remaining ’1% came from people’ I met through the program, many of which ‘working more closely’ with “the good stuff” or ‘had [ worked with ] in the past’.

In fact, what was especially amusing about the whole affair was the way that our ‘military management’ almost ‘tried to act’ as if the ‘technology’ – we were essentially ‘reverse engineering’ – was ‘not extra-terrestrial’ at all.

Aside from the word “extra-terrestrial,” itself, we rarely heard any other terms like “alien” or “UFO” or “outer space” or anything. ‘Those aspects’ were ‘only mentioned briefly’ when absolutely ‘necessary to explain something’.

In many cases it was necessary to ‘differentiate’ between the different ‘races’ and ‘their’ respective ‘technology’, and they did ‘not’ even use the word “races.” They were referred to simply as different “sources.”

The Technology –

A lot of the technology we worked on was what you would expect, namely ‘anti-gravity’. Most of the ‘researchers’ ( on the staff ) – with ‘backgrounds’ in ‘propulsion’ and ‘rocketry’ – were ‘military’ men, but the ‘technology’ we were dealing with was so ‘out of this world’ that it didn’t really matter all that much what your background was because none of it applied.

All we could hope to do was use the ‘vocabulary’ of our respective fields as a way ‘to model’ the extremely bizarre ‘new concepts’ we were very slowly ‘beginning to understand’ as best we could.

A ‘rocket engineer’ doesn’t usually rub elbows much with a ‘computer scientist’, but inside PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ], we were all ‘equally mystified’ and were ready to ‘entertain any and all ideas’.

The ‘physicists’ made the most headway, initially because out of all of our skills, their’s ‘overlapped the most’ with the ‘concepts behind this technology’ ( although that isn’t saying much! ). Once they [ physicists ] got the ball rolling though, we began to find that many of the ‘concepts found in computer science’ were applicable as well, albeit in very vague ways.

While I didn’t do a lot of work with the antigrav [ anti-gravity ] ‘hardware’, myself, I was occasionally involved in the ‘assessment’ of ‘how’ that ‘technology’ was meant to ‘interface’ with its ‘user’.

The antigrav [ anti-gravity ] was amazing, of course, as were the ‘advances’ we were making with ‘materials engineering’ and so on.

But what interested me most then, and still amazes me most to this day, was something completely unrelated.

In fact, it was this ‘technology’ that immediately jumped out at me when I ‘saw’ the Chad and Rajman ‘photos’, and even more-so in the ‘Big Basin photos’.

The “Language” –

I put the word Language in quotes because calling what I am about to describe a “language” is a misnomer, although it is an easy mistake to make.

Their [ extraterrestrial ] ‘hardware’ was ‘not’ operated in quite the same way as ours.

In our technology, even today, we have a combination of ‘hardware and software’ running almost everything on the planet.

Software is more abstract than hardware, but ultimately it needs hardware to run it.

In other words, there’s no way to write a computer program on a piece of paper, set that piece of paper on a table or something, and expect it to actually do something.

The most powerful ‘code’ in the world still ‘does not actually do anything’ until a piece of ‘hardware interprets it [ software ]‘ and ‘translates’ its ‘commands’ into ‘actions’.

But ‘their [ extraterestrial ] technology’ is ‘different’.

It really did operate like the magical piece of paper sitting on a table, in a manner of speaking.

They had something akin to a ‘language’ that could quite literally ‘execute’ itself – at least in the ‘presence’ of a very specific type of ‘field’ [ ‘field presence execution’ ].

The ‘language’, a term I am still using very loosely, is a ‘system’ of ‘symbols’ ( which does admittedly very much resemble a written language ) along with ‘geometric forms’ and ‘[ geometric ] patterns’ that fit together [ ‘interlocking’ ] to ‘form diagrams’ that are themselves ‘functional’.

Once they [ interlocking symbolic format diagrams ] are ‘drawn’ – so to speak – on a suitable ‘surface’ made of a suitable ‘material’ and in the ‘presence’ of a certain type of ‘field’, they immediately begin performing the desired tasks. It really did seem like magic to us, even after we began to understand the principles behind it.

I worked with these ‘symbols’ – more than anything [ else ] – during my time at PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ], and ‘recognized them’ the moment I saw them in the ‘photos’.

They appear in a very simple ‘form’ on Chad’s ‘craft’, but appear in the ‘more complex diagram form’ on the ‘underside’ of the ‘Big Basin craft’ as well.

Both are unmistakable, even at the small size of the Big Basin photos.

An example of a diagram in the style of the Big Basin craft is included with this in a series of scanned pages from the [ mistitled ] “Linguistic Analysis Primer”.

We needed a copy of that diagram to be utterly precise, and it took about a [ one – 1 ] month [ 30-days ] for a team of six [ 6 ] to ‘copy’ that ‘diagram’ into our drafting program!

Explaining everything I learned about this technology would fill up several volumes, but I will do my best to explain at least ‘some’ of the ‘concepts’ – as long as I am taking the time to write all this down.

First of all, you wouldn’t open-up their [ extraterrestrial ] ‘hardware’ to find a CPU here, and a data bus there, and some kind of memory over there.

Their [ extraterrestrial ] ‘hardware’ appeared to be ‘perfectly solid’, and consistent, in terms of ‘material’ – from one side to the other. Like a rock or a hunk of metal.

But upon [ much ] closer inspection, we began to learn that it was actually one [ 1 ] big ‘holographic computational substrate’ – each “computational element” ( essentially, individual ‘particles’ ) can ‘function independently’ but are ‘designed to function together’ in tremendously ‘large clusters’.

I say its ‘holographic’ because you can ‘divide it up into the smallest chunks’ you want and still find a scaled-down but complete representation of the whole system.

They produce a ‘non-linear computational output’ when ‘grouped’.

So four [ 4 ] elements, working together, is actually more than four [ 4 ] times ‘more powerful than’ one [ 1 ].

Most of the internal “matter” in their [ extraterrestrial ] ‘crafts’, usually everything – except the outermost housing – is actually ‘this [ extraterestrial] substrate’ and can ‘contribute to computation’ at ‘any time’ and in ‘any state’.

The ‘shape’ of these [ extraterrestrial ] “chunks” of ‘substrate’ also had a profound ‘effect’ on its [ extraterrestrial ] ‘functionality’, and often served as a “shortcut” to achieve a goal that might ‘otherwise’ be more ‘complex’.

So back to the language.

The language is actually a “functional blueprint.”

The ‘forms’ of the ‘shapes’, ‘symbols’ and ‘arrangements’ thereof is itself ‘functional’.

What makes it all especially ‘difficult to grasp’ is that every ‘element’ of each “diagram” is ‘dependant on’ and ‘related to’ every ‘other element’ [ elements ], which means ‘no single detail’ can be ‘created’, ‘removed’ or ‘modified’ independently.

Humans like written language because each element of the language can be understood on its own, and from this, complex expressions can be built.

However, their “language” is entirely ‘context sensitive’, which means that ‘a given symbol’ could mean as little as a ’1-bit flag’ in ‘one [ 1 ] context’, or – quite literally – contain the entire human genome or a galaxy star map in another.

The ability for a single, small symbol to contain, not just represent, tremendous amounts of data is another counter-intuitive aspect of this ‘concept’.

We quickly realized that even ‘working in groups’ of ten [ 10 ] or more on the ‘simplest of diagrams’, we found it virtually impossible to get anything done. As each new feature was added, the ‘complexity of the diagram exponentially grew’ to unmanageable proportions.

For this reason we began to develop computer-based systems to manage these details and achieved some success, although again we found that a threshold was quickly reached beyond which even the supercomputers of the day were unable to keep up.

Word was that the ‘extraterrestrials could design’ these ‘diagrams’ as ‘quickly’, and [ as ] easily as a human programmer could write a [ computer language ] Fortran program.

It’s humbling to think that even a ‘network of supercomputers’ was ‘not’ able to ‘duplicate’ what they could do in their [ extraterrestrial ] own heads.

Our entire system of language is based on the idea of assigning meaning to symbols.

Their [ extraterrestrial ] technology, however, somehow ‘merges’ the ‘symbol’ and the ‘meaning’, so a subjective audience is not needed.

You can put whatever meaning you want on the symbols, but their behavior and functionality will not change, any more than a transistor will function differently if you give it another name.

Here’s an example of how complex the process is.

Imagine I ask you to incrementally add random words to a list such that no two [ 2 ] words use any of the same letters, and you must perform this exercise entirely in your head, so you can’t rely on a computer or even a pen and paper.

If the first [ 1st ] in the list was, say, “fox”, the second [ 2nd ] item excludes all words with the letters F, O and X.

If the next word you choose is “tree”, then the third [ 3rd ] word in the list can’t have the letters F, O, X, T, R, or E in it.

As you can imagine, coming up with even a third [ 3rd ] word might start to get just a bit tricky, especially since you can’t easily visualize the excluded letters by writing down the words.

By the time you get to the fourth [ 4th ], fifth [ 5th ] and sixth [ 6th ] words, the problem has spiraled out of control.

Now imagine trying to add the billionth [ 1,000,000,000 ] word to the list ( imagine also that we’re working with an ‘infinite alphabet’ so you don’t run out of letters ) and you can imagine how difficult it is for even a computer to keep up.

Needless to say, writing this kind of thing “by hand” is orders of magnitude beyond the capabilities of the brain.

My background lent itself well to this kind of work though. I’d spent years ‘writing code’ and ‘designing’ both ‘analog’ and ‘digital’ circuits, a process that at least visually resembled these diagrams in some way.

I also had a personal affinity for ‘combinatorics’, which served me well as I helped with the ‘design of software’ running on ‘supercomputers’ that could juggle the often trillions [ 1,000,000,000,000 ] of rules necessary to create a ‘valid diagram’ of any ‘reasonable complexity’.

This overlapped quite a bit with ‘compiler theory’ as well, a subject I always found fascinating, and in particular ‘compiler optimization’, a field that was ‘not’ half [ 50% ] of what it is today back then.

A running joke among the linguistics team was that Big-O notation couldn’t adequately describe the scale of the task, so we’d substitute other words for “big”.

By the time I left I remember the consensus was “Astronomical-O” finally did it justice.

Like I said, I could go on for hours about this subject, and would love to write at least an introductory book on the subject if it was not – still completely – ‘classified’, but that’s not the point of this letter so I’ll try to get back on track.

The last thing I’d like to discuss is how I got copies of this material, what else I have in my possession, and what I plan to do with it in the future.

My Collection –

I worked at PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] from 1984 to 1987, by which time I was utterly burned out.

The sheer volume of details to keep in mind while working with the diagrams was enough to challenge anyone’s sanity, and I was really at the end of my rope with the military attitude towards our “need to know”. Our ability to get work done was constantly hampered by their reluctance to provide us with the necessary information, and I was tired of bureaucracy getting in the way of research and development [ R&D ].

I left somewhere in the middle of a 3-month bell curve in which about a quarter of the entire PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] staff left for similar reasons.

I was also starting to disagree with the direction the leadership wanted to take as far as the subject of extra-terrestrials went.

