NonReferenceable Objects ( NRO )

[ PHOTO #1 ( above ): U.S. Navy missile launched from Pacific Ocean undersea channel dugout cliff holes near Santa Catalina island November 8, 2010, or as officials claimed it was only a passenger airline jetstream from Hawaii? ( click to enlarge ) ]

[ PHOTO #2 ( above ): U.S. Navy missile launched from Pacific Ocean undersea channel dugout cliff holes near Santa Catalina island November 8, 2010, or as officials claimed it was only a passenger airline jetstream from Hawaii? ( click to enlarge ) ]

[ PHOTO ( above ): U.S. Navy missile launched from Pacific Ocean undersea channel dugout cliff holes near Santa Catalina island November 8, 2010, or as officials claimed it was only a passenger airline jetstream from Hawaii? ( click to enlarge ) ]

NonReferenceable Objects ( NRO )
Harvesting Extra-Superconductive Magnetic Element Properties
by, Concept Activity Research Vault ( CARV )

December 7, 2011 16:00:42 ( PST ) Updated ( Originally Published: November 22, 2010 )

CALIFORNIA, Los Angeles, San Nicholas Island – December 7, 2011 – Depends on how one looks at it, but amongst southern California islands, Santa Catalina rests about 23-miles offshore where the deadly Pacific Ocean channel is deeper than Mount Everest is high.

This Pacific Ocean channel is also home for the world’s largest Great White shark species, and for decades – according to some southern Cailifornia residents – Santa Catalina island is suspected of harboring offshore resident extraterrestrial aliens ( also known as ) ‘non-referenceable aliens’ caught with Unidentified Submersible Objects ( USO ), Unidentified Flying Objects ( UFO ), and /or Non-Referenceable Objects ( NRO ) diving in and out of this sea passageway to their suspected deep sea base.

While there has been no mention of what these extraterrestrial aliens might be doing underwater, a few believe there is a distinct – although remote – possibility they [ nonreferenceable biological entities ] may be utilizing their Non-Referenceable Objects ( NRO ) interalia Unidentified Submersible Objects ( USO ) to harvest a planet Earth natural resource ’super-magnetic fluid’ easily removed by them from ultra-deep sea volcano molten minerals they then only extract the super-magnetic properties therefrom, afterwhich they jetison the remaining molten lava.

While that may be too unbelieveable you are urged to pause before making any final determinations about this report because the U.S. National Oceanic and Atmospheric Administration ( NOAA ) Ocean Scienes and Technology ( OST ) department in the ultra-deep sea below the Pacific Ocean, far west of the California island of Santa Catalina, is right on target with what some believe to be aliens from outer space reaches beyone the Earth.

The 2007 New Zealand American Submarine Ring of Fire ( NZASRoF or NZASRF ) Mariana Trench expedition using the AUV ( Autonomous Underwater Vehicle ) ABE ( Autonomous Benthic Explorer ) was assigned to detail map the ultra-deep sea Brothers volcano, a rhyodacite ( silicious ) explosive volcano more than 2,600 feet ( 800-meters ) above its surrounding deep-sea floor to its caldera rim located 1-mile ( 1,500 meters ) beneath the surface of the Pacific Ocean where it erupted with so much explosive force that it carried carried volatile energy and volume partially emptying its ‘magma chamber’ where its collapsed caldera area measures 1.6 nautical miles ( 3-kilometers ) by ( x ) 2.2 nm ( 4-kilometers ) to a depth of 300 meters below the volcano rim.

Brothers Volcano, however has more to offer out-of the ultra-deep Pacific Ocean where its ‘large magnetic anomalies’ register many hundreds of nano-Teslas, a unit of magnetic field strength amplitudes from its volcanic lava, from nearby just southeast where ‘several volcanic domes’ ( ‘slightly less explosive’ than Brothers major caldera was ) that are ‘younger’ and ‘larger volcanic lava bodies’ associated with ‘greater magnetic anomalies’ expectedly holding a ‘strong magnetic anomaly signature’.

During this expedition, as is the case on many traditional marine geophysical surveys, a Remote Vehicle ( R/V ) Sonne will ‘tow’ ( from the sea surface ) a magnetometer ( dipped into but not far below the surface of the sea where it is dragged along to roughly measure ‘magnetic field amplitudes’ far above buried volcano lava domes revealing ‘magnetic anomaly surveying’ to ‘identify recent lava flows’, however Brothers volcano nearby domes in the southeast Pacific Ocean lay 1,500 to 2,500 meters beneath any surface tow magnetometer that will only provide a ‘very broad kilometer scale’ reading of ‘magnetic anomaly variations’ but not readings like anything positioned near the ‘actual volcanic structure’ so, for a much higher resolution of magnetic anomaly variables, a more precise ‘magnetic anomaly information’ survey can be performed with the Autonomous Benthic Explorer ( ABE ), an Autonomous Underwater Vehicle ( AUV ), that can perform a series of ultra-deep sea dives and flights ( 50 meters above the volcano domes ) following parallel lines while collecting ‘magnetic anomaly measurements’ from a mounted onboard ‘fluxgate magnetometer’ ( the size of a hand palm ) performing swath fly-overs collecting ‘bathymetry’, ‘conductivity’, ‘temperature’, and ‘chemical’ measurement instrument readings used to estimate ‘magnetization of the volcano’ correlated with what is seen on bathymetry and ‘volcanic flow unit identification images.

The Brothers Volcano caldera area sees ‘geothermal vents’ of lava spewing a residual ‘high temperature demagnetization fluid’ that ‘alters magnetic chemistry’ of ‘titanomagnetite’, a natural super-magnetic mineral, however after this ‘geothermal alteration’ even titanomagnetite is rendered far less magnetic. This ‘geographic high-temperature demagnetizing fluid alteration’ can be found even within ‘magnetic dead zones’ where both ‘active’ and ‘inactive’ as well as ‘young’ an ‘old’ lava vent sites exist.

On land surfaces, studies of similar collapsed volcano calderas ( depressions ) suggest calderas were filled with formed deposits of a pyroclastic low-density vesicular material.

References provided, click on: http://upintelligence.wordpress.com/2010/12/09/secret-hfse-properties-part-1/ and http://oceanexplorer.noaa.gov/explorations/07fire/logs/aug1/aug1.html to begin learning more.

Who says that all intelligent biological entities, unknown to us, are not of this world but only from outer space? We already know that the ultra-deep sea holds biological entities foreign to us, however what we ‘do not know’ is the extent of ultra-deep sea biological entity spieces. Does the simply fact that ‘we do not know about all of them’ render them ‘aliens’ on Earth? No. What if there are ‘advanced biological entities’ of the ultra-deep sea? What if these creatures were on Earth before us? If that proves to be the case, then all human beings could very well be new ’aliens’ on Earth. Keyword, being, ‘new’ so just how new makes a ‘new alien’ on Earth?

In 1989, a large Unidentified Submersible Object ( USO ) was discovered floating on the surface of the Pacific Ocean, according to eyewitnesses  aboard an ocean going vessel that tracked the UFO / USO underwater on sonar.

This same USO, was witnessed releasing what appeared to be several smaller Unidentified Submersible Objects ( USO ), submerged on a heading southwest beyond Santa Catalina island where it disappeared off sonar tracking. Did this USO travel underwater to the Mariana Trench or, as yet to be identified, seabase location?

On June 14, 1992 more than two-hundred ( 200 ) Unidentified Flying Objects ( UFO ) interalia Unidentified Submersible Objects ( USO ) were witnessed by at least twenty-seven ( 27 ) residents of Los Angeles County in southern California, according to MUFON ( Los Angeles, California ) chapter UFO / USO researcher Preston Dennett.

These UFO / USO Non-Referenceable Objects ( NRO ), however were not ’hovering in the sky’ but ‘rising-up out-of the Pacific Ocean channel near Santa Catalina island’ west of Santa Monica, California, according to resident witnesses positioned less than 10-miles east in the foothills of Los Angeles.

These two-hundred ( 200 ) UFO / USO  crafts, that came out-of the Santa Catalina island channel of the Pacific Ocean for several seconds, gathered into several cluster formation ( small squadrons ) before each set shot-off upward like missiles into southwest sky beyond southern California’s Santa Catalina island.

Were these two-hundred ( 200 ) Non-Referenceable Objects ( NRO ), which were all headed southwest by air in the same direction as the Mariana Trench in the Pacific Ocean, or were they travelling far beyond it and the atmosphere of Earth?

Worried local residents – including those from Santa Monica, California to as far south as Malibu, California – filed UFO / USO eyewitness reports by telephone with switchboard operators of the Los Angeles County Sheriff’s Department ( LASO ), Santa Monica Police Department ( SMPD ) as well as with other officials.

One ( 1 ) caller, who was recorded by a law enforcement operator, sounded hesitant perhaps, embarrassed, but nevertheless concerned enough to report the unidentifiable objects he had just witnessed.

The wealth of these eyewitness local resident report descriptions were fed by local officials to officials of the federal United States government, amongst which included the U.S. Coast Guard ( USCG ) that reportedly refused to honor a request to search the Pacific Ocean area near Catalina island for any trace remnant discharges any of the two-hundred ( 200 )  UFOs / USOs may have left or jetisoned.

On December 25, 2004 in southern California adjacent to Santa Catalina island the Long Beach Police Department ( LBPD ) had their own mid-air encounter with a UFO / USO officially recorded on their police helicopter Forward Looking Infra-Red ( FLIR ) camera ( see video below ):

During July 2009 in Santa Monica, California another UFO / USO – resembling the same UFO / USO encounter with the Long Beach Police Department helicopter ( video above ) – was filmed in color from the coastal City of Santa Monica, California just off the westcoast Pacific Ocean channel near Santa Catalina island ( see video below ):

On November 8, 2010 another Unidentified Flying Object ( UFO ) and / or Unidentified Submersible Object ( USO ) was sighted in southern California near Santa Catalina island witnessed it while filming it from aboard a southern California City of Los Angeles television ( KCBS TV ) news station helicopter ( see video below ):

The UFO / USO filmed ( above ) by the news station helicopter news was denied by ‘all’ official United States federal government agencies claiming they had no knowledge if it and had nothing to do with the Unidentified Flying Object ( UFO ) sighted.

Interestingly, after U.S. federal officials interviewed the KCBS TV news station helicopter reporter, the same reporter then disavowed what he previously reported by agreeing with U.S. federal officials that what he had seen filmed were just ice crystals glistening off a ‘small airplane’ travelling into the horizon during sunset.

Did this KCBS-TV news reporter undergo U.S. federal government official embedding? Why would the KCBS-TV news reporter change what he previously witnessed and then reported to the greater southern California Los Angeles news area public?

What about the KCBS-TV news helicopter video ( above )?

Listen very carefully to precisely what the news helicopter reporter describes ( below ) in the most ‘general of terms’:

Was the KCBS-TV Sky news helicopter video ‘interrupted’ or ‘earlier replaced’ by ‘decoy film footage’ to ‘disguise what was really being witnessed’ to ‘match general descriptions’ reported the KCBS-TV Sky 2 helicopter news reporter?

Watch what former U.S. federal government Department of Defense ( DoD ) military officials whom have decades of experience with what was sighted off the coast of southern California near Catalina island ( below ):

Now compare what civilian reporters said to agree with ‘official U.S. government cover story lines’ the later reported ( below ):

If the UFO / USO video was implanted or switched, might it have appeared more like the films ( further above )? One may no longer wonder what was actually seen coming out-of the Pacific Ocean near Santa Catalina island. Then again, the UFO / USO may have originated near another southern California island, San Nicholas island ( see video below ).

 

The U.S. National Reconnaissance Office ( NRO ) may have a purposeful misnomer embedded within its initials. Historical research proves that the U.S. federal government entity charged with who “owns the night” refers to Unidentified Flying Objects ( UFO ) as being ‘objects’ of “Non-Reference” or Non-Refrerencable Objects ( NRO ).

What if the U.S. National Reconnaissance Office ( NRO ) actually stands for the U.S. Non-Referenceables Office ( NRO ) charged with reconnaissance over Non-Referenceable Objects ( NRO ) “Who Rule The Night?” Learn a little something more about U.S. federal government clearance levels and what surrounds the NRO ( video below ):

Now, if those following this report are ‘thoroughly convinced’ and ‘absolutely sure’ that what is being discussed here has being cleverly twisted around into something less than factual, the following ( below ) serious speach given by the recently deceased former Minister of Defense for Canada may come to some as a rather shocking surprise:

The following five ( 5 ) color video mini-series ( below ) introduces Unidentied Submersible Objects ( USO ) also known as Non-Referenceable Objects ( NRO ):

The Truth Is Out There Amidst The Abyss Below

Far west of southern California islands, in the Pacific Ocean, lays the Marianna Trench where on May 24, 2009 an ultra-deep sea discovery project [ http://geology.com/press-release/deepest-part-of-the-ocean/ ] documented videos of ’self-illuminating ultra-deep sea creatures’ using no ’artificial light’ but a ‘natural bioluminescent process’ known as ‘counterillumination’, which is really something one needs to ’see to believe’ ( below ):

While the 2009 video ( above ) provides documented factual understandings of evidence for what truly exists ( i.e. bioluminescent sea creatures ) in the ultra-deep sea, another video clip ( below ) that was filmed twenty ( 20 ) years earlier in 1988 provided displays of bioluminescent sea creatures in the ultra-deep sea science-fiction motion picture film “The Abyss.” Perhaps, in another 20-years ( more or less ) in the future, this insight may allow the public to even better fathom and understanding what lies in the ultra-deep sea further ( below):

Now equipped with a new set of eyes, one wishing to go even deeper might research before consulting government on NonReferenceable Objects ( NRO ) claimed nonexistent for the public.

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/

 

Advertisements

Alien Contactee Movements

Colleen Thomas alien contactee fraudster

[ PHOTO ( above ): Colleen Thomas ‘alien contactee movement leader’ ( click to enlarge ) ]

Alien Contactee Movements
by, Kentron Intellect Research Vault ( KIRV )

November 8, 2011 13:22:08 ( PST ) Updated ( March 9, 2011 )

SACRAMENTO -November 8, 2011 – Although an avid following of X-Files television series and movie aficionados still believe the “Truth Is Out There,” few know the real facts surrounding what became of a plethora of radical New Age quasi-religious fundamentalists, festering national malcontents and environmental domestic terrorists that went in to hiding beneath anti-government anti-tax protest groups for decades that were under government microscopes until they resurfaced in a variety of ’new splinter groups’ – some entering what are known as ’extraterrestrial observation groups’ that for the most part remain untouched by law enforcement until ‘financial losses’ and /or ’deaths’ begin occurring on ’members of extraterrestrial alien groups’ – now known as the “Contactee Movement” that appears undergoing a new trend led by what some say is a seriously disturbed middle-class American woman named Colleen Thomas who’s not bashful about exhibiting sexy ways to get her points across to over now well over 60,000 followers she crosses-over many lines with including what some believe unlawful.

Interviewed recently on several news television broadcasts, claimed ‘alien contactee’ Colleen Mary Ellis ( also known as ) Colleen Thomas (aka) Archangel Destiny ( 2010 – California, USA ) promotes her ”alien agenda” history as a cover for an anti-tax and anti-government revolutionary movement, akin to other alien ‘contactee movement’ radical revolutionaries Ruth Norman ( 1954 – UNARIUS Academy Of Science – California, USA ), Lafayette Ron Hubbard (aka) L. Ron Hubbard ( 1952 – SCIENTOLOGY founder claiming aliens from planet Venus contacted him – California, USA ), George Admaski ( 1952 – claiming aliens from planet Venus contacted him – California, USA ), George Van Tassel, Howard Menger, Daniel Fry, those of The Order Of The Solar Temple ( see, e.g. October 1994 alien contactee movement deaths in Quebec, Canada and Switzerland ), Raelien and others claiming to be ’alien contactee’ leaders whom use a wide variety of ruses to attract money and more from a variety of gullible audiences.

Alien Contactee Movement – Frauds & Deaths

For those unfamiliar with how dangerous the “Contactee Movement” has become, telltale signs to be alerted to are provided in the investigative report video ( below ):

Colleen Thomas Alien Contactee – Russian Television RT News

[ Video ( above ): Russian Television ( RT ) News Interviews Colleen Thomas ( click arrow to watch video clip ) ]

Alien Contactee Movement Cults

Peering through an unfathomable pitch black sky, moon-bats may be flitting-about – either up in belfries or in cave group slumber conventions, however far beyond caverns and belfries people for centuries have gazed even-further upward to distant stars, not just stargazers but others – including some groups that congregate to discuss ‘extraterrestrials’ ( ET ) that some government officials refer to as ‘non-referenceable objects’ ( NRO ).

Topics such as ‘unidentified flying objects’ ( UFO ), ‘extraterrestrial biological entities ( EBE ) and “Close Encounters” ( of various “Kinds” ) include anything from those who “want to believe” that either “Hey, I just saw a UFO!” some traverse far beyond the night sky to horror story ‘alien abductions’ ( abductees ) where ‘alien contactees’ ( depending on their particular stories ) may land in a ‘variety of phenomena categories’, amongst many, which psychologists diagnose as versions of Post-Traumatic Stress Syndrome ( PTSD ) involving anything from ‘past life experiences’ ( flash-backs ), ‘memory loss’ ( time travel ) and ‘foreign object implants’ documented by videotaped clinical removals from patients claiming inability to recall having been implanted with the retrieved  ’metallic object’ ( smaller than the diameter of a straight pin ).

