-Caveat Lector-

from:
http://www.kimsoft.com/kim-spy.htm
Click Here: <A HREF="http://www.kimsoft.com/kim-spy.htm">kim-spy:
Intelligence and CounterIntelligence</A>
-----
Uh hunh.  Thanks DG
Om
K
-----
kim-spy
Intelligence and CounterIntelligence


What's New at Kimsoft?

Please, support us by clicking the banners below - they pay us each time you
click:

www.luckysurf.com

Our Sponsor Banners and Ads

[Spy News] [Spylopedia] [SPYder Web]

------------------------------------------------------------------------

I. Military Intelligence

[Hot Topics] [Press Release - Announcements] [News Links] [Archives and
Classics] [Cyber War, Signal Intelligence, Mind Control] [US Intelligence
Agencies] [Foreign Countries] [Eyewitness and Misc. Publications] [Non-Governm
ental Resources] [Weapons and Their Transfers] [Other Lists of Military
Intelligence] [Intelligence Professional Associations]

II. Paramilitary and Terrorism

[Special Forces, Guerrillas and Terrorism] [Poor Men's Nuclear War:
Bio-chemical Attacks]

III. Non-Military Intelligence

[Commercial Intelligence and Industrial Espionage] [Personal Security and Law
Enforcement] [Security Services]

IV. Sex: A Weapon in Politics, Commerce and Espionage

[Sex in Politics and Espionage]
------------------------------------------------------------------------


Hot Topics & Links


*   The First Defense International Group  manufactures a diversified range
of Bullet resistant products from Bulletproof Vests, Vehicle Armouring,
Ballistic plates and shields. The company was founded in 1980 as a small
defense manufacturer starting as a single proprietorship, single-product and
today the company and its subsidiaries generate million in revenues.

*   Military Memories - The Soldiers, Sailors, Airmen and Marines of the
United States Armed Forces. Hear America's Twentieth Century fighting men and
women relive their adventures and see American military history through the
eyes of the people who were there. Join us as we chronicle the experiences of
these living monuments to American history and pride.

*   704th Military Intelligence Brigade - A Brief History of ASA

*   INDUSTRIAL CHEMICALS AND TERRORISM: HUMAN HEALTH THREAT ANALYSIS,
MITIGATION AND PREVENTION --Terrorists, warring factions, and saboteurs use
chemicals commonly found in communities in industrialized nations to create
improvised explosives, incendiaries, and chemical agents. Common chemicals
may be used because standard military chemical agents may be difficult or
dangerous to manufacture, access, or disperse. The Agency for Toxic
Substances and Disease Registry (ATSDR)

*   Raiders of the China Coast : CIA Covert Operations During the Korean War
- In an effort to divert China's attention from the Korean front in 1950 and
relieve pressure on the allied forces, the CIA sponsored a series of raids
along the southeastern coast of China conducted by anti-Communist guerrillas.
The guerrillas were trained and supported by the paramilitary arm of the CIA
from coastal islands still in Nationalist hands, and their covert operations
remained sealed from public view. Now for the first time in print, the full
dramatic story of this large-scale paramilitary campaign is revealed by a
veteran of the operations.

*   SECRET WAR IN SHANGHAI: An Untold Story of Espionage, Intrigue, and
Treason in World War II -- by Bernard Wasserstein - An utterly enthralling
chronicle about Shanghai as the intelligence capital of the Far East. This is
the first book-length account of the little-known story of Shanghai's
underground war. The widely respected historian Bernard Wasserstein has
researched it entirely from original sources and uncovered startling new
evidence of collaboration and treason by American, British, and Australian
citizens. This remarkable depiction of complicity and betrayal is history at
its most exciting and surprising. For further info: FSB Associates or SmartBoo
ks.

*   The Deutch Commission Report of Weapons of Mass Destruction

*   Box89 - specializes in providing the Corporate Finance sector with
intelligence on the major players prior to investment. The company is located
at and was recently profiled in the Financial Times.

*   THE SECRET WAR AGAINST HANOI: Kennedy's and Johnson's Use of Spies,
Saboteurs, and Covert Warriors in North Vietnam - In 1961, the newly elected
Kennedy administration concluded that North Vietnam was so successfully
subverting and disrupting the American-backed government in South Vietnam
that it felt compelled to reciprocate in kind. Two could play the game of
deception, disinformation, espionage, psychological warfare, sabotage and
dirty tricks. However, due to the very sensitive political nature of this
covert American retaliation, all operations were run under the most stringent
of confidences; not a word about this secret war was to reach the public in
any form.

