Section 1:
Introduction and The Anatomy of the Narrative
1.1 Scope of
Inquiry and Source Material Assessment
This expert report
undertakes a rigorous analysis of the public claims made by former Central
Intelligence Agency (CIA) officers Andrew and Jihei Bustamante, co-authors of
the memoir Shadow Cell.1 The purpose is to contextualize their assertions regarding a
critical counterintelligence (CI) operation, the subsequent influence of their
operational model on CIA institutional restructuring, the mechanisms of covert
finance, and their strategic geopolitical forecast concerning the future of the
United States.
The core of the
Bustamantes’ public narrative revolves around the deployment of a bespoke
"shadow cell" designed to neutralize a high-level mole leaking
classified information to a key adversarial country, coded as
"Falcon".1 This account provides a
rare look into high-stakes espionage and institutional adaptation in the 21st
century.
An important analytical
constraint when assessing memoirs by former intelligence officers is the CIA’s
Pre-Publication Review Board (PPRB) process. All such disclosures must adhere
to secrecy agreements.4 The Bustamantes’ claims
that the CIA attempted to ban or suppress their story 1 suggests intense scrutiny by the agency. Consequently, the
final published account is understood to be either heavily redacted or
intentionally crafted to reveal organizational concepts (tradecraft,
operational methodology, and systemic failures) while safeguarding the
identities of sources and specific classified techniques. The book’s success is
measured by professional reviews, which praise its "hair-raising"
quality and capacity to provide an "unusual window into the normally
closed world of spies’ private lives".5
1.2 The
Bustamante Operational Claims: Mission Parameters
The operation began in
response to a profound systemic failure: an internal mole was leaking sensitive
information, compromising established operations, officers, and assets
targeting the adversarial state, "Falcon".7 The damage was considered so severe that nearly all existing
operations focused on the adversary were rendered useless.3 This institutional inability to protect operations necessitated
the creation of the ad hoc, highly
compartmentalized "shadow cell".1
The structural
requirement for such a specialized, dedicated cell implies a fundamental
deficit in the traditional counterintelligence (CI) structure either at CIA
Headquarters (Langley) or within the specific division dedicated to the
adversary, known as "Falcon House." Had traditional CI mechanisms
been trusted to handle the compromise, the high risk and resource expenditure
required for a bespoke, decentralized operational unit overseas would have been
unnecessary. The necessity of this alternative approach suggests institutional
trust had been profoundly eroded by the penetration.
The shadow cell operated
from a friendly third country codenamed "Wolf," conducting direct
operations inside "Falcon".3 The cell employed a
groundbreaking fusion of capabilities: Andrew, a covert officer, was paired
directly with Jihi, a master targeter who specialized in analytical
intelligence.8 Jihi’s targeter mindset
was critical to the cell’s operational security, enabling her to "think
through how the operation could be reverse engineered by Falcon and actually
find us".3 This integrated
analytical and operational approach was core to the cell’s eventual success.
To maintain operational
security, Andrew adopted the alias Alex Hernandez for travel into Falcon
territory.7 His operational cover
was as a middle manager for a proprietary company named "Acme
Commercial".7 This business was
established as a "real but fake business run by the CIA," designed to
source disposable goods from foreign countries for distribution across Western
countries.7 Establishing a
commercially viable proprietary company like Acme Commercial highlights the
high resource expenditure mandatory for modern deep-cover operations. Unlike
simple diplomatic cover, a proprietary company requires substantial seed
capital and continuous logistical management (sourcing, supply chain
verification, distribution) to ensure plausibility (or "legend") in a
high-threat environment. This essential link between operational demands and
the high cost of maintaining a credible deep-cover life directly introduces the
complexity of the CIA's opaque financial mechanisms—the Black Budget—necessary
to shield and sustain these commercial fronts.