Contactee movement stories, however are even more bizarre, claiming a wide variety of contacts albeit ‘in-body physical’ and/or via ‘extra sensory perceptions ( audio-visual and/or ESP ) or ’out-of-body interdimensional perceptions’ ( meaningful presence sensations with and/or without communications ( audio, visual and/or telepathic ) with ‘unknown entities’ that range anywhere in descriptions from:

– Humanoid figures in varying sizes ( child up-to giants ) displayed or projected as smoky wafts ( colors: charcoal grey, yellow, white and translucent ) ’with’ or ’without’ “wings” resembling ‘ghosts’;

– Android machines combinatoral  ’half human’ and ’half-machine’ referred to as ”man-chines” or “manchines”; and,

– Biological entities vary, to include:

– Alien hybrid bipeds varying in size ( height: 4-foot to 8-foot ), various skin tones ( colored: light grey, purple blue smoke ) various eye shapes ( small to large oval-like almond ) colored predominantly charcoal black with enlarged head shapes and skinny long arms;

– Humanoid bipeds varying in size ( 5-foot to 8-foot ), varying in skin tone ( colored: eggshell off-white tan or albino white ) with round eyes ( colored:light red, pink and red );

– Insect multilegs resembling an enlarged ’preying mantis’ with hexagonal faceted eyes;

– Reptile bipeds resembling a human-sized ‘lizard’, ‘tyrannosaur’, ‘dragon’ ( ‘with’ or ‘without’ “wings” ), ’serpent’ or ‘snake’ infamously referred-to as “Reptilians.”

Colleen Thomas claims, within her diatribe against the U.S. Department of Homeland Security ( see video “Colleen Thomas Demonstrating Symptoms of Paranoia Schizophrenia” further below ), that based solely on her own ’close observation’ of FOX News Rupert Murdoch that she wholeheartedly believes ‘he’ is actually a “Reptilian” who shape-shifted itself to resemble that man.

Alien contactee stories, of course, may be embellished-upon or enhanced for reasons unknown to the claimed contactee explaining-away their ‘unusual personal experiences’ as best they can. Some, however claim their ‘experience’ was spiritually “metaphysical” and that any ‘treatment’ they may have been subjected to was either ‘clinically extra high tech’ or ‘purely’ “holistic” whereby their ‘extraterrestrial alien visitor’ imparted within them an ‘enlightenment’, ‘awakening’ or  ’conveyance’ they believe was designed for only one ( 1 ) purpose – for the ‘contactee’ to share a ‘new belief system’ as a “message” passed-on from the alien ( in question ).

Contactee movement cult indoctrinates are predominantly ’co-dependent’ on ’peer acceptance’ that fades as the contactee’s peers do not typically share nor can they experience as much enthusiasm as the contactee wants from them, which typically results in an ever-growing insatiable thirst for acceptance by the contactee who then seeks-out those of a stature somewhat like themself. The contactee’s next step to ‘be accepted’ by ‘someone else’ is a mistake when they reach-out for ‘therapy sessions’ where clinicians typically lump the contactee in with all the rest of those needing as much – if not more- psychological help as the contactee, and typically the contactee ends-up in worse psychological shape than when they first arrived in ‘group therapy sessions’.

The fact is, the contactee ‘never finds peace within themself’ from ‘group therapy sessions’, which is ‘not designed to restore old order previous lives’ but to assist in allowing the patient to create a ‘newer more healthy life for themself’. Unfortunately, and because of these reasons, a contactee will likely veer down a dangerous road to emotional disaster while believing that ‘self-reliance’ was somehow to be ‘built on group acceptance’, which it isn’t nor will it ever be attained through ‘support group sessions’ or in Gestalt hot-seat therapy either. In short, the contactee becomes immmersed in their own unquenchable thirst to be accepted by like-minded individuals, which is what points contactees into extreme forms of therapy typically led by ‘occult practioners’ of ‘metaphysics therapy’ will – along with boat-loads of encouragement – convince contactees they ( alone ) ‘will be able to develop solutions to their own problems’ by ‘metaphysical focusing on their newly therapized inner strength’ by ‘leading others’ in what the ‘contactee knows best’ ( ‘not a practicing psychiatric clinician’ ). The contactee then goes off with what ‘they think they decided on their own’, which is to ‘start preaching to a larger audience’ about their ‘extraterrestrial interdimensional feelings of two-way telepath communications’, but ‘that communication’ is unfortunately ‘not founded in reality’ but within their inner self.

With external socialization deemed manditorily rampant amongst metaphysical like-mindeds, it’s only a matter of time before the contactee locates an ‘attractive supporter’ ( financially or otherwise beneficial in some fashion ) inspiring the contactee to launch themself either ‘into a cult’, as a ‘member’ who will grow-up through the rank and file structure learning most of what they need to know to get ‘other people’s money ( OPM ), or ‘start a fledgling a new cult’ and ‘lead it’ to such a point whereby the contactee’s ‘original financial supporter’ realizes some grateful benefit – one way or the other.

The ever-growing “Contactee Movement” is led by charismatic strategic thinkers able to articulate well-convincing stories designed to lead others to contribute something they otherwise might not do if they were not ‘followers’, ‘joiners’, and ‘risk-taking adventuresome spectators’.

Alien contactee movement leaders do not usually start-out with huge coffins filled with wealth, but usually sell all that is dear to them to obtain ‘seed money’, capital with which to grow a cult organization, and on their way kicking and scratching the eyes out-of anyone to get money, they start scamming others from a small group of followers by sucking as much out-of them as possible, while doling it back to themself as cash drawers fill fast.

Most alien contactee movement cults do ‘not pay taxes’, do ‘not even file taxes’, but instead hide the majority of fraudulent gained income through ‘real estate trusts’, ‘other name holding real estate assets’ that can be ‘liquidly portioned-off’, ‘corporate debenture’ profits, ‘stock derivative payments’ from interest on stock holdings, ‘corporate capitol holdings’, ‘corporate fluid inventory’ liquidations, ‘structured annuity payments’ ( scholastic, medical and other foundations ), and the list goes on besides the ‘old wall-safe’ or ‘sock’ trick where no trace of cash contributions can be frozen if otherwise deposited in a bank.

Alien contactee movement cults use subtle forms or blatant striking measures of intimidation on cult initiates whom receive claims of ‘protection from alien beings’ upon following instructions through guiding leaders of such groups. Let no one forget these venerable words: “We’re going to be murdered,” Marshall H. Applewhite told a reporter in 1972, “And when we are – after 3-1/2 days – we’re going to walk out into life in the next level above human.”

Colleen Thomas Alien Contactee – Anti-Christian Cult

[ Video ( above ): Colleen Thomas Contactee Anti-Religion & Anti-Government Pitch ( click arrow to view video ) ]

Colleen Thomas Alien Contactee – Government Threats

[ Video ( above ): Colleen Thomas Threatens U.S. President Barack Obama & Others ( click arrow on video to view ) ]

Colleen Thomas Alien Contactee – Sex Stunt Shows

Alien contactee leader Colleen Thomas used a ‘new publicity twist’ ( YouTube.Com videos and elsewhere on the internet ) by openly admitting she uses the oldest trick in the book – ”sex” – but not so subtle sexually suggestive techniques:

– Nudity ( total / partial ); – Deep cleavage displays ( bending over, hopping around, and a closet-full of more ); – Striptease ( tour bus group exposure and more ); and, – Pole dancing ( dirty-dancing and more ).

Alien contactee cult queen leader Colleen Thomas continues ‘bringing home the bacon’ ( OPM – ‘other people’s money’ ) by leading thousands of followers down the points ( ‘messages’ ) of her primrose pointed paths successfully growing her ‘extraterrestrial aficionado audience base’.

Colleen Thomas Alien Contactee – In A Nutshell

Information referenced ( immediately below ) includes ‘edited insertions’ [ ‘verified multiple named aliases’ ] for the purpose of ‘legal clarity’ to distinctly identify this particular “Colleen Thomas” as opposed to any others similarly named. Specifically, this Colleen Thomas ‘autobiography’ ( immediately below ) consists of ‘her self-written life story chosen by her as her public advertisement on the internet’ ( elsewhere ), it has been set-forth ‘herein otherwise’ to clearly demonstrate this one ( 1 ) example, amongst many others, surrounding a ‘leader’ within a trend setting ‘extraterrestrial alien’ themed “Contactee Movement” cult bordering on the occult, and while Colleen Thomas may not necessarily publicly promote the drinking of dead children’s blood, her ‘internet financial vampirical schemes’ are uniquely caught within the example ( immediately below ) of publicly ‘practicing fraudulent deceptions’ by espousing one’s self as an ‘alien contactee’, ‘claiming personal benefits to others upon their financial contributions’, ‘self financial enrichment’ using a ‘public artifice to defraud’ medium of the ‘internet’ as that ‘device’ or tool’ message pushing platform ‘simultaneously promoting non-payment of U.S. taxes’ ( against U.S. law ) to ’60,000 followers’, an array of malcontent bashing the U.S. government all of which is found being hosted from an ‘internet psychic hotline website’ ( immediately below ).

– – – –

Source: PREDICT MY FUTURE INC.

Colleen Thomas – Spiritual Light Worker

About

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was born into a large family in 1960. The family was plagued with mental illness and depraved individuals that preyed upon the young and the weak.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] is no stranger to evil, and has been confronted with the dark ones, even ‘to the point of attempts on her life’.

At the age of 14 [ Colleen Mary Ellis ], the wild and virtually uncontrollable 8th grader [ Colleen Mary Ellis ], was sent away to live with a sister in Russellville, Arkansas where within 1-year the unsupervised wild girl [ Colleen Mary Ellis ] was sexual active and then pregnant.

Never having attended High School, and always being treated like she [ Colleen Mary Ellis (aka) Colleen Thomas ] were defective in her [ Colleen Mary Ellis (aka) Colleen Thomas ] mind because she [ Colleen Mary Ellis (aka) Colleen Thomas ] was not intelligent “like men are,” Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] let education go and became a full-time mother [ Colleen Mary Ellis (aka) Colleen Thomas ] of 5 children.

Were it not for her [ Colleen Mary Ellis (aka) Colleen Thomas ] personal ethics – that pained inside her every time she claimed to have graduated high school in order to look good on a job application – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] would likely still have an 8th grade education to this day.

At the age of 32 Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] took her [ Colleen Mary Ellis (aka) Colleen Thomas ] GED and did so well she [ Colleen Mary Ellis (aka) Colleen Thomas ] was ‘talked into taking classes’ at the community college she [ Colleen Mary Ellis (aka) Colleen Thomas ] had gone to for the test.

When the youngest [ Colleen Mary Ellis (aka) Colleen Thomas ] of 5 children started attending school all day, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] began a full-time Biological Sciences program at the University of Nevada Reno where Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] earned her nursing degree.

Over the course of her [ Colleen Mary Ellis (aka) Colleen Thomas ] lifetime Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has shown unusual resilience and tolerance for others, even those channeling the dark toward her [ Colleen Mary Ellis (aka) Colleen Thomas ] in frequently tormenting, even life threatening ways.

A chaotic military life [ the husband of Colleen Thomas ] made for a very adjustable pliable personality is Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] that is tough as nails – when times get hard – but completely flexible with life and people otherwise.

It was always in Colleen’s [ Colleen Mary Ellis’ (aka) Colleen Thomas’ ] nature to stick up for the underdog – even when it was her [ Colleen Mary Ellis (aka) Colleen Thomas ] – but especially when it was someone else.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has always been very adventurous and daring – too much so at times – getting into situations that could have cost her [ Colleen Mary Ellis (aka) Colleen Thomas ] her [ Colleen Mary Ellis (aka) Colleen Thomas ] life, but close calls never detoured her [ Colleen Mary Ellis (aka) Colleen Thomas ] from pressing herself [ Colleen Mary Ellis (aka) Colleen Thomas ] even harder the next time.

As a girl – and young woman – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was very much like a strong and powerful man; at 105-pounds and 5-foot 4-inches tall Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was like a toy poodle that chases after Great Dane’s unaware of the size issue.

Colleen’s [ Colleen Mary Ellis’ (aka) Colleen Thomas’ ] tough reputation was tried time and again, growing-up moving from one school district to another more often than she can count; all of them [ school districts ] always on the poor side of town where Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was ‘not always in the majority race’ [ ethnicity ].

Under such trying – and often times ‘dangerous gang conditions’ – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘learned how to put fear into those who challenged her [ Colleen Mary Ellis (aka) Colleen Thomas ]’ and how to be very diplomatic under fire – ‘resorting to blows’ – only as a last resort when attacked.

A lifetime of seemingly unrelenting hardships and hostility from the dark never killed Colleen’s [ Colleen Mary Ellis (aka) Colleen Thomas ] happy go lucky spirit, that is until her 28-year old daughter Victoria Amour Meckler (aka) Tory A. Meckler (aka) “Margaret Tracy” unexpectedly died 2-years ago.

For the first time in her life Colleen [ Colleen Mary Ellis (aka) Colleen Mary Thomas ] had lost all will to live, but lacked the will to die either; she [ Colleen Mary Ellis (aka) Colleen Thomas ] was simply ambivalent and adrift.

Three [ 3 ] hostile marriages, persistent problems with money, and 20-years in a ‘Christian cult’ came crashing in all at once as the anguish of losing a child overtook her [ Colleen Mary Ellis (aka) Colleen Thomas ].

In the depths of despair, a shift took place that caused Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] to call everything she [ Colleen Mary Ellis (aka) Colleen Thomas ] ever knew or believed into doubt; earlier this year that positionless place Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] found herself in – was finally jerked into a new reality through a ‘kundalini awakening’ that cleared all her [ Colleen Mary Ellis (aka) Colleen Thomas ] chakras at once on January 31st of this year.

On Valentine’s Day of this year a Pleiadian man – an 8-foot tall giant who is a gifted and talented astrophysicist known throughout the galaxy – melded minds with Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] causing her [ Colleen Mary Ellis (aka) Colleen Thomas ] to awaken – knowing things about physics she [ Colleen Mary Ellis (aka) Colleen Thomas ] had never learned before – and had sudden clarity on all the quantum physical matters that had puzzled and eluded her [ Colleen Mary Ellis (aka) Colleen Thomas ] understanding before.

For the last several weeks, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has become consciously aware of her [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘telepathic connection’ to ‘mother Earth’, ‘other planets’ and ‘stars’ and the ‘alien peace keeping forces’ that have the ‘dark’ pinned down here on Earth.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] was given the all-clear, that humanity was safe ‘because the dark were on the run’ – as they realize that the aliens that had simply observed their activity in the past had suddenly began engaging Vril [ Third Reich era – Vril Society ] ships [ UFO disk shaped spaceships ] and ‘human nuclear weapons’ of war.

As a Pleiadian contactee, Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] will no doubt have a ‘role to play’ in ‘building the world of tomorrow’ where the humans are free from the dark spirited carnivorous sentient reptilians who have been feeding on human suffering for 10,000 years.

Earth, will be restored to her original purpose, which is to serve as an oasis for star travelers to visit and enjoy in peace – a vacation destination of intergalactic fame.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has become a ‘virtual overnight hit’ with the ‘pop New Age culture’ and ‘spiritual people’ who have always been open to the possibility of sentient life from other star systems.

After launching her [ Colleen Mary Ellis (aka) Colleen Thomas ] first [ 1st ] speech on July 27th – to the public on her YouTube.Com [ http://www.youtube.com/colesakick ] website to report on her [ Colleen Mary Ellis (aka) Colleen Thomas ] new knowledge of physics and alien affairs – Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has ‘attained International attention’ and ‘support’.

Over 60,000 people had tuned in to hear what Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] had to say, in just 8-weeks time clearly her [ Colleen Mary Ellis (aka) Colleen Thomas ] ‘messages’ are as ‘timely’ as they are ‘beneficial to others’.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] has joined this service [ PREDICT MY FUTURE INC., at: http://www.SpiritualLightWorkers.Com ] so she [ Colleen Mary Ellis (aka) Colleen Thomas ] can ‘earn a living’ as a ‘world teacher’ of ‘Pleiadian physics’, ‘spirituality’ and ‘new forms of community based governance without the need for a central government’ – that ‘only served to enslave Americans and other nations to paying taxes’ with over half their invested energies from working to earn a living. A ‘living need not be earned’ and the ‘abundance of nature need not be sold’; ‘bartering will be the new currency’ of ‘energy exchange’ in the ‘future economy’ that ‘replaces the one that collapsing now’.

Colleen [ Colleen Mary Ellis (aka) Colleen Thomas ] will be happy to answer any question you may have, with regard to ‘her personal life’, ‘alien affairs’ and ‘physics’.

Reference

http://www.spirituallightworkers.com/profile_colleen.html

– – – –

Colleen Thomas Alien Contactee Stripping For Fun, Money, Or More?

Colleen Thomas partying

Colleen Thomas admits publicly [ in one of her many YouTube.Com videos that ‘she personally posted’ ] to utilizing ’sex’as her ”creative marketing tools” capturing ‘financial support’ from those she claims are predominately ‘wealthy old men’ willing to donate money because of exhibiting her ‘special attractions’ – supporting her wantonly wicked lifestyle.

