Special Access Programs (SAP) These Programs do not Exist Publicly

They are known as ‘deep black programs 1997 US Senate report Described Them

IMG_2181

A former intelligence contractor has leaked the very first documentation that proves the existence of clandestine black budget operations (1)(programs that are extremely classified dealing with technology, information and more.) Did we really need this leak in order to believe that black budget programs operate in secrecy? No, many people will tell you that the existence of black budget programs was obvious and that we didn’t need any official documentation to prove it, but this still helps. The United States has a history of government agencies existing in secret for years. The National Security Agency (NSA) was founded in 1952, its existence was hidden until the mid 1960′s. Even more secretive is the National Reconnaissance Office, which was founded in 1960 but remained completely secret for 30 years.

 

We are talking about Special Access Programs (SAP). From these we have unacknowledged and waived SAPs. These programs do not exist publicly, but they do indeed exist. They are better known as ‘deep black programs.’ A 1997 US Senate report described them as “so sensitive that they are exempt from standard reporting requirements to the Congress.” 

 

The Washington Post revealed that the “black-budget” documents report  a staggering 52.6 billion dollars that was set aside for operations in the fiscal year 2013. Although it’s great to have this type of documentation in the public domain proving the existence of  these black budget programs, the numbers seem to be off according to some statements made by some very prominent people who have been involved in the defense sector for years. There is a lot of evidence to suggest that these programs are not using billions of dollars, but trillions of dollars that are unaccounted for. Here is a statement given by Canada’s former Minister of National Defence, Paul Hellyer in 2008:

 

It is ironic that the U.S. would begin a devastating war, allegedly in search of weapons of mass destruction when the most worrisome developments in this field are occurring in your own backyard.  It is ironic that the U.S. should be fighting monstrously expensive wars  allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy when trillions, and I mean thousands of billions of dollars have been spent on projects which both congress and the commander in chief no nothing about

 

We are talking about large amounts of unaccounted-for money going into programs we know nothing about. There have been several congressional inquiries that have noted billions, and even trillions of dollars that have gone missing from the federal reserve system. On July 16, 2001, in front of the house appropriations committee, Secretary of Defense Donald Rumsfeld stated:

 

The financial systems of the department of defence are so snarled up that we can’t account for some $2.6 trillion in transactions that exist, if that’s believable 

 

We don’t really hear about black budget programs, or about people who have actually looked into them.  However, the topic was discussed in 2010 by Washington Post journalists Dana Priest and William Arkin. Their investigation lasted approximately two years and concluded that America’s classified world has:

 

Become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employes, how many programs exist within it or exactly how many agencies do the same work 

 

Another person was aviation journalist Bill Sweetman. Within the Pentagon, he estimated that approximately 150 special access programs existed that weren’t even acknowledged. These programs are not known about by the highest members of government and the highest ranking officials in the military. He determined that most of these programs were dominated by private contractors (Lockheed Martin, Boeing, etc.) and that he had no idea as to how these programs were funded

 

Dwight Eisenhower, former 5 star U.S. general (highest possible rank) and President of the United States also warned us about  secrecy and the acquisition of unwarranted influence within the “department of defence” with his farewell speech

 

In the council of government, we must guard against the acquisition of unwarranted influence whether sought or unsought, by the military industrial complex. The potential disaster of the rise of mis placed power exists, and will persist. We must never let the weight of this combination endanger our liberties or democratic processes

 

He warns us about the influence of the military industrial complex, and the influence and power it’s capable of. After Eisenhower the next and only other president that blew the whistle on secrecy beyond the government was president John F. Kennedy in one of his most famous speeches, he is also referring to the military industrial complex:

 

The very word secrecy is repugnant, in a free and open society. And we are as a people inherently and historically opposed to secret societies, secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control. We are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence. On Infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumour is printed, no secret is revealed

 

The amount that the US sets aside for sensitive operations each year is not allowed to be published for eyes outside of the intelligence community. We are in an age where the US is having a difficult time keeping sensitive information under wraps, and although there is an abundance of blatant information for the world to wake up to, that which is still kept under tight wraps has also become more transparent. Many phenomena previously labelled as merely a “conspiracy theory” are now surfacing as true and verifiable day after day.