Section 2:
Counterintelligence Triumph: The Search for the Falcon House Mole
2.1 Adversary
Profile: Decoding "Falcon Intelligence"
The central mission of
the Shadow Cell was to address the devastating leaks flowing to "Falcon
Intelligence," the intelligence arm of the adversarial country.7 Analyzing the timeline of events provides the best means of
decoding the identity of "Falcon." The Bustamantes stated that the
mole they were plagued by was eventually arrested by the FBI around 2019 or
2020.3
This timeline is highly
significant, placing the successful conclusion of the counterintelligence
operation decades after the major Cold War mole arrests, such as Aldrich Ames
(CIA, arrested 1994, spying for Russia/KGB) 9 and Robert Hanssen
(FBI, arrested 2001, spying for Russia/SVR).10 The 2019/2020 timeframe
aligns precisely with the renewed focus on espionage emanating from the
People's Republic of China (PRC).
The case of Alexander Yuk Ching Ma offers the
strongest correlation with the Bustamantes’ claims.11 Ma, a former CIA clandestine officer, was arrested in August
2020 and charged with conspiring to pass classified information up to the Top
Secret level to intelligence officials of the PRC's Ministry of State Security
(MSS).12 Ma’s espionage began around 2001 and was often facilitated
through meetings with SSSB (Shanghai State Security Bureau) officers in Hong
Kong.13 Critically, the subsequent investigation involved the FBI
hiring Ma as a contract linguist as part of a ruse to monitor him,
demonstrating the intense, multi-agency counterintelligence effort required to
confirm the breach.13 Given the contemporary
geopolitical focus on the PRC as the primary long-term espionage threat, the
codename "Falcon" almost certainly refers to China, and "Falcon
House" to the specialized division focused on that nation.
The nature of
21st-century espionage, as evidenced by the Ma case, is characterized less by
Cold War ideological defection and more by sustained, financially motivated
betrayal facilitated through the exploitation of institutional access and, in
some cases, cultural/ethnic ties.12 Ma’s espionage lasted
nearly two decades, inflicting damage through long-term access rather than a
single rapid leak.13 This structural
vulnerability required a novel approach to counterintelligence.
2.2 The Role of
the Shadow Cell in Mole Capture
The Bustamantes assert
that their operations played a direct role in the eventual capture, stating,
"the case file that had identified that mole started all the way back with
our operations".3 They maintain that the
work performed overseas contributed to the capture of the mole that had
compromised Falcon House.3 This assertion is
credible, as the highly compartmentalized Shadow Cell, operating outside the
compromised institutional framework, would have been uniquely positioned to
gather uncompromised human intelligence (HUMINT) or signals intelligence
(SIGINT) necessary to determine what
classified information was leaking, thereby helping to narrow the list of
suspects who had access to that material.
The cell was successful
not only in "ferreting out the mole" but also in "building new
intelligence sources inside of Falcon".3 The ability to
establish new, uncompromised assets in a high-priority adversary nation, at a
time when legacy operations were compromised, is the ultimate validation of
their decentralized operational model.
Although critics have
noted that Andrew Bustamante was primarily a target analyst, not a traditional
case officer (agent runner) 14, the Shadow Cell model
itself explicitly overcame this traditional bureaucratic distinction. Jihi, the
targeter, provided critical analytical support, predicting the adversary’s
counter-targeting moves 3, while Andrew performed
the covert operational tasks. This synergy proves that the integrated
analytical/operational approach was the crucial element in restoring the US
intelligence advantage against Falcon.3 The following table
contextualizes the operational claims within the history of high-profile
intelligence penetrations:
Table of Comparison:
Major US Intelligence Moles and Operational Context
Mole (Case Name) |
Agency |
Adversary |
Espionage Window |
Arrest Year |
Relevance to
Falcon/Bustamante |
Aldrich Ames |
CIA |
Russia/KGB |
1985–1994 |
1994 9 |
Historical Precedent (triggered internal review) |
Robert Hanssen |
FBI |
Russia/KGB/SVR |
1985–2001 |
2001 10 |
Highlighted failure of traditional CI silos |
Alexander Y.C. Ma |
CIA/FBI |
China/MSS ("Falcon") |
2001–2020 |
2020 11 |
Strongest match to the 2019/2020 timeline and the contemporary
focus on China 13 |
2.3
Deconstructing Advanced Tradecraft
The cell’s survival and
success depended heavily on meticulous operational security and advanced
tradecraft, elements of which were publicly disclosed in their account.3 A key technique detailed is "dry cleaning," a British
term for protocols used to "clear our path before we would go into
Falcon," essentially defeating adversarial surveillance measures before
initiating an operation.3 "Mirroring"
was another technique utilized for evasion and counter-surveillance.3
In source recruitment,
the Bustamantes describe the use of elicitation techniques to extract
information. Elicitation is the process of getting individuals to share more
information than they intend to disclose.3 A specific, highly
effective psychological tactic mentioned is the use of sustained silence. By
simply sitting quietly, one can often force an individual to speak to fill the
perceived social vacuum, a technique often employed by interviewers and border
patrol agents.3 These details confirm
that modern deep-cover operations require sophisticated psychological and
counter-surveillance skills beyond traditional espionage tactics.
