Monday, October 20, 2025

A Strategic Analysis of Covert Claims: Contextualizing the "Shadow Cell" Operations, CIA Reform, and Geopolitical Forecasts

 

 


 

 

Section 1: Introduction and The Anatomy of the Narrative

 

 

1.1 Scope of Inquiry and Source Material Assessment

 

This expert report undertakes a rigorous analysis of the public claims made by former Central Intelligence Agency (CIA) officers Andrew and Jihei Bustamante, co-authors of the memoir Shadow Cell.1 The purpose is to contextualize their assertions regarding a critical counterintelligence (CI) operation, the subsequent influence of their operational model on CIA institutional restructuring, the mechanisms of covert finance, and their strategic geopolitical forecast concerning the future of the United States.

The core of the Bustamantes’ public narrative revolves around the deployment of a bespoke "shadow cell" designed to neutralize a high-level mole leaking classified information to a key adversarial country, coded as "Falcon".1 This account provides a rare look into high-stakes espionage and institutional adaptation in the 21st century.

An important analytical constraint when assessing memoirs by former intelligence officers is the CIA’s Pre-Publication Review Board (PPRB) process. All such disclosures must adhere to secrecy agreements.4 The Bustamantes’ claims that the CIA attempted to ban or suppress their story 1 suggests intense scrutiny by the agency. Consequently, the final published account is understood to be either heavily redacted or intentionally crafted to reveal organizational concepts (tradecraft, operational methodology, and systemic failures) while safeguarding the identities of sources and specific classified techniques. The book’s success is measured by professional reviews, which praise its "hair-raising" quality and capacity to provide an "unusual window into the normally closed world of spies’ private lives".5

 

1.2 The Bustamante Operational Claims: Mission Parameters

 

The operation began in response to a profound systemic failure: an internal mole was leaking sensitive information, compromising established operations, officers, and assets targeting the adversarial state, "Falcon".7 The damage was considered so severe that nearly all existing operations focused on the adversary were rendered useless.3 This institutional inability to protect operations necessitated the creation of the ad hoc, highly compartmentalized "shadow cell".1

The structural requirement for such a specialized, dedicated cell implies a fundamental deficit in the traditional counterintelligence (CI) structure either at CIA Headquarters (Langley) or within the specific division dedicated to the adversary, known as "Falcon House." Had traditional CI mechanisms been trusted to handle the compromise, the high risk and resource expenditure required for a bespoke, decentralized operational unit overseas would have been unnecessary. The necessity of this alternative approach suggests institutional trust had been profoundly eroded by the penetration.

The shadow cell operated from a friendly third country codenamed "Wolf," conducting direct operations inside "Falcon".3 The cell employed a groundbreaking fusion of capabilities: Andrew, a covert officer, was paired directly with Jihi, a master targeter who specialized in analytical intelligence.8 Jihi’s targeter mindset was critical to the cell’s operational security, enabling her to "think through how the operation could be reverse engineered by Falcon and actually find us".3 This integrated analytical and operational approach was core to the cell’s eventual success.

To maintain operational security, Andrew adopted the alias Alex Hernandez for travel into Falcon territory.7 His operational cover was as a middle manager for a proprietary company named "Acme Commercial".7 This business was established as a "real but fake business run by the CIA," designed to source disposable goods from foreign countries for distribution across Western countries.7 Establishing a commercially viable proprietary company like Acme Commercial highlights the high resource expenditure mandatory for modern deep-cover operations. Unlike simple diplomatic cover, a proprietary company requires substantial seed capital and continuous logistical management (sourcing, supply chain verification, distribution) to ensure plausibility (or "legend") in a high-threat environment. This essential link between operational demands and the high cost of maintaining a credible deep-cover life directly introduces the complexity of the CIA's opaque financial mechanisms—the Black Budget—necessary to shield and sustain these commercial fronts.

 

Section 2: Counterintelligence Triumph: The Search for the Falcon House Mole

 

 

2.1 Adversary Profile: Decoding "Falcon Intelligence"

 

The central mission of the Shadow Cell was to address the devastating leaks flowing to "Falcon Intelligence," the intelligence arm of the adversarial country.7 Analyzing the timeline of events provides the best means of decoding the identity of "Falcon." The Bustamantes stated that the mole they were plagued by was eventually arrested by the FBI around 2019 or 2020.3

This timeline is highly significant, placing the successful conclusion of the counterintelligence operation decades after the major Cold War mole arrests, such as Aldrich Ames (CIA, arrested 1994, spying for Russia/KGB) 9 and Robert Hanssen (FBI, arrested 2001, spying for Russia/SVR).10 The 2019/2020 timeframe aligns precisely with the renewed focus on espionage emanating from the People's Republic of China (PRC).

