You are here

NSA

American Cryptology During the Cold War 1945-1989

SizeSeedsPeersCompleted
52.8 MiB0035
This torrent has no flags.


American Cryptology During the Cold War 1945-1989 TOP SECRET UMBRA declassified Book I: The Struggle for Centralization, 1945-1960 Book II: Centralization Wins, 1960-1972 Book III: Retrenchment and Reform, 1972-1980 Book IV: Cryptologic Rebirth, 1981-1989 Book I: The Struggle for Centralization, 1945-1960 Chapter 1: Cryptologic Triumph and Reorganization. 1941-1949 World War II and the Intelligence Revolution The Way COMINT Was Organized at the End of the War The CJO The Cryptologic Allies Chapter 2: AFSA and the Creation of NSA The Stone Board AFSA The Brownell Committee Korea The Country The Asia Dilemma The Invasion The Murray Mission Counterattack China AFSA and ASA Operations White Horse Mountain AFSS Introduces Tactical Warning The Navy The AFSA Factor Relations with ROK COMSEC and COMINT Korea - an Assessment Chapter 3: Cryptology under New Management Canine and the New Organization The Early Work Force Fielding the Field Offices Civilians in the Trenches - the Civop Program COMINT Reporting in Transition ... ebooks: American Cryptology During the Cold War Book 1.pdf American Cryptology During the Cold War Book 2.pdf American Cryptology During the Cold War Book 3.pdf American Cryptology During the Cold War Book 4.pdf tags: cryptology, cryptography, NSA, secret, CIA, military, agency, spy, Cold War

Project Hexagon Satellite Surveillance Declassified (1977)

SizeSeedsPeersCompleted
19.08 MiB005
This torrent has no flags.


Project Hexagon Satellite Surveillance Declassified (1977) The Hexagon vehicle performs world-wide search and surveillance missions with two cameras that provide stereo panoramic photography. The film is recovered as each of four (4) large reentry vehicles (Mark 8) is filled. Each reentry vehicle is ejected from the Hexagon vehicle and is caught by USAF JC130 aircraft near the Hawaiian Islands. The film is then flown to Eastman Kodak at Rochester, N. Y. , to be de-spooled, processed, and then copied for the using agencies. The Hexagon vehicle also performs mapping and geodesy missions with stellar and terrain frame cameras. The film is retrieved via the small (Mark V) reentry vehicle mounted on the Hexagon vehicle nose. Accurate Hexagon vehicle location for the mapping mission is determined with the Doppler Beacon System and in the future via the Navigational Package. The Hexagon vehicle files in a near polar orbit (97 deg inclination) at a typical perigee/apogee of 88/155 NM, respectively. Mission durations of up to 180 days have been flown. In addition to the stereo panoramic cameras and the Mapping Camera System, the Hexagon vehicle [censored] tags: satellite, surveillance, Cold War, spying, CIA, military, camera, NSA, USA

James Bamford Puzzle Palace NSA Mind Control Psyops

SizeSeedsPeersCompleted
564.02 MiB1215
This torrent has no flags.


James Bamford Puzzle Palace NSA Mind Control Psyops 1) The Puzzle Palace by James Bamford (1983) In this remarkable tour de force of investigative reporting, James Bamford exposes the inner workings of America's largest, most secretive, and potentially most intrusive intelligence agency. The NSA has long eluded public scrutiny, but The Puzzle Palace penetrates its vast network of power and unmasks the people who control it, often with shocking disregard for the law. Now extensively revised and updated to include information on the NSA's secret role in the Korean Airlines disaster, Iran-Contra, the Gulf War, and other major world events of the 1980s and 1990s, this is a brilliant account of the use and abuse of technological espionage. In 1947, the governments of the United States, the United Kingdom, Canada, Australia, and New Zealand signed a secret treaty in which they agreed to cooperate in matters of signals intelligence. In effect, the governments agreed to pool their geographic and technological assets in order to listen in on the electronic communications of China, the Soviet Union, and other Cold War bad guys--all in the interest of truth, justice, and the American Way, naturally. The thing is, the system apparently catches everything. Government security services, led by the U.S. National Security Agency, screen a large part (and perhaps all) of the voice and data traffic that flows over the global communications network. Fifty years later, the European Union is investigating possible violations of its citizens' privacy rights by the NSA, and the Electronic Privacy Information Center, a public advocacy group, has filed suit against the NSA, alleging that the organization has illegally spied on U.S. citizens. Being a super-secret spy agency and all, it's tough to get a handle on what's really going on at the NSA. However, James Bamford has done great work in documenting the agency's origins and Cold War exploits in The Puzzle Palace. Beginning with the earliest days of cryptography (code-making and code-breaking are large parts of the NSA's mission), Bamford explains how the agency's predecessors helped win World War II by breaking the German Enigma machine and defeating the Japanese Purple cipher. He also documents signals intelligence technology, ranging from the usual collection of spy satellites to a great big antenna in the West Virginia woods that listened to radio signals as they bounced back from the surface of the moon. Bamford backs his serious historical and technical material (this is a carefully researched work of nonfiction) with warnings about how easily the NSA's technology could work against the democracies of the world. Bamford quotes U.S. Senator Frank Church: "If this government ever became a tyranny ... the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government ... is within the reach of the government to know." This is scary stuff. --David Wall "There have been glimpses inside the NSA before, but until now no one has published a comprehensive and detailed report on the agency. . . Mr. Bamford has emerged with everything except the combination to the director's safe." —The New York Times Book Review ebook: The Puzzle Palace by James Bamford (1983) 669p.pdf audio-book: computer voice, 19 hrs 2) NSA Mind Control and Psyops by Will Filer (1999) "The following was sent to me by Will Filer on July 27, 1999. It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information." ebook: NSA Mind Control and Psyops by Will Filer (1999) 19p.pdf audio-book: computer voice tags: NSA, mind control, psyops, spying, subliminal, hypnosis, eavesdropping, mkultra