Section 3:
Structural Transformation: The Mission Center Model
3.1 The Brennan
Reorganization (2014-2015)
Andrew Bustamante
publicly stated that the operational success of the Shadow Cell, which used an
integrated analyst-operator structure, appears to have become the foundation
for a massive structural reorganization at the CIA in 2014, just two years
after their cell model was in use.3
The structural
reorganization was indeed sweeping, ordered by then-CIA Director John Brennan,
and was intended to improve accountability and close espionage gaps that had
hampered the agency's global insights.16 Brennan’s reform
fundamentally changed the agency’s internal architecture by creating 10 new
"mission centers" devoted to specific geographic areas or specialized
subjects.16
3.2 The
Counterterrorism Center (CTC) as Precedent
The essential feature of
Brennan's reform was the decision to extend
the operational model of the Counterterrorism Center (CTC) to the entire
agency.17 The CTC had proven effective in the post-9/11 environment by
dissolving the traditional bureaucratic separation between intelligence
disciplines. Historically, case officers (operations arm) and analysts
(analytical arm) worked for different bosses in different offices.16 The new mission center approach blended these separate
disciplines, requiring them to work side-by-side in regional and thematic
units.17
This integrated model
offers several clear operational advantages: analysts possessing deep expertise
on adversaries can target operations more efficiently; intelligence circulation
is accelerated; and officers can more easily evaluate the reliability of
incoming information.17
However, the
implementation of the CTC model agency-wide carries significant organizational
risk. Critics argue that breaking down the wall between analysts and operations
officers risks analytical objectivity.17 The primary concern is
that analysts, working closely with operators whose careers and budgets depend
on the perceived effectiveness of their covert actions, may become reluctant to
issue critical assessments or state that an operation is failing.17 This inherent conflict between mission success and objective
analysis represents a persistent internal challenge for the agency, even with
the structural benefits of the new model.
3.3 Evaluating
the Causal Claim
While the Bustamantes
assert their cell was the model for the 2014 restructuring 3, it is more analytically accurate to view this as convergence rather than direct,
singular causation. The agency's need for integrated units was systemic, driven
by decades of institutional failure: the inability of traditional
compartmentalization to prevent devastating internal penetrations (Ames,
Hanssen) 10, and the difficulty of responding rapidly to asymmetric threats
like terrorism.18 Compartmentalization,
originally designed for security, was found to often protect the mole more
effectively than the agency itself.
The Shadow Cell’s
success, however, provided a crucial, high-stakes, real-world proof-of-concept.
Operating the integrated model against a
sophisticated peer competitor like "Falcon" and achieving a
favorable outcome (ferreting out the mole and restoring operational advantage) 3 provided the necessary institutional confidence and impetus for
Director Brennan to extend the CTC model universally. This proved that fusion
could work not just for terrorist cells but also in great power competition.
The operational decision
to create the Shadow Cell and locate it outside "Falcon House"
suggests that the institutional rigidity and potential for compromise within
the traditional structure were so profound that cultural change could only be enforced
through necessity and decentralized action. The fact that the cell’s integrated
methodology succeeded against the deep compromise presented a template that
could then be codified and implemented across the agency as Mission Centers,
formally acknowledging that 21st-century threats require the same level of
integrated urgency previously reserved for kinetic counterterrorism operations.18
Section 4: The
Financial Shadow: Funding Mechanisms and the Black Budget
4.1 The Legal
Basis for Covert Finance
The existence and
operation of proprietary commercial fronts like Acme Commercial 7 necessitate an understanding of the extraordinary financial
mechanisms available to the intelligence community, specifically the
"Black Budget."