*   Armageddon Brand Nuclear Weapons for Sale - Bringing you the best in
atomic and hydrogen weapons of all sizes and uses. Featured this month: "Fat
Man" Low yield atomic weapon in classic 1940's design. Akward to move, but
ideal for stationary deployment. Celebrate the past with a "Fat Man" at the
entrance to your HQ.

*   S. Africa's Dr Death says his germwar project was based on U.S. - By
Nicole Mordant - South Africa's "Doctor Death", the mastermind behind an
apartheid-era germ and chemical warfare campaign against blacks, said the
project was based on a U.S. government biological and chemical programme. In
short excerpts from a filmed interview shown to Reuters, Wouter Basson said
that he had slipped into the United States to gather information ahead of the
launch of South Africa's secret chemical weapons project in 1982.

*   In-Q-It and CIA Partner to Find Leading-Edge Technology Solutions - To
ensure that the Central Intelligence Agency (CIA) remains at the cutting-edge
of information technology advances and capabilities, the Director of Central
Intelligence has created In-Q-It, a private, independent, non-profit
corporation that will network and develop partnerships with information
technology leaders in industry and academia to work on projects of mutual
interest to both the CIA and the commercial marketplace.

*   Omega Systems - an intelligence related organization based in Canton
Ohio. The actual organization has long remained 'private,' in that we don't
publicize. Omega Systems has recently put up this web in hopes of obtaining
more buisness and providing those interousted with a more vivid idea of what
it is we do.

*   Commission: 'Americans will die on American soil' from high tech terror -
The United States is increasingly vulnerable to high-technology terrorism,
particularly a biological weapons attack, that could result in massive
casualties, a presidential commission says.

*   Police Universe - is the Internet’s first interactive Law Enforcement
Network. The Network is primarily composed of active and retired Peace
Officers, Judges, and Criminology Professors who have used their extensive
experience’s to create an extraordinary Network. We are dedicated to
providing all members with professional information relative to their careers
as well as interesting topical social and personal news content.

*   Net-based germ warfare watch By Steve Sternberg (USA TODAY) - Doctors in
New Mexico and in the once-secret Russian city of Chelyabinsk-70 have forged
the first links in a grass-roots network to alert the world if anyone
unleashes biological weapons of war.

*   AudioLex Forensic, Legal and Business - We are a forensic consultancy
working mainly with tape-recorded evidence of various kinds.

*   SCIENTIFIC INVESTIGATION OF LAKES NYOS AND MONOUN, CAMEROON: PRELIMINARY
REPORT, APRIL-MAY 1998 - The release of carbon dioxide gas (CO2) from Lake
Monoun in 1984 and Lake Nyos in 1986 resulted in the loss of nearly 1800
lives. This report summarizes the preliminary findings of the joint
U.S.-Cameroonian-Japanese scientific investigation in April-May 1998. The
investigation is part of a continuing study aimed at understanding these
events, determining the potential for future lethal releases of carbon
dioxide, and providing the information required to proceed with hazard
remediation.

*   Nuclear, Biological & Chemical - NBCNCO Home Page

*   War & Conflict: Past, Present, Future - aims to provide comprehensive
information about the theory and conduct of war. We hope that our site will
help engender debate, while also providing an exploration into the cause, the
conduct and the outcome of war. We have included in-depth presentations in
topics such as the control and limitation of conflict, the law of war, the
economics of war and the future of conflict.

*   Murray Associates - Electronic Eavesdropping Detection

*   The Echelon System forms part of the UK-USA security system but unlike
many of the electronic spy systems developed during the Cold War, it is
designed for primarily nonmilitary targets: governments, organizations and
businesses in virtually every country.

*   Death by Slow Death - contains detailed information on the so-called
"soft-kill" weapons used by today's counterintelligence agents. These have
been in use for decades but have remained highly secret, unknown to all
except the select agents specially trained to actually carry out this kind of
work. Their ostensible application is to neutralise foreign agents but of
course there is nothing to stop them being used against innocent civilians.