I always felt that at least some form of disclosure would be beneficial, but as a lowly CARET ‘engineer’ I wasn’t exactly in the position to call shots.

The truth is, our management didn’t even want us discussing – even among ourselves – non-technical aspects of this subject ( such as ethical or philosophical issues, as they felt it was enough of a breach of security to let civilians like us anywhere near this kind of thing in the first place.

So, about 3-months before I resigned ( which was about 8-months before I was really out – since you don’t just walk out of a job like that with a 2-week notice ) – I decided to start taking advantage [ remove PACL work documents, etc. ] of my ‘position’ [ a ‘situational position’ wherein his ( Issac ) PACL ‘security inspections’ on his ( Issac ) ‘person’ became lessened or ‘weak’ upon his ( Issac ) ‘departures from the PACL facility’ ].

As I mentioned earlier, my DoD [ United States Department Of Defense ] experience got me into an internal management role sooner than some of my colleagues, and after about a [ one – 1 ] year of that kind of status, the outgoing [ departing ] searches [ security inspections ] each night became slightly less rigorous.

Normally, we were to empty out any containers, bags or briefcases, then remove our shirt and shoes and submit to a kind of frisking. Work was never allowed to go home with you, no matter who you were.

For me, though, the briefcase search [ secuity inspection ] was [ had become ] eventually enough [ all that the security inspection became on him ( Issac ) ].

Even before I [ Issac ] actually decided to do it [ remove PACL work documents, etc. ], I was sure that I would be able to sneak certain materials out with me.

I wanted to do this [ remove PACL work documents, photos, etc. ] because I knew the day would come when I would want to write something like this, and I knew I’d regret it until the day I died if I didn’t at least leave the possibility open to do so.

So I started photocopying [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] documents and reports by the dozen.

I had then [ 3-months before he ( Issac ) resigned from PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] put the papers [ documents, etc. ] under my shirt around my lower back, tucked enough into my belt to ensure they wouldn’t fall out.

I could do this [ ‘physically able to do’ but ‘not authorized to do’ ] in any one of a few ‘short windowless hallways’ on some of the ‘lower floors’, which were among the few places that did ‘not’ have an ‘armed guard watching’ my every move.

I would walk in one end [ of the ‘short windowless hallways’ ] with a stack of papers large enough that when I came out the other end [ of the ‘short windowless hallways’ ] with some of them [ documents, photos, etc. ] in my shirt – there would ‘not’ be a visible [ observational ] difference in what I was holding.

You absolutely cannot be too careful if you’re going to pull a stunt like this.

As long as I walked carefully they would ‘not’ make a crinkling noise [ paper flex rustling upon movement ].

In fact, the more papers I took, the less noise they made, since they were ‘not’ as flimsy [ resistant to flex upon restricted movement ] that way.

I’d often take upwards of 10-pages up to 20-pages at once [ each time ].

By the time I was done, I had made out with [ unlawfully removed documents, photos, etc. away from PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ‘hundreds’ [ 200+ or more ] of ‘photocopies’, as well as a few ‘originals’ and a ‘large collection’ of ‘original photographs’.

With this ‘initial letter’, I have attached high resolution scans of the following:

– One [ 1 ] page is from a [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] “inventory review” with a ‘photo’ – appears to depict one ( 1 ) of the ‘parts’ found in the Rajman sighting and ‘parts’ very similar to the Big Basin craft;

– The first [ 1st ] nine ( 9 ) pages of one ( 1 ) of our [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ‘quarterly’ research ‘reports’;

– Scans of the ‘original photographs’ used ‘in that report’ – since the ‘photocopies obscure’ most of the ‘details’; and

– Five [ 5 ] pages from a ‘report’ on our [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] ongoing analysis of the “language” ( inappropriately titled “linguistic analysis” ) depicting the kind of diagram – just barely visible on the underside of the Big Basin craft.

This material is the most, ‘relevant’ and ‘explanatory’, I could find on ‘short notice’.

Now that these are up [ on the internet ], ‘if’ I decide to release more in the future, I’ll be able to take my time and better search this rather large collection of mine that I’ve sadly never organized.

I’m not sure what I’ll be doing with the rest of the collection in the future.

I suppose I’ll wait and see how this all plays out, and then play it by ear.

There are certainly risks involved in what I’m doing, and if I were to actually be identified and caught, there could be rather serious consequences.

However, I’ve taken the proper steps to ensure a ‘reasonable level of anonymity’ and am quite secure in the fact that the information I’ve so far provided is by ‘no means unique’ among many of the CARET participants [ had access to ].

Besides, part of me has always suspected that the [ United States of America ] government ‘relies on the occasional leak’ – like this – and actually wants them to happen, because it ‘contributes to a steady slow-paced path towards revealing’ the ‘truth’ of this ‘matter’.

Since Leaving CARET –

Like I said, I left PACL in 1987, but have kept in touch with a great many of my friends and co-workers from those days.

Most of us are retired by now, except – of course – for those of us that went-on to get ‘teaching jobs’, but a few of us ‘still hear things’ [ ‘still told of these matters’ ] through the grapevine.

As for CARET itself, I’m not sure what’s become of it.

Whether it’s still known by the same name, I’m quite sure it’s ‘still active’ in ‘some capacity’, although who knows where.

I heard from a number of people that PACL [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] closed up shop a few years after I left, but I’ve still yet to get a clear answer on why exactly that happened.

But I’m sure ‘the kind of work we did there’ [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] is ‘still going’ strong.

I’ve heard from a lot of friends that there are multiple sites like PACL in Sunnyvale, California ( USA ) and Mountain View, California ( USA ) also disguised to look like ‘unremarkable office space’.

But this is all second-hand information so you can make of it what you will.

Around 2002, or so, I came across Coast to Coast AM [ radio station in the United States of America ] and have been hooked ever since.

I admit, I don’t take most of the [ radio program ] show’s content as anything more than entertainment, but there have been occasions when I could be sure a guest was clearly speaking from experience or a well-informed source.

For me, there’s just something very ‘surreal about hearing all this speculation’ and ‘so-called inside information’ about UFOs [ Unidentified Flying Objects ] ( and the like ) but [ my ( Issac ) ] being ‘personally able to verify’ at least ‘some of it’ as being true or false. It’s [ Coast to Coast AM radio program ( USA ) ] also a ‘nightly’ [ time period, when Coast to Coast AM radio is broadcasted ] reminder of how hectic things were in those days, which helps me enjoy my retirement all the more.

Knowing I’m not part of that crazy world anymore really is something I enjoy on a daily basis, as much as I miss some of it.

Conclusion –

What I’ve shared so far is only a very small portion of what I have, and what I know.

Despite the very sheltered and insulated atmosphere within CARET, I did ultimately learn a great deal from various colleagues, and some of what I learned is truly incredible.

I’d also like to say that for what it’s worth, during my time [ 1983 – 1987 ] there [ PALO ALTO CARET LABORATORY ( Palo Alto, California, USA ) ] I never heard anything about invasions, or abductions, or many of the more frightening topics that often pop up on Coast to Coast AM [ radio program ( USA ) ].

That’s not to say that none of it is true, but in my time working alongside some of the most well-connected people in this field, it never came up.

So at the very least I can say my intent is not to scare anyone.

My view on the extra-terrestrial situation is very much a positive, albiet still highly secretive one.

One thing I can definitely say is that if they wanted us gone, we would have been gone a very, very long time ago, and we wouldn’t even have seen it coming.

Throw out your ideas about a space war or anything silly like that. We’d be capable of fighting back against them about as much as ants could fight back against a stampede of buffalo.

But that’s okay, we are the ‘primitive race’, they [ extraterrestrials ] are the ‘advanced races’, and that’s just the way it is.

The ‘other advanced races let them live through their primitive years’ back in ‘their day’, and there is no reason to think it will be any different for us.

They [ extraterrestrials ] are not in the market for a new planet, and even if they [ extraterrestrials ] were there are way too many planets out there for them [ extraterrestrials ] to care about ours enough to take it by force.

To reiterate my take on the recent sightings, I would guess that experimentation – done in the last couple months – on a device that, among other things, is capable of interfering with various crafts onboard invisibility has resulted in a sudden wave of sightings.

It may ‘not’ explain ‘all’ of the recent events, but like I said, I’d bet my life that ‘is’ exactly what happened at Big Basin – at least – and it’s probably related in some way to the Chad, Rajman and Tahoe [ Lake Tahoe, California / Nevada ( USA ) ] sightings [ of the unidentified flying object ( UFO ) ].

So, despite all the recent fanfare over this, I’d say this does ‘not’ mean much.

Most importantly, they are ‘not suddenly’ “here,” they [ extraterrestrials ] have been here for a long time, but just [ have ] happened to turn ‘intentionally visible’ for brief periods ‘recently’.

Lastly, there are so many people selling books, and DVDs, and doing lectures and all that so, I would like to reiterate the fact that I am ‘not’ here to ‘sell’ anything.

The material I’m sharing is ‘free to distribute’ provided it’s all kept intact and unmodified, and this letter is included.

I tend to question the motives of anyone charging money for their information, and will assure you that I [ Issac ] will never do such a thing.

And in the future, just to cover all the bases, anyone claiming to be ‘me’ [ Issac ] who ‘is’ selling a DVD or book is most certainly ‘not going to be me’ [ Issac ].

Any future releases from me [ Issac ] will come from the e-mail address I’ve used to contact Coast to Coast AM [ USA radio station ], and will be sent to them [ Coast to Coast AM ( USA radio station ) ] only.

I’d like to make this clear as well to ensure that people can be sure that any future information comes from the same source, although I must be clear:

At this time I do not have any future plans for additional information. Time will tell how long I will maintain this policy, but do not expect anything soon.

I’d really like to let this information “settle” for a while and see how it goes.

If I find out I’m getting an IRS [ United States Department of the Treasury, Office of Internal Revenue Service ( IRS ) ] audit tomorrow, then maybe this wasn’t too smart.

Until then, I’m going to take it slow.

I hope this information has been helpful.

– Issac

– –

One of the documents ( in the form of high resolution scans of the original ) uploaded was called “PALO ALTO CARET LABORATORY Q-4 1986 RESEARCH REPORT” – here are some excerpts:

1. OVERVIEW –

This document is intended as a primer for the tentative findings of the Q4 1986 research phase ( referred to herein as “Q-4 1986″ ) at the Palo Alto CARET Laboratory (aka) PACL. In accordance with the CARET program mission statement, the goal of this research has been achieving a greater understanding of extraterrestrial technology within the context of commercial applications and civilian use. Examples of such applications, in no particular order, include transportation, medicine, construction, energy, computing and communication.

The ultimate goal of this research is to provide a core set of advanced technologies in a condition suitable for patent review.

2. EXTRACTION –

The process of converting raw artifacts of extraterrestrial origin to usable, fully-documented human technology is termed extraction. The extraction process ultimately consists of two phases:

First [ 1st ] is the establishment of a complete theoretical and operational understanding of the artifact; and,

Second [ 2nd ] is a distillation of the artifact’s underlying principles into usable, product-oriented technology.

Suggestions of specific product applications on behalf of PACL have been encouraged, but are not considered mandatory or essential.

