Primary Intelligence Asset

MH370 CIA:JSOC Analysis 2

AUTHENTICATED_SOURCE RESTRICTED_ACCESS_LVL_3 OCR_VERIFIED
INTEL

Executive Summary

Analysis of the command, control, and legal architecture for a hypothesized MH370 asset denial operation ('Project Quiet Exodus'). It outlines the Presidential Finding (Title 50) requirements and the CIA-led operational framework necessary for such a covert action.
Analysis Confidence: High
ST_CODE: 089163

System Metadata

Source ID

DOC-MH370_EX

Process Date

2/3/2026

Integrity Hash

SHA256-0ho92zey9iav...

Indexer Status

COMPLETE

Initializing_Secure_Viewer...
[ DOWNLOAD_ORIGINAL_ASSET ]

FORENSIC_TRANSCRIPT_LOG

Transcript

Page 1 of 1

INTRODUCTION

Project Quiet Exodus: An Analysis of the Command, Control, and Legal Architecture of the MH370 Asset Denial Operation The Legal and Policy Architecture for Covert Action This section establishes the foundational legal and policy framework required to authorize an operation of the scale and sensitivity of Project Quiet Exodus. It demonstrates that a clear, albeit highly classified, legal pathway exists for such an action, centered on the President's unique authorities under Title 50 of the U.S. Code. The Presidential Finding Under Title 50: The Indispensable Legal Instrument Any analysis of a U.S. covert action must begin with its legal foundation. The primary legal authority for such operations is codified in Title 50 of the U.S. Code, which defines a covert action as "an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States will not be apparent or acknowledged publicly". The hypothesized MH370 asset denial operation—a non-attributable action to neutralize a critical human asset and deny a strategic technological capability to a foreign power—falls squarely within this statutory definition. The legal instrument required to initiate a covert action is a Presidential Finding, a formal written directive through which the President of the United States authorizes the operation. To issue a Finding, the President must determine that the proposed action is "necessary to support identifiable foreign policy objectives of the United States, and is important to the national security of the United States". The intelligence baseline's assessment that the Freescale Semiconductor team had become an "imminent and intolerable vector for compromise" of a "nation-defining technological advantage" provides the precise national security justification required for such a grave determination. The Finding is a highly structured document with specific legal requirements. It must be in writing, unless immediate action is required, in which case a written record must be made contemporaneously and reduced to a formal Finding within 48 hours. Crucially, the Finding must specify every U.S. government department, agency, or entity authorized to participate in the action. This provision is paramount, as it legally subordinates all named participants, including any detailed Department of Defense (Do D) assets, to the operational control of the designated executive agency—in this case, the Central Intelligence Agency (CIA)—for the specific purpose of the covert action. The Presidential Finding is not merely an authorization; it is a powerful mechanism of control and compartmentalization. By explicitly naming the participating agencies, the Finding legally establishes the operational boundaries and the "need-to-know" list from the highest level of government. This creates a legally enforceable firewall around the operation, preventing bureaucratic creep and unauthorized access from other parts of the U.S. government. Furthermore, the legal requirement to report any "significant change" in a previously approved action back to the congressional intelligence committees ensures that the operation remains tightly bound to its original intent and scope. For an operation involving revolutionary technology like the Compact Fusion Reactor (CFR) platform, this level of strict, legally defined control is indispensable for maintaining secrecy and achieving the mission's objectives. Feature Title 50 Authority (Covert Action) Title 10 Authority (Military Operation) Primary Authority President of the United States Secretary of Defense Lead Agency/Executor Central Intelligence Agency (or other designated agency) Department of Defense (Combatant Commands) Chain of Command President -> Director of the CIA -> Operational Commander President -> Secretary of Defense -> Chairman, JCS -> Combatant Commander Legal Basis for