The foundation of this
financial opacity is the CIA Act of 1949,
which created a budget mechanism authorizing the CIA to spend money
"without regard to the provisions of law and regulations relating to the
expenditure of government funds".19 This legal exemption
ensures that the CIA has the flexibility to fund any operation, regardless of
its sensitivity or legality, under the mantle of national security law.19
The consequence of this
unique statutory exemption is the creation of the Black Budget, which has
ballooned significantly—tripling under the Reagan administration and now
equaling large domestic spending sectors like federal healthcare.20 While secrecy is essential for national security operations,
this extreme lack of public and detailed congressional oversight compounds the
risk of fraud, mismanagement, or poorly conceived programs, leaving the
Pentagon and Congress unable to "cut wisely what it can't see".20 Congressional oversight is reduced to what is colloquially
known as the "hose treatment," where representatives are briefed in
highly secure chambers without being permitted to take notes or copies.20
4.2 Proprietary
Companies and Commercial Cover
Proprietary companies
like Acme Commercial 7 are critical
instruments for deep-cover operations. They fulfill the dual mandate of
providing plausible cover (legend) for covert officers operating in high-threat
environments and creating a self-sustaining or shielded financial ecosystem
outside the traceable appropriations process.7 The fact that Acme Commercial was designed to conduct
legitimate international sourcing and distribution of disposable goods
demonstrates the level of detail required to maintain operational plausibility
and avoid drawing the attention of sophisticated adversaries like
"Falcon".7
4.3 Revenue
Generation through Seized Assets
The discussion of
operational funding necessitates examining methods of generating
non-appropriated revenue, specifically through asset seizure and forfeiture.
The Department of Justice (DOJ) maintains the Assets Forfeiture Fund (AFF), established by the Comprehensive
Crime Control Act of 1984.22 Forfeiture allows the
government to seize property (cash, real estate, cryptocurrency, vehicles) that
was used in or obtained through criminal activity, such as drug trafficking or
financial fraud.24
The AFF is primarily
administered by the U.S. Marshals Service and the FBI.23 Recent high-value criminal activities, such as cryptocurrency
investment fraud, have led to massive seizures—including one case where $225
million in crypto was forfeited.26 These funds are legally
used for various purposes, including compensating crime victims and supporting
law enforcement efforts.25
Crucially, the Attorney
General is authorized to use the AFF to pay "necessary expenses associated
with forfeiture operations" and to finance "certain general
investigative expenses".22 While there is no
public documentation confirming the direct
flow of AFF proceeds to the CIA’s exempt Black Budget, the use of these funds
for joint, high-priority counterintelligence investigations—such as the massive
multi-agency effort to identify and prosecute the Falcon mole (like Alexander
Yuk Ching Ma)—is legally viable under the umbrella of "general
investigative expenses."
This convergence of the
CIA’s statutory financial opacity and the availability of vast, liquid,
non-appropriated funds (such as seized cryptocurrency) creates an increasingly
insulated financial ecosystem for sensitive national security operations.26 While this grants the intelligence community exceptional
operational flexibility, it simultaneously compounds the already limited
congressional oversight provided by the 1949 Act.19 The reliance on high-value criminal seizure assets,
particularly in the rapidly evolving digital financial space, further detaches
covert operational funding from the traditional, traceable annual public
appropriations cycle.
Table 2: Covert Funding
Mechanisms and Legal Shielding
Mechanism |
Legal Authorization |
Purpose in Covert
Operations |
Oversight Challenge |
Black Budget Appropriations |
CIA Act of 1949 19 |
Personnel, logistics, infrastructure, proprietary companies 7 |
Exempt from normal public review; highly limited congressional
visibility ("hose treatment") 20 |
Proprietary Companies (e.g., Acme) |
Internal CIA Authority |
Deep cover, financial sustainment, operational logistics |
Shielded by national security classification; financial
records are non-public 7 |
Asset Forfeiture Funds (AFF) |
28 U.S.C. $\S$ 524(c) 22 |
Investigative support, joint CI operational expenses, asset
acquisition |
Proceeds are traceable to law enforcement/justice agencies;
direct flow to CIA is opaque but potentially permissible for
"investigative expenses." |
Section 5: The
Geopolitical Thesis: Decoupling Before 2030
5.1 The
Macro-Strategic Framework
The most striking public
claim made by the Bustamantes is the warning to "Leave the USA Before
2030".1 This is not presented
as a tactical warning concerning an imminent military attack, but rather as a
long-term strategic projection regarding the fundamental instability and
potential systemic failure of the American geopolitical and economic structure.