*   Laboratory Telematics and Information Security - The Netherlands

*   DECODING OF CIA' KRYPTOS

*   DEFRAUDING AMERICA: Encyclopedia of Secret Operations by the CIA, DEA,
and Other Covert Agencies

*   Land Mine Clearing - basic informations about: General Landmine
Informations, Mine Clearing Vehicles, Waste Processing Vehicles, Vegetation
Cutter (in Preparation), Detection Research and Development.

*   Effects of Nuclear Weapons and Nuclear War

*   Advanced Biological and Medical Technologies: Biological Warfare Defense
Unconventional Pathogen Countermeasures

*   HDM - Visual Business Intelligence Systems

*   Commission to Assess the Organization of the Federal Government to Combat
the Proliferation of Weapons of Mass Destruction: Combating Proliferation of
Weapons of Mass Destruction - July 14, 1999 (PDF - 1.5MB)

*   Security Focus - features articles, editorials, news, papers, reports and
an Information Warfare Forum that people can post to and discuss current
issues in the field. The tone of this forum is academic and research
orientated in nature and focuses on both the technical and strategic.

*   Intelligence and Security Portal -- A search engine and directory of
intelligence, Info War and security sites and services.

*   Intelligence-Net Office

*   Richard Tomlinson's News at Mario's Cyberspace Station - with 100+ links
to news stories related to former MI6 spy including e-mail addresses Mario
used to get in touch with Tomlinson who has fled Switzerland and is on the
run and out in the cold in Europe, wanted in London for allegedly divulging a
list of British intelligence officers on the Internet.

*   Stratfor's Asia Intelligence

*   Col. Lunev reveals Russian War Plans - the highest ranking military
intelligence officer ever to have defected from Russia. He did so in 1992
after the Soviet Union dissolved and Boris Yeltsin had come to power. The
book is available at: Through the Eyes of the Enemy : Russia's Highest
Ranking Military Defector Reveals Why Russia Is More Dangerous Than Ever - by
Stanislav Lunev and Ira Winkler.

*   Military Channel is a 24-hour television network with original
programming themed around the heroes, history and hardware of the
international military.

*   RADARSET International

*   How to get or correct the FBI files on you

*   Spy Links

*   National Space and Meteor Hotline

*   Competitive Intelligence

*   Canada.Com News Cafe: News and Wires
*   The Sleeping Giant News - The Sleeping Giant is an international online
resource detailing the intensifying threat of non-conventional terrorism from
transnational groups and rogue nations.



Press Release - Announcements


*   APB ONLINE is an all crime, all the time news service based on the web.
One of the highlights of our program is we have a section called The G-Files
in which we obtain government documents through the Freedom of Information
Act. For instance, we broke the story that the NSA has secret files on
Princess Diana with a FOIA request we submitted. And, we discovered the FBI
has surveillance files on Vince Foster and the DEA has three pages of top
secret document Sonny Bono that would be a threat to someone's life if
released.

*   Global Crisis Control International, Inc. provides force protection and
open source intelligence analysis of current events to help companies
determine if they should continue operations in crisis countries. We extend
an invitation to you to visit our website.

*   CRB Research Books - CRB Research Books provides a source of
informational books for electronic eaves dropping, surveillance, security and
investigation.

*   Kent Spalding Militaria



News Links

Military News - Canadian Forces College     Intelligence On-line
Intelligence Online     Online Intelligence
EmergencyNet News   Viking Phoenix News     Information Age
    NAVY NEWS
US DOD News     CounterIntelligence Briefings   Invincible Defense Group
Centre for Defence & International Security Studies
Pinkerton Global Intelligence Services  STRATFOR Systems'   Investigation
Resources   Esanam East Asia
The Intelligence Service
    ICT - The International Policy Institite for Counter-Terrorism  CP Tango
- Intelligence on N/S Koreas
Global Spy News     WorldNetDaily News Alert    ELINT   Softwar

General Information Search Links


------------------------------------------------------------------------

Archives and Classics

Sun Tzu (500 BC): The Use Of Spies

FBI Secret Files Available on FOIA  IMAGING OF LEGACY COLLECTIONS AMONG THE
CENDI AGENCIES  Koran: Conspiracy   Koran: War
The National Security Archive   US Army Intelligence & Security Command
Archives    FBI FOIA Web    Special Operations and Low Intensity Conflict
Covert Operations
    Investigations - Online     Information Warfare Documents   TEMPEST and
electromagnetic emmanation monitoring
US CIA Manual on Assassinations
    Gaining Access to CIA's Records     CIA Torture Manual  Army Manuals and
Publications
CIABASE On-line     NameBase Book Index     USSR KGB Archives   Global Land
Information System (GLIS)
Janes Weapons News
    BTG Jane's EIS - on-line
    Jane's War Machine Information
    NSA VENONA Archives