Action Presidential Finding (50 U.S.C. §3093) Execute Order from the President or Secretary of Defense Congressional Oversight House & Senate Select Committees on Intelligence (HPSCI/SSCI) House & Senate Armed Services Committees (HASC/SASC) Primary Purpose To influence foreign conditions where U.S. role is not apparent or acknowledged To conduct military operations in support of national objectives The National Security Council as the Deliberative Body Before a Presidential Finding is signed, any proposed covert action of this significance is subject to a rigorous interagency review process managed by the National Security Council (NSC). The NSC is the President's principal forum for considering national security and foreign policy matters, and its primary function is to advise and assist the President in integrating all aspects of national power. The senior interagency body for this process is the NSC's Principals Committee (PC), which is typically chaired by the National Security Advisor and includes cabinet-level officials such as the Secretaries of State and Defense, the Director of National Intelligence (DNI), the Director of the CIA, and the Chairman of the Joint Chiefs of Staff. Historical precedent and modern directives confirm that a proposal for a covert action, typically generated by the CIA, is submitted to the NSC for deliberation. The PC is tasked to "consider and submit to the President a policy recommendation, including all dissents, on each proposed covert action". This process ensures that the strategic rationale, operational risks, required resources, and potential diplomatic or military consequences are fully vetted by all relevant stakeholders before a final decision is presented to the President. A search for unusual or unexplained NSC or PC meetings in early March 2014 yields no direct evidence. However, this absence is itself significant when viewed in the geopolitical context of the time. The dominant, all-consuming national security issue of that exact period was Russia's invasion and subsequent annexation of Crimea. Official White House records confirm that President Obama convened an NSC meeting in the Situation Room on March 3, 2014, specifically to discuss the escalating crisis in Ukraine. This intense operational tempo of high-level meetings provided the perfect strategic cover for the sensitive deliberations required for Project Quiet Exodus. A proposal of this nature would not require a separate, anomalous meeting that could attract unwanted attention. Instead, it could have been briefed and debated within a "Principals Small Group"—a more restricted session of the PC—or as a highly compartmented agenda item within the existing crisis management framework. The frequent and expected congregation of the key principals to manage the Ukraine crisis would have created the ideal, low-signature environment for the NSC to conduct its most sensitive deliberations regarding the imminent threat from the People's Republic of China (PRC) in Asia. The lack of a specific, publicly identifiable "MH370 meeting" is not a lack of evidence; it is evidence of sophisticated operational security at the highest level of government. Command and Control: The CIA-JSOC Nexus in a Joint Interagency Task Force The operational execution of Project Quiet Exodus would have required a command structure capable of seamlessly integrating intelligence, technology, and specialized military capabilities under a single, unified command. The standard U.S. government doctrinal model for such a complex mission is the Joint Interagency Task Force (JIATF). The Joint Interagency Task Force (JIATF) Model: A Framework for Integrated Action A JIATF is a force multiplier that uses a unique organizational structure to focus the capabilities of multiple government agencies on a single, well-defined mission under the command of a single individual. While many JIATFs are established and publicly acknowledged for missions like counter-narcotics (e.g., JIATF-South) or regional security (e.g., JIATF-West), the model is equally applicable to clandestine operations. For Project Quiet Exodus, a national-level directive, likely issued by the NSC as part of the covert action approval process, would have mandated the formation of a highly compartmented JIATF. This directive would have compelled the participation and resourcing from all agencies specified in the Presidential Finding. Unlike its public counterparts, this task force—designated here as JIATF-Exodus—would have been clandestine, its