– –

From: Isaac Subject: Re: “Drones” Date: June 27, 2007

Isaac:

“There are a few misconceptions that I have noticed so far and would like to clear them up, and will also answer your questions:

1) I realize now that I did not make this clear, but I should clarify that I am not responsible for the blacking out of the Q4-86 report. Most of the copies I was able to make came from documents that were already archived, which meant that they had already been censored for use by outside parties that needed access to some, but not all, of CARET’s information. I’m trying to share this information, not hide it, but if I did feel that if a given topic was too sensitive for some reason, I would make it clear that I had personally covered it up and probably try to give a reason why.

2) I do not understand the question about why the diagram would be “formatted for 8.5 x 11″… As I mention in my letter, the diagram is a reproduction, not the original. We had a team of technical artists painstakingly copy the diagram from its original source, which was a slightly curved panel not unlike the one seen in the Big Basin craft, although this one was apparently inside the craft, not on the outside. We copied it into a drafting program over the course of about a month.

Our software was understandably primitive by today’s standards, but it was still orders of magnitude more powerful than a pencil and paper would have been. This made a task that would have otherwise been nearly impossible relatively feasible, albeit extremely time-consuming. I can assure you, “they” did not make anything particularly convenient for us. One of the reasons we chose to reproduce that particular diagram was because out of all the diagram-artifacts we had access to, it was on the flattest surface.

Since the geometry of the forms is extremely important, curvature of the surface it’s printed on must be “corrected” if it is to be reproduced in a surface with a different contour (such as a flat page). This can be done in a number of ways, by either using a mathematical model to reverse the effect of the surface curves on the diagram’s shapes, or by methods of physical measuring that allow precise measuring of irregular surfaces. In either case, however, it adds a significant new dimension of labor to an already extremely labor-intensive task, so it’s avoided whenever possible. We really just needed one or two accurately copied diagrams to serve as convenient examples for our own work in decoding and reproducing it, so luckily this was not something we had to do often. Some experimentation was being done on ways to “scan” the diagrams as well, using an almost completely automated process that could automatically account for curved surfaces, but during my time there, very little progress was made on this front.

3) I think the confusion over the quality of the documents stems from the fact that he (critic) is under the impression they (CARET document) were typeset. They were not. First of all, I’m no guru when it comes to graphics or design, but being in close contact with numerous people from places like XPARC will give you enough background to know the lay of the land. What’s first important to note is that systems capable of desktop publishing had been in development for many years before CARET, mostly starting with the Xerox Alto (in 1973), which XPARC developed themselves.

In fact, I once remember hearing from someone related to the original Alto team that Boeing (I believe) used the Alto to lay out and print the documentation for one of their planes (or something to that effect, I heard the story years ago). The joke was apparently that there was so MUCH documentation that the plane itself could essentially be filled with the pages. Furthermore, laser printing itself had also been around for many years (albeit in an extremely expensive form), and was also developed within XPARC (more or less). Other systems, such as PERQ and Lilith, also came out around the late 70′s and while none of them turned into major commercial products, they were not uncommon among large companies and [mostly] universities and were put to very productive use.

These systems were also the inspiration for the Apple Lisa and Macintosh, which was of course perhaps the biggest factor in the consumer-level desktop publishing boom of the late 80′s and early 90′s. By 1984, there were quite a few options available for producing these kinds of documents, they were just ABSURDLY expensive, so they weren’t on every street corner. Obviously it was nowhere near as turnkey and simple as it is today, but it was a very crude approximation of the same process with similar tools. We just had far less features and everything was a hell of a lot slower. But the point I’m trying to make is that while our method of documentation was somewhat advanced for its time, and also somewhat uncommon, it was hardly unattainable by a sufficiently motivated, financed, and well-connected organization.

I had very little contact with the technical writers for the most part, but I do know that we were using this kind of technology for both page layout and printing. CARET was expected to produce a massive amount of detailed, well-formatted documentation that could be easily modified and re-used for numerous drafts and revisions, and we would not have been able to keep up using traditional page layout and typesetting techniques. The mid-1980′s were a very transitional period for these fields, and I would suggest that people do not assume we were using run-of-the-mill standards.

One of the things I appreciated most about CARET was that if the technology was available, and we needed it to work better or more effectively, it was given to us with little debate. But typesetting and digital page layout are apples and oranges, so I think most of this is a moot point anyway.

The bottom line is that many people both inside and outside the engineering world frequently underestimate how long we’ve had a lot of the technology we have. 99% of the algorithms we use today were developed decades ago, they just didn’t have the same practical applications immediately available. Most of the engineers of the 60′s and 70′s would have been right at home with today’s developments and technologies. The only difference is that things have gotten smaller and faster. In the vast majority of technologies, that is the only thing that REALLY changes from one era to the next. If I told the average person that we had speech-synthesizing technology in 1936, they probably wouldn’t believe me.

I could show you a prototype of a simple drafting/design system that was operated by a light pen directly on a screen from the 1960′s. You could draw a shape freehand, then immediately rotate it, modify it, duplicate it, or whatever. You could draw lines connecting different objects, then erase them by simply drawing a squiggly line over it. The computer could interpret the squiggles as a sign to erase something, all in real time. And this was half a century ago, and decades before CARET. Think about that for a moment. The point is, most of what we have today is much older than we think. The only differences are that it’s faster, cheaper, and a marketing team has given it a glossy finish and found a commercial application for it. But if you take away some of the speed, power, ubiquity and consumer appeal, you’ll find a lot of today’s technology scattered throughout much of the 20th century. I hope this is helpful.

Isaac”

– –

From: Isaac Subject: Re: “Drones” Date: June 27, 2007

Isaac:

“1) While I wasn’t a major player in the (CARET) organization, I was hardly ‘some worker.’ My middle-management position is the only reason I was able to make out with what I did. Bear in mind that even someone in my position would never get the chance to leave with even the smallest of actual artifacts, but paperwork smuggling was feasible for anyone who wasn’t subjected to the frisking.

Also, let’s not forget that paperwork only proves so much. I’ll be the first to agree that everything I’ve provided could be faked, I suppose. It is, after all, just a series of images. While the powers that be obviously don’t want this material leaking if they can help it, they’re certainly aware that scans of documents aren’t in the same league as UFOs landing on the White House lawn. I’m not the first person to leak a document or a photo, and I won’t be the last. The information I’ve shared is very unlikely to change the world, and this is the reason I’m not worried about being literally murdered if I’m identified. I’ll face consequences to be sure, but it’s not the kind of thing they kill for.

2) Of course the manual doesn’t look anything like typical government and military documents. The entire purpose of CARET was to recreate the look and feel of silicon valley private enterprise, populate it with private industry engineers, and let it tackle the problem of extraterrestrial technology research. Style manuals were among the numerous things we brought with us from the ‘outside world.’ I’m not sure what else can be said about this. I agree it’s uncommon for non-standard documents to come out of this kind of research, but it’s even more uncommon for people like myself (and even more so for many of my co-workers) to be brought into this kind of project in the first place. Most of us were decidedly not military men. I find it a lot more bizarre than the fact that we were able to design our reports a certain way. CARET was an exception to many of the usual rules.

3) If he (one of many critics who emailed Earthfiles and which I shared with Isaac) believes the pictures are fake, I certainly can’t do or say anything to prove otherwise. He sounds very sure of himself.

4) Most importantly, be very wary of anyone who claims to ‘know the mind’ of extraterrestrials. The comments he’s made are, to put it lightly, naive and extremely presumptuous. Firstly, he’s referring to ‘the aliens’ as if there is a single collective group of them. The universe is not split into ‘humans’ and ‘non-humans,’ any more than Earth is split up into ‘Spanish’ and ‘non-Spanish’ or something equally arbitrary. There are numerous races – and again, like our own races of humans here on earth, they do things in very different ways.

His comment that ‘the aliens don’t do this or that’ is akin to saying ‘humans don’t speak Japanese.’ Well, many humans don’t, but Japanese humans certainly do. The point is not that his statement is right or wrong, but simply that it’s phrased illogically. He then goes on to suggest that the design of the drones is wasting space, which is again, alarming in its arrogance. We had some of the brightest minds in the world spending years just to understand a single facet of their technology, while this individual claims to be able to assess basically every detail of a given design after looking at a single photo and conclude that it’s inefficient. I’m not even sure such a statement should be dignified with a response, and I’m sure you can understand why.

To be honest, whoever this person is, I wrote him off as soon as he said ‘the aliens would never design as these pictures depict.’ That’s about as presumptuous (if not ignorant) as a statement on this subject can be, at least coming from a fellow human. Unless there’s an alien engineer on the other side of this email, there’s simply no way such statements could have merit. I’m really only writing this as a courtesy to you.

At best, he’s been exposed to technology from a radically different race, and at worst, he doesn’t know what he’s talking about. This individual may have access to real information, and he might not. If he is a fellow ‘whistle blower,’ then I’m not interested in attacking him. If he’s not, and is simply making things up, then I’m even less interested. Whatever he is or isn’t is not for me to say, but judging by the way he talks about this issue I have my doubts.

It’s a big world and these are complicated issues. A sense of humility and the admission we don’t know everything is one of our greatest assets.

Isaac”

====

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Quantum Crypto Keys

Quantum Cryptographic Control screen QCrypt QKey

[ IMAGE ( above ): Quantum Cryptographic Control QCrypt QKey Display Screen. Click on image to enlarge. ]

Quantum Crypto Keys
by, Concept Activity Research Vault ( CARV )

November 19, 2011 11:34:08 ( PST ) Update ( Published: November 4, 2010 )

USA, Virginia, Tysons Corner – November 19, 2011 – What business continually builds its inventory, no matter what happens anywhere in the world, and never stops building it?

While some may fear big brother, others are financially profiting from carefully researching otherwise unknown private sector business investment portfolios strategically partnered with government intelligence agencies.

Quantum Cryptography –

Expect quantum cryptography to become known in the future as the first practical application for “Quantum Communications.”

Quantum cryptography is a form of cryptography exploiting quantum theory, in-particular with uncertainty principle stating it is impossible to measure all aspects of an object with absolute certainty.

Background –

Im 1984, Charles H. Bennett ( fellow at IBM THOMAS J. WATSON RESEARCH CENTER ) and Gilles Brassard ( researcher at the University of Montreal, Canada ) first devised quantum cryptography as part of their study of relationships between physics and information.

They were not searching for a new cryptographic method but applying basic principles of quantum mechanics to real world uses and discovered quantum mechanics ideally suited for cryptography because of photons one-wayness. [49.]

In 1989, Charles H. Bennett and IBM colleagues built the first working quantum cryptographic prototypes sending photons a distance of 30 centimeters through the air of a laboratory.

Many authorities predicted at least 25-years would pass before any form of quantum cryptography would have practical utility, however at least three ( 3 ) manufacturers now have ‘quantum cryptography products on the market’ and developing more technology such as ‘range’ plus more in the future.

Some of the latest cryptologic technologies are still subject to continuing scientific investigation or are already in research and development stages, although early commercial products exist where standards are under development for some new technologies.