 Colleen Thomas office

Colleen Thomas Alien Contactee Nude Tour Bus Escort Service

From the privacy of her residence – or wherever she happens to be at the time – Colleen Thomas operates an ’alien contactee nude tour bus escort service’ for those attracted through her online ‘nude video chat’ – wanting to see more of ‘her’ and ‘she promises’ the extraterrestrial “Mothership” too, if  ’they send her money’ to be taken on her ‘fraudulent alien contactee gala bus ride’.

7 Colleen Thomas

Colleen Thomas on Tour Bus

Colleen Thomas, alien contactee ’nude tour bus guide’, escorts enthusiastic passengers on a sight-seeing tour bus visiting her various favorite ‘hotspots’ – up and down northern California west coastline of the Pacific Ocean – where out upon cliffs she points to various  ’natural sights’ ( daytime ocean seawater reflecting a spot of the Sun, sparkling glimmers in the ocean, etc. ) she points to and exclaims, “See, over there! That’s the extraterrestrial alien “Mothership!”

Colleen Thomas alien contactee nude tour bus escort service is a ‘device or artifice to defraud’ via her ‘alien nude platform’ or ’mood room’  filled by her with a gala atmosphere of music, drinking, jokes, laughter, dancing and yes, nudity, designed to loosen-up more customer monies from gullible gawkers looking for cheap nude thrills. Well? They get what they pay for, taken for a ride, the Colleen Thomas way!

Colleen Thomas, unfortunately cannot keep her clothes on for those ‘older men’ she taunts, claiming they’re the largest contributors of money to her, while the rest aboard her tour bus go for the ride witnessing part of ’her nude comedy act’  ( below ):

Has anybody complained about the ‘services’ Colleen Thomas continues providing? That was not easily discovered, until one man from the nude tour bus ride came forward with a complaint, however as for now – until eventually incarcerated by law enforcement for blatant displays of ‘indecent exposure’ and/or ‘accepting money under false pretenses’ ( fraud ) – both of which ‘she has delivered plenty of’ to-date – no criminal fraud charges have yet been filed against Colleen Thomas; or, any of her alien contactee movement co-conspirators.

Colleen Thomas exudes an inordinate amount of energy some say is financially driven. Those watching her emotional-ticks soon come to realize her soft parts are rapidly collapsing when delivering her ‘coven-fostered’ spider web of ‘out-of-touch with reality’ spacey broadcasts about ‘interplanetary doom and gloom’ she claims to receive updates from a fourth ( 4th ) dimension and/or fifth ( 5th ) ‘interdimensional being’ – another ‘imaginary man’ ( this one 8-feet tall ! ) in her life – warning her ( she claims ) about what is ‘about to befall everyone on the face of God’s green Earth’ at which point her message turns-to ‘woeth those not buying her psychobabble diatribe’ of ‘the sky is falling’ as she trails-off howling at the moon like a banshee ranting over ‘internet radio’, internet videos’, Twitter, Facebook, and a host of ‘internet blogcasts’ sufficient enough to even make a maggot puke over what some say is ‘just entertainment’.   Colleen Thomas’ gimmick is simply ‘kinky’, without typical ‘sex and violence’ additives, but applies ‘titillating sex’, ‘tantalizing stripteases’, and while encouraging audiences about ‘extraterrestrial interdimensional alien friendlies’, preaches the U.S. government is out to lock-up all its citizens, and then outlines an extremely violent ending for all mankind by claiming an Extinction Level Event ( ELE ) is coming to her audiences everywhere. She is impetuous about being brought-on talkshows and news programs to “warn everyone.”

Colleen Thomas’ gimmick is simply ‘kinky’, without typical ‘sex and violence’ additives, but applies ‘titillating sex’, ‘tantalizing stripteases’, and while encouraging audiences about ‘extraterrestrial interdimensional alien friendlies’, preaches the U.S. government is out to lock-up all its citizens, and then outlines an extremely violent ending for all mankind by claiming an Extinction Level Event ( ELE ) is coming to her audiences everywhere. She is impetuous about being brought-on talkshows and news programs to “warn everyone.”

Cult Queen Enjoying Galactic Immunity?

While this savvy buxom business matron may appear to have not covered her operation bases very well either, some of her most avid followers speculate that her protection from federal, state and local laws stretch to the planet Venus and beyond. What say you, U.S. revenuers?

Colleen Thomas was not always an ‘alien contactee movement sex idol’ thousands see her as today, but in Nevada as a ‘promiscuous nurse’ – according to a ‘few professionals’ intimately familiar with her personalware tradecrafts – who after attending a plethora of colleges, learned ‘how to easily manipulate human behavior’ and ‘administer dangerous chemotherapy drugs’ to weak an dying patients ( including children and the elderly ) suffering a variety of maladies associated with cancer and more.

Colleen Thomas rose through hospital ranks where with her eye keenly fixed on a position as an “Administrator,”  that is what led her into the midst of the Visiting Nurse Association ( VNA ) – dealing with healthcare providers where the eventual niche of ‘administration’ finally fell into place, but ‘not long being able to maintain herself’ as one of the ‘team players’ she saw arranged a relatively new ‘private practice’ niche and dove into it head-first.

In 1998, Colleen Thomas became a registered nurse in Nevada working for KAISER PERMANENTE HOSPITAL, CARSON TAHOE HOSPITAL, and SAINT MARY’S REGIONAL MEDICAL CENTER, dabbled in the field of ‘home healthcare’ ( GENTIVA HEALTH SERVICES and HOMECARE PLUS ), but as an “Administrator” for ‘visiting home nurse healthcare providers’ she appears self-employed working part-time out-of her home-office with ‘home healthcare administrative management’ ( REHABFOCUS HOME HEALTH INC. – Stockton, California ) as well as her ‘more publicly known other activities’ too.

While some question the ‘mental health’ of any alien contactee cult leader, Colleen Thomas previous drug abuse treatment at an Arizona drug rehabilitation center has had her ‘personal well-being’ well diagnosed by at least two ( 2 ) psychiatric professionals on two ( 2 ) seperate occassions.

Colleen Thomas Demonstrating Symptoms of Paranoia Schizophrenia

Colleen Thomas demonstrates her own seething personal attacks on the U.S. Department of Homeland Security, FOX News mogul Rupert Murdoch, and others within a video clip she produced and then published on the internet, at: http://www.youtube.com/watch?v=HsbOgTN40ME

Corporate Hospitality Tradecraft Tricks

Colleen Thomas claims a so-called “marketing background,” but from her apparent open public displays of ‘nudity marketing’, she may have been positioned for what Corporate America curiously uses as a “hospitality hostess” or ‘party-curious corporate girl’ suited better for performing ‘business relation services’ capturing ‘more hard-to-get contracts’ and eventual funding by keeping visiting representatives, brokers and businessmen ‘happily marketed’.

Colleen Thomas went on to apply her coven-like tradecrafts and personalwares hoping to boost a smaller business ( BLUESUMMITS LAND CAPITAL and AMICK ENTERPRISES – Roseville, California ), which only appeared at-first to pay-off but eventually encountered difficulties.

Alien Contactee Queen Has To Be Shasta Mountain Bound

Colleen Thomas visions, amongst a very long list of others, exclaim extraterrestrial interdimensional alien beings exist in an ancient alien underground safehaven city known – by followers of the “Hollow Earth” theory – as “Telos” further claimed secretly located deep down inside the base of Mr. Shasta in northern California where ‘only select enlightened ones’ will be allowed entry to unimaginable wonderful things, but with a catch – somewhat akin perhaps to the old rock ‘n roll song “Hotel California” ( “… you can get anything you want, but when you check-in you can never check-out …” ) – leading victims on a ‘fraud to nowhere’. Unless people are led to their demise ( e.g. as were those in the Jim Jones massacre ), law enforcement will continue failing its ’alert test’ on the Colleen Thomas alien contactee movement.

U.S. Marine Corps Married Life Tossed – Alien Style – By Queen Of Cult

In-addition to Colleen Thomas’ believed part-time work as a home healthcare “Administrator” and “Consultant” to a small group of curiously nearby ”satellite offices,” she not only maintains she’s a “Pleiadian” alien contactee ( spreading more than just words on what is about ready to come ) she goes on claiming she’s ”Executive Director” for QUANTUM AETHERDYNAMICS INSTITUTE and a “Theoretical Physicist” and “Inventor” for DESTINY TECHNOLOGIES – her “galactic plane” headquartered somewhere between the images in her mind, her ‘home office’ ( sewing room ) and ’main office’ ( garage ) where she sits piloting her almighty ”mothership” – an upscale Placer County home ( 1756 Park Oak Drive, Roseville, California, USA ) foreclosed upon her “galactic plane” in the suburbs.

Colleen Thomas XXX-Files Star Sees “The Truth Is Not Out There!”

Whether Colleen Thomas is in-front of an audience of her peers, shamans, witches, alien abductee fanatics or UFO aficionados, her other ‘abhorrent behavior patterns demonstrated’ remain, and although she’s certainly no Al Pacino ( Scarface ) or James Cagney ( White Heat ) – respective motion picture film stars seeing phrases coined such as “The World Is Yours” or “Top Of The World” it appears she’s the only one in-heat over implanted scars that should have her own neon sign blinking, “The Truth Is Not Out There!” ( XXX-Files ) because some – able to pierce veils of secrecy – see quite clearly through a myriad of far-more smoke and mirrors than she or whomsoever she’s taking instructions from could ever conger.

Should anyone know of someone who may have had a bad experience within a “Contactee Movement,” your replies ( by e-mail ) or comments ( below ) are helpful proactive steps to prevention of financial fraud and other serious crimes associated with these types of activities.

Submitted for review and commentary by,

Kentron Intellect Research Vault ( KIRV )
E-MAIL: KentronIntellectResearchVault@gmail.com
WWW: http://KentronIntellectResearchVault.WordPress.Com

References

http://www.youtube.com/watch?v=dKx4MeBybkc
http://www.youtube.com/watch?v=rpYpROtdiMQ
http://wink.com/p/Colleen-Thomas-p:1e0u8e1qs0b44
http://twitter.com/colesakick
http://www.intellectuallyhonestscience.com
http://www.myspace.com/colesakick
http://videogum.com/244851/colleen-thomas-explains-mondays-secret-missile-launch/webjunk/vlogging/
http://www.myspace.com/colesakick/blog
http://www.youtube.com/colesakick
http://www.intellectuallyhonestscience.com
http://www.blogtalkradio.com/The-Next-Paradigm-Shift
http://www.godlikeproductions.com/forum1/message1088335/pg1
http://www.linkedin.com/in/colleenthomas
http://www.spirituallightworkers.com
http://www.publicrecords.com/people-search-records/colleen-m-thomas-in-california
http://humansbeingthelight.ning.com/profile/ColleenMaryEllis
http://www.publicrecords.com/people-search-records/colleen-m-ellis-in-nevada
http://www.verifyphone.com/phone-lookup-reviews/916-784-0566
http://web.archive.org/web/20080422080325rn_2/www.bluesummits.com/content/home.html
http://sacramento.craigslist.org/reo/2128220568.html
http://sacramento.craigslist-real-estate.com/postings/reo/2139874195.html
http://sacramento-ca.americanlisted.com/houses/1200000-home-roseville-map_17471027.html
http://www.redfin.com/CA/Roseville/1756-Park-Oak-Dr-95661/home/19625369
http://www.myyp.com/Sacramento,CA/White-Pages/A/66/book
http://start.cortera.com/company/research/l1o2lyn5l/amick-enterprises/
http://www.zillow.com/profile/nevadabob/
http://www.abovetopsecret.com/forum/thread492937/pg#pid11055816
http://www.slideshare.net/Colesakick/american-fuel-centers
http://www.azteria.com/c/P5795658
http://store.payloadz.com/details/933074-Documents-and-Forms-Presentations-Alien-Contact-Movement-Uncensored.html

Advanced Stealth – Part 2

Quantcast

Advanced Stealth – Part 2
by, Concept Acvtivity Research Vault ( CARV )
April 21, 2009
CALIFORNIA, Los Angeles – April 21, 2009 – The Los Angeles Times article ( below ) mentions NORTHROP GRUMMAN prototype development testing of lighter than air stealth type dirigibles in the Washington, D.C. Metroplex Area ( New Jersey, Pennsylvania, Maryland, Virginia, and Washington, D.C. ).
Might central Virginia’s NORTHROP GRUMMAN SPERRY MARINE DIVISION ( U.S. Route 29 / South Seminole Trail, Charlottesville, Virginia ) test site monitor new stealth technology equipped aerial vehicles?
Airship vessel ships and crafts whose surface skin material that can be remotely-controlled to illuminate like an artificial star or approaching aircraft with landing lights brightly shining downward from reaction to ground-based InfraRed-like invisible light pumped onto a stealth dirigible  ( lighter-than-air, pressurized helium gas, aerial platform, LEO vehicle ), a surveillance vessel whose external surface skin has the technological capability to gather invisible light and convert that hidden light into a refracted visible white-light spectrum like a extremely large floodlight / landing-light / strobe light with emissions emminating from buoyant airborne surveillance platforms. Imagine, central Virginia Greene County western quadrant foothills – near Rockingham County – with an artificial star, a snooping blimp that doesn’t look like a blimp but just an innocent looking star above in the night sky.
Conventional technologies would normally be comprised of bulky and heavy items such as arrays of refractive mirrors, heat diffusers, high-energy collectors / converters, high-energy power supplies, and even more that could not possibly be launched inside a lighter-than-air dirigible airship platform; at least not a blimp that would still wish to remain invisible or un-observable from the ground.
If the craft, vehicle, or vessel surface skin was made from a new electronic sensitivity controlled material, like electronic textile materials the U.S. Department of Defense ( DoD ) DARPA MEMS Biofutures Program has been working on for over 10-years, it might be a material so advanced that it could – on demand / command – ’react’ to any spectrum of invisible light ( blue-green laser communication beamlight ) and be controlled from a long distance wireless control station that might make anything possible. What about super secret electronic textiles and hidden super characteristic capabilities?
What about ‘transparent airships’ and other the new advanced stealth technologies?
– – – –
Scientists Create Observable Fiber Webs That See
July 2006
In a radical departure from conventional optic lens type materials, MIT scientists developed a sophisticated optical system comprised of mesh type webbed light detection fibers.
Having a number of advantages over its conventional lens predecessors, the constructs of this new fiber is currently capable of measuring the direction, intensity and phase of light ( a property used to describe a light wave ) without the lenses, filters, or detector array classic elements of conventional optical systems such as eyes or cameras.
Researchers expect the new system will be capable of much more.
Potential applications range from ‘improved space telescopes’ to ‘clothing that provides situational awareness’ to soldiers, or ‘those visually impaired’.
The transparent fiber-webs could even enable huge computer screens to be activated with beams of light instead of the touch of a finger. “We could use light to enhance interaction with computers and even gaming systems,” said Professor Yoel Fink of the Department of Materials Science and Engineering and the Research Lab of Electronics, leader of the team. “It’s intriguing–the idea of touching with light.”
The scientists report the work in the June 25 online edition of Nature Materials, and it is featured on the cover of the July print issue of the magazine.
The human eye, digital and film cameras, and even the Hubble space telescope rely on lenses and detector surfaces ( like the retina ) to create images. But while these systems deliver excellent images, they are constrained by their size, weight, fragility and limited field of view.
In contrast, the fiber webs are flexible and lightweight. Plus, a fiber web in the shape of a sphere can sense the entire volume of space around it, according to Fink.
“When you’re looking at something with your eyes, there’s a particular direction you’re looking in,” says Ayman Abouraddy a research scientist in Fink’s lab. “The field of view is defined around that direction. Depending on the lens, you may be able to capture a certain field of view around that direction, but that’s it. Until now, most every optical system was limited by an optical axis or direction.”
In addition to having an unlimited field of view, the fiber sphere can also detect the direction of incoming light. Light enters the transparent sphere at one point and exits at another, providing a directional reference back to the light source.
Fink’s team has also created a flat, two-dimensional web of fibers and placed two such webs in parallel. These constructs, which can measure the intensity of incoming light, are capable of generating rough images of objects placed near them, such as the shape of a letter “E” cut stencil-like from paper and lit from behind. The image shows up on a computer screen, reconstructed from a light intensity distribution measured by the webs.
The fibers used in the webs are about 1 millimeter in diameter. They consist of a photoconductive glass core with metal electrodes that run along the length of the core, all surrounded by a transparent polymer insulator.
The fibers can detect light anywhere along their length, producing a change in current in an external electrical circuit. While one fiber on its own cannot detect the exact location of an incoming beam of light, when many fibers are arrayed in a web, their points of intersection provide the exact coordinates of the beam. A computer assimilates the data generated by the web and translates it for the user.
If the fibers were woven into a textile, for instance, an embedded computer could provide information on a small display screen or even audibly.
Improving the imaging power of the fiber webs will require reducing the diameter of the fibers and creating denser webs. Fink says he’s not certain whether the new technology will one day replicate human vision. “Just the idea of imaging with a transparent object is a true eye opener,” he said.
Reference(s)
– – – –
SOURCE: The Los Angeles Times ( Los Angeles, California, USA )
Scientists Create Observable Fiber Webs That See
July 2006
In a radical departure from conventional optic lens type materials, MIT scientists developed a sophisticated optical system comprised of mesh type webbed light detection fibers.March 13, 2009
Having a number of advantages over its conventional lens predecessors, the constructs of this new fiber is currently capable of measuring the direction, intensity and phase of light ( a property used to describe a light wave ) without the lenses, filters, or detector array classic elements of conventional optical systems such as eyes or cameras.
Researchers expect the new system will be capable of much more.
Potential applications range from ‘improved space telescopes’ to ‘clothing that provides situational awareness’ to soldiers, or ‘those visually impaired’.
The transparent fiber-webs could even enable huge computer screens to be activated with beams of light instead of the touch of a finger. “We could use light to enhance interaction with computers and even gaming systems,” said Professor Yoel Fink of the Department of Materials Science and Engineering and the Research Lab of Electronics, leader of the team. “It’s intriguing–the idea of touching with light.”
The scientists report the work in the June 25 online edition of Nature Materials, and it is featured on the cover of the July print issue of the magazine.
The human eye, digital and film cameras, and even the Hubble space telescope rely on lenses and detector surfaces ( like the retina ) to create images. But while these systems deliver excellent images, they are constrained by their size, weight, fragility and limited field of view.
In contrast, the fiber webs are flexible and lightweight. Plus, a fiber web in the shape of a sphere can sense the entire volume of space around it, according to Fink.
“When you’re looking at something with your eyes, there’s a particular direction you’re looking in,” says Ayman Abouraddy a research scientist in Fink’s lab. “The field of view is defined around that direction. Depending on the lens, you may be able to capture a certain field of view around that direction, but that’s it. Until now, most every optical system was limited by an optical axis or direction.”
In addition to having an unlimited field of view, the fiber sphere can also detect the direction of incoming light. Light enters the transparent sphere at one point and exits at another, providing a directional reference back to the light source.
Fink’s team has also created a flat, two-dimensional web of fibers and placed two such webs in parallel. These constructs, which can measure the intensity of incoming light, are capable of generating rough images of objects placed near them, such as the shape of a letter “E” cut stencil-like from paper and lit from behind. The image shows up on a computer screen, reconstructed from a light intensity distribution measured by the webs.
The fibers used in the webs are about 1 millimeter in diameter. They consist of a photoconductive glass core with metal electrodes that run along the length of the core, all surrounded by a transparent polymer insulator.
The fibers can detect light anywhere along their length, producing a change in current in an external electrical circuit. While one fiber on its own cannot detect the exact location of an incoming beam of light, when many fibers are arrayed in a web, their points of intersection provide the exact coordinates of the beam. A computer assimilates the data generated by the web and translates it for the user.
If the fibers were woven into a textile, for instance, an embedded computer could provide information on a small display screen or even audibly.
Improving the imaging power of the fiber webs will require reducing the diameter of the fibers and creating denser webs. Fink says he’s not certain whether the new technology will one day replicate human vision. “Just the idea of imaging with a transparent object is a true eye opener,” he said.
Reference(s)
– – – –
SOURCE: Los Angeles Times ( Los Angeles, California, USA )
Pentagon Plans Blimp To Spy From New Heights
by, Julian E. Barnes
March 13, 2009
USA, Washington, D.C. – The Pentagon said Thursday that it intends to spend $400,000,000.00 (USD) million to develop a giant dirigible that will float 65,000 feet above the Earth for 10-years, providing unblinking and intricate radar surveillance of the vehicles, planes and even people below.
 “It is absolutely revolutionary,” Werner J.A. Dahm, chief scientist for the U.S. Air Force, said of the proposed unmanned airship – describing it as a cross between a satellite and a spy plane.
 The 450-foot-long craft would give the U.S. military a better understanding of an adversary’s movements, habits and tactics, officials said. And the ability to constantly monitor small movements in a wide area – the Afghanistan and Pakistan border, for example – would dramatically improve military intelligence.