The theoretical basis
for this forecast relies heavily on deterministic historical and economic
models, specifically Kondratiev economic
cycles (predicting long waves of economic growth and decline) and the
observed cyclical patterns of empires.27 The analysis concludes
that the US empire is nearing a critical inflexion point due to structural
flaws. The argument is that the shift in global power is inevitable, and that
the long-term reliance on "limitless money" and escalating national
debt will precipitate downfall.27
This deterministic
worldview is common among intelligence professionals trained to identify
systemic risks and vulnerabilities. When this framework is applied to the home
country, the focus shifts to internal political and economic factors that are
exploitable by adversaries.
5.2 The Rise of
China and Economic Warfare
The "Falcon"
adversary, inferred to be the PRC, is central to the geopolitical thesis,
representing the rising global superpower challenging American dominance.27 This competition is defined not primarily by military conflict
but by the cheaper and equally devastating means of economic warfare.27
The contemporary
conflict landscape emphasizes non-kinetic means: mass technological theft,
supply chain infiltration (as the Acme Commercial model was designed to
navigate), financial leverage, and information warfare.28 Terrorist groups are already leveraging advanced technologies
like AI and unmanned aerial vehicles.28 The intelligence
community views foreign powers as actively attempting to shape and influence US
elections and political decision-making, confirming the pervasive nature of
this informational and psychological conflict.27
The geopolitical
forecast predicts a "shift in power".27 This analysis directly links the internal intelligence battle
against the Falcon mole—a battle to protect intellectual property, sources, and
methods—with the broader macroeconomic deterioration of the US position
relative to a rising peer competitor. The projected decline is a consequence of
failing to secure internal systems against external and internal exploitation.
5.3 Assessment
of Critical Risk Factors for the US
The 2030 warning is a
professional judgment that internal political and economic fragmentation
constitutes a greater long-term threat than any singular external attack. It
forecasts a necessary "hard reset" of the American system.8
The deep skepticism
regarding government competence is a recurring theme. The Bustamantes discuss
the tension between political appointees and national service, noting high
turnover at the CIA driven by "box-checking and political climbing".8 This suggests deep internal distrust that loyalty to a
political administration often supersedes national service goals, creating
instability that adversaries can exploit.
Andrew Bustamante’s
discussion of potential political solutions—specifically his support for a
"level-headed, centrist female leader from the Republican party" 27—underscores the belief that the forecasted crisis is solvable
through competent political leadership, but that current leadership models are
insufficient. The primary driver of the instability, from this perspective, is
internal political and financial mismanagement.
The core implication of
the 2030 warning is that it is less a prediction of tactical military invasion
and more a forecast of a severe reduction in US geopolitical influence,
accompanied by a resulting collapse of domestic financial and political stability.
The advice to "decode the signals" and avoid "blindly
trusting" governmental narratives 8 is a direct application
of counterintelligence training to civil society, reflecting a deep awareness
of the prevalence of information warfare and geopolitical "spin".8
Section 6:
Conclusion and Strategic Recommendations
6.1 Synthesis
of Verified Operational Data and Critical Gaps
The analysis confirms
strong contextual support for the operational claims of the Andrew and Jihei
Bustamante. The integrated "Shadow Cell" model proved successful in
restoring operational capability against a high-priority adversary ("Falcon,"
inferred to be the PRC), whose long-term espionage activities were highly
detrimental to national security. The timeline and context of the mole hunt
align closely with the 2020 arrest and prosecution of former CIA officer
Alexander Yuk Ching Ma, who spied for the PRC.3
Structurally, the cell’s
integrated fusion of analysis and operations provided critical validation for
the sweeping 2014 CIA reorganization into Mission Centers under Director
Brennan.3 This adaptation demonstrates the institutional acknowledgment
that peer competition requires the same unified operational tempo previously
limited to counterterrorism.