In the increasingly competitive Information Age – where the Internet spreads knowledge rapidly – protecting U.S. next-generation weapon systems, empirical SE&I, M&S applications, and intellectual property sees technical data became critical.

Cryptologic scientific investigations and developing technologies are closely related to those in the area of information technology ( IT ) because information security modules, components, and systems must be tightly integrated with – if not an integral component or module of – basic information processing hardware and software architecture where many applications now incorporate high-performance features and metaprocessing techniques shortening cryptanalytic time required for an exhaustive key search.

– –

Zero-Knowledge Proofs ( ZNP ) –

Zero-knowledge proofs ( ZNP ) are methods for proving knowledge of a secret without revealing any information about the secret.

Technology Parameter(s)

1. Prove knowledge of a secret without revealing any knowledge of the secret; 92

2. Prove identification;

3. Provide verification;

4. Reproducible results that significantly enhance or degrade current U.S. military zero-knowledge proof schemes; and,

5. Significantly enhance or degraded existing cryptographic capabilities for U.S. government ( USG ) Class A and Class B cryptographic systems.

Critical Materials: None identified.

Unique Test, Production, Inspection Equipment: None identified.

Unique Software

ZNP models.

Major Commercial Applications –

ZNP characteristic of anonymity is an important part of some concepts for e-commerce transactions.

For example, proof of certain generic authority or credit ‘credentials’ might be provided for e-commerce without revealing identity by using ZNP systems.

E-commerce transactions that protect privacy.

Like all requirements for security on the Internet, the threats from independent hackers and from nation states, rogue states, terrorists, and international criminals drive this technology.

Affordability Issues: Not an issue at this time.

Background –

ZNP allows a prover to demonstrate knowledge ( of a secret ) while revealing no information ( whatsoever of use to the verifier ) in conveying this demonstration of knowledge beyond what the verifier was able to deduce before the protocol run.

Only a single bit of information has to be conveyed, namely:

That the prover actually does know the secret.

ZNP protocols provide trusted authentication mechanisms and anonymity.

For example, one could prove U.S. citizenship without providing any other specific information such as name, address, sex, or exact age.

A protocol that is a proof of knowledge has the zero-knowledge property if it can be simulated in the following sense:

There exists an expected polynomial-time algorithm ( simulator ) which can produce – upon input of the assertion(s) to be proven but without interacting with the real prover – transcripts indistinguishable from those resulting from interaction with the real prover.

The zero-knowledge property implies that a prover – executing the protocol, even when interacting with a malicious verifier – does not release any information about its ( prover’s ) secret knowledge other than the particular assertion itself is true, not otherwise computable in polynomial time from public information alone.

Thus, participation does not increase the chances of subsequent impersonation.

A protocol is computationally zero-knowledge if an observer – restricted to probabilistic polynomial time tests – cannot distinguish real from simulated transcripts.

For perfect zero-knowledge, the probability distributions ( of the transcripts ) must be identical.

Zero-knowledge means computational zero-knowledge, when not qualified by further convention.

In the case of computational zero-knowledge, real and simulated transcripts are said to be polynomially indistinguishable ( indistinguishable using polynomial-time algorithms ).

Any information extracted by a verifier – through interaction with a prover – provides no advantage to the verifier within polynomial time.

Interesting work has been done in statistical zero-knowledge work performed by Jan Camenisch and Markus Michels exemplifying ‘statistical zero-knowledge protocols to prove statements’ saw these three ( 3 ) protocols:

– A committed number is a prime;

– A committed ( or revealed ) number is the product of two ( 2 ) safe primes, i.e. primes p and q such that (p-1)/2 and (q-1)/2 are prime; and,

– A given integer has large multiplicative order modulo, a composite number consisting of two ( 2 ) safe prime factors.

Main building blocks of aforementioned protocols are statistical zero-knowledge proofs of knowledge that are of independent interest where there has been proof of the correct computation of a modular addition, a modular multiplication, and a modular exponentiation whereby all values – including the modulus – are committed-to but not publicly known. Apart from the validity of the equations, no other information about the modulus ( e.g., a generator whose order equals the modulus ) or any other operand is exposed.

These techniques can be generalized to prove that any multi-variate modular polynomial equation is satisfied where only commitments to the variables of the polynomial – and to the modulus – need be known. Thus improving previous results where the modulus is publicly known.

– –

Digital Data Steganography –

Steganography is that branch of cryptology that attempts to obscure the existence of data through the use of subliminal channels.

Cleartext or encrypted information can be randomly embedded in the quantization noise of ‘digital images’ or other ‘imprecise digital data files, without noticeably increasing the size of the host file.

Background –

Image steganography can be used to conceal an encrypted message.

Technique by ‘combining image steganography and encryption or multiple-encryption could present a challenge to National Security and law enforcement agency cryptanalysts whereby ‘even if a message were known to exist in an electronic image’, the ‘message bits’ would have to be ‘identified’ and ‘isolated’ in cryptanalysis processing that could make ‘plain text recovery incredibly time consuming’ – if not ‘impracticable’. Steganography, in various forms, are ‘not strictly digital image steganography’.

Banks make use of a code-word execution technique when they need to send highly secure “action” messages to execute preplanned actions. Predetermined and mutually agreed actions are then set in motion, with instructions implicit in one short phrase embedded in routine banking message traffic.

Key critical to profiting from private intelligence investments in private sector arenas is to aquire even better predictives than what intelligence agencies currently understand future necessities will be.

Predictives, in brief formats presented to government directorates, are typically derived from a broad ‘studies and analysis collective’.

Predictives are rarely derived from only one ( 1 ) individual – save for leadership occassional fortune tellers – because few fluidly exercise simultaneous abilities quickly, i.e. identifying target specific information, limitedly broadening core targets outward to key multiple arenas requiring in-depth research and then analyzing all combinatorically with trend based progressive direction. Finding someone who can do all this, albeit step-by-step, could possibly benefit some leadership while even wiser leadership might add ‘socio-economic analysis’ in that mix to more effectively buffet any social unrest outcomes.

While considering one ( 1 ) individual doing it all, the word ‘impossible’ may initially come to mind, however that may not necessarily be true. Even ‘without mind reading’ or Mensa abilities, one ( 1 ) key to sucessfully profiting from investing in private sector businesses – tied to emerging government intelligence agency venture capital investments – may only require special skill sets in researching and analyzing what already slipped past intelligence information technology ( IT ) software protocols or think-tank collectives that would have otherwise already hammered-out an intelligence business investment shelf-ready decision awaiting a key trigger for implementation.

The first and easiest task to perform is becoming knowledgeable in historical intelligence business investments and where new knowledge will precisely profit in the not too distant future – thereby beating lumbering bears, busy bees and pesky flies – to ‘their honey’.

Profiting from those inept is not unlawful – at least not ‘yet’ – and so long as the insatiable sweet tooth of bears and bees can have the ‘majority of their honey’ they ‘might not mind sharing a little new honey’ shown them. Then again, ‘maybe not’.

For some, what is involved may only be tantamount to collecting a finder’s fee for doing some treasure hunting, however one must know how and where to look for some ‘old technology’ lost in yesterday’s bureaucratic confusion.

To place a bet, on a private business or the stock market, one needs to research more carefully than others – never underestimating machine-to-machine communications ( M2M ) either.

The following initial report ( below ) is only but a related research exercise that may prepare financial freedom futures.

– – – –

Circa: 2002 – 2008

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION 2500 Sand Hill Road – Suite 113 Menlo Park, California 94025 – 7061 USA TEL: +1 (650) 234-8999 TEL: +1 (650) 234-8983 FAX: +1 (650) 234-8997 WWW: http://www.inqtel.com WWW: http://www.in-q-tel.org WWW: http://www.in-q-tel.com

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION P.O. Box 12407 Arlington, Virginia 22219 USA TEL: +1 (703) 248-3000 FAX: +1 (703) 248-3001

– –

IN-Q-TEL focus areas, surround:

– Physical Technologies; – Biological Technologies; – Security; and, – Software Infrastructure.

– –

IN-Q-TEL

Investments –

Strategic Investments, Targeted Returns

In-Q-Tel is ‘building’ a ‘portfolio of companies’ that are ‘developing innovative solutions’ in ‘key technology areas’

Similar to many ‘corporate strategic venture’ firms, In-Q-Tel seeks to ‘optimize potential returns’ for our clients — the CIA and the broader Intelligence Community— by investing in companies of strategic interest.

In-Q-Tel engages ‘start-ups’, ‘emerging’ and ‘established’ companies, universities and research labs.

In-Q-Tel structure attractive win-win relationships through ‘equity investments’, as well ‘strategic product development funding’, and ‘innovative intellectual property arrangements’ and ‘government business development guidance’.

An Enterprising Partner –

In-Q-Tel ‘portfolio companies’ value a ‘strategic relationship’ with a ‘proactive partner’.

Companies, that work through In-Q-Tel due diligence process, know their technologies have the potential to address the needs of one of the most discriminating enterprise customers in the world.

In-Q-Tel takes a hands-on approach, working closely with our ‘portfolio companies’ to help ‘drive their success’ in the ‘marketplace’ and to ‘mature [ ‘grow’ ] their technologies’.

In-Q-Tel ‘investment goals’ are focused on ‘return’ on technology – a ‘blend of factors’ that will ‘deliver strategic impact’ on the Agency [ CIA ] mission:

– Effective ‘deployments’ of innovative technologies to the CIA; – Commercially successful ‘companies that can continue’ to ‘deliver’ and ‘support’ innovate technologies; and, – Financial ‘returns to fund further technology investments’ to ‘benefit the Intelligence Community’.   Investing In Our National Security –

In just a few short years, In-Q-Tel has ‘evaluated’ nearly two thousand [ 2,000 ] ‘proposals’:

75% [ 1,500 ] of which have come from companies that had never previously considered working with the government.

To date, In-Q-Tel ‘established strategic relationships’ with more than ‘twenty’ ( 20 ) of these ‘companies’.

Read more about our ‘portfolio companies’ and ‘technology partners’, or learn how to submit a business plan to In-Q-Tel.

Areas Of Focus –

IN-Q-TEL focuses on next generation technologies for gathering, analyzing, managing and disseminating data. Learn more about our areas of focus:

Knowledge Management: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/km.html ];

Security and Privacy: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sp.html ];

Search and Discovery: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sd.html ];

Distributed Data Collection: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/dd.html ]; and,

Geospatial Information Services: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/gi.html ].

Submit A Business Plan –

“In-Q-Tel also has garnered a reputation in the tech and VC [ Venture Capital ] worlds for being hard-nosed during due diligence. Unlike some venture firms, In-Q-Tel is staffed with hard-core techies who know how to put a program through the ringer. They’ve also got one of the roughest testing domains: the computer systems of the CIA.” – Washington Business Journal ( November 19, 2001 )

– View our criteria [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/submit/index.html ] for submission, and apply for consideration online.

Media Resources –

– Investment Portfolio: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf ].

Reference

http://web.archive.org/web/20020630223724/www.inqtel.com/invest/index.html

– – – –

Circa: 2002

IN-Q-TEL

Investments –

Technology Partners ( 2002 ) –

INKTOMI [ http://www.inktomi.com ] ( Leading Edge Search and Retrieval Technology )

INKTOMI, based in Foster City, California ( USA ), has offices elsewhere in North America, Asia and Europe.