existence and charter known only to those with the highest security clearances and a direct need-to-know. Entity Primary Role Governing Authority POTUS Authorization U.S. Constitution, Art. II NSC Principals Committee Deliberation & Recommendation National Security Act of 1947 CIA (as Executive Agent) Overall Command & Execution Title 50 (Presidential Finding) CIA - Directorate of Operations (DO) Covert Action Planning & Execution, Information Operations Title 50 CIA - Directorate of Science & Tech (DS&T) Technical Interface, Programmatic Oversight Title 50 Joint Special Operations Command (JSOC) Specialized Planning, Logistics, & Asset Support Title 10 (acting under Title 50 authority) National Security Agency (NSA) Signals Intelligence (SIGINT) Support Title 50 Entity Primary Role Governing Authority National Geospatial-Intelligence Agency (NGA) Geospatial Intelligence (GEOINT) Support Title 50 National Reconnaissance Office (NRO) Satellite Intelligence (IMINT/SIGINT) Support Title 50 U.S. Navy (Specific Units) Logistical & Operational Support (e.g., UCT-2, VPU-2) Title 10 (acting under Title 50 authority) The Central Intelligence Agency: Lead Agency and Executive Agent The Presidential Finding would have designated the CIA as the lead agency, making the Director of the CIA the executive agent for the operation, receiving the order directly from the President. Within the JIATF, the CIA would have held several paramount roles: ● Intelligence Trigger: The CIA would be responsible for producing the definitive, all-source intelligence assessment that triggered the operation. This would involve fusing signals intelligence from the NSA on PRC communications with human intelligence (HUMINT) from its own clandestine sources to conclude with high confidence that the Freescale team was at "imminent and intolerable" risk of compromise. ● Covert Action Authority and Deniability: The CIA's Directorate of Operations (DO), as the agency's clandestine arm, would be responsible for the overall planning and management of the operation to ensure the U.S. government's role remained plausibly deniable. This includes managing the operational security, cover stories, and deception plans. ● Programmatic Interface: The CIA's Directorate of Science & Technology (DS&T) would serve as the critical bridge between the intelligence community and the clandestine Skunk Works® program developing the CFR platform. The DS&T's mission is to "apply innovative, scientific, engineering, and technical solutions" and "apply advanced technologies that provide the nation a significant intelligence advantage," positioning it as the natural government entity to oversee and integrate a revolutionary technology from a "black" program into an operational context. ● Information Operations: The CIA would be responsible for orchestrating the global post-event information campaign, a core component of covert action designed to shape public narratives, misdirect scrutiny, and conceal the true nature of the operation. Joint Special Operations Command: The Specialized Enabler The Presidential Finding would have directed the Department of Defense to provide support, legally detailing assets from the Joint Special Operations Command (JSOC) to the CIA-led JIATF. JSOC, a subordinate command of U.S. Special Operations Command (USSOCOM), would serve as the specialized enabler, providing unique capabilities that the CIA does not organically possess. JSOC's key contributions would include: ● Specialized Planning and Logistics: JSOC's primary contribution would be its unparalleled expertise in planning complex, no-fail missions in denied or politically sensitive environments. Their planners, embedded within the JIATF, would develop the detailed operational concept, logistical support plan, and contingency responses necessary for mission success. ● Advanced Force Operations (AFO): AFO are clandestine operations conducted prior to a main mission to "refine the location of specific, identified targets and further develop the operational environment". It is plausible that small AFO teams from a JSOC Special Mission Unit, such as Delta Force's G Squadron, were deployed to the region for pre-operational surveillance or to prepare the operational area. ● Specialized Asset Support: JSOC would provide access to unique, low-visibility aviation or maritime assets required to support the operation, which would be integrated into the overall JIATF plan. This structure creates a symbiotic fusion of authority and capability. The CIA possesses