The CIA Books Reports and Manuals Collection

SizeSeedsPeersCompleted
1.02 GiB10335
This torrent has no flags.


The CIA Books Reports and Manuals Collection The Central Intelligence Agency (CIA) is a civilian foreign intelligence service of the U.S. Government, tasked with gathering, processing and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT). As one of the principal members of the U.S. Intelligence Community (IC), CIA reports to the Director of National Intelligence and is primarily focused on providing intelligence for the President and his Cabinet. Books on the CIA Acid Dreams The Complete Social History of LSD by Lee & Shlain.pdf Bitter Fruit The Untold Story of the American Coup in Guatemala.pdf Chasing Phantoms by Carissa Conti.pdf CIA and Rural Pacification.pdf CIA and Surrogate Warfare in Laos.pdf CIA and the Generals.pdf CIA Congress.pdf CIA in Africa.pdf Cocaine in America Veteran of the CIA Drug War Tells All.pdf Coup D'Etat in America CIA and JFK.pdf Dirty Work The CIA in Europe by Philip Agee.pdf Documents from the US Espionage Den Vol 61.pdf Encyclopedia of the CIA.pdf Espionage and Intelligence Viewpoints.pdf Foreign Intelligence Organizations Richelson.pdf From Democracy to Dictatorship by Gene sharp.pdf Getting to Know the President CIA Briefings of Presidential Candidates 1952-1992.pdf Global Trends.pdf Globalizing Torture.pdf Hour of the Time The Invisible Government by David Wise.pdf In Search of Enemies CIA Story by John Stockwell.pdf Inside the Company CIA Diary by Philip Agee.pdf John Stockwell in Search of Enemies.pdf Kwitny The Crimes of Patriots A True Tale of Dope Dirty Money and the CIA Iran Contra Scandal 1987.pdf Minute by Minute The Role of Intelligence in the Cuban Missile Crisis Jacqueline V Eyl.pdf Nazi War Criminals and US Intelligence.pdf Operation Mind Control by Walter Bowart.pdf Petherick The CIA in Iran The 1953 Coup and the Origins of the US Iran Divide 2006.pdf Powderburns 2012 with photos.pdf Psych of Intel New CIA.pdf Ted Shackley Spymaster My Life in the CIA 2004.pdf The CIA Against Latin America Special Case Ecuador.pdf The CIA and the Cult of Intelligence by Marchetti & Marks.pdf The Crimes of Patriots A True Tale of Dope, Dirty Money, and the CIA by Jonathan Kwitny.pdf The Politics of Heroin in Southeast Asia.pdf The Zapatista Social Netwar in Mexico.pdf Tracy Twyman Mind Controlled Sex Slaves and the CIA.pdf Trail of the Octopus From Beirut to Lockerbie Inside the DIA.pdf Trance Formation of America.pdf UFOs Are Real Clifford E Stone.pdf Vietnam Declassified The CIA and Counterinsurgency.pdf CIA Manuals CIA Combat Training.pdf CIA Deception Program 9 Civil Disturbance Operations.pdf The 2002 CIA World Factbook.pdf CIA Reports 2004 CIA Terror Report.pdf Black September CIA Files.pdf BP British Petroleum CIA Files.pdf CIA FBI Bin Laden Statements 1994-2004.pdf CIA File of Dwight D Eisenhower.pdf CIA Interrogation.pdf CIA Psychology of Intelligence Analysis.pdf CIA Psyops.pdf CIA Report That Reveals Area 51.pdf CIA Response.pdf CIA Sociological Study.pdf CIA Speaks Master Transcripts.pdf CIA Torture Report December 2014.pdf CIA Torture Report Minority Views.pdf CIA Torture Report.pdf Counter-Intelligence Interrogation Torture Manual.pdf Family Jewels.pdf Finlandization in Action CIA Report.pdf Intelligence Espionage Military Intelligence Special Series No 20 German Ski Training and Tactics 1944.pdf MKULTRA CIA Mind Control Research and Documentation.pdf Pollard Damage Assess CIA.pdf Report on the Presidents Surveillance Program.pdf Sturgis CIA Documents.pdf U2 History Complete.pdf UFO CIA.pdf US Government Experiments on Citizens.pdf CIA Text CIA Timeline.pdf Directory of CIA Espionage Agents.pdf Project MKUltra The CIA Program of Research in Behavioral Modification.pdf Sherry Sandor Kelly CIA NSA Occupy Agent.pdf tags: CIA, NSA, FBI, secret service, intelligence, agency, espionage, mkultra, drugs