 

Could some of these black budget programs be dealing with UFOs? There is a large amount of evidence to suggest that they do, and possibly even extraterrestrials. Documents from the NSA prove that UFOs and extraterrestrials are of high interest to the agency(9)(10). In fact I would like to mention that there is an overwhelming amount of evidence to suggest that these black budget programs deal with matters beyond our world. Garry McKinnon has also shed light on this fact, as have thousands of previously classified documents and statements from high level government and military personnel. The world within our own world must be quite fascinating, the fact that we are living in the time of transparency must mean that the truth cannot stay hidden forever.

 

Worlds Within Worlds

 

Excerpt from the book “A.D. After Disclosure”

 

Thoughts on the “Breakaway Civilization”

 

By now, the classified world has moved far beyond the reach of the public world, and far beyond in its power and capabilities. Consider the story of a former NSA scientist who spoke with the authors. According to this individual, the NSA was operating computers during the mid-1960s with a processing clock-speed of roughly 650 megahertz(MHZ). To put that in perspective, it took 35 years for personal computers in the consumer market to reach that speed. Indeed, in 1965 there were no personal computers at all. Immediately, the near-fatal Apollo 13 mission in 1971 comes to mind, with its reliance on slide-rulers by mission specialist to guide the damaged NASA spacecraft back to Earth. When presented with this image, the NSA scientist shrugged and stated that secret computational capabilities were too important to share with NASA. So in, in computing, the National Security Agency was an amazing 35 years ahead of the rest of the world. This leads one to wonder what its computational powers are today.

 

Another example was the U.S. air strike against Libya in 1986. The raid employed f-111 fighter aircraft. Left out of the mission, however, was the F-117A Nighthawk, better known as the stealth fighter. It had been operational since 1983, but was still classified in 1986. In a form of logic both perverse and rational, the F-117A was so radically advanced that keeping it secret was more important than using it for this military mission.

 

Given the mixture of a treasure chest of government money, and private connections, the likelihood exists that six decades later there is a clandestine group that possesses:

 

Technology that is vastly superior to that of the “mainstream” world.

The ability to explore areas of our world and surroundings presently unavailable to the rest of us.

Scientific and cosmological understandings that give them greater insights into the nature of our world

A significant “built off the grid” infrastructure, partially underground, that affords them a high degree of secrecy and independence of action

This might well qualify them as a separate civilization – one that has broken away from our own, in effect, a breakaway civilization. Still interacting with our own, its members probably move back and forth between the official reality of what we are supposed to believe, and the other reality which encompasses new truths and challenges.

 

No, many people will tell you that the existence of black budget programs was obvious and that we didn’t need any official documentation to prove it, but this still helps. The United States has a history of government agencies existing in secret for years.

 

The National Security Agency (NSA) was founded in 1952, its existence was hidden until the mid 1960′s. Even more secretive is the National Reconnaissance Office, which was founded in 1960 but remained completely secret for 30 years.

 

We are talking about Special Access Programs (SAP).

 

From these we have unacknowledged and waived SAPs. These programs do not exist publicly, but they do indeed exist. They are better known as ‘deep black programs.’

 

A 1997 US Senate report described them as,

 

so sensitive that they are exempt from standard reporting requirements to the Congress.

 

The Washington Post revealed that the “black-budget” documents report  a staggering 52.6 billion dollars that was set aside for operations in the fiscal year 2013.

 

Although it’s great to have this type of documentation in the public domain proving the existence of  these black budget programs, the numbers seem to be off according to some statements made by some very prominent people who have been involved in the defense sector for years. There is a lot of evidence to suggest that these programs are not using billions of dollars, but trillions of dollars that are unaccounted for.

Here is a statement given by Canada’s former Minister of National Defence, Paul Hellyer in 2008 (below video):

 

It is ironic that the U.S. would begin a devastating war, allegedly in search of weapons of mass destruction when the most worrisome developments in this field are occurring in your own backyard.

 

It is ironic that the U.S. should be fighting monstrously expensive wars  allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy when trillions, and I mean thousands of billions of dollars have been spent on projects which both congress and the commander in chief no nothing about.

