What Kind Of Top-Secret Assassination Tech Does $58 Billion Buy?
Under Cover The Lockheed Martin RQ-170 Sentinel, an unmanned reconnaissance drone, is the most recent aircraft to emerge from the military's "black" budget.
Not since the end of the Cold War has the Pentagon spent so much to develop and deploy secret weapons. But now military researchers have turned their attention from mass destruction to a far more precise challenge: finding, tracking, and killing individuals
Every year, tens of billions of Pentagon dollars go missing. The money vanishes not because of fraud, waste or abuse, but because U.S. military planners have appropriated it to secretly develop advanced weapons and fund clandestine operations. Next year, this so-called black budget will be even larger than it was in the Cold War days of1987, when the leading black-budget watchdog, the Center for Strategic and Budgetary Assessments (CSBA), began gathering reliable estimates. The current total is staggering: $58 billion—enough to pay for two complete Manhattan Projects.
Rumsfeld 2.3 Trillion Dollars missing Pentagon 1 DAY Before 9-11
Where does the money go? Tracking the black budget has always been a challenge. Constantly shifting project names that seem to be randomly generated by computers—Tractor Cage, Tractor Card, Tractor Dirt, Tractor Hike and Tractor Hip are all real examples—make linking dollar amounts to technologies impossible for outsiders. But there are clues.
According to Todd Harrison, an analyst at the CSBA, the allocations for classified operations in the 2011 federal budget include $19.4 billion for research and development across all four branches of the military (funding for the CIA, including its drone strikes in Afghanistan and Pakistan, is contained within the Defense Department black budget), another $16.9 billion for procurement, and $14.6 billion for “operations and maintenance.” This latter category, Harrison notes, has been expanding quickly. This may suggest that many classified technologies are now moving from the laboratory to the battlefield.
In fact, the rise in classified defense spending accompanies a fundamental change in American military strategy. After the attacks of September 11, the Pentagon began a shift away from its late Cold War–era “two-war strategy,” premised on maintaining the ability to conduct two major military operations simultaneously, and began to focus instead on irregular warfare against individuals and groups. That strategic shift most likely coincides with an investment shift, away from technology that enables large-scale, possibly nuclear, war against superpower states and toward technology that helps military planners hunt and kill individuals. Each branch of the military uses different language to describe this process. Pentagon officials have spoken openly about their desire to use advanced technology to “reduce sensor-to-shooter time” in situations involving “time-sensitive targets.” The head of U.S. Special Operations Command talks about “high-tech manhunting,” while Air Force officials describe plans to compress the “kill chain.”
Even inside the Pentagon, few people know the precise details of the black budget. But by combining what is known about Pentagon goals and what is known about the most recent advances in military technology, we can begin to sketch its general contours.
Satellites On Demand: The Pentagon’s desire for pervasive battlefield surveillance doesn’t end with drones. Another goal is reconnaissance satellites that can be launched within a few days of a request, a drastic abbreviation of a process that today takes one to two years. Satellites have at least two significant advantages over drones: They can stay in the air 365 days a year, and they’re exempt from concerns about international airspace. Conducting drone-quality surveillance from a satellite requires advanced imaging technology like that found on an experimental satellite the Air Force launched last year, TacSat-3. TacSat-3 is equipped with hyperspectral sensors, which capture electromagnetic radiation across such a wide spectrum that they can detect the disturbed earth covering a buried roadside bomb. It’s an early step toward satellites that could find and identify individual people.
The first link in the kill chain: finding the person to hunt. Particularly in Afghanistan and Pakistan, this type of intelligence gathering is increasingly done using unmanned aerial vehicles (UAVs). According to the New America Foundation, a nonprofit think tank, the U.S. conducted 45 drone strikes in Pakistan in the first six months of this year. The centrality of unmanned aircraft to such missions suggests that the black budget is almost certainly already funding next-generation drones.
In April 2009, a French magazine published a photograph of one recent product of that funding—a slender-winged aircraft that had previously been spotted in southern Afghanistan and that aerospace experts had begun calling the Beast of Kandahar. After another photograph surfaced, this one a clear shot of the craft on the runway in Kandahar, the Air Force issued a statement that finally gave the Beast a formal identity: the RQ-170 Sentinel.
Manufactured by Lockheed Martin, the RQ-170 is a tailless flying wing with the telltale shape and surface contours of a stealth aircraft. Black-plane watchers immediately noticed similarities between the RQ-170 and Lockheed’s unmanned Polecat aircraft, which UAV observers had long speculated was being developed in secret and which was finally made public at the Farnborough International Airshow in England in 2006. The Air Force says that the Sentinel is a reconnaissance drone, a claim supported by the aircraft’s lack of visible armaments, by the sensors that appear to be embedded in its wings, and by its “RQ” designation.
But much about the RQ-170 is puzzling. Why would the Air Force need a stealth aircraft in Afghanistan, a country with no radar defense system? It wouldn’t, according to those familiar with the drone. The RQ-170 was developed with a more sophisticated enemy, perhaps China, in mind. That doesn’t mean it couldn’t be adapted for current conflicts, however. Unlike the relatively easy-to-spot Predator and Reaper drones, the RQ-170’s stealth could allow it to conduct missions that those aircraft cannot, such as clandestine tracking, or slipping unnoticed across Afghanistan’s border into Iran or Pakistan to spy on their nuclear programs.