GAO Archives of Gov Reports
    The Consortium - Investigative Reports  Lisa Pease's Real History Archives
    Covert Action Quarterly
FAS library of US intelligence documents    Crime Archives  Directory of
Wiretap
    The Foreign Correspondent: FTP

Misc. Archives
    INVESTIGATIVE DATABASE
    Political Investigations
    Misc. intelligence on Asia

Cold War Espionage  Personal History Archives   The United States and the
Overthrow of Sukarno,1965-1967  History of Spies
Spies in the Moscow Nightlife - One reporter views the secret world of
"Intrigue & Espionage"      Satelite images of the world    Cold War Era
Spooks - Home Pages

National Archives and Records Administration


Cyber War, Signal Intelligence, Mind Control

Cryptome    American Intelligence Study Group   Mind Control Forum  US
President's Information Infrastructure Task Force
Information Warfare and the Canadian Forces     Royal Canadian Mounted
Police's Information Technology Security Branch     Utility listening related
web resources - Signal intelligence     Who is watching who?
US Government Computer Security     Computer Espionage  The Conspiracy To
Erect An Electronic Iron Curtain    Mike Tighe's Cryptology Home Page
Breaking The RMP 2/nth Table Code   Propaganda - Disinformation Warfare
    Information Warfare, I-War, Cyberwar    Information Security
InfoSec     Computer Security Institute     IW - US Navy    IW - Resources
COMSEVENTHFLT   Intelligence and Electronic Warfare     Telepathy,
psychokinesis, remote viewing, etc. in intelligence     Payne-O's Secret
Hacker Selections
Cryptography--Industry Canada   Canada's Cryptography Policy--Oct. 1/98
Speech by Industry Minister Manley  Summary of Canada's Cryptography Policy
Swift Vengeance

US Intelligence Agencies

Defense Intelligence Agency     National Security Agency
    CIA - Home Page
    FBI - Federal Bureau of Investigation

US Dept. of State: HEROES
    The Department of the Treasury: US Secret Service
    National Security Institute
    U.S. Intelligence Agencies - National Counterintelligence Center (NCC)

US Security Policy Board    US Department of Defense Security Institute
cyberSPOKESMAN
    DefenseLINK

The Pentagon
    US DOD - OSD C3I
    Defense Technical Information Web
    DOD Software Environments Department (JEXS)

US DOD Gopher Sites
    US National War College
    Military Sciences and Defense
    Veterans and Military Web Sites
AirForceLINK
    USAF - AIALINK
    USAF Scientific Advisory Board
    USAF - cyberSPOKESMAN
Naval Postgrad School Joint C4I Systems
    US Navy - NISE WEST FACILITY GUAM
    Real Time Support for the Warrior   The 525th Military Intelligence
Brigade (Airborne)
U.S. ARMY, FOREIGN MILITARY STUDIES OFFICE
    337th MI BN (TE) (ABN) USAR     434th Military Intelligence Detachment
(Strategic)
    Military Intelligence: 20th Special Forces Group

MICOM Historical Office Home Page
    The Army HomePage Subject Area Index - H
    USAIC & Fort Huachuca
    Joe Bayerl's Army Topics Page

Foreign Countries

Australian Institute of Professional Intelligence Officers (AIPIO)  US Army
Area Handbooks  US State Dept.: Report by Country   US CIA: Report by Country
IntelWeb: Intelligence Communities by Country   British Security Service
(official)  British Government Communications Headquarters (GCHQ):  UK
CABINET OFFICE (OPS) - INTELLIGENCE AND SECURITY COMMITTEE
British Intelligence Service    UK Cabinet Office--Central Intelligence
Machinery   Great Britain - SECURITY AND INTELLIGENCE   Canadian Forces
School of Intelligence and Security
Canadian Security Intelligence Service: 1996 Public Report  Department of
National Defence--R&D Branch
    R&D Program--Command, Control and Information Systems   War, Peace and
Security, Canadian Forces College
The Canadian Intelligence Community--Control and Accountability     Security
Intelligence Review Committee   Canadian Security Intelligence Service --
Service canadien du renseignement de sécurité
    Communications Security Establishment
China Defense Links     Chinese Security Homepage   German Security Services
(German 'FBI')      Greek Armed Forces
Indonesia
    Iraqi Intelligence Community
    Israel
    Israel Dept of Defense archives
Japanese Espionage in S Korea
    Japanese Intelligence Services Home Page    Japan Virtual Library
Jordanian General Indelligence Department
Mongolia    S Korea: Agency for National Security Planning  Netherlands
Security Service (BVD) 1995 Annual Report   The 298 Squadron Soesterberg AFB
RNLAF
Palestinian Intelligence Community  Philippines
    Russian Navy
    World's military