However, significant
structural challenges remain. The legal framework provided by the CIA Act of
1949 ensures intentional financial opacity.19 This, combined with the
emergence of massive, non-appropriated revenue streams via criminal asset
forfeiture (such as cryptocurrency seizures) 22, creates an increasingly insulated financial ecosystem for
intelligence operations that continues to resist comprehensive public or
congressional oversight.20
6.2
Recommendations for Policy Analysts
Based on the analysis of
these systemic vulnerabilities and successful adaptive operational models, the
following strategic recommendations are warranted:
1.
Reinforce the Integrated
CI Model: The
success of the Shadow Cell model validates the necessary systemic shift toward
integrated Mission Centers. Policy must ensure that this fusion is fully
enforced to address sophisticated peer-competitor espionage, treating CI
against nations like Falcon/PRC with the same prioritization and resource
allocation reserved for kinetic threats.
2.
Mitigate Analytical
Bias:
Ongoing efforts must be made to safeguard analytical objectivity within Mission
Centers. Mechanisms should be formalized to ensure that analysts feel empowered
to issue critical assessments of operations, regardless of the perceived
political or budgetary consequences of operational failures.17
3.
Enhance Oversight of
Non-Appropriated Funds: Given the increasing complexity of covert finance, specific,
classified congressional oversight protocols should be developed to track the
use of proprietary companies and the potential leveraging of non-appropriated
funds, particularly high-value liquid assets derived from federal asset
forfeiture programs, thereby balancing operational necessity with mandatory
democratic accountability.
6.3 Final
Assessment of the Bustamante Legacy and Public Value
The public disclosure by
the former officers, despite professional criticism regarding the delineation
of roles 14 and the inherent conflict with secrecy agreements, offers a
critical, unclassified perspective on modern intelligence tradecraft and the
internal struggles for institutional reform.6
The "2030"
warning should be interpreted as a high-confidence strategic projection derived
from deterministic historical analysis, positing the likely decline of US
hegemonic stability driven by internal structural flaws (financial insolvency and
political incompetence) exploited by external pressures (Falcon/PRC). The value
of this warning lies not in predicting a specific tactical threat, but in
compelling institutional and public introspection regarding deep, systemic
domestic vulnerabilities before external competition renders corrective action
impossible.
Works cited
1.
Former
CIA Spies (NEW): Leave the USA Before 2030! The CIA Tried To Ban This Story! -
YouTube, accessed October 20, 2025, https://www.youtube.com/watch?v=fu6bYPTp_kE
2.
Brand
New Espionage Memoir! THE SHADOW CELL with Andrew & Jihi Bustamante,
accessed October 20, 2025, https://www.youtube.com/watch?v=XeZKu89I0jw
3.
Transcript:
Ex-CIA Spies Andrew and Jihi Bustamante on DOAC Podcast - The Singju Post,
accessed October 20, 2025, https://singjupost.com/transcript-ex-cia-spies-andrew-and-jihi-bustamante-on-doac-podcast/
4.
CIA
Sues Former Officer over Critical Book - CBS News, accessed October 20, 2025, https://www.cbsnews.com/news/cia-sues-former-officer-over-critical-book/
5.
Shadow
Cell: An Insider Account of America's New Spy War - Goodreads, accessed October
20, 2025, https://www.goodreads.com/book/show/198493679-shadow-cell
6.
Shadow
Cell by Andrew Bustamante | Hachette Book Group, accessed October 20, 2025, https://www.hachettebookgroup.com/titles/andrew-bustamante/shadow-cell/9780316572149/?lens=little-brown
7.
Former
CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by
2030!, accessed October 20, 2025, https://www.shortform.com/podcast/episode/the-diary-of-a-ceo-with-steven-bartlett-2025-08-28-episode-summary-former-cia-spies-the-cia-tried-to-ban-this-story-we-re-leaving-the-us-by-2030
8.