 

We are talking about large amounts of unaccounted-for money going into programs we know nothing about.

 

There have been several congressional inquiries that have noted billions, and even trillions of dollars that have gone missing from the federal reserve system.

 

On July 16, 2001, in front of the house appropriations committee, Secretary of Defense Donald Rumsfeld stated:

 

The financial systems of the department of defence are so snarled up that we can’t account for some $2.6 trillion in transactions that exist, if that’s believable.

 

We don’t really hear about black budget programs, or about people who have actually looked into them. However, the topic was discussed in 2010 by Washington Post journalists Dana Priest and William Arkin

 

Their investigation lasted approximately two years and concluded that America’s classified world has:

 

Become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employees, how many programs exist within it or exactly how many agencies do the same work.

Another person was aviation journalist Bill Sweetman. Within the Pentagon, he estimated that approximately 150 special access programs existed that weren’t even acknowledged.

 

These programs are not known about by the highest members of government and the highest ranking officials in the military. He determined that most of these programs were dominated by private contractors (Lockheed Martin, Boeing, etc.) and that he had no idea as to how these programs were funded.

 

Dwight Eisenhower, former 5 star U.S. general (highest possible rank) and President of the United States also warned us about secrecy and the acquisition of unwarranted influence within the “department of defence” with his farewell speech:

 

In the council of government, we must guard against the acquisition of unwarranted influence whether sought or unsought, by the military industrial complex. The potential disaster of the rise of misplaced power exists, and will persist.

 

We must never let the weight of this combination endanger our liberties or democratic processes.

 

He warns us about the influence of the military industrial complex, and the influence and power it’s capable of.

 

After Eisenhower the next and only other president that blew the whistle on secrecy beyond the government was president John F. Kennedy in one of his most famous speeches  he is also referring to the military industrial complex

 

The very word secrecy is repugnant, in a free and open society. And we are as a people inherently and historically opposed to secret societies, secret oaths and to secret proceedings.

 

We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions.

 

Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment.

 

That I do not intend to permit to the extent that it is in my control. We are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence.

 

On Infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day.

 

It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised.

 

JFK Address,   “The President and the Press,”

Before The American Newspaper Publishers Association

27 April 1961   JFK Speech

The amount that the US sets aside for sensitive operations each year is not allowed to be published for eyes outside of the intelligence community.

 

We are in an age where the US is having a difficult time keeping sensitive information under wraps, and although there is an abundance of blatant information for the world to wake up to, that which is still kept under tight wraps has also become more transparent. Many phenomena previously labeled as merely a “conspiracy theory” are now surfacing as true and verifiable day after day.

 

Could some of these black budget programs be dealing with UFOs? There is a large amount of evidence to suggest that they do, and possibly even extraterrestrials.

 

Documents from the NSA prove that UFOs and extraterrestrials are of high interest to the agency.

 

In fact I would like to mention that there is an overwhelming amount of evidence to suggest that these black budget programs deal with matters beyond our world.

Garry McKinnon has also shed light on this fact, as have thousands of previously classified documents and statements from high level government and military personnel.

 

The world within our own world must be quite fascinating, the fact that we are living in the time of transparency must mean that the truth cannot stay hidden forever.

Worlds Within Worlds

 

By now, the classified world has moved far beyond the reach of the public world, and far beyond in its power and capabilities.

Consider the story of a former NSA scientist who spoke with the authors. According to this individual, the NSA was operating computers during the mid-1960s with a processing clock-speed of roughly 650 megahertz (MHZ).

 

To put that in perspective, it took 35 years for personal computers in the consumer market to reach that speed. Indeed, in 1965 there were no personal computers at all. Immediately, the near-fatal Apollo 13 mission in 1971 comes to mind, with its reliance on slide-rulers by mission specialist to guide the damaged NASA spacecraft back to Earth.

 

When presented with this image, the NSA scientist shrugged and stated that secret computational capabilities were too important to share with NASA. So in, in computing, the National Security Agency was an amazing 35 years ahead of the rest of the world. This leads one to wonder what its computational powers are today.

 

Another example was the U.S. air strike against Libya in 1986. The raid employed f-111 fighter aircraft.