INKTOMI division business, involves:

Network Products – comprised of industry leading solutions for network caching, content distribution, media broadcasting, and wireless technologies; and,

Search Solutions – comprised of general Web search and related services, and ‘enterprise’ search.

Inktomi ‘develops’ and ‘markets’ network infrastructure software essential for ‘service providers’ and ‘global enterprises’.

Inktomi ‘customer’ and ‘strategic partner’ base of leading companies, include:

MERRILL LYNCH; INTEL: AT&T; MICROSOFT; SUN MICROSYSTEMS; HEWLETT-PACKARD; COMPAQ; DELL; NOKIA; AMERICA ONLINE ( AOL ); and, YAHOO.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Lead System Integrator ( LSI ) – SAIC LSI [ http://www.saic.com/contractcenter/ites-2s/clients.html  ]

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ), founded in 1969 by Dr. J. R. Beyster who remained with SAIC for 30-years until at least November 3, 2003, has had as part of its management, and on its Board of Directors, many well known former U.S. government personnel, including:

– Melvin Laird, Secretary of Defense in the Richard Milhouse Nixon Presidential Administration;

– William Perry, Secretary of Defense in the William Jefferson Clinton Presidential Administration;

– John M. Deutch, U.S. Central Intelligence Agency ( CIA ) Director of Central Intelligence ( DCI ) in the William Jefferson Clinton Presidential Administration;

– U.S. Navy Admiral Bobby Ray Inman, U.S. National Security Agency ( NSA ) and U.S. Central Intelligence Agency ( CIA ) – various employed capacities in ‘both’ Agencies – in the Gerald Ford Presidential Administration, Billy Carter Presidential Administration and Ronald Reagan Presidential Administration;

– David Kay, who led the search for Weapons of Mass Destruction ( WMD ) – following the 1991 U.S. Persian Gulf War – for the United Nations ( UN ) and in the George W. Bush Sr. Presidential Administration following the 2003 U.S. invasion of Iraq.

In 2009, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) moved corporate headquarters to Tysons Corner at 1710 SAIC Drive, McLean, Virginia ( USA ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is a scientific, engineering and technology ‘applications company’ with numerous ‘state government clients’, ‘federal government clients’, and ‘private sector clients’.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) works extensively, with:

U.S. Department of Defense ( DOD ); U.S. Department of Homeland Security ( DHS ); U.S. National Security Agency ( NSA ); U.S. intelligence community ( others ); U.S. government civil agencies; and, Selected commercial markets.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Subsidiaries –

SAIC VENTURE CAPITAL CORPORATION; SCICOM TECHNOLOGIES NOIDA ( INDIA ); BD SYSTEMS ( BDS ); BECHTEL SAIC COMPANY LLC; BECK DISASTER RECOVERY ( BDR ); R.W. BECK; BENHAM; CLOUDSHIELD; DANET; EAGAN MCALLISTER ASSOCIATES INC.; HICKS & ASSOCIATES MEDPROTECT LLC REVEAL; SAIC-FREDERICK INC.; NATIONAL CANCER INSTITUTE ( NCI ); SAIC INTERNATIONAL SUBSIDIARIES; SAIC LIMITED ( UK ); CALANAIS ( SCOTLAND ); VAREC; APPLIED MARINE TECHNOLOGY CORPORATION; EAI CORPORATION; and, Others.

In 1991, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) received transference of the U.S. Department of Defense ( DOJ ), U.S. Army ( USA ), Defense Intelligence Agency ( DIA ) ‘Remote Viewing Program’ renamed STARGATE Project.

In January 1999, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) consultant Steven Hatfill saw SAIC vice president Joseph Soukup internally ( with no outside client ) commission ( with no outside client ) William C. Patrick – a retired leading figure in the legacy U.S. bioweapons program – see a report produced ( 28-pages on Feburary 1999 ) on terrorist anthrax attack possibilities via Unitd States postal mailings prior to 2001 anthrax attacks in the United States.

In March 2001, the U.S. National Security Agency ( NSA ) had SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) in ‘concept definition’ phase for what later became known as the NSA TRAILBLAZER Project, a “Digital Network Intelligence” system intended to ‘analyze data’ carried across computer ‘networks’.

In 2002, the U.S. National Security Agency ( NSA ) chose SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) to produce a ‘technology demonstration platform’ for the NSA TRAILBLAZER Project, a contract worth $280,000,000 million ( USD ).

TRAILBLAZER Project participants, included:

BOEING; COMPUTER SCIENCES CORPORATION ( CSC ); and, BOOZ ALLEN HAMILTON.

In 2005, TRAILBLAZER – believed by speculators ( http://www.PhysOrg.Com et. al. ) to be a continuation of an earlier data mining project THINTHREAD program – saw U.S. National Security Agency ( NSA ) Director Michael Hayden inform a U.S. Senate hearing that the TRAILBLAZER program required several hundred million dollars over budget – consequently trailing years behind schedule waiting for approvals.

From 2001 through 2005, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) was primary contractor for the $600,000,000 million ( USD ) TRILOGY Program, a three ( 3 ) part program – intended to replace obsolete FBI computers with a then-new state-of-the-art cutting edge technology ‘secure high-speed computer network system’ that would install 500 computer network servers, 1600 scanners and thousands of desktop computers in FBI field offices – that on December 2003 delivered to the U.S. Department of Justice ( DOJ ) Federal Bureau of Investigation ( FBI ) its SAIC “Virtual Case File” ( VCF ), a $170,000,000 million ( USD ) software system designed to speed tracking of terrorists, better accurize communications amongst agents fighting criminals with this FBI ‘critical case management system’, however nineteen ( 19 ) different government managers involved 36 contract modifications averaging 1.3 FBI changes everyday totaling 399 changes during 15-months afterwhich the FBI continued arguing ( through its own intermediary, AEROSPACE CORPORATION ) changes until the U.S. Department of Justice ( DOJ ) Inspector General ( IG ) criticized its ‘FBI handling’ of SAIC software, whereon February 2005 SAIC ‘recommended’ the FBI at-least ‘begin using’ the SAIC TRILOGY VCF ‘case management system’.

On September 27, 2006 during a special meeting of SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) stockholders, employee-owners voted by a margin of 86% to proceed with the initial public offering ( IPO ) whereupon completion SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) also paid – to existing stockholders – a ‘special dividend’ of $1,600,000,000 billion to $2,400,000,000 billion ( USD ).

On October 17, 2006 SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) conducted an initial public offering ( IPO ) of common stock offering of 86,250,000 shares priced at $15.00 per share. Underwriters – BEAR STEARNS and MORGAN STANLEY – exercised over-allotment options resulting in 11,025,000 million shares seeing the IPO raise $1,245,000,000 billion ( USD ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) had approximately 46,000 total employees, 16,000 employees were in McLean, Virginia ( USA ) and another 5,000 employees were in San Diego, California ( USA ).

SRA INTERNATIONAL INC. ( SRA ) [ http://www.sra.com/about-us/profile.php ]

SRA INTERNATIONAL INC., founded in 1978, headquartered in Fairfax, Virginia has additional U.S. offices.

SRA INTERNATIONAL INC. is a leading provider of information technology services and solutions to clients in national security, health care and public health, and civil government markets, requiring:

– Strategic Consulting; – Systems Design, Development, and Integration; – OutSourcing; and, – Operations Management.

SRA INTERNATIONAL INC. also delivers business solutions, for:

– Text mining; – Data mining; – Disaster and Contingency Response Planning; – Information Sssurance; – Environmental Strategies – Environmental Technology; – Enterprise Systems Management; and, – Wireless Integration.

SRA INTERNATIONAL INC. ORIONMagic ®

– –

Circa: 2002

IN-Q-TEL

Investments –

Portfolio Of Companies ( 2002 ) – Partial List

ARCSIGHT [ http://www.arcsight.com ] ( Security Management Software for The Enterprise )

ArcSight, founded in May 2000, is located in the heart of Silicon Valley, California ( USA ).

ArcSight is a leading supplier of enterprise software that provides the security “air traffic control system” for large, geographically dispersed organizations. These organizations are augmenting their network infrastructure with a wide variety of security devices such as firewalls, intrusion detection and identity management systems that produce a barrage of uncoordinated alarms and alerts that overwhelm the security staff.

With its ‘centralized view’ of ‘all security activity’ combined with ‘real time analysis’ of ‘events’, by both ‘operating at the perimeter and inside’ the organization, ArcSight provides a ‘single solution’, for:

Event capture; Log aggregation; Real time correlation; Incident investigation; and, Reporting.

ArcSight ‘separates’, the ‘true threats and attacks’ from the ‘millions of false alarms and non-threatening activities’ that occur each day, focusing attention and resources on high-priority problems.

The company has delivered enterprise, ‘security management solutions’ to leading ‘financial services’, ‘government’ and ‘manufacturing’ organizations while ‘attracting capital’ from ‘leading investors’, such as:

IN-Q-TEL; KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, SUMITOMO CORPORATION.

ATTENSITY CORPORATION [ http://www.attensity.com ] ( Text Extraction for Threat Detection )

Attensity Corp., founded in 2000, is a privately held company with dual headquarters in Mountain View, California ( USA ) and Salt Lake City, Utah ( USA ).

Attensity Corp. provides enterprise, ‘analytic software’ and ‘services’, to:

Government agencies; and,

Fortune 500 companies.

Attensity has developed breakthrough text extraction technology that transforms information captured in free form text into structured, relational data.

Attensity enables government agencies to dramatically expand their analytical capabilities in the area of ‘threat detection’ by, powering:

Link analysis; Trending; Exception reporting; Other advanced analytics; and, Knowledge management applications.

Attensity technology is the culmination of nearly a decade [ 10-years ] of research in computational linguistics.

Attensity Corporation customers include:

IN-Q-TEL, a strategic venture group funded by the CIA; WHIRLPOOL; and, JOHN DEERE.

ATTENSITY CORPORATION investor, is:

IN-Q-TEL

BROWSE3D [ http://www.browse3d.com ] ( Advanced Web Navigation )

BROWSE3D, founded in 2000, is located in the Dulles Technology Corridor of northern Virgina.

The company’s first Knowledge Management product, the Browse3D Browser, enables Internet users to browse Web sites using a dynamic, interactive, 3 dimensional ( 3-D ) display environment.

One year later [ 2001 ] the Browse3D Browser was recognized as the Best Internet Software of 2001 at the COMDEX Fall Technology Show ( Las Vegas, Nevada, USA ).

Browse3D launched its ‘consumer product’ in January 2002.

For the past 2-years [ since 2000 ], Browse3D has been working to re-invent the online researcher’s tool set. A researcher’s ability to ‘harvest relevant online data’ is often limited by the tools available to view that data.

Future products and technologies promise additional improvements in the way users ‘find’, ‘organize’, ‘save’ and ‘exchange’ web-based ‘content’.

BROWSE3D early-stage venture funding provided, by:

IN-Q-TEL; and, angel investors.