Belgian Armed Forces Web    SPOTTER'S NEST - The Italian Aviation Database
North Korea Virtual Library

Eyewitness and Misc. Publications

Lancer Militaria Page   Military Intelligence in Southeast Asia, 1970-1975.
Interrogation, CIA-Style: Many Mean Ways to Loosen Cold-War Tongues
Military Art and Science, War, National Defence, and Armed Forces
CHERNOBYL
    Orlin Grabbe Homepage   USS Liberty Home Page   Political Assassinations
Pegasus: CIA Assassination Project - Tatum's Saga
    N Korean Military - Papers by Joseph S. Bermudez Jr.
    US Air Force 11th, 12th, 6166th TAC Recon Reunion and memoirs
    Young Warrior, 1948 Arab Israeli War

Sources eJournal
    Spies and Provocateurs
    Viking Phoenix Archives
    Deep Politics Bookstore
The National Intelligence Book Center / Surveillant Magazine
    Cloak and Dagger Book Store     MCW Books & Videotapes
    tempest

The Bureau of Justice Statistics and Archives   CIA Maps & Publications
Milittary Publications International Directory  Rudolf Ivanovich Abel - The
Master Spy
Secrets of War  CRB Research Books  The Far Gone Books  Military Memories

Non-Governmental Resources

SPYder Web  Gary Tate's Military Reference Page     Southern Security
Consultants     CIA-SEAL-Special Forces/Intelligence
Intel-World
    US military secrecy
    Intelligence & Spy
    GONZO Links - Spooks

JRL Location's Home Page
    TSCM.COM Counterintelligence Home Page
    007
    AJAX MILITARY, INTELLIGENCE & LAW ENFORCEMENT AGENCY ACCESS

Office of The International Criminal Justice
    FAS - Intelligence      IntelWeb - The WWW Site of Intelligence Watch
Report  WWW Rule of Law Online

Political Investigations    Technical Services Agency   Intelligence Web Link
    E-HAWK
Beacon Analysis & Research  Journal of Electronic Defense   Russian Space
Science     War Crime Laws

Weapons and Their Transfers


Nuke Them All!

CINC Spec Sheets    Firearms in Russia - History, laws and links    Research
Headquarters    New York Times: Joint Strike Aircraft
MILNET: Military Information - Weapons
    War in the Age of Invisible Machines    Unofficial Leopard Intel Page -
Air forces  General info
International Military Sales PLUS   Armament Technology     NUCLEAR WEAPON
LINKS & AUTO-LINKS  Nuclear Control Institute
N Korea's Nuclear Arsenal   China's Nuclear Arsenal by Yang Zheng   Israel's
Nuclear Weapons     Australian Uranium Information Centre
The High Energy Weapons Archive     Nuke Home Page  Todd's Atomic Homepage
Todd's Keyword Search for Nuke Links
Bombs 'n' Bullets
    World's Military Missiles - A Directory
    Code Names and Numbers for Weapons
    Force XXI Acronyms - an extensive list of military jargons.

A-bomb Issues   Jane's Defence Glossary, AQ-AT
    Council for a Livable World Online: Eliminate Weapons   Indian nuclear
tests
Remember Hiroshima / Remember Nagasaki  Dangerous places in America     Map
of hazardous places     Nuclear War Survival Skills
Radiation Dosimetry     Relative radiation doses from various sources   How
nukes work  Race for the SuperBomb
The Cox Report on Chinese espionage in America  Cox Report Full of Errors
China brandishes neutron bombs  Swords of Armaggedon - Nuclear Weapons
Trinity Atomic Web Site - Nuclear Weapons: History, Technology, and
Consequences    Submarines of the World     Nuclear War Survival Info   "The
Bug in the Bomb" -
X-ray Lasers    Induced Gamma Emission, IGE and The Gamma-ray Laser (poor
man's triggers for nukes?)  OUR NUCLEAR ERA: THE GLOBAL PROLIFERATION OF
NUCLEAR ARMS