the legal authority under Title 50 to conduct covert action but often lacks the large-scale, exquisite kinetic and logistical capabilities for complex interventions. JSOC possesses these world-class capabilities but, operating under Title 10, lacks the legal authority to unilaterally conduct covert actions, which are statutorily defined as intelligence activities. The JIATF model under a Title 50 Finding pairs the CIA's legal authority and mandate for deniability with JSOC's unparalleled operational capability. This is not mere interagency cooperation; it is a legal and operational construct that allows the U.S. government to project power in a way that neither organization could achieve alone. The Broader Institutional Framework Project Quiet Exodus would have required the synchronized effort of the entire national-level intelligence apparatus. The actions of these agencies and supporting military units must be understood not as independent operations but as directed tasks within the JIATF structure, all in service of the CIA's covert action objective. National-Level Intelligence Support: The Technical Enablers The JIATF commander would have the authority to task the nation's three major technical intelligence agencies for dedicated support: ● National Geospatial-Intelligence Agency (NGA): The NGA's role is to provide geospatial intelligence (GEOINT), which forms the visual and geographic foundation for any modern operation. For this mission, NGA would be tasked with providing detailed mapping of the operational area, creating precise targeting packages for the aircraft, and conducting all-source analysis of imagery collected before, during, and after the event to confirm mission success and support the post-event deception campaign. ● National Security Agency (NSA): As the primary collector of signals intelligence (SIGINT), the NSA's role would be indispensable. The NSA would have been tasked with an intense, focused collection effort against PRC targets to provide the initial intelligence trigger, specifically monitoring communications related to the Freescale team and PRC espionage efforts targeting them. During the operation itself, the NSA would provide real-time SIGINT overwatch, monitoring for any adversary reactions. ● National Reconnaissance Office (NRO): The NRO designs, builds, and operates the nation's reconnaissance satellites. The NRO would be tasked by the JIATF to reposition and focus its satellite constellations (both imagery and signals intelligence platforms) to provide persistent, strategic overwatch of the entire operational theater. This would include tracking the target aircraft and monitoring the broader region for any foreign military or intelligence responses. Re-contextualizing Military Unit Involvement: Subordinate Tasked Elements The specific military units identified in the intelligence baseline must be re-contextualized as subordinate elements executing discrete tasks assigned by the JIATF commander. ● U.S. Navy Underwater Construction Team 2 (UCT-2): An official U.S. Navy news release published on March 13, 2014, confirms that UCT-2 was deployed to Diego Garcia in February-March 2014. Critically, their final mission was explicitly stated as the "inspection and repair of two Hydro-acoustic Data Acquisition System (HDAS) cables". Within the JIATF framework, this action is understood not as a routine maintenance task, but as a critical act of operational preparation, directed by the JIATF to create the "acoustic blackout" necessary to suppress evidence and maintain plausible deniability. ● U.S. Navy Special Projects Patrol Squadron 2 (VPU-2): VPU-2 is a highly secretive squadron that flies specially modified P-3 and EP-3E aircraft to collect signals and electronic intelligence for "national-level tasking". The espionage case of Lt. Cmdr. Edward Lin confirms the squadron's deep involvement with "highly sensitive programs related to advanced energy and propulsion systems". A revolutionary new platform like the CFR orb would require extensive operational testing and signature measurement. The program office at Skunk Works® and their government sponsors at CIA's DS&T would need to collect detailed performance data in a real-world operational scenario. A VPU-2 aircraft, with its specialized sensor suites, would be the ideal platform to perform this technical intelligence collection mission. Therefore, VPU-2's role in the MH370 operation was likely twofold: first, to provide traditional SIGINT overwatch of the target and the operational