 

Left out of the mission, however, was the F-117A Nighthawk, better known as the stealth fighter. It had been operational since 1983, but was still classified in 1986. In a form of logic both perverse and rational, the F-117A was so radically advanced that keeping it secret was more important than using it for this military mission.

 

 

Given the mixture of a treasure chest of government money, and private connections, the likelihood exists that six decades later there is a clandestine group that possesses:

 

Technology that is vastly superior to that of the “mainstream” world.

The ability to explore areas of our world and surroundings presently unavailable to the rest of us.

Scientific and cosmological understandings that give them greater insights into the nature of our world

A significant “built off the grid” infrastructure, partially underground, that affords them a high degree of secrecy and independence of action

This might well qualify them as a separate civilization – one that has broken away from our own, in effect, a breakaway civilization.

 

Still interacting with our own, its members probably move back and forth between the official reality of what we are supposed to believe, and the other reality which encompasses new truths and challenges.

As I already mentioned, the purpose of PEHI (Project For The Exposure Of Hidden Institutions) is to put together the entire spectrum of the world’s hidden organizations. But even though I’m familiar with the Pilgrims Society, the 1001 Club, the Multinational Chairmans Group, Le Cercle, and other very powerful hidden organizations, I’m sure there’s is a lot more to discover.

For example, during the long hours that these membership lists were put together, I’ve always paid attention to individuals who might have been involved with different intelligence agencies. Information remains scarce, but it happens relatively often that you come across someone who is involved with the CIA. This isn’t such a surprise, because there’s no doubt that the CIA is very closely allied with the most important financial and political institutions in the United States.

On the other hand, I seldom or never came across individuals involved with Army intelligence, Navy Intelligence, Air Force Intelligence, the DIA, the NRO, or the NSA. Le Cercle is a bit of an exception, because it’s focused on bringing together members of the international intelligence agencies. And, of course, there is the science-oriented JASON Group, which has at least one former NSA employee and two founders of the NRO.

All in all, besides their official functions it’s very hard to get an idea of what most of these intelligence agencies are doing. Personally, I am always looking for leads in the longest and most obvious cover up ever; that one about the UFO phenomenon, in which I include the cattle mutilations (take a look here). There’s no indication that the average Pilgrims Society or Trilateral Commission member has any idea about these subjects, but somewhere these two worlds have to meet. I am anything but an expert on intelligence agencies, but I do want to put some basic information here which I think is important for anyone looking into hidden organizations. It could easily take a couple of years before I write some additional information on this subject, and maybe I never will.

In the U.S. you only have 3 types of classification: Confidential, Secret, and Top Secret. That’s it. But this doesn’t matter, since the true power of the classification system is the famous ‘need to know’ policy. Just because you have a Top Secret clearance doesn’t mean you can gain access to all the different Top Secret documents of the CIA, Army, Navy, and Air Force.

However, this 3-tiered classification system is not enough to protect some of the more sensitive information. Therefore additional levels of compartmentalization have been created. After a very intensive background check, someone with a Top Secret clearance might obtain an additional Sensitive Compartmented Information (SCI) clearance, under which information is buried that needs to be restricted to even fewer individuals. This TS-SCI clearance had been introduced mainly to stop some higher ranking officers from looking into Top Secret files they don’t have any business with.

But even the TS-SCI clearance doesn’t provide the secrecy needed for some of the most sensitive projects. This is the reason that Special Access Programs (SAP) are created all the time. In this case only a predetermined list of authorized personnel has access to the project and additional security measures can be taken to keep outsiders away from it. Different congressional committees are informed about these SAPs, but there is very little time for questions.

Most SAPs start out as Unacknowledged Special Access Programs (USAP), better known as Black Projects. The F-117A Nighthawk and the B-2 Spirit are examples of projects that started out as Unacknowledged SAPs.

A DOD manual describes a USAP as follows (1):

Unacknowledged SAPs require a significantly greater degree of protection than acknowledged SAPs… A SAP with protective controls that ensures the existence of the Program is not acknowledged, affirmed, or made known to any person not authorized for such information. All aspects (e.g., technical, operational, logistical, etc.) are handled in an unacknowledged manner.”