CANDERA INC. [ http://www.candera.com ] ( Enterprise Storage )

Candera Incorporated, founded in 2000, is a development stage stealth mode company headquartered in Milpitas, California ( USA ).

Candera Inc. is developing a new generation, purpose built, network based storage management platform that gives businesses unprecedented ‘control over’ and ‘visibility into’ their networked storage environments.

With the Candera Confluence solution, businesses can dramatically improve the utilization of their existing heterogeneous storage assets by consolidating them into a centrally managed storage pool. These can then be quickly and dynamically allocated to meet the needs of current and future network based applications, giving large enterprises a strategic advantage.

Candera is building the first [ 1st ] system, of a new generation of systems, that will enable customers to unleash the ultimate value of networked information storage.

CONVERA [ http://www.convera.com ] ( Mission Critical Enterprise Search and Categorization Software )

Convera RetrievalWare is a high-performance intelligent search system that allows broad flexibility and scalability for implementation across corporate intranets and extranets, enabling users to index and search a wide range of distributed information resources, including text files, HTML, XML, over 200 proprietary document formats, relational database tables, document management systems and groupware repositories. Convera RetrievalWare excels in distributed client environments and server environments with hundreds or thousands of users, documents, images and / or multiple media assets.

Advanced search capabilities include concept and keyword searching, pattern searching and query by example.

Convera is a leading provider of enterprise mission-critical ‘search’, ‘retrieval’ and ‘categorizing’ solutions.

More than 800 customers – in 33 countries – rely on Convera search solutions to power a broad range of mission critical applications, including enterprise:

Portals; Knowledge management; Intelligence gathering; Profiling; Corporate policy compliance; Regulatory compliance; Customer service; and, More.

DECRU [ http://www.decru.com ] ( Secure Networked Storage )

Decru, founded in April 2001, is headquartered in Redwood City, California ( USA ).

Decru solves the problem of secure data storage with a robust, wire-speed encryption appliance that fits transparently into any SAN or NAS storage environment, protecting data from both internal and external threats.

Markets include essentially any organization with a need to protect proprietary or confidential information ( e.g. government, technology, financial services, health care ).

Investors, include:

IN-Q-TEL; NEA; GREYLOCK; and, BENCHMARK.

GRAVITRON [ http://www.graviton.com ] ( Early Warning Detection and Notification System for Homeland Security Over Wireless Mesh Networks )

GRAVITON, founded in 1999, is located in La Jolla, California, USA.

Solomon Trujillo, former head of U.S. WEST ( baby bell telephone company ), leads GRAVITRON.

GRAVITON is on leading edge of a fledgling ( small ) industry, known as:

Machine to Machine Communications ( M2M ).

GRAVITON is developing an advanced integrated wireless sensor platform uniquely optimized for large-scale distributed sensor network applications working with Micro Electro Mechanical Systems ( MEMS ) sensor and spread spectrum wireless technologies licensed exclusively to GRAVITON from the U.S. National Laboratory at Oakridge ( also known as ) Oakridge National Laboratory ( Tennessee, USA ) – managed by the U.S. Department of Energy ( DOE ).

GRAVITON products and solutions integrate wireless, sensor and data management technology enabling enterprises to efficiently and transparently monitor, control, send, receive, and update system information from devices anywhere in the world.

GRAVITON is supported and funded by a number of corporate partners and investors, including:

IN-Q-TEL; GLOBAL CROSSING; ROYAL DUTCH SHELL ( oil / petroleum ); MITSUI; SIEMENS; QUALCOM; OMRON; MOTOROLA; and, SUN MICROSYSTEMS.

GRAVITON ‘primary’ financial investors, include:

MERRILL LYNCH;

GRAVITON ‘venture capital’ firms, include:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, EARLYBIRD.

INTELLISEEK [ http://www.intelliseek.com ] ( Enterprise Intelligence Solutions )

INTELLISEEK, founded in 1997, has since 1998 been changing the way organizations ‘understand’, ‘gather’ and ‘use’ enterprise ‘intelligence’.

INTELLISEEK ‘knowledge discovery tools’ [ as of: 2002 ] enable the nation’s largest enterprises with up-to-the-minute consumer, industry information and ‘competitive intelligence’.

INTELLISEEK ‘Enterprise Search Server’™ ( ESS ) search platform provides a suite of intelligent applications that automate ‘knowledge discovery’ and ‘knowledge aggregation’ from hundreds of disparate, and often hard-to-locate data sources.

INTELLISEEK ‘Knowledge Management’ and ‘Search and Discovery’ solutions solve the fundamental problem of “information overload” by identifying and searching relevant, targeted and personalized content from the internet, intranets and extranets.

INTELLISEEK clients, include:

FORD MOTOR COMPANY ( FOMOCO ); NOKIA; and, PROCTOR AND GAMBLE.

Investors include:

IN-Q-TEL; FORD VENTURES; RIVER CITIES CAPITAL; GENERAL ATLANTIC PARTNERS LLC; FLAT IRON PARTNERS; BLUE CHIP VENTURE COMPANY; NOKIA VENTURES; and, Other private investors.

METACARTA [ http://www.metacarta.com ] ( Geospatial Data Fusion )

MetaCarta, established in 1999, was launched on more than $1,000,000 million in funding from the U.S. Department Of Defense ( DOD ) Defense Advanced Projects Agency ( DARPA ) and private investors.

MetaCarta CEO John Frank, with a doctorate from the Massachusets Institute Of Technology ( MIT ) where during 1999 – as a Hertz Fellow in physics working on a PhD – conceived a new way to view – geographically – ‘collections of text’ that later saw MetaCarta combine his interests in algorithms, information design, and scientific models of real world phenomena.

Metacarta provides a new knowledge management platform that integrates ‘text data with geography’ providing a ‘cohesive system’ for ‘problem solving’.

METACARTA Geographic Text Search ( GTS ) appliance, the software solution, redefines how people interact with information, enabling analysts to view text reports and geographic information in one ( 1 ) logical view through integration of text and geography delivering new information not obtainable from any other source.

MetaCarta CEO John Frank graduated from Yale University.

MOHOMINE [ http://www.mohomine.com ] ( Transforming Unstructured Multi-Language Data Into Actionable Information )

MOHOMINE, founded in 1999, is privately-held and located in San Diego, California, USA.

MOHOMINE technology has been deployed by United States national security organizations.

MOHOMINE mohoClassifier for National Security Organizations ™ reviews ‘text information’ in ‘cables’, ‘e-mails’, ‘system files’, ‘intranets’, ‘extranets’ and ‘internet’ providing ‘automated document classification’, ‘routing’ – based upon ‘learn-by-example pattern recognition’ technology – and ‘reports’ on user defined properties such as ‘topic’, ‘subject’, ‘tone’ ( ‘urgent’, plus others ), ‘author’, ‘source’ ( geographic locations, ‘country’, etc. ), and more.

MOHOMINE mohoClassifier users can easily set up ‘filters’ to automatically ‘identify’ and ‘prioritize’ ( ‘read first’ requirement ) documents that are quickly processed – out-of large volumes of other data – and then quickly route prioritized information to quickly reach the proper people.

MOHOMINE, from Global 5000, currently [ since 2002 ] has more than one hundred fifty ( 150 ) customers across numerous vertical industries, including:

CITICORP; WELLS FARGO; INTEL; TEXAS INSTRUMENTS; PFIZER; BOEING; ORACLE; PEOPLESOFT; and, NIKE.

MOHOMINE investors, include:

IN-Q-TEL; HAMILTON APEX TECHNOLOGY VENTURES; and, WINDWARD VENTURES.

QYNERGY CORPORATION [ http://www.qynergy.com ] ( Long-Lasting Power Solutions For Multiple Applications And Small-Tech )

QYNERGY CORP., founded in 2001, is located in Albuquerque, New Mexico.

QYNERGY technology originated at the U.S. National Laboratory at Sandia ( also known as ) Sandia National Laboratories ( New Mexico, USA ) and at the University of New Mexico ( New Mexico, USA ).

QYNERGY Corp. develops leading-edge energy solutions based on QYNERGY proprietary QynCell ™ technology that made an exciting breakthrough – over other ‘battery’ or ‘portable energy’ devices – in ‘materials science’ allowing QYNERGY to possess several unique competitive advantages.

QYNERGY QynCell ™ is an ‘electrical energy device’ revolution, providing:

Long-lived Batteries – QynCell usable life is potentially over a period of ‘several decades’ ( 10-year multiples ), during which time the QynCell device ‘does not require external charging’;

Miniature and Micro Applications – QynCell™ technology is scaleable, thus can be ‘miniaturized’, for:

Micro Electro Mechanical Systems ( MEMS ); MicroPower™ applications; Small microelectronics; and, Power-on-a-chip applications.

SAFEWEB [ http://www.safewebinc.com ] ( Secure Remote Access )

SAFEWEB, established in April 2000, is based in Emeryville, California, USA.

SAFEWEB built the world’s largest ‘online privacy network’, however in 2001 its ‘free online service’ was ‘concluded’ – to focus on developing its ‘enterprise’ product.

SAFEWEB is a leading provider of innovative security and privacy technologies that are effective, economical and simple.

SAFEWEB Secure Extranet Appliance ( SEA ), the first [ 1st ] SAFEWEB enterprise security release – reduces the cost and complexity traditionally involved in securing corporate network resources.

SAFEWEB Secure Extranet Appliance ( SEA ), named Tsunami, is a fundamental ‘redesign of extranet architecture’ integrating disparate technologies into a ‘modular plug-in network appliance’ ( SEA Tsunami).

SAFEWEB SEA Tsunami is an ‘all-in-one solution’ simplifying implementation of ‘extranets’ and ‘Virtual Private Networks’ ( VPN ) reducing Total Cost of Ownership ( TCO ) by innovative architecture letting companies build – in less than 1-hour – ‘secure extranets’ providing ‘remote stationed’ enablement of ‘employees’, ‘clients’ and ‘partners’ to access ‘internal applications’ and ‘secure data’ from anywhere using a standard internet website browser.

SAFEWEB delivers, through established strategic partnerships, customized versions of its Secure Extranet Appliance ( SEA ) Tsunami technology to U.S. intelligence [ CIA, etc. ] and communications agencies [ NSA, etc. ].

SAFEWEB investors, include:

IN-Q-TEL; CHILTON INVESTMENTS; and, KINGDON CAPITAL.

STRATIFY INCORPORATED [  ] ( Unstructured Data Management Software )

In 1999, PURPLE YOGI was founded by former INTEL Microcomputer Research Laboratory scientists Ramana Venkata and Ramesh Subramonian.

PURPLE YOGI, became known as STRATIFY INCORPORATED ( a privately-held company ).

In early 2001, ORACLE CORPORATION veteran and senior executive Nimish Mehta became president and chief executive officer ( CEO ).

STRATIFY INC., headquartered in Mountain View, California ( USA ), is [ 2002 ] the ‘emerging’ leader in ‘unstructured data management’ software.

STRATIFY Discovery System is a ‘complete enterprise software platform’ helping todays [ 2002 ] organizations ‘harness vast information overload’ by ‘automating the process’ of ‘organizing’, ‘classifying’ and ‘presenting’ business-critical unstructured information usually found in ‘documents’, ‘presentations’ and internet website pages.