Aircraft like the RQ-170, the Predator and the Reaper can get only so close to their targets, of course, which is why the Pentagon is developing micro-drones designed to investigate dangerous terrain undetected. In April the Washington Post reported that the CIA was using pizza-platter-size micro-drones to find insurgents in Pakistan. And the 2010 Pentagon budget contains a brief unclassified reference to Project Anubis, a micro-drone developed by the Air Force Research Laboratory. The Air Force won’t talk about that specific vehicle, but a more general 2008 marketing video released by the lab did suggest that future micro-UAVs might be equipped with “incapacitating chemicals, combustible payloads, or even explosives for precision targeting capability.” The video depicts an explosives-laden drone dive-bombing and killing a sniper. Budget documents indicate that Project Anubis (named for the ancient Egyptian god of the dead) is now complete, which means a lethal micro-drone could already be in the field.
Remember the 26-foot-tall Anubis Statue Installed at Denver International Airport?
The Pentagon is forging the next link in the kill chain—following an individual—with at least one high-priority research program. The Clandestine Tagging, Tracking and Locating initiative (abbreviated both as CTTL and TTL), which was conceived in 2003, is slated to get about $210 million in unclassified funding between 2008 and 2013 and may receive more than that from the black budget. “The global war on terrorism cannot be won without a Manhattan Project–like TTL program,” was how officials from the Defense Science Board, a civilian committee that advises the Pentagon, described the situation in a 2004 presentation, adding that “cost is not the issue.”
In a 2007 briefing, Doug Richardson, an official working in the Special Reconnaissance, Surveillance, and Exploitation program in Special Operations Command, said that the Pentagon wanted to use 14 different technologies for tagging and tracking targets such as people and vehicles. Tagging could involve marking targets with invisible biological paints or micromechanical sensors; tracking would mean monitoring those markers from a distance. Other schemes entailed capturing a person’s “thermal fingerprint” and then tracking him or her, perhaps from aircraft equipped with infrared sensors.
Read the rest of the story at: popsci.com
A 26-foot-tall Anubis Statue Installed at Denver International Airport
Book: CIA Director Admitted US Drone Strikes Killed American Citizens
Taranis Drone - Artificial Intelligence to take over the Skies
CCTV in the sky: police plan to use military-style spy drones
60 drone hits kill 14 al-Qaeda men, 687 civilians
US Air Force prepares drones to end era of fighter pilots
Thousands flee bomb attacks by US drones
Robotic pterodactyl spy-drones will swoop between buildings and perch on apartment balconies
Alan Grayson on "The War Is Making You Poor" Act (Video)
Influencing Human Cognition: US Electromagnetic Weapons and Human Rights
US Tax Dollars at War: More Than 53% of US Tax Payment Goes to the Military
Secret Space-Illuminati's Conquest of Space (Video)
Behind TV Analysts, Pentagon's Hidden Hand
Cyborg Moth Flies! (Video) & The Pentagon's battle bugs
Pentagon hires British scientist to help build robot soldiers that "won't commit war crimes"
Pentagon Prepares To Build $130bn Robot Army
The Launching of U.S. Cyber Command - CYBERCOM
Pentagon Looks to Breed Immortal "Synthetic Organisms," (Molecular Kill-Switch Included)
Pentagon threatens Congress: accounts running dry
Latest News from our Front Page
Hackers Leak Info on 9,372 DHS Employees
Homeland Security claims there is no indication that any breach of sensitive or personally identifiable information occurred
Hackers released the names, positions, phone numbers and email addresses of more than 20,000 alleged FBI employees Monday only hours after leaking similar data from more than 9,000 people at the DHS.
The group claiming responsibility, known as “DotGovs,” first alerted Infowars to the alleged ...
Gyms, Wikipedia, & Anti-White Racism
A media-generated “uproar” following the innocent renaming of a River Falls, Wisconsin, school gym, and the blatant manipulation of Wikipedia, have served as the latest examples of the ongoing anti-white racism which is becoming endemic in society at large.
As reported in the River Falls Journal, the Meyer Middle School in River Falls, Wisconsin, needed a new fitness center. To this ...
Pegida's Multi - Culti (state) Agenda!
This guy raises some very interesting points regarding the recent PEGIDA launch in the UK and around Europe.
Make sure to check out the videos below. The focus on the criticism descends into a Nazi accusation contest. "No no THEY are the REAL Nazi's."
Pegida UK is fronted by Tommy Robinson, Paul Weston and Anne Marie Waters. They held a demo in ...
Sweden plans to expel up to 80,000 asylum-seekers (that didn't seek asylum)
Sweden intends to expel up to 80,000 migrants who arrived in 2015 and whose application for asylum has been rejected, Interior Minister Anders Ygeman said Wednesday.
Ed: Wait, so they are in the country despite being rejected asylum? How did that happen and who let them in then?
"We are talking about 60,000 people but the number could climb to 80,000," the ...
What Happened to Roosh and Why Did the International Media Run With the "Pro-Rape" Allegation Lie?
In the past few days there has been a slew of articles coming out of the garbage pile that is the mainstream media, detailing how "Roosh V" of Return of Kings, not only is a "Pro-rapist," but how he also was going to teach men how to rape, at their planned international meetups.
Roosh did a press conference in Washington DC, ...
|More News » |