Persons involved in a particular USAP are ordered to deny such a program exists. It’s not allowed to react with a “no comment”, because that way someone immediately suspects something is being hidden and might be motivated to look further into it. Officers not ‘accessed’ for a USAP, even superior ones, are to be given the same response. The more sensitive the program, the more protection the commanding officer can demand. He could even subject his personnel to lie-detector tests to see whether or not they have been talking about it to anyone. According to a 1997 Senate investigation (2):

“Additional security requirements to protect these special access programs can range from mere upgrades of the collateral system’s requirements (such as rosters specifying who is to have access to the information) to entire facilities being equipped with added physical security measures or elaborate and expensive cover, concealment, deception, and operational security plans.”

There are two versions of the Unacknowledged Special Access Programs. The first one is the regular USAP. These regular USAPs are reported in the same way as their acknowledged versions. In closed sessions, the House National Security Committee, the Senate Armed Services Committee, and the defense subcommittees of the House and Senate Appropriations committees can get some basic information about them. The Secretary of Defense, however, can decide to ‘waive’ particularly sensitive USAPs. These are unofficially referred to as Deep Black Programs. According to the same 1997 Senate investigation as mentioned earlier:

“Among black programs, further distinction is made for “waived” programs, considered to be so sensitive that they are exempt from standard reporting requirements to the Congress. The chairperson, ranking member, and, on occasion, other members and staff of relevant Congressional committees are notified only orally of the existence of these programs.”

This leads to the conclusion that only very few people are aware of these waived Unacknowledged Special Access Programs. Congress certainly doesn’t get the information it needs to speak out against newly established waived USAPs and I haven’t read anywhere that their opinion is actually appreciated. You could also ask yourself if Congress is told the truth about many of the most sensitive Special Access Projects or if their successors are informed about previously activated (waived) USAPs. Even with regular SAPs Congress is ignored at times:

“Last summer, the House Defense Appropriations Committee complained that “the air force acquisition community continues to ignore and violate a wide range of appropriations practices and acquisition rules”. One of the alleged infractions was the launch of an SAP without Congressional notification.” (3)

What makes Unacknowledged Special Access Projects even more impenetrable is the fact that a lot of these programs are located within private industry. The U.S. government generally doesn’t develop a whole lot. If you look at the defense industry, you have companies like Boeing, Lockheed, Northrop, McDonnell Douglas, TRW, Rockwell, Bechtel, SAIC, or Decision-Science Applications (DSA Inc.), who develop certain technologies for the U.S. government.

This means it’s virtually impossible to get information about these projects, because private industry is protected by something called ‘proprietary privilege‘. You generally can’t get any information about a USAP by issuing a FOIA or by annoying a Congressman (National Security), but just in case anyone might be able to succeed, there’s always the argument of proprietary privilege of the private industry.

Category Secrecy levels
Additional levels of Compartmentalization A USAP behind another SAP or USAP, combined with the protection the private industry enjoys.
‘Waved’ Unacknowledged Special Access Programs / ‘Deep Black Programs’ (details already completely invisible to congress and the president)
Unacknowledged Special Access Programs / ‘Black Programs’
(acknowledged) Special Access Programs
Top Secret Sensitive Compartmented Information (TS-SCI)
Basic secrecy levels Top Secret NATO Cosmic Top Secret
Secret NATO Secret
Confidential NATO Confidential
Public or semi-public For Official Use Only NATO Restricted
Unclassified NATO Unclassified


And even in case the National Security State and proprietary privilege fails, there still seems to be at least one other (unverified) mechanism to protect the most sensitive projects from public exposure. This information comes from (many very credible) Disclosure Project witnesses (4), all of them claiming to have some kind of experience with these type of projects.