“It is constant surveillance, uninterrupted,” Dahm said. “When you only have a short time view – whether it is a few hours or a few days – that is not enough to put the picture together.”

The project reflects a shift in Pentagon planning and spending priorities under Defense Secretary Robert M. Gates who has urged the military services to improve intelligence and surveillance operations while cutting high-tech weaponry costs.

If successful, the dirigible – brainchild of the Air Force and the Pentagon research arm [ DARPA ] – could pave the way for a fleet of spy airships, military officials said.

However, it marks the return to a form of flight that has stirred anxiety and doubt since the 1937 Hindenburg disaster – 36 people were killed when that airship went up in flames in New Jersey.

The military has used less sophisticated tethered blimps, called ‘aerostats’, to conduct surveillance around military bases in Iraq.

But flying at 65,000-ft., the giant airship would be nearly impossible to see beyond the range of any hand-held missile, yet safe from most fighter planes.

And its range would be such that the spy craft could operate at the distant edges of any military theater, probably out of the range of surface-to-air [ SAM ] missiles as well.

The Air Force intelligence, surveillance and reconnaissance abilities have improved dramatically in the last 5-years with the expansion of the Predator and other drones [ Unmanned Aerial Vehicles ( UAV ) ]. Although such craft can linger over an area for a long time, they do not watch constantly.

The giant airship military value would come from its radar system giant antenna – would allow the military to see farther and with more detail than it can now.

“Being able to observe threats [and] understand what is happening is really the game-changing piece here,” Dahm said.

The dirigible will be filled with helium and powered by an innovative system that uses solar panels to recharge hydrogen fuel cells. Military officials said those underlying technologies, plus a very lightweight hull, were critical to making the project work.

“The things we had to do here were not trivial; they were revolutionary,” said Jan Walker, a spokeswoman for the Defense Advanced Research Projects Agency [ DARPA ], the Pentagon research arm.

The U.S. Air Force has signed an agreement with DARPA to develop a demonstration dirigible by 2014. The prototype will be one-third ( 1/3rd ) as long as the planned surveillance craft known as ISIS ( Integrated Sensor Is Structure ), because the radar system will be built into the structure of the ship.

While the military says the craft is closer to a blimp than a zeppelin, which has a rigid external structure, officials usually call the project an airship. Blimps get their shape from pressurized helium gas.

The Pentagon has not yet awarded a contractor to build the prototype. Earlier work was done by NORTHRUP GRUMMAN in Redondo Beach, California; Baltimore, Maryland; and other locations – and by LOCKHEED MARTIN in Palmdale, California; Akron, Ohio; and Denver, Colorado.

Reference

http://www.latimes.com/news/nationworld/nation/la-na-spyblimp13-2009mar13,0,4608400.story

– – – –

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

 

Secret IT Directorate

CIA HQ former buildings

[ PHOTO ( above ): Former U.S. Central Intelligence Agency Headquarters ( click on image to greatly enlarge ) ]

Secret IT Directorate
by, Concept Activity Research Vault ( CARV )

November 22, 2011 11:45:08 ( PST ) Updated ( Originally Published: October 25, 2010 )

USA, Menlo Park, California – November 22, 2010 – Some may not recall the ‘first public announcement ( 2000 )’ of the United States Central Intelligence Agency ( CIA ) ‘private business corporation’ having been referred to as the IN-Q-TEL CORPORATION INTERFACE CENTER (aka) QIC, it was however fomerly known as IN-Q-TEL CORPORATION, but ‘that company name’ was even formerly known as IN-Q-IT CORPORATION (  ’not’ to be confused with the INTUIT CORPORATION business of software application programs QuickBooks and TurboTax ), however the CIA ’reversed’ its previous private business name change decisions back to it now being known as the IN-Q-IT CORPORATION ( IN-Q-IT ) today. Clear as mud, right?

Some wonder whether ”IN-Q-IT” is even ‘really’ the ’true name’ of this CIA ‘private business’ company today, or whether – within the intelligence community pea ‘n shell game of names – other company subsidiary names may have developed, but for now the IN-Q-IT CORPORATION is ‘currently known’ as being the U.S. Central Intelligence Agency ( CIA ) ‘venture capital’ private business corporation.

Important to understand precisely ‘what this CIA private business was supposed to be accomplishing’ versus ‘what the CIA actually did’ with its private business; more recently, however ’what it has become’ and ‘what it is supposed to be accomplishing’ today and for the future.

The curious state of affairs sees no one knowing anything more about the CIA QIC ( IN-Q-TEL Interface Center ) private business corporation than a few did when it began, but ‘now’ no one is even required to inform the public with an accounting to justify anything surrounding it. Why? Because it was meant to be a ‘private business’ company, ‘not’ a U.S. government entity, and ‘that’ was ‘how’ the CIA created it to remain – outside anyone’s purview – for a rather ‘complex’ reason.

The only method, by which an ‘even more complete’ and ‘even more accurate assessment’ may be formulated for an ’even more thorough understanding’ is quite involved and may at times be highly complex. One must not only review ‘multiple facet areas’ this CIA ‘private business company was originally designed to tackle but more-so what it was supposed to accomplish, and from within ‘both’ of those areas, go on to ’realize precisely’ what ‘were’ and ‘still are’ today’s “problem sets” facing the CIA and just ‘how’ they are juggling it all.

Some believe ‘members’ of U.S. Congressional committees’ and subcommittees’ ‘oversight’ had to attend ‘special educational lessons’ designed by the CIA. Did key members of Congress attend what basically amounted to a CIA ‘school’?

The CIA Congressional school was believed non-existent by many left to see other less palatable theories develop into the U.S. Congress having simply tired over too numerous CIA complex oversight reviews – and so much so that Congress relagated its own authority over to CIA in what some believed tantamount to the CIA ‘fox’ guarding its own global-sized intelligence ‘chicken coop’.

Some may now be enlightened to understand what the United States Central Intelligence Agency ( CIA ) decidely phrased as its own ”radical departure” away-from what it perceived as ‘inefficient economic budget support’ for solving its own ’quantum complexities’ within ’highly specific areas’ – still ‘classified’ in the interest of ‘national security’ – burdensomely producing an exponential growth of new ”problem sets” the CIA would only publicly explain – in the most general of terms – as such ‘experienced from within un-named areas’ of ‘science and technology research and development applications’ that the CIA was decidely viewing to establish ‘limits upon’ and go on to a’simultaneously’ establish as ‘marketable derivatives’ it called ”products” that CIA Office of Science and Technology ( S&T ) oversight could ‘manage distribution of information knowledge’ from but on an ‘in-exchange’ contractual agreement basis with ‘cooperative’ “private sector” ‘individuals’, ‘businesses’,  ’institutions’ and ‘organizations’ and thereby ‘establish who held proprietary keys’ to ‘special skill sets’ of what was already protected ’intellectual property rights’ of “existing” technology and CIA global establishment over all ”emerging” ( new upcoming future ) technology proprietary rights by sole marketeering ‘special talents’ and ‘special services’ could be harvested where incredible amounts of ‘profit’ could also be harnessed ( absorbed ) by the CIA.

To many of entrepeneurial independent spirit this CIA QIC private business corporation appeared, in-essence, out-of nowhere, like a new Borg structure infringing on private freedoms of what few once experienced of global marketplace past, and to others CIA QIC tenor was too Godfather-like – making people and entities an offer they couldn’t refuse. While the CIA foresaw such rumors and speculation coming,  in reality, what ‘was’ the ‘CIA’ doing by opening-up ‘its own private business corporation’?

Visionary dreams may be able to see the United States Central Intelligence Agency ( CIA ) ‘shed’ its ’government skin’ to become the ‘world’s largest multi-national corporation’ holding the ‘world’s largest monopoly’ on information technology ( IT ) research and development direction of much of the world’s finest talent resources, i.e. private ‘individuals’, ‘businesses’, ‘institutions’ and ‘organizations’ independently operating outside U.S. Congress ‘oversight, budget justification and related constraints’. Such clever restructuring in-place, CIA would cease to exist as the public knows it today, technically – by legal definition – becoming a wholly-owned ’non-profit organization’ – no longer requiring U.S. Department of the Treasury tax dollar funding. Set free, a new type of CIA would exist with ‘self-determined financing’ and stock market trading profits derived from a host of private sector corporate ‘mergers and acquisitions’ ( M&A ).

While surface dreams of such visionaries might at-first appear ingenious ‘how’ was ‘all’ this ‘actually assembled’?

Before 1999, it took the CIA Office of Legal Counsel less than 1-year to research various United States laws to locate legacy technicality provisions that the U. S. Congress approved allowing the CIA to exercise its own ”radical departure” plan.

By 2000, ’reality’ saw the fetal stages of this CIA private bussiness venture plan developing, leaving the public without hearing anymore further about its progress.

Some believed an ‘initial public offering’ ( IPO ) paying dividends to private individual investors and corporate trading of shares of ‘stock’ in what could have been misconstrued as potentially being the world’s largest ‘insider trading scheme’ headache of the United States Securities and Exchange Commission ( SEC ) whose predictives could only imagine manage the envelopment of multiple new technology area companies trading on ’stock exchange’ floors that could potentially carry forward ‘mutual profit secrets’ paying more funds than anticipated into the CIA private business plan – a “radical departure” away from what otherwise had long been understood as the status quo of world trading – where embarrassing implications might turn’terrorist fund reduction measures’ into ‘profits derived from CIA led secret private business developments in high technology products’. Could such a “radical departure” plan backfire or morphotherwise ’unsophisticated terrorists’ – utilizing improvised munition missions – into a new more powerful community of ’uncooperative competitive business terrorists’? Perhaps.

Implications of a CIA private business group of subsidiary businesses trading stock on ‘open stock market exchanges’ around the world could create an entirely ’new form of intelligence blowback’ of staggering global socio-economic business proportions for future generations.

Today, no overall clear pictures exist on what still remains cloaked in secrets – albeit ’government’ or ‘private’ – where outside both domains this CIA private business enterprise continues growing. But, in which directions?

Prior to 2001, the new CIA plan became a ’high-directional multi-tiered simulataneous growth-oriented economic support expansion’ for and of ‘key-critical secret-sensitive advanced “information technology” ( IT ) derivatives ( “products” )’ that could ‘only be implimented’ by the CIA “identifying” ( targeting ) and “partnering” ( obtaining ) ’exisiting information’ and ‘information tasking ability quotients’ from “global” ( worldwide ) “private sector” masses – an ”infinite” ( unlimited ) supply of ‘private individuals’, ‘private businesses’ and ‘institutions’ to become ‘dedicated taskers’ of controlled CIA “problem sets.”

The CIA private business futures would depend on successful simultaneous utilization of exercising better economic sense to its maximum potential immediately alongside highly specific advanced technological enhancements the United States ’intelligence community’ would be grown under a new ‘broad term secrecy’ commonly known but hidden within what the CIA termed only as ”information technology” ( IT ) that would necessarily require CIA controlled ’targeting’, ‘shaping’ and ‘acquisition’ of a plethora of private business sector information technology ( IT ) application research and development.

Truely a ”radical departure,” as the CIA publicly alluded to, when describing its ‘new mission focus’ – solving CIA “problem sets.”

Although CIA controlled ’special technology’ research and development ( R&D ) was on ‘applications’ that later becale known as ” Commercial Off The Shelf ” ( C.O.T.S. / COTS ) ‘products’ that were in-essence – during early stage informational development – the cruxt of what the CIA wanted presented on its ‘table’ whereupon the CIA would legitimatize and manage ‘mass information exchanges’ the CIA would ’trade’ for ‘other valuable considerations’ but to only a select few ‘private companies’ ( e.g. LOCKHEED, LUCENT, PHILIPS, AT&T, et al. ) that would in-return be ‘capable of offering’ through only ’United States government qualified’ contractual agreement exchanges of whatever the CIA deemed these companies ’could place of further interest’ or ’further the duration of continuing to provide’ what these select private ‘individuals’, ‘companies’, ‘institutions’ and ‘organizations’ were ‘already providing under U.S. government contract agreement harvests’.

The public, however only understood ‘press reports’ that kept all of the aforementioned very ’simple’ – indicating in the vaguest of terms – that ‘products would eventually be sold’ ”through the private sector.”

Secret-sensitive ‘products’, that were in all actuality ‘technological breakthroughs’ were to be traded between CIA selected and controlled business stock holdings, and the CIA IN-Q-TEL INTERFACE CENTER ( QIC ) would privately and thereby secretly manipulate all technology funds derived from what the CIA QIC publicly referred to as those being its ‘partners’ and ‘other vendors’ that would remain ’outside the purview U. S. Congress government budget oversight’ where all private companies remain to enjoy unfettered privledges of privacy.

By utilizing U.S. Department of the Treasury government tax funds – for U.S. government contract agreement funding to ‘private business partners’ – the United States Federal Reserve System follows in CIA footpath lock-step by ’mirroring’ private bank wire transfer monies directed and then redirected through a long chain series of foreign corporation named offshore bank accounts secretly routed back into the U.S. Central Intelligence Agency ( CIA ) IN-Q-IT CORPORATION (aka) QIC  private business enterprise handling ‘venture capital’ where new project funding amounts may be decidely broken down into smaller amounts or pooled into much larger amounts for dispersals to clandestine other secret-sensitive intelligence programs, projects and/or operations that gain the strength to easily remain ‘outside U.S. Congress intelligence oversight board committees and subcommittee scrutinization.