STRATIFY Discovery System platform ‘transforms unstructured internal and external data’ into ‘immediately accessible relevant information’ automatically organizing millions of documents displayed in easy navigational hierarchy.

STRATIFY INC. clients, include:

INLUMEN and INFOSYS TECHNOLOGIES LIMITED, named in 2001 as one ( 1 ) of The Red Herring 100.

STRATIFY INC. received funding, from:

IN-Q-TEL; H & Q AT INDIA (also known as ) H & Q ASIA PACIFIC; SOFTBANK VENTURE CAPITAL ( now known as ) MOBIUS VENTURE CAPITAL; SKYBLAZE VENTURES LLC; and, INTEL CAPITAL.

SRD [ http://www.srdnet.com ] ( Near Real Time Data Warehousing and Link Analysis )

SYSTEMS RESEARCH & DEVELOPMENT ( SRD ), founded in 1983, develops software applications to combat fraud, theft, and collusion.

SYSTEMS RESEARCH & DEVELOPMENT Non-Obvious Relationship Awareness ™ ( NORA ™ ) was originally developed for the gambling casino gaming industry

SYSTEMS RESEARCH & DEVELOPMENT NORA software is designed to identify correlations across vast amounts of structured data, from hundreds or thousands of data sources, in near real-time, and alert users to potentially harmful relationships between and among people.

SRD NORA software technology leverages SYSTEMS RESEARCH & DEVELOPMENT proven expertise in ‘aggregating’, ‘warehousing’ and ‘leveraging people data’ and ‘transaction data’ to strengthen corporate management and security systems.

SYSTEMS RESEARCH & DEVELOPMENT clients [ 2002 ], include:

U.S. Depaartment of Defense ( DOD ); CENDANT; TARGET; MGM MIRAGE; MANDALAY BAY RESORT GROUP; and, Food Marketing Institute.

TACIT [ http://www.tacit.com ] ( Enterprise Expertise Automation )

TACIT, founded in 1997, is located in Palo Alto, California ( USA ) with regional sales offices in Virginia, Maryland, Pennsylvania and Illinois.

David Gilmour serves as president and chief executive officer ( CEO ).

TACIT Knowledge Systems is the pioneer and leader in ‘Enterprise Expertise Automation’.

TACIT products ‘automatically and continuously inventories’ the ‘skills’ and ‘work focus’ of an ‘entire organization’ for ‘dynamic location’ of ‘connections to expertise needed’ – when needed to make decisions, solve problems, and serve customers.

TACIT products also include its award winning flagship product KnowledgeMail™. In June 200, TACIT was voted one of the “Hot 100 Private Companies,” by Upside Magazine.

In 2000 and 2001, TACIT was one ( 1 ) of the “100 Companies that Matter,” by KM World [ Knowledge Management World ].

TACIT attracted a ‘world class advisory board’ with interest from ‘venture capital’ and Fortune 500 ‘clients’ of ‘enterprise’ and ‘customers’, including:

IN-Q-TEL; JP MORGAN; CHEVRON-TEXACO ( petroleum and chemical ); UNISYS; HEWLETT-PACKARD; NORTHROP-GRUMAN ( aerospace & defense ); and, ELI LILLY ( pharmaceuticals ).

TACIT investors, include:

IN-Q-TEL; DRAPER FISHER JURVETSON; REUTERS GREENHOUSE FUND; and, ALTA PARTNERS.

TRACTION SOFTWARE [ http://www.tractionsoftware.com ] ( Harvest and Use Information from All Sources )

TRACTION SOFTWARE, founded in 1996, is located in Providence, Rhode Island ( USA ).

TRACTION® Software is the leader in ‘Enterprise Weblog’ software, bringing together working ‘communications’, ‘knowledge management’, ‘content management’, ‘collaboration’, and the ‘writable intranet portal’.

TRACTION TeamPage™ product addresses the need for ‘unified on-demand view’ of ‘team content’ and ‘team communication’ from ‘all document sources’ in ‘context’ and over ‘time’.

TRACTION TeamPage deploys quickly and easily on an existing network and delivers a ‘capstone communication system’ by turning ‘e-mail’ and ‘web browser’ into powerful tools for end-users.

TeamPage targets ‘program teams’ and ‘product management teams’ in ‘government’ and ‘business’.

TRACTION also supports a wide range of applications and business processes, including but not limited, to:

Business Intelligence and Market Research;

Collection Highlighting and Media Distribution;

Investor Relations E-Mail and Public Relations E-Mail Triage and Response; and,

Tracking Exception Process and Reporting Exception Process.

TRACTION SOFTWARE investors, include:

IN-Q-TEL; SLATER CENTER FOR INTERACTIVE TECHNOLOGY; and, private investors.

ZAPLET INCORPORATED [ http://www.zaplet.com ] ( Enterprise Collaboration Tools For Email )

ZAPLET INC., founded in 1999, is located in Redwood Shores, California ( USA ).

ZAPLET INC. is an enterprise software and services company and creator of the Zaplet Appmail System™ collaboration software that brings application functionality directly to a user’s inbox to complete business processes.

ZAPLET INC. Appmail, using a server-based platform, combines power, ‘centralized control’ and ‘robust security’ for traditional enterprise application systems with the convenience and ease-of-use of e-mail.

ZAPLET Appmail in-box becomes the gateway to a protected server where the application functionality and data securely reside.

Zaplet™ Appmail can be used, to:

Manage and Streamline mission-critical business processes; Requires no additional client-side upgrades; and, Instantly expandable for work teams ‘beyond’ the ‘enterprise’.

ZAPLET INC. has received numerous awards, including:

Red Herring 100; Enterprise Outlook – Investors’ Choice; and, Internet Outlook – Investors’ Choice.

ZAPLET INC. customers, include leading companies, in:

Finance; Telecommunication; High technologies; and, Government.

ZAPLET INC. is backed by world class investors, including:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); ACCENTURE TECHNOLOGY VENTURES; QUESTMARK PARTNERS L.P.; RESEARCH IN MOTION LIMITED ( RIM ); INTEGRAL CAPITAL PARTNERS; ORACLE CORPORATION; CISCO SYSTEMS INC.; and, NOVELL INC.

– –

Circa: 2010

IN-Q-TEL

Investments –

Portfolio of Companies ( 2010 ) – Partial List

3VR Security AdaptivEnergy Adapx Arcxis Asankya Basis Technology Bay Microsystems CallMiner Cambrios Carnegie Speech CleverSafe ( SAIC ) CopperEye Destineer Elemental Technlogies Ember Corporation Endeca Etherstack FEBIT FireEye FluiDigm

Reference(s)

http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf http://www.iqt.org/technology-portfolio/orionmagic.html http://defense-ventures.com/in-q-tel/

– – – –

Now if you thought you graduated with honors magna cum laude – think again and begin reading ( below ):

QUCOMM – Long Distance Photonic Quantum Communication

Brief –

An overview of the work done at Los Alamos National Laboratory ( New Mexico, USA ) on Quantum Computation and Cryptography

The idea of quantum computation and cryptography is to use the laws of quantum mechanics for either computing or exchange secrets messages.

Los Alamos is a leader in Experimental Quantum Computation [ EQC ].

The recent discovery that it was possible to use Nuclear Magnetic Resonance ( NMR ) for quantum computation has made experimental work leap forward.

The 3-qubit quantum computer – using NMR techniques with the molecule trichloroethylene – is state-of-the-art at present ( winter 1998 ).

We have succeeded at creating a GHZ state.

This is the “big brother” of an Einstein-Podolsky-Rosen ( EPR ) state.

Using qubits with state |0> and |1>, we have created the state |000> + |111>. It is well known form the foundations of quantum mechanics.

Both the EPR and the GHZ state have properties that are non-classical. For more details see our paper NMR-GHZ [ http://xxx.lanl.gov/ps/quant-ph/9709025 ].

Quantum error correction is required to compensate for the fragility of the state of a quantum computer.

We report the first [ 1st ] experimental implementations of quantum error correction and confirm the expected state stabilization.

A precise study of the decay behavior is studied in alanine and a full implementation of error correction protocol is implemented in trichloroethylene.

In NMR computing, however, a net improvement in the signal-to-noise would require very high polarization.

The experiment implemented the 3-bit code for phase errors in liquid state-state Nuclear Magnetic Resonance ( NMR ).

Quantum mechanics provides spectacular new information processing abilities.

One of the most unexpected is a procedure called ‘quantum teleportation’ – suggested by Bennet, et al. [  http://www.research.ibm.com/quantuminfo/teleportation ] – that allows the ‘quantum state of a system’ to be ‘transported from one location to another’ – without moving through the intervening space.

We have implemented the ‘full quantum teleportation operation’ over ‘inter-atomic distances’ using ‘liquid state Nuclear Magnetic Resonance (NMR)’. [ see, e.g. Electronic Transfer In Mesoscopic Systems, Quantum Kinetics, Magnetoresistance Within Magnetic Layering, Liquid State NMR, etc. (http://www.quantiki.org/wiki/Liquid-state_NMR ) ]

The inclusion of the final stage enables – for the first [ 1st ] time – a teleportation implementation, that may be used as a ‘subroutine’ in ‘larger quantum computations’, or for ‘quantum communication’.

Our experiment also demonstrates the use of ‘quantum process tomography’, a procedure to ‘completely characterize the dynamics of a quantum system’.

Finally, we demonstrate a controlled exploitation of decoherence as a tool to assist in the performance of an experiment.

Using quantum mechanics – instead of classical mechanics – has huge advantages but also some drawbacks; quantum mechanics make the ‘applications much more powerful’ but at the same time much more ‘fragile’ against ‘noise’.

Organization Information –

KUNGLIGA TEKNISKA HOGSKOLAN Valhallavaegen 79 100 44 Stockholm SWEDEN

CONTACT: Anders Karlsson

TEL: +46-8-7521272

FAX: +46-8-7521240

E-MAIL: aandkar@ele.kth.se

WWW : http://www.ele.kth.se/QEO/qucomm ( Project website )

Long Distance Photonic Quantum Communication (aka) LDPQC interalia the QuComm Project, will:

1. Scale secure quantum communication towards longer distances;

2. Realize novel applications; and,

3. Identify and transfer ‘spin-off applications’ to ‘industry’ [ i.e. ‘private sector’ businesses ].

The physical resources explored, are:

Entangled quantum states having no classical counterpart.

Work will be pursued on novel sources, for:

1. Direct ‘generation of entangled photon states’ in ‘electrically pumped structures’;

2. Diode-laser pumped ‘non-linear optical crystals’; and,

3. Detectors or ‘multiphoton states’.

Basic quantum information building blocks, such as teleportation and entanglement swapping, will be developed. Field demonstrations will be used to validate the technology, both at 700nm – 800nm ( free space and optical fibers ) and at 1300 nm and 1550 nm ( telecommunication fibers and systems ).

The consortium consists of both ‘universities’ and ‘industries’ [ private sector businesses ] – those with a broad ‘physics’ and ‘technology’ background.