Some of these people, with no one in the project disputing it, are saying that certain Black Programs (USAPs) act as covers for UFO / ET related projects. This means that in an emergency situation a sensitive Black or Deep Black Program could be revealed to the public, while the program behind it remains undiscovered. In a 1997 speech, former astronaut Edgar Mitchell summarizes what the Disclosure Project is all about (5):

“I also think that the prevalence in the modern era of so many events – the sightings, the continual mutilation events, the so-called abduction events – that we are looking at likely reversed engineered technology in the hands of humans that are not under government control or any type of high level control…

So if there are back engineered technologies existing, they are probably in the hands of this group of individuals, formerly government, formerly perhaps intelligence, formerly, under private sector control with some sort of oversight by military or by government. But this (oversight) is likely no longer the case as a result of this access denied category that is now operating. I call it a clandestine group. The technology is not in our military arsenals anywhere in the world, but it does exist, and to me that’s quite disconcerting.”


A big questions that remains of course is how all these projects are funded. The official black budget of the DoD would be the most likely explanation, but there are ‘indications’ that the U.S. economy is being plundered for at least $1 trillion every year (yes, about 10% of GNP). Because no one is going to believe this without reading the full original sources, I cached all the mainstream news reports at the bottom of this article.

I extracted the following numbers from these reports:

Year Missing Sources (all cached at the bottom of this article)
1998 $3.4 trillion Washington Times
1999 $2.3 trillion Congressional meeting
2000 $1.1 trillion Congressional meeting; Insight Magazine
2001 $2.3 trillion CBS quoting Rumsfeld
2002 $1+ trillion San Francisco Chronicle; CBS


According to financial expert Catherine Austin Fitts this has become possible due to the introduction of acts like the 1947 National Security Act and the 1949 CIA Act (6). Large New York banks like J.P. Morgan Chase and defense contractors like Lockheed Martin, who are running the systems of all the government departments, seem to be responsible for diverting and laundering billions of dollars every day from public and other undisclosed funds. I suggest you read all the sources that are provided for this article, because I sure haven’t got any answers on this subject.

At the moment, I am wondering who is using who here? Is J.P. Morgan Chase, the core of the American part of the Anglo-American financial empire, being used as a milch cow to fund secret projects of the most unimaginable magnitude? Or, in line with the NWO conspiracy theories, are the bankers of the Pilgrims Society themselves really the ones in control? Or is there some kind of mutual interest here, whereby these bankers fund the Black Projects, while technology and services from these Black Projects keeps them on top of the world? I guess anything is possible at this moment.

By the way, USAPs don’t always have to involve the development of new cutting edge technology. In the following case a USAP is used as to a tool to circumvent national and international humanitarian laws. Seymour Hersh, 2004 (8):

Rice and Rumsfeld know what many others involved in the prisoner discussions did not — that sometime in late 2001 or early 2002, the President had signed a top-secret finding, as required by law, authorizing the Defense Department to set up a specially recruited clandestine team of Special Forces operatives and others who would defy diplomatic niceties and international law and snatch — or assassinate, if necessary — identified ‘high-value’ Al Qaeda operatives anywhere in the world.

Equally secret interrogation centers would be set up in allied countries where harsh treatments were meted out, unconstrained by legal limits of public disclosure. The program was hidden inside the Defense Department as an ‘unacknowledged’ special-access program, or SAP, whose operational details were known only to a few in the Pentagon, the CIA and the White House.”

All I want at this point is the names of the people who are running all these projects. Check back in a couple of years or so.


National Industrial Security Program Operating Manual Supplement

The Under Secretary Of Defense
Washington D.C. 20301

2000
Defense Technical Information Cnter (DTIC):

DoD 5220.22-M-SUP-1

… g. Procedures for unacknowledged SAP security.

An unacknowledged SAP will require additional security training and briefings, beyond that required in the baseline. Additional requirements will be specified in the Contract Security Classification Specification and will address steps necessary to protect sensitive relationships, locations, and activities.

… 3102. Unacknowledged Special Access Programs (SAP).

Unacknowledged SAPs require a significantly greater degree of protection than acknowledged SAPs. Special emphasis should be placed on:

a.   Why the SAP is unacknowledged
b.   Classification of the SAP
c.   Approved communications system
d.   Approved transmission systems
e.   Visit procedures
f.    Specific program guidance

… Unacknowledged Special Access Program.

A SAP with protective controls that ensures the existence of the Program is not acknowledged, affirmed, or made known to any person not authorized for such information. All aspects (e.g., technical, operational, logistical, etc.) are handled in an unacknowledged manner.

Latest Comments

Leave a Reply