Directorate Central Intelligence ( DCI ) ochestral management arrangements within its IN-Q-IT INTERFACE CENTER ( QIC ) realizes from foreign historical prospectives that when a private business exercises ‘en masse privatized mind teams’ to understands today’s falabilities in-keeping with human frailties encountering CIA inherent procedural compartmentalization of secrets rule ( no “talking around” ) requiring those of such outside each task to be unable to quickly assemble an ‘overall picture’ of what overall CIA plans consist of – at least that’s how it’s supposed to work but rarely does – so, while that alone ( in and of itself ), became a “problem set” to solve that drastic measures needed taking. Hence, the CIA “radical departure” plan has another design serving to counteract intelligence information leaks.

Ingenious, is a very small word to describe even one ( 1 ) facet of this CIA private business plan where the public has its limited understanding confusingly ’shifted from what it perceives to be government secrets’ moved rapidly back and forth between ‘private sector secrets’ in what only but a few perceive to be a ‘new wave intelligence form’ or ‘combinatoric intelligence structuring’ producing a shield ( shell ) to protect even more secrets actually beneath what has become a new globally flexible CIA layered support group strengthening.

As an extremely large ’black budget’ intelligence missions funding source, CIA IN-Q-TEL INTERFACE CENTER would only be the recipient of limited and toned recommendations supplied by the QIC Board of Advisors ( CIA headquarters ) as measures to be reviewed for eventual implimentation by the QIC Board of Trustees for the essential discretionary manipulation of sophisticated:

1. Technologies [ i.e. XEROX PARC RESEARCH CENTER, et al. ];

2. Vendors [ i.e. LOCKHEED, et al. ];

2. Debt [ i.e. TELECREDIT INC., et al. ];

3. Capital [ i.e. MARSH & MCLENNAN CAPITAL INC. ];

4. Stock Market Trading [ i.e. GOLDMAN SACHS & CO. ]; plus,

5. More.

The report ( below ) shows ‘whom’ were initially placed in ‘experienced authoritative positions’ and shows ’whom’ were chosen as ’senior level executive advisors’, all selectively chosen by the CIA pulling them from ‘key critical private businesses’ to ‘guide’ the private U.S. Central Intelligence Agency business venture.

Such should really come as no surprise, at least to those understanding mechanics of international business, trading and finance where all domestic and foreign bank account transactions are mirrored under oversight by the United States Federal Reserve System ( FED ) and U.S. Securities And Exchange Commission ( SEC ), the latter two ( 2 ) of which are ‘overseen’ by the U.S. Central Intelligence Agency ( CIA ).

This information was dervived from, outside ’market sensitive‘ ( stock market trading ) material, a Critical Sensitive National Security report [ August 13, 2001 ] of the U.S. Congress, House of Representatives Subcommittee on Oversight and Investigations ( Subcommittee ) of the Committee on Financial Services relying on information supplied by, amongst others, the SEC Divisions of Enforcement and Corporation Finance, Offices of the Chief Accountant, General Counsel, Compliance, Inspections and Examinations, Office of the Comptroller, Office of Economic Analysis, the U.S. Central Intelligence Agency ( CIA ).

But, is all this ‘really going on’? See full report ( below ).

– – – –

Courtesy: Unwanted Publicity Information Group

Source: X-CIA Files [ now defunct MSN Group website ]

 

 

 

CIA Sends Hi-Tech Tsunami Warnings by, X-CIA Files – Staff Writer [ AnExCIA@bluewin.ch ]

March 12, 1999

USA, California, Menlo Park – The first ‘publicly open contract’ between a so-called ‘private firm’ partnering with the U.S. Central Intelligence Agency (CIA) where the private corporation whose CIA members conceived and funded it is known as the In-Q-Tel Corporation was formerly known as the In-Q-It Corporation.

In-Q-Tel is actually one of many CIA private-sector business partners, which is not all that uncommon a partnership, like what the CIA has had for decades with the MITRE CORPORATION (USA), BELL LABORATORIES ( Canada ), and TRW Power Thrusting Division ( Hawthorne, California, USA ), remote control center for CIA maneuvering Tracking Data and Relay Satellites ( TDRS ) and the Killer HUGHES ( KH-11 ) anti-satellite satellite ( space born destructive laser platform ) series.

The publicly revealed partnership between the CIA and IN-Q-TEL CORPORATION has sent another tsunami warning to Japan at its NIPPON ELECTRIC CORPORATION ( NEC ) high-technology monopoly, that has been right on the heels of advanced high-technology advancements seen within the RESEARCH TRIANGLE PARK ( North Carolina, USA ).

There is some doubt and controversy though between what the CIA says In-Q-Tel is, verses what Q-In-Tel says it is.

CIA claims ( on its website ) that Q-In-Tel is a “‘non-profit’ organization.”

IN-Q-TEL states it has had ’profitability in-mind for quite some time’.

Let’s see what the facts reveal (below), allowing casual observers to make up their own minds about just what IN-Q-TEL ‘really is’:

The In-Q-Tel Heirarchy

CIA IN-Q-TEL INTERFACE CENTER ( QIC ) players are stacked-up on a list that reads like something out-of a Robert Ludlum novel – filled with international intrigue high-tech corporatarchy.

CIA IN-Q-TEL INTERFACE CENTER ( QIC ) Board of Trustees is a Who’s-Who of ‘big corporate’ America:

– Gilman Louie, CEO of IN-Q-TEL CORPORATION, most recently was HASBRO INTERACTIVE Chief Creative Officer and General Manager of the GAMES.COM group ( responsible for creating the HASBRO internet game site ), previously serving as Chairman of the Board of MICROPOSE, CEO and Chairman of SPECTRUM HOLOBYTE, CEO of SPHERE INC., and is on the Boards of Directors of numerous software firms.;

– Lee Ault, Chairman, former Chairman and CEO of TELECREDIT INC.;

– Norman Augustine, former Chairman and CEO of LOCKHEED MARTIN CORPORATION;

– John Seely Brown, Chief Scientist, XEROX CORPORATION and President, XEROX PARC RESEARCH CENTER;

– Michael Crow, Executive Vice Provost of Columbia University;

– Stephen Friedman, Senior Principal of MARSH & MCLENNAN CAPITAL INC., and former Chairman of GOLDMAN SACHS AND CO.;

– Paul Kaminski, former U.S. Department Of Defense ( DoD ) Undersecretary for the U.S. Defense Acquisition and Technology Office, President and CEO of TECHNOVATIONS INC., and Senior Partner in GLOBAL TECHNOLOGY PARTNERS;

– Jeong Kim, President of CARRIER NETWORK, part of the LUCENT TECHNOLOGIES GROUP, and former founder of YURIE SYSTEMS;

– John McMahon, former Deputy Director of U.S. Central Intelligence Agency ( CIA ), former President and CEO of LOCKHEED MISSILE & SPACE COMPANY, and consultant to LOCKHEED-MARTIN CORPORATION;

– Alex Mandl, Chairman and CEO of TELIGENT, and former President and CEO of AT&T; and,

– William Perry, former U.S. Department Of Defense Secretary and currently Berberian Professor at Leiland Stanford University.

New CIA Use Of In-Q-Tel Interface Center ( QI.C )

In-Q-Tel is a new non-profit corporation funded by the CIA to seek Information Technology ( IT ) solutions to the Agency’s most critical needs. A unique venture, was formed to enable the Agency ( CIA ) to have access to ‘emerging and developing information technology’ in a timely manner.

QIC ( IN-Q-TEL INTERFACE CENTER ) is the ‘interface center’ linking the IN-Q-TEL CORPORATION to the Agency ( CIA ).

QIC – CIA Function

QIC develops a problem set for In-Q-Tel, partners with In-Q-Tel in the solution acceptance process and manages the Agency’s relationship with In-Q-Tel.

QIC plans and evaluates the partnership program, protects CIA security and CIA counter-intelligence interests and communicates the QIC / In-Q-Tel venture to the World.

CIA – QIC Function

The CIA, working in partnership with IN-Q-TEL, created the Agency’s ( CIA ) new found organization QIC.

QIC goals now, are to be the leading source for commercial, high impact IT solutions for the Agency ( CIA ), and will be herald as the single most important contributor to the Intelligence Community by the year 2001. QIC will create and use the full range of corporate processes needed to manage QIC (aka) the ” CIA-In-Q-Tel Partnership ” by delivering CIA-accepted IT solutions.

CIA Goals With QIC

Eventually, IN-Q-TEL will take on a life funded by the high-technology consumer public. QIC ( IN-Q-TEL Interface Center ) however, works comprehensively and collaboratively with Agency ( CIA ) IT specialists, customers, IN-Q-TEL experts, Agency ( CIA ) managers, the Chief Information Officer, the Chief Technology Officer, Chief Financial Officer, Agency directorates, and Executive Board to develop an annual coordinated and approved critical ‘problem set’ for IN-Q-TEL.

QIC, leads Agency participation in the partnership’s solution transfer planning, including resources, technology demonstration, and prototype testing and evaluation.

At the same time, QIC works with In-Q-Tel to assure that it addresses issues regarding the transfer of IT solutions into the Agency. QIC also works with Agency customers and their managers to create an environment conducive to the implementation and acceptance of partnership solutions and follow-on initiative.

In-Q-Tel Background

On September 29, 1999 the Central Intelligence Agency (CIA) was treated to something different. In many of the nation’s leading newspapers and television news programs a story line had appeared that complimented the Agency for its creativity and openness.

The media was drawn to a small corporation in Washington, D.C. that had just unveiled its existence and the hiring of its first CEO, Gilman Louie who described the Corporation called, the “IN-Q-IT CORPORATION“, as having been formed “…to ensure that the CIA remains at the cutting edge of information technology advances and capabilities.”

With that statement the Agency ( CIA ) launched a new era in ‘how it obtains cutting-edge technologies’.

In early January 2000, the name of the corporation ( IN-Q-IT CORPORATION ) was changed to IN-Q-TEL CORPORATION.

The ‘origins of the concept’ that has become IN-Q-TEL are traceable to Dr. Ruth David, former CIA Deputy Director for Science and Technology.

She and CIA Science And Technology Deputy Director, Joanne Isham, were the first senior Agency ( CIA ) officials to understand that the information revolution required the CIA to forge ‘new partnerships’ with the ‘private sector’ and ‘design a proposal for radical change’.

The timing of the proposal was fortuitous.

CIA Director of Central Intelligence ( DCI ), Mr. George Tenet, had just launched his own Strategic Direction Initiative ( SDI) – also known as “Star Wars“ – included technology as one of its areas for review.

The study made a direct link between Agency ( CIA ) ‘future technology investments’ and ‘improving’ its ‘information gathering’ and ‘analysis capabilities’.

By the summer of 1998, the Agency ( CIA ) had assembled a few senior Agency ( CIA ) ‘staff employees with an entrepreneurial bent’ and ‘empowered them’ to take the Dr. Ruth David original concept and flesh it out.

Aided by a ‘consulting group’ and a ‘law firm’, they ( CIA ) devoted the next 4-months to making the rounds in Silicon Valley ( California ) – and elsewhere – putting the concept through the wringer. Much of the ‘time was spent listening’.

Many they met with were often critical of one aspect or another of the concept.

But, whether they were ‘venture capitalists’, Chief Executive Officers ( CEO ), Chief Technical Officers ( CTO ) or men of Congress and staffers, all eagerly immersed themselves in spirited debates that enriched the Agency ( CIA ) team and ‘drove the concept in new directions’.

By the end of 1998, the Agency  CIA ) team reached a point at which the concept seemed about right.

Though’ it had changed considerably’ from that which had been proposed initially by Dr. Ruth David, it remained true to its core principles.

It was time to hand the ‘product’ of the Agency ( CIA ) work over to someone in the ‘private sector’ with the ‘experience’ and passion necessary ‘to start the Corporation’.

To the delight of the DCI and Agency ( CIA ) team, Norman Augustine, a former CEO of LOCKHEED-MARTIN and 4-time recipient of the Department of Defense highest civilian award, the Distinguished Service Medal, accepted the challenge.

By February 1999, the Corporation was established as a legal entity, and in March [ 1999 ] it [ IN-Q-TEL CORPORATION ] received its first [ 1st ] contract from the Agency ( CIA ). In-Q-Tel was in business, charged with ‘accessing information technology ( IT ) expertise and technology wherever it existed’ and brought it to bear on the’ information management’ challenges facing the Agency ( CIA ).

In-Q-Tel Creation

As an information based agency, the CIA must be at the cutting edge of information technology in order to maintain its competitive edge and provide its customers with intelligence that is both timely and relevant.

Many times the Agency and the federal government have been the catalysts for technological innovations. Examples of Agency ( CIA ) inspired breakthroughs, include the LOCKHEED AEROSPACE aircraft designed U-2 ( Dragon Lady ) and SR-71 ( Black Bird )reconnaissance aircraft and the CORONA ‘surveillance’ satellites, while the ‘parent of the Internet’ [ Advanced Research Projects Agency (aka) ARPA.NET ] was led forward with the Defense Advanced Research Projects Agency ( DARPA ).

By the 1990s, however – especially with the advent of the World Wide Web – the ‘commercial market’ was setting the pace in IT innovation.

And, as is the nature of a market-based economy, the ‘flow of capital’ and ‘talent’ has irresistibly ‘moved to the commercial sector’ where the prospect of huge profits from ‘initial public offerings‘ ( IPO ) and ‘equity-based compensation‘ has become ‘the norm’.

In contrast to the remarkable transformations taking place in Silicon Valley ( California ) and elsewhere, the Agency ( CIA ) – like many large Cold War era ‘private sector corporations’ – felt itself being ‘left behind’. It ( CIA ) was not connected to the creative forces that underpin the digital economy.

And, of equal importance, many in Silicon Valley ( California ) knew little about the Agency ( CIA ) IT ( information technology ) needs.

The opportunities and challenges posed by the information revolution to the Agency ( CIA ) core mission areas of ‘clandestine collection’ and ‘all-source analysis’ were growing daily.

Moreover, the [ CIA ] challenges are not merely from foreign countries, but also ‘transnational threats’.

Faced with these realities [ by 1997 ], the leadership of the CIA made a critical and strategic decision in early 1998.

The Agency’s leadership recognized that the CIA did not, and could not, compete for IT ( information technology ) innovation and talent with the same speed and agility that those in the ‘commercial marketplace’, whose businesses are driven by “Internet time” and ‘profit’, could.

The CIA mission ‘was’ intelligence collection and analysis, not IT innovation.

The leadership also understood that, in order to extend its reach and access a broad network of IT innovators, the Agency had to step outside of itself and appear not just as a buyer of IT but also as a seller.

The CIA had to offer Silicon Valley ( County of Santa Clara, California ) something of value, a business model that the Valley [ Silicon Valley ] understood; a model that ‘provides’ – for those who joined hands ( became partner affiliates ) with IN-Q-TEL – the ‘opportunity to commercialize’ their ‘innovations’. In addition, IN-Q-TEL ‘partner companies’ would also ‘gain another valuable asset’, access to very difficult CIA ‘problem sets’ that could become ‘market drivers’.

Once the Agency ( CIA ) leadership crossed these critical decision points, the path leading to IN-Q-TEL formation was clear.

In-Q-Tel – Close-Up

In-Q-Tel founder, Norm Augustine, established it as an independent non-profit corporation.

Its Board of Trustees, which now has 10 members, functions as any other board, initially guiding and overseeing the Corporation’s startup activities and setting its strategic direction and policies.

The CEO, who was ‘recruited’ by the Board [ Board of Trustees for IN-Q-TEL CORPORATION ], reports to them [ Board of Trustees for IN-Q-TEL CORPORATION ], and ‘manages’ IN-Q-TEL.

The Corporation [ IN-Q-TEL ] has offices in two ( 2 ) locations:

1. Washington, D.C.; and,

2. Menlo Park, California [ Silicon Valley ].

It [ IN-Q-TEL ] employs a ‘small professional staff’ and a ‘smaller group’ of ‘business consultants’ and ‘technology consultants’.

In-Q-Tel’s mission is to foster the development of new and ‘emerging information technologies’ and pursue ‘research and development’ ( R&D ) that produce solutions to some of the most difficult IT [ information technology ] problems facing the CIA.

To accomplish this, the Corporation [ IN-Q-TEL ] will network extensively with those in ‘industry’, the ‘venture capital’ community, academia, and any ‘others’ who are at the ‘forefront of IT [ information technology ] innovation’.

Through the business relationships that it establishes, In-Q-Tel will create environments for collaboration, product demonstration, prototyping, and evaluation.

From these activities will flow the IT solutions that the Agency ( CIA ) seeks and, ‘most importantly’, the ‘commercial opportunities’ for ‘product development’ by its ‘partners’.

To fulfill its mission, In-Q-Tel has designed itself to be:

– Agile to respond, rapidly to Agency needs and commercial imperatives;

– Problem driven, to link its work to Agency program managers;

– Solutions focused, to improve the Agency’s capabilities;

– Team oriented, to bring diverse participation and synergy to projects;

– Technology aware, to identify, leverage, and integrate existing products and solutions;

– Output measured, to produce quantifiable results;

– Innovative, to reach beyond the existing state-of-the-art in IT; and,

– Over time, self-sustaining, to reduce its reliance on CIA funding.

At its core, In-Q-Tel is designed to operate in the market place on an equal footing with its commercial peers and with the speed and agility that the IT world demands.