Inside
the CIA: Andrew & Jihi Bustamante Expose Government Spin, Honeypots,
Epstein Questions & Lines the U.S. Won't Cross PT 1 - Apple Podcasts,
accessed October 20, 2025, https://podcasts.apple.com/am/podcast/inside-the-cia-andrew-jihi-bustamante-expose/id1191775648?i=1000721624060
9.
Aldrich
Ames — FBI, accessed October 20, 2025, https://www.fbi.gov/history/famous-cases/aldrich-ames
10.
Robert
Hanssen - FBI, accessed October 20, 2025, https://www.fbi.gov/history/famous-cases/robert-hanssen
11.
Alexander
Yuk Ching Ma - Wikipedia, accessed October 20, 2025, https://en.wikipedia.org/wiki/Alexander_Yuk_Ching_Ma
12.
Former
CIA Officer Arrested and Charged with Espionage - Department of Justice,
accessed October 20, 2025, https://www.justice.gov/archives/opa/pr/former-cia-officer-arrested-and-charged-espionage
13.
case-study-ma.pdf
- CDSE, accessed October 20, 2025, https://www.cdse.edu/Portals/124/Documents/casestudies/case-study-ma.pdf
14.
The
good and bad opinions of Andrew Bustemante. : r/Intelligence - Reddit, accessed
October 20, 2025, https://www.reddit.com/r/Intelligence/comments/1eqoh8e/the_good_and_bad_opinions_of_andrew_bustemante/
15.
Case
Studies - Security Awareness Hub, accessed October 20, 2025, https://securityawareness.dcsa.mil/cdse/case-studies/case.html?Ma
16.
CIA
chief announces sweeping agency overhaul | PBS News Weekend, accessed October
20, 2025, https://www.pbs.org/newshour/politics/cia-chief-announces-sweeping-agency-overhaul
17.
Why
Brennan's Reform Would Hurt the CIA - New America, accessed October 20, 2025, https://www.newamerica.org/weekly/why-brennans-reform-would-hurt-cia/
18.
Approved
for Release: 2014/09/12 C05618308 - CIA, accessed October 20, 2025, https://www.cia.gov/readingroom/docs/DOC_0005618308.pdf
19.
The
Black Budget of the United States: The Engine of a "Negative Return
Economy", accessed October 20, 2025, https://ciaotest.cc.columbia.edu/olj/wa/wa_apr04/wa_apr04_sac01.html
20.
THE
DARK SECRET OF THE BLACK BUDGET - BY MAKING $35 BILLION IN DEFENSE PROGRAMS
INVISIBLE, THE PENTAGON IS HURTING NATIONAL SECU - CIA, accessed October 20,
2025, https://www.cia.gov/readingroom/docs/CIA-RDP90-00965R000707040013-3.pdf
21.
The
Black Budget: The Crossroads of (Un)Constitutional Appropriations and
Reporting, accessed October 20, 2025, https://missingmoney.solari.com/the-black-budget-the-crossroads-of-unconstitutional-appropriations-and-reporting/
22.
Assets
Forfeiture Fund (AFF) - Department of Justice, accessed October 20, 2025, https://www.justice.gov/afp/assets-forfeiture-fund-aff
23.
Asset
Forfeiture | U.S. Marshals Service, accessed October 20, 2025, https://www.usmarshals.gov/what-we-do/asset-forfeiture
24.
DEA
Asset Forfeiture, accessed October 20, 2025, https://www.dea.gov/operations/asset-forfeiture
25.
Asset
Forfeiture - FBI, accessed October 20, 2025, https://www.fbi.gov/investigate/white-collar-crime/asset-forfeiture
26.
District
of Columbia | Largest Ever Seizure of Funds Related to Crypto Confidence Scams,
accessed October 20, 2025, https://www.justice.gov/usao-dc/pr/largest-ever-seizure-funds-related-crypto-confidence-scams
27.
Urgent
Warning: China's Takeover & Global Power Shifts | Andrew Bustamante PT 2,
accessed October 20, 2025, https://podcasts.apple.com/us/podcast/urgent-warning-chinas-takeover-global-power-shifts/id1191775648?i=1000662721472&l=ru
28.
2040
- DNI.gov, accessed October 20, 2025, http://www.dni.gov/files/ODNI/documents/assessments/GlobalTrends_2040.pdf
No comments:
Post a Comment