This report was part of Appendix B of the Mapping, Charting and Reconnaissance Research Laboratory, Final Report, from April of 1949. It is reproduced here, in its entirety, as obtained from the Defense Technical Information Center (DTIC). Document Archive Report on Unidentified Aerial and Celestial Objects, Project 364, April 30, 1949 by Dr. J Allen Hynek [278 Pages, 12.5MB]
Author: John Greenewald
According to the document: A series of Photographic Interpretation Briefs will be published by NPIC, as a supplement to the Golden Tree IPlRs, on all active COMOR and other targets of significant Intelligence nature In Cuba. The Briefs are designed as a series of Installations sheets and may be collated in Handbook form. Locator maps of each major COMOR target category as well 8f;umapoutHnlngthe provinces and the military di8tri.ctS occupied by the three Cuban Armies (West, Central and East) are also provided. COMOR target category separator sheers are provided, as appropriate. Each Brief provides a basic description of the target…
Background The following memorandum was first released by the FBI in the 1970s, but did not gain notoriety until much later. It was written by a Special Agent of the FBI by the name of Guy Hottel, who addressed the memo to the Director of the FBI, J. Edgar Hoover. Within, Hottel describes information from an Air Force investigator, in which three “flying saucers” had been recovered in New Mexico. In addition, each saucer was occupied by three bodies of human shape but only three feet tall, dressed in a metallic cloth. According to the informant (see update below for…
According to the Defense Threat Reduction Agency (DTRA): “There are many misconceptions about nuclear weapons effects and a potential post nuclear detonation battlefield environment. In this video, LTC James Gifford, Ph.D. removes the myths associated with nuclear detonations, to help prepare military forces to fight in and through a post nuclear detonation environment if the need arises.” Video Player https://www.youtube.com/watch?v=68-ha_Esw5o
Background Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption attempted to ensure secrecy in communications, such as those of spies, military leaders, and diplomats. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. Below, you will find the…