As an example, it [ IN-Q-TEL ] can ‘effect the full range of business transactions‘ common to the industry – it is ‘venture [ venture capital ] enabled’, can ‘establish joint ventures‘, ‘fund grants [ grant funding ]‘, sponsor open competitions, ‘award sole source contracts‘, etc. And, ‘because of the many degrees of freedom granted to it‘ [ IN-Q-TEL ] by the Agency ( CIA ), IN-Q-TEL ‘does not require Agency ( CIA ) approval for business deals it negotiates‘.

As such, In-Q-Tel represents a different approach to government R&D.

It [ IN-Q-TEL ] ‘moves away from the more traditional government project’ office model in which the program is managed by the government.

Instead, the Agency ( CIA ) has invested much of the decision-making in the Corporation [ IN-Q-TEL ].

Hence, In-Q-Tel will be judged on the outcomes produced, i.e. the solutions generated, and not by the many decisions it makes along the way.

In-Q-Tel – IT Space

As with many aspects of the In-Q-Tel venture, the Agency took a different approach in presenting its IT needs to the Corporation. It bounded the types of work that In-Q-Tel would perform – its IT operating “space” – by two ( 2 ) criteria:

In the first [ 1st ] instance, it made the decision that In-Q-Tel would initially conduct only unclassified IT work for the Agency ( CIA ).

Second [ 2nd ], to attract the interests of the private sector, it recognized that IN-Q-TEL would ‘principally invest in areas’ where there was both an Agency ( CIA ) need and ‘private sector interest’.

Whereas in the past, much of the commercial computing world did not focus on those technologies useful to the CIA, the intersection zone between intelligence and private sector IT needs has grown tremendously in recent years.

Many of the underlying technologies that are driving the information revolution are now directly applicable to the intelligence business. Examples of commercial applications that also support intelligence functions are:

1. Data warehousing and data mining; 2. Knowledge management; 3. Profiling search agents [ Search Engines and User search requests ]; 4. Geographic information systems [ Satellite Communication Information Systems ]; 5. Imagery analysis and pattern recognition; 6. Statistical data analysis tools; 7. Language translation; 8. Targeted information systems; 9. Mobile computing; and, 10. Secure computing.

Information Security or INFOSEC, a critical enabling technology for all intelligence information systems, is now a mainstream area of research and innovation in the commercial world, due in no small part to the exponential growth in Internet e-commerce.

Thus, there are a number of commercially available security technologies:

1. Strong encryption; 2. Secure community of interests; 3. Authentication and access control; 4. Auditing and reporting; 5. Data integrity; 6. Digital signatures; 7. Centralized security administration; 8. Remote users or traveling users; and, 9. Unitary log-in.

It is, no doubt, the case that the commercial investments flowing into information security outpace the spending made by the Intelligence Community.

Thus, In-Q-Tel will be poised to ‘leverage the investments of others to the benefit of the Agency ( CIA )‘.

Having bounded In-Q-Tel’s IT space with these 2 criteria – ‘unclassified work’ with ‘commercial potential’ – the Agency defined a set of strategic problem areas for the Corporation.

These four ( 4 ) areas have the added and obvious benefit of spanning the needs of all the Agency’s directorates and, hence, its core business functions of collection and analysis:

1. Information Security: Hardening, and intrusion detection, monitoring and profiling of information use and misuse, and network and data protection.;

2. Use of the Internet: Secure receipt of information, non-observable surfing, authentication, content verification, and hacker resistance.;

3. Distributed Architectures: Methods to interface with custom / legacy systems, mechanisms to allow dissimilar applications to interact, automatic handling of archived data, and connectivity across a wide range of environments.; and,

4. Knowledge Generation: Geospatial data fusion and multimedia data fusion or integration and, computer forensics.

Information Technology ( IT ) In-Q-Tel – CIA Occupancy

It will no doubt raise questions with some who will believe that it or the Agency ( CIA ) have other motives.

It is, therefore, important to highlight ‘what In-Q-Tel is not’ and what it [ IN-Q-TEL ] will not do.

First, it is not a front company for the Agency ( CIA ) to conduct any activities other than those spelled out in its Articles of Incorporation and its Charter Agreement.

As a non-profit – 501(c)3 – corporation, it will operate in full compliance with the Internal Revenue Service ( IRS ) regulations and, as with all similar non-profits, its IRS filing will be a matter public record.

In-Q-Tel is ‘openly affiliated with the Agency ( CIA )’, as was made obvious to the world during its press rollout on September 29, 1999.

Of equal importance, it will not initiate work in areas that lead to solutions that are put into so-called “black boxes” – that is, innovations that the government subsequently classifies. To do so would undercut In-Q-Tel credibility with its business partners to the detriment of the Agency.

Finally, IN-Q-TELis a solutions company‘, ‘not a product company‘.

Working through its business partners, it will demonstrate solutions to Agency problems but will not generate products for use by Agency components.

In-Q-Tel ‘inspired products‘ will be ‘developed through separate contractual arrangements‘ involving Agency ( CIA ) ‘components‘ and ‘other vendors‘.

In-Q-Tel – Structure & Staffing

Central to the In-Q-Tel business model are speed, agility, market positioning, and leveraging.

These attributes, taken together, have helped shape the evolving structure of the Corporation. It is one that intends to emphasize the “virtual” nature of the Corporation while minimizing “brick and mortar” costs, i.e. it will operate by facilitating data sharing, and decisionmaking via seamless communications using a private network with broadband connectivity to the Agency and its partners, while limiting direct infrastructure investments in laboratories and related facilities by leveraging the facilities of others.

To facilitate this intent, the In-Q-Tel Board and CEO decided to hire a small staff composed of people with strong technical and business skills.

At present, the Corporation has about ten ( 10 ) staff employees and, it is expected that, by the end of the year 2000, the total will number about thirty ( 30 ).

The CEO is currently designing In-Q-Tel management structure, but the parameters he has set for it indicate that it will be very flat and aligned for rapid decision-making.

How In-Q-Tel Works

One of the great leaps of faith the Agency took in this venture was to recognize, early on, that private sector businessmen were better equipped than it was to design the Corporation and create its work program.

The Agency’s critical role was to develop the initial concept, help form the best Board possible, give IN-Q-TEL a challenging problem set, and then design a ‘contractual vehicle‘ that ‘gave‘ the [ CIA ] CorporationQIC ] the ‘necessary degrees of freedom to design itself and operate in the market place‘.

All of this was accomplished in less than 1-year, to include the design of In-Q-Tel’s initial work program. In-Q-Tel’s current work program is built on a process of discrete, yet overlapping, elements – IT roadmapping, IT baselining, and R&D projects.

The underlying philosophy now driving the In-Q-Tel program is to gain an understanding of the many players occupying In-Q-Tel’s IT space – by roadmap analysis – and, concurrently, test and validate the performance and utility of existing products and technologies – by baseline testing – against current Agency needs.

If the test results are successful, the Agency ( CIA ) has the ‘option’ of quickly ‘purchasing’ the ‘products’ directly ‘from the vendor’.

However, in those ‘cases where there are no existing products or technologies‘, or where a gap exists between the baseline test results and the Agency ( CIA ) needs, IN-Q-TEL will launch R&D projects.

In this way, the Agency ( CIA ) obtains near-term solutions through the evaluation of those products considered “best-in-class” and can target its R&D projects more precisely – that-is, to where ‘commercial‘ or ‘other government [ contract ] IT investments [ $ ] are small‘ or nonexistent.

With its first [ 1st ] year budget of about $28,000,000 million, In-Q-Tel has focused its initial efforts on the IT roadmap and baseline elements of the program.

The roadmap project seeks, first, to ‘identify those in industry, government, and academia who occupy the same IT space as In-Q-Tel’ and, secondarily, to ‘spot existing technologies of potential interest’.

The results will also help In-Q-Tel leverage the technical advances made by others, assess the overall direction and pace of research, avoid duplicating work done by other government entities, and highlight [ identify and target ] potential business partners. The roadmap will be updated and refined by In-Q-Tel throughout the life of its work program.

Two ( 2 ) Team Incubators & Twenty ( 20 ) Hi-Tech Firms [ Businesses ]

These twenty (20) are executing the baseline-testing element of the In-Q-Tel work program. They were selected by an independent review panel of national IT experts convened by In-Q-Tel to evaluate multiple proposals.

Each of the two ( 2 ) teams is working on one ( 1 ) or more ‘incubator concepts’ derived by In-Q-Tel from the Agency ( CIA ) ‘problem set‘ enumerated above. The incubator teams will operate for over a [ 1 ] year. As the In-Q-Tel work program grows, it is possible that other baseline incubator teams will be established.

The R&D part of the program, which In-Q-Tel manages, will soon become the core of its activities, with a growing percentage of its funds directed towards a portfolio of research projects. In-Q-Tel is formulating its research thrusts based on the information and test results gathered under the roadmap and baseline work, aided by extensive interactions with the private sector and the Agency.

The design of the research projects will be set by In-Q-Tel and will vary to meet the mutual interests of the Agency ( CIA ), In-Q-Tel, and its prospective business partners.

As mentioned earlier, In-Q-Tel will ‘draw from a broad range of R&D competition‘ models to attract the business partners it seeks.

In some cases, it may assemble teams of companies that each has a necessary part, but not the whole, of the solution In-Q-Tel seeks.

In ‘other projects’ IN-Q-TEL might be a co-investor in a fledgling company with another business partner such as a venture capital firm.

Or, it could take a more traditional route, using a request for proposal.

In essence, In-Q-Tel will use whatever model most efficiently and effectively meets the needs of all parties to a transaction, with a constant eye towards leveraging its resources and solving the Agency’s IT needs.

Common to most or all of the R&D agreements that In-Q-Tel intends to use will be the subject of intellectual property (IP), or more precisely said, the ownership of IP and the allocation of IP generated revenues.

In the area of IT R&D, a deal is typically not struck until all of the parties’ IP rights are clearly established.

In-Q-Tel’s acceptance within the IT market place depends heavily on its ability to negotiate industry standard IP terms.

Recognizing this, the Agency ( CIA ) agreement with In-Q-Tel allows it and/or its partners to retain title to the innovations created and freely negotiate the allocation of IP derived revenues.

The only major stipulation is that the Agency ( CIA ) retain traditional “government purpose rights” to the ‘innovations‘.

Contract Model – In-Q-Tel

Before the partnership between In-Q-Tel and the Agency became a reality, the Agency ( CIA ) had to develop a new contract vehicle that granted the Corporation [ QIC ] the degrees of freedom it needed to operate in the market place.

Most Agency ( CIA ) contracts, including those in R&D, are based on the Federal Acquisition Regulations ( FAR ), however FAR is often viewed by industry as overly burdensome and inflexible. And, it has been the U.S. Department of Defense ( DoD ) experience that smaller companies often will not contract with the government because of the extra costs they would incur to be FAR compliant.

Because the Agency ( CIA ) wanted to encourage such companies to work with In-Q-Tel, it took a different approach and designed a non-FAR agreement with the IN-Q-TEL CORPORATION.

It [ CIA ] also adopted elements from the old internet Godfather, i.e. Advanced Research Projects Agency or ARPA and its model based on “Other Transactions ( OT )” authority granted to the DoD [ U.S. Department of Defense ] by Congress [ U.S. Congress ].

OT [ Other Transaction ] agreements ‘permit authorized government agencies’ [ e.g. CIA ] to design R&D agreements outside the FAR.

The hoped for result is to spur greater flexibility and innovation for the government. In addition, it permits well-managed businesses, large and small, to perform R&D for the government, using their existing business practices and procedures.

Using an ARPA model OT agreement as a guide, the Agency ( CIA ) designed a 5-year Charter Agreement that describes the broad framework for its relationship with IN-Q-TEL, sets forth general policies, and establishes the terms and conditions that will apply to future contracts. In addition, a short-term funding contract was negotiated that includes In-Q-Tel’s “Description of Work”.

Together these documents define the metes and bounds of the Agency ( CIA ) relationship with In-Q-Tel and permit IN-Q-TEL to negotiate agreements with its partners, absent [ without ] most government flow down requirements.

In-Q-Tel – Advancements

The In-Q-Tel venture is one that has challenged the Agency to think creatively and quickly to address the fundamental changes that the information revolution is having on its core business.

It responded by setting aside traditional policies and practices in many areas and established a new partnership with industry and academia, based on shared interest and mutual benefit.

But, one cannot ignore that this venture involves risk, both for the Agency and In-Q-Tel. From the Agency’s perspective there are three ( 3 ) major areas that will require constant attention:

1. Managing its relationship with IN-Q-TEL;

2. Solution transfer; and,

3. Security.

Perhaps the most important of the three is the first, managing the relationship without stifling In-Q-Tel’s competitive edge.

IN-Q-TEL is a small independent corporation ‘established to improve the mission performance of a much larger government Agency‘. [ ? National Secruity Agency ( NSA ) ? ]

The imperatives that led to In-Q-Tel have many parallels in industry. In fact, the IT sector is replete with examples of a large corporation seeking to improve its competitiveness by either purchasing a small start-up company or forming a subsidiary.

The ‘parent corporation‘ [ ? ] sees in ‘its offspring‘ traits that it no longer possesses – speed, agility, and expertise. But, for these traits to be realized, ‘the start-up‘ must operate unencumbered from the ‘parent corporation‘ [ ? ], whose natural tendency is to rein in and control it.

Similarly, the Agency ( CIA ) will have to restrain its natural inclination to micromanage IN-Q-TEL and, instead, allow the Corporation [ QIC ] the freedom to prosper. It must have continuous insight into In-Q-Tel’s activities, but must understand that In-Q-Tel is responsible for its own operations, including the design and management of the work program.

Acceptance by Agency ( CIA ) components of In-Q-Tel inspired solutions will be the most important measure of success in this venture. It is also likely to be the hardest.

While there is every expectation that In-Q-Tel will become commercially successful and seed innovative solutions, if they are not accepted and used by Agency line managers, then the overall venture will be judged a failure.

Although In-Q-Tel has a critical role in the solution transfer process, the burden rests with the Agency, since the challenges are as much managerial and cultural as they are technical.

The Agency ( CIA ) Chief Information Officer ( CIO ), directorate heads, and component directors will all have to work closely with IN-Q-TEL to overcome bureaucratic inertia and identify eager recipients of the innovations that the Corporation develops.

Agency ( CIA ) “product champions” for each IN-Q-TEL project should be identified early and should participate fully in its formulation, testing, and evaluation. Incentives should be considered for those Agency ( CIA ) components that commit to projects with unique risks or that require extensive personnel commitments.

These and other strategies will be employed to ensure that the return on the Agency’s investment in In-Q-Tel translates into measurable improvements in its mission performance.

The open affiliation between the CIA and In-Q-Tel is yet another unique aspect and challenge for this venture. Although the Corporation [ QIC ]will be doing only unclassified work for the Agency ( CIA ), the nature of its IT research and its association with a US intelligence agency will undoubtedly attract the interests of foreign persons, some with questionable motives.

The obvious security ramifications of this scenario were well considered in the decisionmaking process that led to In-Q-Tel’s formation. It was ultimately decided that the risks are manageable and, in many ways, are similar to those faced by any high-tech company trying to protect its IP and trade secrets.

IN-Q-TEL and the Agency ( CIA ) will be working closely to ensure that the Corporation [ QIC ] operates with a high degree of security awareness and support.

In-Q-Tel has a critical role in meeting these three ( 3 ) challenges. However, it’s most persistent challenge will be developing and sustaining a reputation as a business that:

1. sponsors leading edge research;

2. produces discoveries; that can be,

3. profitably commercialized.

Once it has established a record of accomplishment in these two areas, the high caliber IT talent the Agency hopes to reach through In-Q-Tel will be drawn to the Corporation.

In-Q-Tel Future

Those of us at the Agency who helped to create In-Q-Tel are endlessly optimistic about its prospects for success. The early indicators are all positive. Among them is the caliber of the people who stand behind and lead the Corporation and the initial reaction from industry and the trade press to its formation.

IN-Q-TEL Board of Trustees is at least the equal of any large corporation’s board. They are committed to the Agency ( CIA ) mission, the new R&D model that IN-Q-TEL represents, and have invested much of their time to its formation.

The Agency and the nation are in their debt.

The Board [ IN-Q-TEL Board of Trustees ] also recruited an outstanding CEO who brings with him the ‘experiences’ and ‘contacts’ of his Silicon Valley [ California ] base and an established reputation for starting and growing new IT companies.

The favorable press coverage of In-Q-Tel combined with the industry “buzz” engendered by the Board and CEO have brought a flood of inquiries by those interested in doing business with the Corporation. And, most importantly, its work program is already beginning to achieve results that the Agency ( CIA ) can use and that its ( CIA ) partners can commercialize.

Judging by the record to date, the road ahead appears promising. But, In-Q-Tel’s fate also rests in part on those institutions charged with oversight of the Agency and its budget.

Congress has supported the Agency as it launched this new venture. The U.S. Congress “seeded the venture with start-up funding” when it was still in its conceptual phase, but asked hard questions of the Agency throughout the design and formation of In-Q-Tel.

Members understood that starting an enterprise such as IN-Q-TEL is ‘not risk free‘. As with all R&D efforts in government and industry, there will be some home run successes but also some failures. That is the price the Agency must be prepared to pay if it wants to stay on the leading edge of the IT revolution.