Other Lists of Military Intelligence

Zhi
    Virtual Underground World of Spies and Intelligence
    Ryan's Military Page    FAS - Intelligence on the Web

Mike Tighe's Home Page
    Research Headquarters
    Center for Defense Information
    LOYOLA HOMEPAGE ON STRATEGIC INTELLIGENCE

Einet Military Links
    Intelligence Resources
    MILNET: Open Source Military Information Database
    CovertAction Quarterly

the SHADOW and other alternative Global media.
    WAR ZONE    Sarajevo Pipeline   Australia Defence Association
Spy Files and Secret Links

Intelligence Professional Associations

WHY SPY? The Uses and Misuses of Intelligence
    Preparing for the 21st Century Intelligence
    OPSEC Professionals Society
    IWR Intelligence Employment Service

National Military Intelligence Association
    Naval Intelligence Professionals    Military Intelligence Corps
Association
    Information relating to the NSA, CIA, various other gov. agencies,
military and government intelligence.

The Association of Korean War Covert Action Vets - A Bulletin Board
    The National Army Security Agency Association (NASAA)   Intelligence
Students Association ISA    Cold War Era Spooks - Home Pages
Canadian Military Intelligence Branch Association   Association of Former
Intelligence Officers   Canadian Association for Security and Intelligence
Studies

II. Paramilitary and Terrorism


Special Forces, Guerrillas and Terrorism

Apollo's Warriors: US Air Force Special Operations during the Cold War - Col.
M. Haas     Air Commando! 1950-1975: Twenty-five Years at the Tip of the Spear
    The Basics: Combatting Terrorism. US Army Command & General Staff College
    U.S. Army Special Forces Army and Special Operations Links
RCMP Air India Bombing Disaster     Unofficial Special Forces Home Page
Special Operations Bibliography     Popular Education In The Salvadoran
Guerrilla Army
Soldier of Fortune  Forest brethen guerrillas in Estonia 1945-1955  DARKMOON
(Ed Evanhoe): 8th Army Special Forces in Korea  Korean War Guerrilla Manual
White Tigers by Col. Malcom     Memoirs of A CIC Agent by Col. Nichols  CIA
Guerrilla Warfare Handbook  The Death of Che Guevara: Declassified
African National Congress Manual for Covert Actions     BEHIND THE LINES
To be a warrior     The Martial Arts Menu Page
THE SOCIETY OF THE HWA RANG     Terrorism Research Center   Covert Action -
Home Page   Steve McGarret's Paramilitary Special Ops
War in the Shadows: The Guerrilla in History - by Robert B. Asprey  Guerrilla
Conflict Before the Cold War - By Anthony James Joes    Some Thoughts on
Irregular Warfare by Jeffrey B. White

Poor Men's Nuclear War: Bio-chemical Attacks

Sun Tzu (500 BC): The Attack by Fire
    A Poor Man's Nuclear War
    Chemical and Biological Warfare
    War in the Age of Invisible Machines

Chemical and Biological Warfare Unmasked
    Chemical and biological weapons: developments and destruction
    Redstone - Chronological Historical 1941-43
    CBW Issues Publications of Matthew Meselson
NGWRC: Radioactive Battlefields of the 1990's
    CIA Views on Bio-Chemical Terrorism
    Chemical and biological weapons
    Terrorism: How Vulnerable Is The USA?

Safety of water supply is threatened worldwide
    CIA on Chemical Weapons
    Chemical weapons in former Yugoslavia
    Chemical Weapons Convention
China Finds Evidence Of Japanese Germ Warfare During WWII
    Unit 731 - Japanese Germ Warfare    News Watch - Japanese War Crimes
Unlocking a deadly secret

Germ war and human experimentation
    A preliminary review of Japanese germ warfare in America
    Japan admits to dissecting WWII POW's
    AID as a weapon of war
Jap Atrocities Biblio
    GERM WARFARE Home Page
    Smallpox Warfare against the American Indians
    Japan's Germ warfare I