area for the JIATF commander; and second, to act as the on-scene technical collection asset for the program office, recording the electronic and physical signatures of the CFR orbs during the engagement to validate their performance. This reframes VPU-2 not just as an operational support asset, but as an integral part of the technology's research and development lifecycle. Corroborating Evidence of a Pre-Planned, CIA-Led Operation The assessment of the MH370 event as a deliberate covert action is supported by a convergence of evidence that forms a complete and logical operational arc: a clear motive, demonstrable intent through pre-planned actions, and active control of the post-event narrative. The Intelligence Trigger: The 2013-2014 U.S.-China Counter-Intelligence Crisis The motive for an operation of this magnitude is found in the acute counter-intelligence threat environment of the 2013-2014 period. This era was characterized by an aggressive, "whole-of-society" campaign by the PRC to acquire sensitive foreign technology through state-sponsored espionage. This assessment is corroborated by a documented surge in Chinese espionage incidents after Xi Jinping assumed power in late 2012. The landmark indictment of five officers from PLA Unit 61398 in May 2014 for economic cyber espionage against U.S. companies in the nuclear power and metals industries serves as a powerful, unclassified confirmation of this high-stakes intelligence battle. This public action, occurring just two months after the MH370 event, validates the intelligence baseline's assessment that the Freescale team, with its irreplaceable knowledge of the CFR control system, was an "imminent vector for compromise" that the U.S. could not tolerate. Pre-Planned Evidence Suppression: The Acoustic Blackout at Diego Garcia The intent to conduct a covert operation is demonstrated by a clear act of pre-planned evidence suppression. The primary piece of physical evidence is the confirmed failure of the northern segment (HA08N) of the HA08 hydrophone array at Diego Garcia in March 2014. This array, also known as the Hydro-acoustic Data Acquisition System (HDAS), would have been the primary sensor capable of detecting and recording the acoustic signature of a conventional aircraft crash in the Indian Ocean. This "convenient failure" is linked directly to a U.S. military unit with the specific means and opportunity to cause it. The official U.S. Navy news release confirming the presence of Underwater Construction Team 2 (UCT-2) and their final mission to "inspect and repair" the HDAS cables in that exact location during the February-March 2014 timeframe is dispositive. This confluence of events defies coincidence and demonstrates foreknowledge and a deliberate action to control the acoustic record from the outset, a hallmark of a meticulously planned covert operation. Pre-Planned Information Operation: The Global Search The active control of the operation's aftermath is evident in the management of the global search for MH370. The chronology of the official search reveals a classic information operation designed to misdirect and deceive. The initial phase, from March 8th to March 15th, was intensely and publicly focused on the South China Sea and the Strait of Malacca, areas consistent with the aircraft's last known position. The dramatic pivot on March 15th to the vast and remote Southern Indian Ocean, based on the carefully timed release of Inmarsat satellite data, is assessed as a deliberate, pre-planned deception. This multi-day misdirection served two critical functions: first, it focused the world's media and search assets on a location thousands of miles from the actual area of operations, buying critical time for the JIATF to sanitize the true location and exfiltrate assets. Second, it introduced a complex but technically plausible data set—the Inmarsat "handshakes"—to create a new, legitimate-seeming search area, effectively laundering the deception through a scientific rationale. This demonstrates active, post-event management of the global narrative, consistent with a CIA-led deception strategy. Date (March 2014) Official Action/Statement Geographic Focus of Search Assessed Deception/Information Operation Objective 8-14 Initial search and rescue operations launched by Malaysia and international partners. Multiple false South China Sea, Strait of Malacca, Andaman Sea. Phase 1: Misdirection. Focus global attention and search assets on the initial, logical search area, far from Date (March 2014) Official Action/Statement Geographic Focus of Search Assessed Deception/Information Operation Objective leads (oil slicks, debris) are pursued. the true area of operations, to buy time. 15 Malaysian PM announces data indicates the plane's communications were deliberately disabled and it flew for hours to the west. Two vast corridors are announced: a northern one over Asia and a southern one over the Indian Ocean. Phase 2: Pivot. Introduce the concept of a massive new search area while still maintaining ambiguity. Begin the process of shifting the narrative. 