With In-Q-Tel’s help plus the continued support of Congress [ U.S. Congress ] and Office of Management and Budget ( OMB ), as well as from the traditional Agency ( CIA ) ‘contractor community‘ and ‘others‘, an “e-CIA” of the next century [ 21st Century ] will evolve quickly, to the benefit of the President and the national security community.

Notes Of Interest

For the next one ( 1 ) or two ( 2 ) years [ 1999 – 2000 ], IN-Q-TEL will accept work only from the CIA‘.

All solutions that it provides to the CIA will be made available to the entire Intelligence Community.

Codified in a 5-year Charter Agreement with the CIA and a 1-year funding contract that is renewable annually. As stipulated in the Charter Agreement, “…the Federal Government shall have a nonexclusive, nontransferable, irrevocable, paid-up license to practice or have practiced for or on behalf of the United States the subject invention throughout the world for Government purposes”.

The Agency ( CIA ) component that has day-to-day responsibility for guiding the CIA relationship with IN-Q-TEL, including the ‘design and implementation of the contract’ and the ‘problem set’, is the IN-Q-TEL INTERFACE CENTER ( QIC ) which resides inside the CIA Directorate of Science and Technology.

Circa: 2002 – 2008

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION 2500 Sand Hill Road – Suite 113 Menlo Park, California 94025 – 7061 USA TEL: +1 (650) 234-8999 TEL: +1 (650) 234-8983 FAX: +1 (650) 234-8997 WWW: http://www.inqtel.com WWW: http://www.in-q-tel.org WWW: http://www.in-q-tel.com

IN-Q-TEL INCORPORATED (aka) IN-Q-IT CORPORATION P.O. Box 12407 Arlington, Virginia 22219 USA TEL: +1 (703) 248-3000 FAX: +1 (703) 248-3001

– –

IN-Q-TEL focus areas, surround:

– Physical Technologies; – Biological Technologies; – Security; and, – Software Infrastructure.

– –

IN-Q-TEL

Investments –

Strategic Investments, Targeted Returns

In-Q-Tel is ‘building’ a ‘portfolio of companies’ that are ‘developing innovative solutions’ in ‘key technology areas’

Similar to many ‘corporate strategic venture’ firms, In-Q-Tel seeks to ‘optimize potential returns’ for our clients — the CIA and the broader Intelligence Community— by investing in companies of strategic interest.

In-Q-Tel engages ‘start-ups’, ‘emerging’ and ‘established’ companies, universities and research labs.

In-Q-Tel structure attractive win-win relationships through ‘equity investments’, as well ‘strategic product development funding’, and ‘innovative intellectual property arrangements’ and ‘government business development guidance’.

An Enterprising Partner –

In-Q-Tel ‘portfolio companies’ value a ‘strategic relationship’ with a ‘proactive partner’.

Companies, that work through In-Q-Tel due diligence process, know their technologies have the potential to address the needs of one of the most discriminating enterprise customers in the world.

In-Q-Tel takes a hands-on approach, working closely with our ‘portfolio companies’ to help ‘drive their success’ in the ‘marketplace’ and to ‘mature [ ‘grow’ ] their technologies’.

In-Q-Tel ‘investment goals’ are focused on ‘return’ on technology – a ‘blend of factors’ that will ‘deliver strategic impact’ on the Agency [ CIA ] mission:

– Effective ‘deployments’ of innovative technologies to the CIA; – Commercially successful ‘companies that can continue’ to ‘deliver’ and ‘support’ innovate technologies; and, – Financial ‘returns to fund further technology investments’ to ‘benefit the Intelligence Community’.   Investing In Our National Security –

In just a few short years, In-Q-Tel has ‘evaluated’ nearly two thousand [ 2,000 ] ‘proposals’:

75% [ 1,500 ] of which have come from companies that had never previously considered working with the government.

To date, In-Q-Tel ‘established strategic relationships’ with more than ‘twenty’ ( 20 ) of these ‘companies’.

Read more about our ‘portfolio companies’ and ‘technology partners’, or learn how to submit a business plan to In-Q-Tel.

Areas Of Focus –

IN-Q-TEL focuses on next generation technologies for gathering, analyzing, managing and disseminating data. Learn more about our areas of focus:

Knowledge Management: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/km.html ];

Security and Privacy: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sp.html ];

Search and Discovery: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/sd.html ];

Distributed Data Collection: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/dd.html ]; and,

Geospatial Information Services: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/tech/gi.html ].

Submit A Business Plan –

“In-Q-Tel also has garnered a reputation in the tech and VC [ Venture Capital ] worlds for being hard-nosed during due diligence. Unlike some venture firms, In-Q-Tel is staffed with hard-core techies who know how to put a program through the ringer. They’ve also got one of the roughest testing domains: the computer systems of the CIA.” – Washington Business Journal ( November 19, 2001 )

– View our criteria [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/submit/index.html ] for submission, and apply for consideration online.

Media Resources –

– Investment Portfolio: [ http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf ].

Reference

http://web.archive.org/web/20020630223724/www.inqtel.com/invest/index.html

– – – –

Circa: 2002

IN-Q-TEL

Investments –

Technology Partners ( 2002 ) –

INKTOMI [ http://www.inktomi.com ] ( Leading Edge Search and Retrieval Technology )

INKTOMI, based in Foster City, California ( USA ), has offices elsewhere in North America, Asia and Europe.

INKTOMI division business, involves:

Network Products – comprised of industry leading solutions for network caching, content distribution, media broadcasting, and wireless technologies; and,

Search Solutions – comprised of general Web search and related services, and ‘enterprise’ search.

Inktomi ‘develops’ and ‘markets’ network infrastructure software essential for ‘service providers’ and ‘global enterprises’.

Inktomi ‘customer’ and ‘strategic partner’ base of leading companies, include:

MERRILL LYNCH; INTEL: AT&T; MICROSOFT; SUN MICROSYSTEMS; HEWLETT-PACKARD; COMPAQ; DELL; NOKIA; AMERICA ONLINE ( AOL ); and, YAHOO.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Lead System Integrator ( LSI ) – SAIC LSI [ http://www.saic.com/contractcenter/ites-2s/clients.html  ]

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ), founded in 1969 by Dr. J. R. Beyster who remained with SAIC for 30-years until at least November 3, 2003, has had as part of its management, and on its Board of Directors, many well known former U.S. government personnel, including:

– Melvin Laird, Secretary of Defense in the Richard Milhouse Nixon Presidential Administration;

– William Perry, Secretary of Defense in the William Jefferson Clinton Presidential Administration;

– John M. Deutch, U.S. Central Intelligence Agency ( CIA ) Director of Central Intelligence ( DCI ) in the William Jefferson Clinton Presidential Administration;

– U.S. Navy Admiral Bobby Ray Inman, U.S. National Security Agency ( NSA ) and U.S. Central Intelligence Agency ( CIA ) – various employed capacities in ‘both’ Agencies – in the Gerald Ford Presidential Administration, Billy Carter Presidential Administration and Ronald Reagan Presidential Administration;

– David Kay, who led the search for Weapons of Mass Destruction ( WMD ) – following the 1991 U.S. Persian Gulf War – for the United Nations ( UN ) and in the George W. Bush Sr. Presidential Administration following the 2003 U.S. invasion of Iraq.

In 2009, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) moved corporate headquarters to Tysons Corner at 1710 SAIC Drive, McLean, Virginia ( USA ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) is a scientific, engineering and technology ‘applications company’ with numerous ‘state government clients’, ‘federal government clients’, and ‘private sector clients’.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) works extensively, with:

U.S. Department of Defense ( DOD ); U.S. Department of Homeland Security ( DHS ); U.S. National Security Agency ( NSA ); U.S. intelligence community ( others ); U.S. government civil agencies; and, Selected commercial markets.

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) Subsidiaries –

SAIC VENTURE CAPITAL CORPORATION; SCICOM TECHNOLOGIES NOIDA ( INDIA ); BD SYSTEMS ( BDS ); BECHTEL SAIC COMPANY LLC; BECK DISASTER RECOVERY ( BDR ); R.W. BECK; BENHAM; CLOUDSHIELD; DANET; EAGAN MCALLISTER ASSOCIATES INC.; HICKS & ASSOCIATES MEDPROTECT LLC REVEAL; SAIC-FREDERICK INC.; NATIONAL CANCER INSTITUTE ( NCI ); SAIC INTERNATIONAL SUBSIDIARIES; SAIC LIMITED ( UK ); CALANAIS ( SCOTLAND ); VAREC; APPLIED MARINE TECHNOLOGY CORPORATION; EAI CORPORATION; and, Others.

In 1991, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) received transference of the U.S. Department of Defense ( DOJ ), U.S. Army ( USA ), Defense Intelligence Agency ( DIA ) ‘Remote Viewing Program’ renamed STARGATE Project.

In January 1999, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) consultant Steven Hatfill saw SAIC vice president Joseph Soukup internally ( with no outside client ) commission ( with no outside client ) William C. Patrick – a retired leading figure in the legacy U.S. bioweapons program – see a report produced ( 28-pages on Feburary 1999 ) on terrorist anthrax attack possibilities via Unitd States postal mailings prior to 2001 anthrax attacks in the United States.

In March 2001, the U.S. National Security Agency ( NSA ) had SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) in ‘concept definition’ phase for what later became known as the NSA TRAILBLAZER Project, a “Digital Network Intelligence” system intended to ‘analyze data’ carried across computer ‘networks’.

In 2002, the U.S. National Security Agency ( NSA ) chose SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) to produce a ‘technology demonstration platform’ for the NSA TRAILBLAZER Project, a contract worth $280,000,000 million ( USD ).

TRAILBLAZER Project participants, included:

BOEING; COMPUTER SCIENCES CORPORATION ( CSC ); and, BOOZ ALLEN HAMILTON.

In 2005, TRAILBLAZER – believed by speculators ( http://www.PhysOrg.Com et. al. ) to be a continuation of an earlier data mining project THINTHREAD program – saw U.S. National Security Agency ( NSA ) Director Michael Hayden inform a U.S. Senate hearing that the TRAILBLAZER program required several hundred million dollars over budget – consequently trailing years behind schedule waiting for approvals.

From 2001 through 2005, SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) was primary contractor for the $600,000,000 million ( USD ) TRILOGY Program, a three ( 3 ) part program – intended to replace obsolete FBI computers with a then-new state-of-the-art cutting edge technology ‘secure high-speed computer network system’ that would install 500 computer network servers, 1600 scanners and thousands of desktop computers in FBI field offices – that on December 2003 delivered to the U.S. Department of Justice ( DOJ ) Federal Bureau of Investigation ( FBI ) its SAIC “Virtual Case File” ( VCF ), a $170,000,000 million ( USD ) software system designed to speed tracking of terrorists, better accurize communications amongst agents fighting criminals with this FBI ‘critical case management system’, however nineteen ( 19 ) different government managers involved 36 contract modifications averaging 1.3 FBI changes everyday totaling 399 changes during 15-months afterwhich the FBI continued arguing ( through its own intermediary, AEROSPACE CORPORATION ) changes until the U.S. Department of Justice ( DOJ ) Inspector General ( IG ) criticized its ‘FBI handling’ of SAIC software, whereon February 2005 SAIC ‘recommended’ the FBI at-least ‘begin using’ the SAIC TRILOGY VCF ‘case management system’.

On September 27, 2006 during a special meeting of SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) stockholders, employee-owners voted by a margin of 86% to proceed with the initial public offering ( IPO ) whereupon completion SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) also paid – to existing stockholders – a ‘special dividend’ of $1,600,000,000 billion to $2,400,000,000 billion ( USD ).

On October 17, 2006 SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) conducted an initial public offering ( IPO ) of common stock offering of 86,250,000 shares priced at $15.00 per share. Underwriters – BEAR STEARNS and MORGAN STANLEY – exercised over-allotment options resulting in 11,025,000 million shares seeing the IPO raise $1,245,000,000 billion ( USD ).

SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ( SAIC ) had approximately 46,000 total employees, 16,000 employees were in McLean, Virginia ( USA ) and another 5,000 employees were in San Diego, California ( USA ).

SRA INTERNATIONAL INC. ( SRA ) [ http://www.sra.com/about-us/profile.php ]

SRA INTERNATIONAL INC., founded in 1978, headquartered in Fairfax, Virginia has additional U.S. offices.

SRA INTERNATIONAL INC. is a leading provider of information technology services and solutions to clients in national security, health care and public health, and civil government markets, requiring:

– Strategic Consulting; – Systems Design, Development, and Integration; – OutSourcing; and, – Operations Management.

SRA INTERNATIONAL INC. also delivers business solutions, for:

– Text mining; – Data mining; – Disaster and Contingency Response Planning; – Information Sssurance; – Environmental Strategies – Environmental Technology; – Enterprise Systems Management; and, – Wireless Integration.

SRA INTERNATIONAL INC. ORIONMagic ®

– –

Circa: 2002

IN-Q-TEL

Investments –

Portfolio Of Companies ( 2002 ) – Partial List

ARCSIGHT [ http://www.arcsight.com ] ( Security Management Software for The Enterprise )

ArcSight, founded in May 2000, is located in the heart of Silicon Valley, California ( USA ).

ArcSight is a leading supplier of enterprise software that provides the security “air traffic control system” for large, geographically dispersed organizations. These organizations are augmenting their network infrastructure with a wide variety of security devices such as firewalls, intrusion detection and identity management systems that produce a barrage of uncoordinated alarms and alerts that overwhelm the security staff.

With its ‘centralized view’ of ‘all security activity’ combined with ‘real time analysis’ of ‘events’, by both ‘operating at the perimeter and inside’ the organization, ArcSight provides a ‘single solution’, for:

Event capture; Log aggregation; Real time correlation; Incident investigation; and, Reporting.

ArcSight ‘separates’, the ‘true threats and attacks’ from the ‘millions of false alarms and non-threatening activities’ that occur each day, focusing attention and resources on high-priority problems.

The company has delivered enterprise, ‘security management solutions’ to leading ‘financial services’, ‘government’ and ‘manufacturing’ organizations while ‘attracting capital’ from ‘leading investors’, such as:

IN-Q-TEL; KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, SUMITOMO CORPORATION.

ATTENSITY CORPORATION [ http://www.attensity.com ] ( Text Extraction for Threat Detection )

Attensity Corp., founded in 2000, is a privately held company with dual headquarters in Mountain View, California ( USA ) and Salt Lake City, Utah ( USA ).

Attensity Corp. provides enterprise, ‘analytic software’ and ‘services’, to:

Government agencies; and,

Fortune 500 companies.

Attensity has developed breakthrough text extraction technology that transforms information captured in free form text into structured, relational data.

Attensity enables government agencies to dramatically expand their analytical capabilities in the area of ‘threat detection’ by, powering:

Link analysis; Trending; Exception reporting; Other advanced analytics; and, Knowledge management applications.

Attensity technology is the culmination of nearly a decade [ 10-years ] of research in computational linguistics.

Attensity Corporation customers include:

IN-Q-TEL, a strategic venture group funded by the CIA; WHIRLPOOL; and, JOHN DEERE.

ATTENSITY CORPORATION investor, is:

IN-Q-TEL

BROWSE3D [ http://www.browse3d.com ] ( Advanced Web Navigation )

BROWSE3D, founded in 2000, is located in the Dulles Technology Corridor of northern Virgina.

The company’s first Knowledge Management product, the Browse3D Browser, enables Internet users to browse Web sites using a dynamic, interactive, 3 dimensional ( 3-D ) display environment.

One year later [ 2001 ] the Browse3D Browser was recognized as the Best Internet Software of 2001 at the COMDEX Fall Technology Show ( Las Vegas, Nevada, USA ).

Browse3D launched its ‘consumer product’ in January 2002.

For the past 2-years [ since 2000 ], Browse3D has been working to re-invent the online researcher’s tool set. A researcher’s ability to ‘harvest relevant online data’ is often limited by the tools available to view that data.

Future products and technologies promise additional improvements in the way users ‘find’, ‘organize’, ‘save’ and ‘exchange’ web-based ‘content’.

BROWSE3D early-stage venture funding provided, by:

IN-Q-TEL; and, angel investors.

CANDERA INC. [ http://www.candera.com ] ( Enterprise Storage )

Candera Incorporated, founded in 2000, is a development stage stealth mode company headquartered in Milpitas, California ( USA ).

Candera Inc. is developing a new generation, purpose built, network based storage management platform that gives businesses unprecedented ‘control over’ and ‘visibility into’ their networked storage environments.

With the Candera Confluence solution, businesses can dramatically improve the utilization of their existing heterogeneous storage assets by consolidating them into a centrally managed storage pool. These can then be quickly and dynamically allocated to meet the needs of current and future network based applications, giving large enterprises a strategic advantage.

Candera is building the first [ 1st ] system, of a new generation of systems, that will enable customers to unleash the ultimate value of networked information storage.

CONVERA [ http://www.convera.com ] ( Mission Critical Enterprise Search and Categorization Software )

Convera RetrievalWare is a high-performance intelligent search system that allows broad flexibility and scalability for implementation across corporate intranets and extranets, enabling users to index and search a wide range of distributed information resources, including text files, HTML, XML, over 200 proprietary document formats, relational database tables, document management systems and groupware repositories. Convera RetrievalWare excels in distributed client environments and server environments with hundreds or thousands of users, documents, images and / or multiple media assets.