Inside Field Station Berlin Teufelsberg - NSA Spying (2014)

SizeSeedsPeersCompleted
169.65 MiB000
This torrent has no flags.


Inside Field Station Berlin Teufelsberg - NSA Spying (2014) with Bill Scannell Of all the NSA's Cold War listening posts, their intelligence facility on top of Berlin's Teufelsberg was their most secretive. source: http://media.ccc.de/browse/congress/2014/index.html 31C3: a new dawn, chaos computer congress a new dawn? - Jordan Maxwell would tell you something about the "new dawn". As they say, 'if you want to control the dissent you lead the dissent.' tags: NSA, cold war, spying, intelligence, secret, eavesdropping, adventure, history, USSR, USA

Inside Field Station Berlin Teufelsberg - NSA Spying (2014)

with Bill Scannell

Of all the NSA's Cold War listening posts, their intelligence facility on top of Berlin's Teufelsberg was their most secretive.

source: http://media.ccc.de/browse/congress/2014/index.html

31C3: a new dawn, chaos computer congress

a new dawn? - Jordan Maxwell would tell you something about the "new dawn".

As they say, 'if you want to control the dissent you lead the dissent.'

Barrie Trower - The Dangers of Microwave Technology

SizeSeedsPeersCompleted
3.2 GiB0028
This torrent has no flags.


Barrie Trower - The Dangers of Microwave Technology Barrie Trower is a former Royal Navy microwave weapons expert and former cold-war captured spy debriefer for the UK Intelligence Services. Mr Trower is a conscionable whistle-blower who lectures around the world on hidden dangers from microwave weapons and every-day microwave technologies such as mobile-phones and WiFi. Mr Trower has also repeatedly assisted the UK Police Federation in their struggle to protect police officers from Tetra/Air-Band radio-communications systems that are harmful to health. Credits: http://www.naturalscience.org videos: 01 Scientist Barrie Trower_ Interview about the Reality of the Wireless Society.mp4 02 Scientist Barrie Trower_ interview about the wireless Lies and Truths.mp4 Barrie Trower - Microwave Mind Control Technologies & Warfare.mp4 Barrie Trower - The Cooking of Humanity.mp4 Barrie Trower, lecture at the Open Mind Conference 2012 part 1.mp4 Barrie Trower, lecture at the Open Mind Conference 2012 part 2.mp4 bt_1_4 Barrie Trower - The Dangers of Microwave Technology.avi bt_2_4 Barrie Trower - The Dangers of Microwave Technology.avi bt_3_4 Barrie Trower - The Dangers of Microwave Technology.avi bt_4_4 Barrie Trower - The Dangers of Microwave Technology.avi ebooks: Barrie Trower Interview.pdf Barrie Trowers Presentation to the Irish Doctors Environmental Association.pdf Bees by Barrie Trower.pdf Dangers of Electromagnetic Frequencies.pdf Offener Brief von Barrie Trower.pdf Weaponized Microwave Radiation - Barrie Trower Interview.pdf

Barrie Trower - The Dangers of Microwave Technology

Barrie Trower is a former Royal Navy microwave weapons expert and former cold-war captured spy debriefer for the UK Intelligence Services. Mr Trower is a conscionable whistle-blower who lectures around the world on hidden dangers from microwave weapons and every-day microwave technologies such as mobile-phones and WiFi. Mr Trower has also repeatedly assisted the UK Police Federation in their struggle to protect police officers from Tetra/Air-Band radio-communications systems that are harmful to health.

Bruce Schneier - NSA Surveillance and What to Do about It [study pack]

SizeSeedsPeersCompleted
3.68 GiB0053
This torrent has no flags.


Bruce Schneier - NSA Surveillance and What to Do about It [study pack]

Bruce Schneier - Applied Cryptography

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

Pages

Subscribe to RSS - NSA