17-23 Australia takes the lead in the southern corridor search. Multiple satellite images of potential debris are released by Australia, China, and France. Southern Indian Ocean. Phase 3: Solidification. Use satellite data (real or manufactured) to legitimize the new search area. Create a plausible, data-driven rationale to cement the new narrative and permanently shift focus away from the actual theater of operations. 24 Malaysian PM announces that new analysis of Inmarsat data concludes the flight ended in the Southern Indian Ocean. Southern Indian Ocean becomes the sole, definitive search area. Phase 4: Deception Complete. Finalize the new narrative. The global search effort is now irrevocably committed to a remote location, ensuring the actual operational area remains secure. The three pillars of evidence—motive, intent, and control—are powerful individually, but their true analytical weight comes from their chronological and causal relationship. They form a complete, logical sequence that describes a classic intelligence operation: a clear and present threat emerges (PRC espionage), establishing the motive; the operational environment is prepared (disabling the HA08 array), demonstrating intent; and a pre-planned deception campaign is launched (misdirecting the search), demonstrating active control of the aftermath. This logical progression from motive to intent to control is extraordinarily difficult to explain as a series of unrelated coincidences. It is the coherent signature of a single, centrally-managed, pre-planned covert action. Works cited 1. Covert Action and Clandestine Activities of the Intelligence ..., https://www.congress.gov/crs-product/R45191 2. Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief - Every CRS Report, https://www.everycrsreport.com/files/20190614_R45175_7d5910f21a70a4196b7a9b85f486256 3bf5255e8.html 3. www.congress.gov, https://www.congress.gov/crs-product/R45175#:~:text=50%20U.S.C.,security%20of%20the%20 United%20States.%22 4. Presidential finding - Wikipedia, https://en.wikipedia.org/wiki/Presidential_finding 5. Covert Action | The Belfer Center for Science and International Affairs, https://www.belfercenter.org/publication/covert-action 6. 50 U.S. Code § 3093 - Presidential approval and reporting of covert actions, https://www.law.cornell.edu/uscode/text/50/3093 7. COVERT ACTION POLICY APPROVAL AND COORDINATION PROCEDURES - CIA, https://www.cia.gov/readingroom/docs/CIA-RDP97M00248R000500190016-9.pdf 8. Covert Action - NDU Press, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-67/JFQ-67_32-39_Berger.pdf 9. Foreign Relations of the United States, 1969–1976, Volume XXXVIII, Part 2, Organization and Management of Foreign Policy; Public Diplomacy, 1973–1976 - Historical Documents - Office of the Historian, https://history.state.gov/historicaldocuments/frus1969-76v38p2/d80 10. Explainer: The U.S. National Security Council (NSC) - Belfer Center, https://www.belfercenter.org/research-analysis/explainer-us-national-security-council-nsc 11. Note on U.S. Covert Actions - Historical Documents - Office of the Historian, https://history.state.gov/historicaldocuments/frus1964-68v12/actionsstatement 12. National Security Directive 79 - George Bush Presidential Library and Museum, https://bush41library.tamu.edu/files/nsd/nsd79.pdf 13. 