Advanced search capabilities include concept and keyword searching, pattern searching and query by example.

Convera is a leading provider of enterprise mission-critical ‘search’, ‘retrieval’ and ‘categorizing’ solutions.

More than 800 customers – in 33 countries – rely on Convera search solutions to power a broad range of mission critical applications, including enterprise:

Portals; Knowledge management; Intelligence gathering; Profiling; Corporate policy compliance; Regulatory compliance; Customer service; and, More.

DECRU [ http://www.decru.com ] ( Secure Networked Storage )

Decru, founded in April 2001, is headquartered in Redwood City, California ( USA ).

Decru solves the problem of secure data storage with a robust, wire-speed encryption appliance that fits transparently into any SAN or NAS storage environment, protecting data from both internal and external threats.

Markets include essentially any organization with a need to protect proprietary or confidential information ( e.g. government, technology, financial services, health care ).

Investors, include:

IN-Q-TEL; NEA; GREYLOCK; and, BENCHMARK.

GRAVITRON [ http://www.graviton.com ] ( Early Warning Detection and Notification System for Homeland Security Over Wireless Mesh Networks )

GRAVITON, founded in 1999, is located in La Jolla, California, USA.

Solomon Trujillo, former head of U.S. WEST ( baby bell telephone company ), leads GRAVITRON.

GRAVITON is on leading edge of a fledgling ( small ) industry, known as:

Machine to Machine Communications ( M2M ).

GRAVITON is developing an advanced integrated wireless sensor platform uniquely optimized for large-scale distributed sensor network applications working with Micro Electro Mechanical Systems ( MEMS ) sensor and spread spectrum wireless technologies licensed exclusively to GRAVITON from the U.S. National Laboratory at Oakridge ( also known as ) Oakridge National Laboratory ( Tennessee, USA ) – managed by the U.S. Department of Energy ( DOE ).

GRAVITON products and solutions integrate wireless, sensor and data management technology enabling enterprises to efficiently and transparently monitor, control, send, receive, and update system information from devices anywhere in the world.

GRAVITON is supported and funded by a number of corporate partners and investors, including:

IN-Q-TEL; GLOBAL CROSSING; ROYAL DUTCH SHELL ( oil / petroleum ); MITSUI; SIEMENS; QUALCOM; OMRON; MOTOROLA; and, SUN MICROSYSTEMS.

GRAVITON ‘primary’ financial investors, include:

MERRILL LYNCH;

GRAVITON ‘venture capital’ firms, include:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); and, EARLYBIRD.

INTELLISEEK [ http://www.intelliseek.com ] ( Enterprise Intelligence Solutions )

INTELLISEEK, founded in 1997, has since 1998 been changing the way organizations ‘understand’, ‘gather’ and ‘use’ enterprise ‘intelligence’.

INTELLISEEK ‘knowledge discovery tools’ [ as of: 2002 ] enable the nation’s largest enterprises with up-to-the-minute consumer, industry information and ‘competitive intelligence’.

INTELLISEEK ‘Enterprise Search Server’™ ( ESS ) search platform provides a suite of intelligent applications that automate ‘knowledge discovery’ and ‘knowledge aggregation’ from hundreds of disparate, and often hard-to-locate data sources.

INTELLISEEK ‘Knowledge Management’ and ‘Search and Discovery’ solutions solve the fundamental problem of “information overload” by identifying and searching relevant, targeted and personalized content from the internet, intranets and extranets.

INTELLISEEK clients, include:

FORD MOTOR COMPANY ( FOMOCO ); NOKIA; and, PROCTOR AND GAMBLE.

Investors include:

IN-Q-TEL; FORD VENTURES; RIVER CITIES CAPITAL; GENERAL ATLANTIC PARTNERS LLC; FLAT IRON PARTNERS; BLUE CHIP VENTURE COMPANY; NOKIA VENTURES; and, Other private investors.

METACARTA [ http://www.metacarta.com ] ( Geospatial Data Fusion )

MetaCarta, established in 1999, was launched on more than $1,000,000 million in funding from the U.S. Department Of Defense ( DOD ) Defense Advanced Projects Agency ( DARPA ) and private investors.

MetaCarta CEO John Frank, with a doctorate from the Massachusets Institute Of Technology ( MIT ) where during 1999 – as a Hertz Fellow in physics working on a PhD – conceived a new way to view – geographically – ‘collections of text’ that later saw MetaCarta combine his interests in algorithms, information design, and scientific models of real world phenomena.

Metacarta provides a new knowledge management platform that integrates ‘text data with geography’ providing a ‘cohesive system’ for ‘problem solving’.

METACARTA Geographic Text Search ( GTS ) appliance, the software solution, redefines how people interact with information, enabling analysts to view text reports and geographic information in one ( 1 ) logical view through integration of text and geography delivering new information not obtainable from any other source.

MetaCarta CEO John Frank graduated from Yale University.

MOHOMINE [ http://www.mohomine.com ] ( Transforming Unstructured Multi-Language Data Into Actionable Information )

MOHOMINE, founded in 1999, is privately-held and located in San Diego, California, USA.

MOHOMINE technology has been deployed by United States national security organizations.

MOHOMINE mohoClassifier for National Security Organizations ™ reviews ‘text information’ in ‘cables’, ‘e-mails’, ‘system files’, ‘intranets’, ‘extranets’ and ‘internet’ providing ‘automated document classification’, ‘routing’ – based upon ‘learn-by-example pattern recognition’ technology – and ‘reports’ on user defined properties such as ‘topic’, ‘subject’, ‘tone’ ( ‘urgent’, plus others ), ‘author’, ‘source’ ( geographic locations, ‘country’, etc. ), and more.

MOHOMINE mohoClassifier users can easily set up ‘filters’ to automatically ‘identify’ and ‘prioritize’ ( ‘read first’ requirement ) documents that are quickly processed – out-of large volumes of other data – and then quickly route prioritized information to quickly reach the proper people.

MOHOMINE, from Global 5000, currently [ since 2002 ] has more than one hundred fifty ( 150 ) customers across numerous vertical industries, including:

CITICORP; WELLS FARGO; INTEL; TEXAS INSTRUMENTS; PFIZER; BOEING; ORACLE; PEOPLESOFT; and, NIKE.

MOHOMINE investors, include:

IN-Q-TEL; HAMILTON APEX TECHNOLOGY VENTURES; and, WINDWARD VENTURES.

QYNERGY CORPORATION [ http://www.qynergy.com ] ( Long-Lasting Power Solutions For Multiple Applications And Small-Tech )

QYNERGY CORP., founded in 2001, is located in Albuquerque, New Mexico.

QYNERGY technology originated at the U.S. National Laboratory at Sandia ( also known as ) Sandia National Laboratories ( New Mexico, USA ) and at the University of New Mexico ( New Mexico, USA ).

QYNERGY Corp. develops leading-edge energy solutions based on QYNERGY proprietary QynCell ™ technology that made an exciting breakthrough – over other ‘battery’ or ‘portable energy’ devices – in ‘materials science’ allowing QYNERGY to possess several unique competitive advantages.

QYNERGY QynCell ™ is an ‘electrical energy device’ revolution, providing:

Long-lived Batteries – QynCell usable life is potentially over a period of ‘several decades’ ( 10-year multiples ), during which time the QynCell device ‘does not require external charging’;

Miniature and Micro Applications – QynCell™ technology is scaleable, thus can be ‘miniaturized’, for:

Micro Electro Mechanical Systems ( MEMS ); MicroPower™ applications; Small microelectronics; and, Power-on-a-chip applications.

SAFEWEB [ http://www.safewebinc.com ] ( Secure Remote Access )

SAFEWEB, established in April 2000, is based in Emeryville, California, USA.

SAFEWEB built the world’s largest ‘online privacy network’, however in 2001 its ‘free online service’ was ‘concluded’ – to focus on developing its ‘enterprise’ product.

SAFEWEB is a leading provider of innovative security and privacy technologies that are effective, economical and simple.

SAFEWEB Secure Extranet Appliance ( SEA ), the first [ 1st ] SAFEWEB enterprise security release – reduces the cost and complexity traditionally involved in securing corporate network resources.

SAFEWEB Secure Extranet Appliance ( SEA ), named Tsunami, is a fundamental ‘redesign of extranet architecture’ integrating disparate technologies into a ‘modular plug-in network appliance’ ( SEA Tsunami).

SAFEWEB SEA Tsunami is an ‘all-in-one solution’ simplifying implementation of ‘extranets’ and ‘Virtual Private Networks’ ( VPN ) reducing Total Cost of Ownership ( TCO ) by innovative architecture letting companies build – in less than 1-hour – ‘secure extranets’ providing ‘remote stationed’ enablement of ‘employees’, ‘clients’ and ‘partners’ to access ‘internal applications’ and ‘secure data’ from anywhere using a standard internet website browser.

SAFEWEB delivers, through established strategic partnerships, customized versions of its Secure Extranet Appliance ( SEA ) Tsunami technology to U.S. intelligence [ CIA, etc. ] and communications agencies [ NSA, etc. ].

SAFEWEB investors, include:

IN-Q-TEL; CHILTON INVESTMENTS; and, KINGDON CAPITAL.

STRATIFY INCORPORATED [  ] ( Unstructured Data Management Software )

In 1999, PURPLE YOGI was founded by former INTEL Microcomputer Research Laboratory scientists Ramana Venkata and Ramesh Subramonian.

PURPLE YOGI, became known as STRATIFY INCORPORATED ( a privately-held company ).

In early 2001, ORACLE CORPORATION veteran and senior executive Nimish Mehta became president and chief executive officer ( CEO ).

STRATIFY INC., headquartered in Mountain View, California ( USA ), is [ 2002 ] the ‘emerging’ leader in ‘unstructured data management’ software.

STRATIFY Discovery System is a ‘complete enterprise software platform’ helping todays [ 2002 ] organizations ‘harness vast information overload’ by ‘automating the process’ of ‘organizing’, ‘classifying’ and ‘presenting’ business-critical unstructured information usually found in ‘documents’, ‘presentations’ and internet website pages.

STRATIFY Discovery System platform ‘transforms unstructured internal and external data’ into ‘immediately accessible relevant information’ automatically organizing millions of documents displayed in easy navigational hierarchy.

STRATIFY INC. clients, include:

INLUMEN and INFOSYS TECHNOLOGIES LIMITED, named in 2001 as one ( 1 ) of The Red Herring 100.

STRATIFY INC. received funding, from:

IN-Q-TEL; H & Q AT INDIA (also known as ) H & Q ASIA PACIFIC; SOFTBANK VENTURE CAPITAL ( now known as ) MOBIUS VENTURE CAPITAL; SKYBLAZE VENTURES LLC; and, INTEL CAPITAL.

SRD [ http://www.srdnet.com ] ( Near Real Time Data Warehousing and Link Analysis )

SYSTEMS RESEARCH & DEVELOPMENT ( SRD ), founded in 1983, develops software applications to combat fraud, theft, and collusion.

SYSTEMS RESEARCH & DEVELOPMENT Non-Obvious Relationship Awareness ™ ( NORA ™ ) was originally developed for the gambling casino gaming industry

SYSTEMS RESEARCH & DEVELOPMENT NORA software is designed to identify correlations across vast amounts of structured data, from hundreds or thousands of data sources, in near real-time, and alert users to potentially harmful relationships between and among people.

SRD NORA software technology leverages SYSTEMS RESEARCH & DEVELOPMENT proven expertise in ‘aggregating’, ‘warehousing’ and ‘leveraging people data’ and ‘transaction data’ to strengthen corporate management and security systems.

SYSTEMS RESEARCH & DEVELOPMENT clients [ 2002 ], include:

U.S. Depaartment of Defense ( DOD ); CENDANT; TARGET; MGM MIRAGE; MANDALAY BAY RESORT GROUP; and, Food Marketing Institute.

TACIT [ http://www.tacit.com ] ( Enterprise Expertise Automation )

TACIT, founded in 1997, is located in Palo Alto, California ( USA ) with regional sales offices in Virginia, Maryland, Pennsylvania and Illinois.

David Gilmour serves as president and chief executive officer ( CEO ).

TACIT Knowledge Systems is the pioneer and leader in ‘Enterprise Expertise Automation’.

TACIT products ‘automatically and continuously inventories’ the ‘skills’ and ‘work focus’ of an ‘entire organization’ for ‘dynamic location’ of ‘connections to expertise needed’ – when needed to make decisions, solve problems, and serve customers.

TACIT products also include its award winning flagship product KnowledgeMail™. In June 200, TACIT was voted one of the “Hot 100 Private Companies,” by Upside Magazine.

In 2000 and 2001, TACIT was one ( 1 ) of the “100 Companies that Matter,” by KM World [ Knowledge Management World ].

TACIT attracted a ‘world class advisory board’ with interest from ‘venture capital’ and Fortune 500 ‘clients’ of ‘enterprise’ and ‘customers’, including:

IN-Q-TEL; JP MORGAN; CHEVRON-TEXACO ( petroleum and chemical ); UNISYS; HEWLETT-PACKARD; NORTHROP-GRUMAN ( aerospace & defense ); and, ELI LILLY ( pharmaceuticals ).

TACIT investors, include:

IN-Q-TEL; DRAPER FISHER JURVETSON; REUTERS GREENHOUSE FUND; and, ALTA PARTNERS.

TRACTION SOFTWARE [ http://www.tractionsoftware.com ] ( Harvest and Use Information from All Sources )

TRACTION SOFTWARE, founded in 1996, is located in Providence, Rhode Island ( USA ).

TRACTION® Software is the leader in ‘Enterprise Weblog’ software, bringing together working ‘communications’, ‘knowledge management’, ‘content management’, ‘collaboration’, and the ‘writable intranet portal’.

TRACTION TeamPage™ product addresses the need for ‘unified on-demand view’ of ‘team content’ and ‘team communication’ from ‘all document sources’ in ‘context’ and over ‘time’.

TRACTION TeamPage deploys quickly and easily on an existing network and delivers a ‘capstone communication system’ by turning ‘e-mail’ and ‘web browser’ into powerful tools for end-users.

TeamPage targets ‘program teams’ and ‘product management teams’ in ‘government’ and ‘business’.

TRACTION also supports a wide range of applications and business processes, including but not limited, to:

Business Intelligence and Market Research;

Collection Highlighting and Media Distribution;

Investor Relations E-Mail and Public Relations E-Mail Triage and Response; and,

Tracking Exception Process and Reporting Exception Process.

TRACTION SOFTWARE investors, include:

IN-Q-TEL; SLATER CENTER FOR INTERACTIVE TECHNOLOGY; and, private investors.

ZAPLET INCORPORATED [ http://www.zaplet.com ] ( Enterprise Collaboration Tools For Email )

ZAPLET INC., founded in 1999, is located in Redwood Shores, California ( USA ).

ZAPLET INC. is an enterprise software and services company and creator of the Zaplet Appmail System™ collaboration software that brings application functionality directly to a user’s inbox to complete business processes.

ZAPLET INC. Appmail, using a server-based platform, combines power, ‘centralized control’ and ‘robust security’ for traditional enterprise application systems with the convenience and ease-of-use of e-mail.

ZAPLET Appmail in-box becomes the gateway to a protected server where the application functionality and data securely reside.

Zaplet™ Appmail can be used, to:

Manage and Streamline mission-critical business processes; Requires no additional client-side upgrades; and, Instantly expandable for work teams ‘beyond’ the ‘enterprise’.

ZAPLET INC. has received numerous awards, including:

Red Herring 100; Enterprise Outlook – Investors’ Choice; and, Internet Outlook – Investors’ Choice.

ZAPLET INC. customers, include leading companies, in:

Finance; Telecommunication; High technologies; and, Government.

ZAPLET INC. is backed by world class investors, including:

KLEINER PERKINS CAUFIELD & BYERS ( KPCB ); ACCENTURE TECHNOLOGY VENTURES; QUESTMARK PARTNERS L.P.; RESEARCH IN MOTION LIMITED ( RIM ); INTEGRAL CAPITAL PARTNERS; ORACLE CORPORATION; CISCO SYSTEMS INC.; and, NOVELL INC.

– –

Circa: 2010

IN-Q-TEL

Investments –

Portfolio of Companies ( 2010 ) – Partial List

3VR Security AdaptivEnergy Adapx Arcxis Asankya Basis Technology Bay Microsystems CallMiner Cambrios Carnegie Speech CleverSafe ( SAIC ) CopperEye Destineer Elemental Technlogies Ember Corporation Endeca Etherstack FEBIT FireEye FluiDigm

Reference(s)

http://web.archive.org/web/20020630223724/http://www.inqtel.com/news/attachments/InQTelInvestmentPortfolio.pdf http://www.iqt.org/technology-portfolio/orionmagic.html http://defense-ventures.com/in-q-tel/

– – – –

Research References

“Information Technology Trends And Their Impact On CIA,” January 1999, declassified report of the U.S. Central Intelligence Agency by, CIA Chief Information Officer.

– – – –

 

Submitted for review and commentary by,

 

Concept Activity Research Vault ( CARV ), Host
E-MAIL: ConceptActivityResearchVault@Gmail.Com
WWW: http://ConceptActivityResearchVault.WordPress.Com

/

/