QuComm Objectives –

1. Extend experimental quantum communication protocols – notably ‘quantum teleportation entanglement swapping’ and ‘entanglement quantum cryptography’ towards ‘longer distances’. In particular, to explore ‘physical resource of entangled states’ of ‘multiple photons’ that otherwise lack finding a counterpart in classical physics;

2. Experimentally demonstrate quantum communication protocols for cryptographic applications in point-to-point and multiparty quantum cryptography – using ‘entangled quantum states’ to ‘achieve’ an ‘increased level of security’ – compared to ‘faint-pulse quantum cryptography’;

3. Validate optical quantum communication technologies – in an ‘application context’ through various field tests of the developed concepts and technologies; and,

4. Identify and transfer ‘spin off’ results – from ‘quantum communication technologies’ – to industries [ private sector businesses ] or to industries-to-be [ ‘emerging’ technology businesses’ ], notably SMEs.

Work Description –

The work will be divided into six [ 6 ] quantum state Work Packages ( WP ) [ ‘problem sets’ ], each with designated WP [ ‘problem set’ ] ‘leaders’:

WP0, leads – ‘Management’ [ i.e. IN-Q-TEL Quantum Interface Center ( QIC ) interalia CIA ], additionally dealing with ‘dissemination’ and ‘industrial take-up’ [ private sector transfers to private sector businesses ] of results [ ‘products’ / ‘solutions’ to ‘market’ for ‘profitability’ ];

WP1, leads – ‘Sources’ [ ‘partners’ ( i.e. ‘businesses’ / ‘institutions’ ]; and,

WP2, leads – ‘Analyzers’ ( i.e. ‘detectors’ / ‘analysts’ / ‘individuals’ ) enabling ‘building block formations’ for ‘subsequent work’.

[ NOTE: Once “sources” and “analyzers” ( ‘detectors’ interalia ‘analysts’ ) are available – in some cases, during project infancy – they will be transferred to later [ “subsequent” ] quantum state Work Packages. ]

WP3, leads – Entanglement enhanced quantum cryptography – focused on ‘entangled states’ – and ‘multi-party quantum cryptography’;

WP4, leads – Teleporting entanglement; and,

WP5, leads – Protocols ( multimode and multistate ) utilizing optimized sources and analyzers for the realization of quantum communication protocols, both ‘significantly improved versions’ of ‘earlier demonstrations’, as well as ‘entirely novel protocols’.  [ NOTE: In WP5, ALCATEL THALES III-V Lab ( Palaiseau Cedex, France ) will work on different schemes of ‘phase locked loop’ to ‘reduce phase noise’ of generated mmW, and will also facilitate exploitation of the ‘results’ achieved through small scale fabrication and/or ‘technology transfer’ ( http://www.ist-iphobac.org/partners/index.asp?id=3 ).

WP 6, leads – Field tests ‘assembled work’ – in earlier work packages ( WPs ) used – to ‘conduct trials outside the laboratory setting’.

By having a ‘separately delineated’ [ sensitive ‘compartmentalized’ information ( SCI ) ] work packages ( WP ) [ ‘problem sets’ ], it will be possible, to:

1. Assure ‘availability of test sites’;

2. Provide ‘coherence in goals’ of ‘field trials’; and,

3. Provide ‘joint experience’ for ‘realization of trials’.

The ‘management’ of the consortium [ http://www.ist-iphobac.org/login.asp ] will be with a ‘management committee’:

1. One [ 1 ] person from each ‘partner’ ( same person as the WP leader, in most cases ); and,

2. One [ 1 ] person from the ‘associated partner’.

The progress of work will be monitored through ‘bi-monthly management reports’ assembled by the WP leader and sent to the ‘coordinator’ [ ? ].

The consortium will meet every 6-months, to:

1. Highlight scientific work;

2. Discuss progress; and,

3. Discuss modifications to the project.

A small ‘industrial advisory committee’, will:

1. Monitor progress of the project; and,

2. Advise and assist in ‘transferring’ – industrial relevant – ‘results’.

The project will ‘disseminate results’, through:

1. Channels Established;

2. Industrial Advisors; and,

3. Community Others [ ‘select attendees’ of organized ‘joint meetings’ and ‘workshops’ ].

QuComm Member List –

Number | Name | Short name | Country

P01 Kungliga Tekniska Högskolan [ http://www.ele.kth.se/QEO/ ]  KTH S [ Sweden ]

P02 Ludwig-Maximilians-Universität München [ http://scotty.quantum.physik.uni-muenchen.de/ ]  LMU G [ Munich, Germany ]

P03 Institut Experimentalphysik der Universität Wien [ http://www.quantum.univie.ac.at/ ] EXPENIVIE A [ Vienna, Austria ]

P04 University of Oxford [ http://www.qubit.org/ ] Oxford UK [ United Kingdom ]

P05 University of Geneva, Group of Applied Physics [ http://www.gapoptique.unige.ch/ ] GAP CH [ Switzerland ]

P06 Los Alamos National Laboratory [ http://qso.lanl.gov/qc/ ] LANL US

P07 THOMSON-HOUSTON ( THALES ) LABORATOIRE CENTRAL DE RECHERCHES ( LCR ) [ http://www.thalesgroup.com/Press_Releases/Descartes_prize_awarded_to_a_European_project_invo/ ] THLCR F [ Domaine de Corbeville, 91400 Orsay, Cedex, FRANCE ] [ NOTE: Second ( 2nd ) largest participant in the UK defense industry. On December 6, 2000 was eventually renamed THALES OPTRONIQUE S.A. ( Elancourt, France ), an electronics company delivering information systems and services for aerospace, defense, and security markets. THALES GROUP is partially state-owned ( France ), operates in more than 50 countries, has 68,000 employees, generated €12.9 billion in 2009 revenues, ranked 485th world’s largest company by Fortune 500 Global, is the 9th largest defense contractor in the world, and sees military sales that are 63% of THALES GROUP total sales. ]

P08 Defence Evaluation and Research Agency [ http://www.dera.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm ] DERA UK

GAP-Optique

University of Geneva, Department of Physics [ http://mpej.unige.ch/physics.html ] ( Geneva, Switzerland )

University of Geneva [ http://www.unige.ch ] ( Geneva, Switzerland )

QRandom is a physical random number generator ( RNG ) based on the intrinsic randomness of quantum mechanics. The random process used is the choice of a photon between the two outputs of a beam-splitter.

The generator is easy to use ( USB plug’n play support and self-powered ) and sufficiently fast for cryptographic applications (100 kHz of raw bits rate ).

The generated files can be processed by the program RNG Tester. This program allows to acquire, to apply an unbiasing procedure and to test files of random bits.

See Photo:

BT Quantum Optics Group:

We live in a quantum world – something physicists have considered with amazement for more than seventy years. It is only now that we realize that quantum physics is more than a radical departure from classical physics. It also offers many new possibilities for information processing.

In particular, quantum theory is non-local: it predicts entanglement between distant systems leading to correlations that cannot be explained by any theory based only on local variables, as demonstrated by Bell inequality.

All experiments are in remarkable agreement with quantum theory. Hence, the physics community faces a very strange worldview: in theory, everything is entangled, but, in practice, decoherence makes it impossible to reveal this entanglement. In addition to its “experimental metaphysics” aspects, quantum entanglement has recently gained much interest and respect because it is at the heart of quantum information processing.

The general idea is that entanglement provides means to carry out tasks that are either impossible classically ( like quantum cryptography ) or that would require significantly more steps to perform on a classical computer ( like factorization ).

However, how robust is quantum entanglement?

How long can one maintain it under control? Over which distances?

Can one really exploit it?

It is worth to emphasize this psychological revolution: for decades entanglement was considered as a source for quantum paradoxes, now it is considered as a resource to achieve tasks classically impossible.

Our activities in experimental quantum optics started in 1993 with a project on cavity effects in silvered microfibers. Almost at the same time we performed a first simple experiment in Quantum Cryptography ( QC ) [ see, e.g. publications, look up ] just for fun.

Nobody then [ 1993 ] would have imagined that in 1999 we would be one of the world leaders in this field. In fact, during a 2-years project supported by SWISSCOM, we developed an automated [ see, e.g. QC-setup, News, Crypto 98, Plug & Play ] with unprecedented performances.

We are currently participating in the Esprit-Project ” European Quantum Cryptography and Single Photon Technologies ” ( EQCSPOT ) in order to develop a QC-prototype.

Within national projects we developed compact sources of entangled photon pairs. With such a source we performed a record-breaking Bell experiment [ see, e.g. QC, Publications, Look Up ] between two [ 2 ] villages near Geneva [ Switzerland ] separated by more than 10 kilometers [ km ].

More generally, we are studying now the relation between non-locality and relativity and the application of novel sources of entangled photons for quantum communication. Our basic research also led to practical results such as an original setup for chromatic dispersion measurements, a novel technique for absolute detector calibration and the development of single-photon detectors in the near infra-red [ IR ].

Reference

http://www.dstl.gov.uk/html/electronics/single_photon_optics_and_quantum_cryptography.htm

Research

http://www.ist-optimist.unibo.it/pdf/network/projects_public/QUCOMM/Deliverables/D8.pdf

– – – –

Example

Since 2005, the THALES Group has successfully manufactured TV/4 format QWIP sensitive arrays in high rate production at the THALES Research and Technology Laboratory.

The full-TV array manufacturing started in 2007.

Uniformity and stability were the key parameters that led to the selection of this technology for thermal cameras.

Another widely claimed advantage for QWIPs was the versatility of the band-gap engineering and of III-V processing allowing custom design of quantum structures to fulfill the requirements of specific applications such as:

1. Very long wavelength ( VLWIR );

2. Multi-spectral detection; and,

3. Polarimetric detection.

Serial production of CATHERINE-XP and CATHERINE-MP has now started for the various programs for which both cameras have been selected. A review of the QWIP Production status, CATHERINE achievements and current programs are presented.

THALES based current strategy on very compact TI in order to address the largest range of platforms and applications.

THALES is working in cooperation with Sofradir and TRT / III-V lab on the evolution of product taking advantage of new capabilities offered by QWIP technology.

Future products are under development, based on:

1. Dual band;

2. Multi-band; and,

3. Polarimetric imagery.

Research

http://www.photonics.com/Article.aspx?AID=40105

http://meetings.aps.org/Meeting/MAR10/Event/121362

http://www.thalesgroup.com/Portfolio/Aerospace/LandJoint_Products_Optronic_self-protection_LWR/?pid=1568

http://www.thalesgroup.com/Markets/Security/Related_Activities/Hypervisor/Content/Next_generation_supervision_architecture/

http://www.ist-isis.org/index/isis-partners.html

http://web.archive.org/web/20080319045528/www.opera2015.org/links/default.asp

http://www.dtic.mil/mctl/DSTL/DSTLSec17gg.pdf

– – – –

To begin tying aforementioned information into a perspective where one needs further research, read these Unwanted Intelligence Annex I reports, at:

http://upintelligence.wordpress.com/2010/10/25/information-technology-directorate

http://upintelligence.wordpress.com/2010/10/23/extraterrestrial-information-technologies

When you’re ready, e-mail, for more.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/