Japan's Germ warfare II
    Scholars say Japan used germ warfare across China
    Uncovering Japan's WWII germ warfare
    Japanese germ warfare: base 371
Nuclear, Biological, and Chemical (NBC) Warfare links   Chem-Bio.com
Weapons of Mass Destruction & Terrorism     NBC : Nuclear, Biological and
Chemical Warfare on the Modern Battlefield
A practical manual for First Responders to chem/bio incidents
Chem-Bio Resource Center has the following items free:

*   SBCCOM - DoD Standard Family of Tactical Shelters (PDF - 1.5MB)
*   SBCCOM - CB Quarterly - Issue 17 - March 1999 (PDF - 2.9MB
*   SBCCOM - CB Quarterly - Issue 16 - December 1998 (PDF - 1.9MB)
*   CBDCOM/SBCCOM 1998 Annual Report (PDF - 1.6MB)


III. Non-Military Intelligence


Commercial Intelligence and Industrial Espionage

Business Intelligence Solutions     Buckley and Associates  Sun Tzu and the
Art of Business     [Investigative Resources]
[Alphabetical listing]  [Geographical Listing]  Spies: Surveillance, Privacy,
Personal Protection     NEAL E. WILSON RESEARCH

Japanese Intelligence Services
    Asia Business Intelligence
    MIND YOUR OWN BUSINESS
    Somers & Associates

IPN - Information Professionals Network
    Japan, Incorporated
    The GlobalScan Network - An Investigative and Intelligence Agency
Satellite Imaging Resource
First Defense International     Business Intelligence Express (BIX) -
Industry Canada     California Business Intelligence    Canadian Commercial
Corporation
Export Development Corporation (risk assessments)   Worldwide Virtual
Library: Remote Sensing     Global Crisis Control International, Inc.   Fred
Cohen & Associates - information security specialists
KPMG Corporate Intelligence Inc. (Canada)   Intelligence-Net Office

Personal Security and Law Enforcement

Criminal Law Association    Personal Protective Services, Inc.  Japan's
Underworld Empire   Law Links
The Criminal Justice Information Technology Institute   Criminal Justice
Information Technology Institute    Intelligence Technologies International
St. Petersburg Crime Prevention Internet Site   Criminal Intelligence Service
Canada  Criminal Justice and Public Safety  Global Security Complex
The Avenger's Handbook  Private Investigations: Baxter and Associates   The
Lawful Path     Private Investigation Home Page
Security Resource Net   Cellular Surveillance Systems   THE SPY SHOP    Law
Enforcment Internet Intelligence Reports
APB Multimedia Inc. - the ESPN of police and crime news     The Codex
Surveillance & Privacy Newsletter   International Bodyguard Directory
AudioLex Forensic, Legal and Business
Police Universe

Security Services

Personal Protective Services, Inc.  Emergency Data  ASW Group (SOC)     HI
TECH Securities Services
Bodyguard Home Page     TR Information Services     Global Investigations &
Information     Detective Information Network
The Integrity Center, Inc.  Investigative Resources     Star Security and
Investigation   Investigators Resource and Referral Service
Siam Relay's SecurityServices   Security Net    Legal, Privacy and Security
Issues in Electronic Commerce   MacKenzie Institute

IV. Sex: A Weapon for Politics, Commerce and War

Mighty empires, emperors and generals have risen and fallen on sex. As an old
saying goes, for every great (or a nasty) man, there is a great (or a nasty)
woman behind him. If Monica were a Mossad agent - could Bill Clinton have
given her US secrets for her 'knee services'?
Sex in Politics     Mata Hari   Female Spies - American Civil War   Rosie
O'Neal Green
Female Spies Sue The CIA    SECRET SOURCES: CIA SEWER RATS HASTENED COLD WAR
DEMISE  The Women's Civil War   Sex and Politics
Women Spies of WWII     Nerd Sex Resources      Princess Noor-un-nisa Inayat
Khan    Clinton - Wag the Dog - Part II - Four Intelligence Scandals and a
Culture War

------------------------------------------------------------------------

Please, email your comments or suggestions to: [EMAIL PROTECTED]


------------------------------------------------------------------------
 - Since 3/5/98 8:00 edt
LE FastCounter



Search  for

------------------------------------------------------------------------
This Intelligence and Security Webring site owned by kimsoft.
[ Previous 5 Sites | Previous | Next | Next 5 Sites | Random Site | List Sites
 ]
------------------------------------------------------------------------

Last modified Sun Dec 19 16:35:36 1999.
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to