2014: Year in Photos | The White House, https://obamawhitehouse.archives.gov/node/315181 14. A look back at Putin's past meetings with US presidents | Live NOW from FOX, https://www.livenowfox.com/news/putin-past-meetings-us-presidents 15. Zelenskyy tries to warn Trump not to trust Putin ahead of Alaska meeting, https://ca.news.yahoo.com/zelenskyy-tries-warn-trump-not-161508039.html 16. The US Government and NSC Policy Process - National Defense University, https://www.ndu.edu/Portals/59/Documents/AA_Documents/Officer%20Prep%20Courses/Do D% 20and%20Interagency%20System%20NDU%2030%20May%202019.pdf?ver=2019-05-30-162 048-470 17. File:President Obama convenes a National Security Council March 2014.jpg, https://commons.wikimedia.org/wiki/File:President_Obama_convenes_a_National_Security_Co uncil_March_2014.jpg 18. Joint Interagency Task Force (JIATF) - The Lightning Press ..., https://www.thelightningpress.com/joint-interagency-task-force-jiatf/ 19. Homeland Joint Interagency Task Force: Can It Better Deliver Planning, Coordination, and Information Sharing Protocols to Counter Transnational Criminal Threats?, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-Fe bruary-2025/Homeland-Joint-Interagency-Task-Force/ 20. Joint Interagency Task Force West - Wikipedia, https://en.wikipedia.org/wiki/Joint_Interagency_Task_Force_West 21. Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions | Congress.gov, https://www.congress.gov/crs-product/R45175 22. Directorate of Operations (CIA) - Wikipedia, https://en.wikipedia.org/wiki/Directorate_of_Operations_(CIA) 23. Directorate of Science and Technology - CIA, https://www.cia.gov/about/organization/directorate-of-science-and-technology/ 24. Central Intelligence Agency Directorate of Science & Technology - Wikipedia, https://en.wikipedia.org/wiki/Central_Intelligence_Agency_Directorate_of_Science_%26_Techno logy 25. JSOC - SOCOM.mil, https://www.socom.mil/pages/jsoc.aspx 26. Joint Special Operations Command - Wikipedia, https://en.wikipedia.org/wiki/Joint_Special_Operations_Command 27. What is an AFO Team? : r/JSOCarchive - Reddit, https://www.reddit.com/r/JSOCarchive/comments/12xkthr/what_is_an_afo_team/ 28. Advanced force operations - Benefits.com - We Make Government ..., https://benefits.com/glossary/advanced-force-operations/ 29. Delta Force - Wikipedia, https://en.wikipedia.org/wiki/Delta_Force 30. the NSA, NGA, DIA, and NRO. Defense intelligence addresses strategic and tactical requirements - Congress.gov, https://www.congress.gov/crs_external_products/IF/HTML/IF10525.web.html 31. APPENDIX C An Intelligence Community Primer, https://govinfo.library.unt.edu/wmd/report/appendix_c_fm.pdf 32. Explore the Journey of the Intelligence Community: Our History, Agencies, and Collective Mission - DNI.gov, https://www.dni.gov/index.php/newsroom/news-articles/news-articles-2023/3721-explore-the-jou rney-of-the-intelligence-community-our-history-agencies-and-collective-mission?highlight=Wy Ji Z SIs Im Jla W5n Iiwi Ym Vpbmdz Iiwid Ghy ZWF0Iiwid Ghy ZWF0cy Is Im J1d CIs In Roa XMi LCInd Ghpcy Is Im1lb WJlcn Mi LCJt ZW1i ZXIi LCJt ZW1i ZXJz Jy Is In Rocm Vhd CBid XQi LCJid XQgd Ghpcy Jd 33. DEVELOP | ACQUIRE | LAUNCH | OPERATE, https://www.nro.gov/Portals/65/documents/about/nro/NROBrochure2022.pdf 34. National Reconnaissance Office - Wikipedia, https://en.wikipedia.org/wiki/National_Reconnaissance_Office 35. News - Seabee divers from Underwater Construction Team ... - DVIDS, https://www.dvidshub.net/news/121979/seabee-divers-underwater-construction-team-2-spend-f ebruary-diego-garcia 36. Special Projects, https://irp.fas.org/program/collect/vpu-002.htm 37. Accused spy served in one of Navy's most shadowy squadrons, https://www.navytimes.com/news/your-navy/2016/04/11/accused-spy-served-in-one-of-navy-s-m ost-shadowy-squadrons/ 38. Survey of Chinese Espionage in the United States Since 2000 ..., https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united -states-2000 39. US indicts China officials over cyber spying | News - Al Jazeera, https://www.aljazeera.com/news/2014/5/20/us-indicts-china-officials-over-cyber-spying 40. U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage - Department of Justice, https://www.justice.gov/archives/opa/pr/us-charges-five-chinese-military-hackers-cyber-espiona ge-against-us-corporations-and-labor 41. Indictment of PLA officers | CFR Interactives, https://www.cfr.org/cyber-operations/indictment-pla-officers 42. The sustainment of the IMS Hydrophone Hydroacoustic Network of ..., https://conferences.ctbto.org/event/7/contributions/1230/attachments/64/158/P4.4.276%20-%20 Haralabus%20e Poster.pdf 43. The hunt for flight MH370: Timeline | World News - Hindustan Times, https://www.hindustantimes.com/world/the-hunt-for-flight-mh370-timeline/story-SQps ZWg OVR9 0HUHBPQdm WO.html 44. Backtracking of MH370 trajectory from La Réunion | CMEMS - Copernicus Marine Service, https://marine.copernicus.eu/services/use-cases/backtracking-mh370-trajectory-la-reunion 45. Timeline of significant actions—Search for missing airline MH370 ..., https://www.infrastructure.gov.au/infrastructure-transport-vehicles/vehicles/aviation/joint-agency- coordination-centre/timeline