The case of Alexander Yuk Ching Ma offers the strongest correlation with the Bustamantes’ claims.11 Ma, a former CIA clandestine officer, was arrested in August 2020 and charged with conspiring to pass classified information up to the Top Secret level to intelligence officials of the PRC's Ministry of State Security (MSS).12 Ma’s espionage began around 2001 and was often facilitated through meetings with SSSB (Shanghai State Security Bureau) officers in Hong Kong.13 Critically, the subsequent investigation involved the FBI hiring Ma as a contract linguist as part of a ruse to monitor him, demonstrating the intense, multi-agency counterintelligence effort required to confirm the breach.13 Given the contemporary geopolitical focus on the PRC as the primary long-term espionage threat, the codename "Falcon" almost certainly refers to China, and "Falcon House" to the specialized division focused on that nation.

The nature of 21st-century espionage, as evidenced by the Ma case, is characterized less by Cold War ideological defection and more by sustained, financially motivated betrayal facilitated through the exploitation of institutional access and, in some cases, cultural/ethnic ties.12 Ma’s espionage lasted nearly two decades, inflicting damage through long-term access rather than a single rapid leak.13 This structural vulnerability required a novel approach to counterintelligence.

 

2.2 The Role of the Shadow Cell in Mole Capture

 

The Bustamantes assert that their operations played a direct role in the eventual capture, stating, "the case file that had identified that mole started all the way back with our operations".3 They maintain that the work performed overseas contributed to the capture of the mole that had compromised Falcon House.3 This assertion is credible, as the highly compartmentalized Shadow Cell, operating outside the compromised institutional framework, would have been uniquely positioned to gather uncompromised human intelligence (HUMINT) or signals intelligence (SIGINT) necessary to determine what classified information was leaking, thereby helping to narrow the list of suspects who had access to that material.

The cell was successful not only in "ferreting out the mole" but also in "building new intelligence sources inside of Falcon".3 The ability to establish new, uncompromised assets in a high-priority adversary nation, at a time when legacy operations were compromised, is the ultimate validation of their decentralized operational model.

Although critics have noted that Andrew Bustamante was primarily a target analyst, not a traditional case officer (agent runner) 14, the Shadow Cell model itself explicitly overcame this traditional bureaucratic distinction. Jihi, the targeter, provided critical analytical support, predicting the adversary’s counter-targeting moves 3, while Andrew performed the covert operational tasks. This synergy proves that the integrated analytical/operational approach was the crucial element in restoring the US intelligence advantage against Falcon.3 The following table contextualizes the operational claims within the history of high-profile intelligence penetrations:

Table of Comparison: Major US Intelligence Moles and Operational Context

 

Mole (Case Name)

Agency

Adversary

Espionage Window

Arrest Year

Relevance to Falcon/Bustamante

Aldrich Ames

CIA

Russia/KGB

1985–1994

1994 9

Historical Precedent (triggered internal review)

Robert Hanssen

FBI

Russia/KGB/SVR

1985–2001

2001 10

Highlighted failure of traditional CI silos

Alexander Y.C. Ma

CIA/FBI

China/MSS ("Falcon")

2001–2020

2020 11

Strongest match to the 2019/2020 timeline and the contemporary focus on China 13

 

2.3 Deconstructing Advanced Tradecraft

 

The cell’s survival and success depended heavily on meticulous operational security and advanced tradecraft, elements of which were publicly disclosed in their account.3 A key technique detailed is "dry cleaning," a British term for protocols used to "clear our path before we would go into Falcon," essentially defeating adversarial surveillance measures before initiating an operation.3 "Mirroring" was another technique utilized for evasion and counter-surveillance.3

In source recruitment, the Bustamantes describe the use of elicitation techniques to extract information. Elicitation is the process of getting individuals to share more information than they intend to disclose.3 A specific, highly effective psychological tactic mentioned is the use of sustained silence. By simply sitting quietly, one can often force an individual to speak to fill the perceived social vacuum, a technique often employed by interviewers and border patrol agents.3 These details confirm that modern deep-cover operations require sophisticated psychological and counter-surveillance skills beyond traditional espionage tactics.

 

Section 3: Structural Transformation: The Mission Center Model

 

 

3.1 The Brennan Reorganization (2014-2015)

 

Andrew Bustamante publicly stated that the operational success of the Shadow Cell, which used an integrated analyst-operator structure, appears to have become the foundation for a massive structural reorganization at the CIA in 2014, just two years after their cell model was in use.3

The structural reorganization was indeed sweeping, ordered by then-CIA Director John Brennan, and was intended to improve accountability and close espionage gaps that had hampered the agency's global insights.16 Brennan’s reform fundamentally changed the agency’s internal architecture by creating 10 new "mission centers" devoted to specific geographic areas or specialized subjects.16

 

3.2 The Counterterrorism Center (CTC) as Precedent

 

The essential feature of Brennan's reform was the decision to extend the operational model of the Counterterrorism Center (CTC) to the entire agency.17 The CTC had proven effective in the post-9/11 environment by dissolving the traditional bureaucratic separation between intelligence disciplines. Historically, case officers (operations arm) and analysts (analytical arm) worked for different bosses in different offices.16 The new mission center approach blended these separate disciplines, requiring them to work side-by-side in regional and thematic units.17

This integrated model offers several clear operational advantages: analysts possessing deep expertise on adversaries can target operations more efficiently; intelligence circulation is accelerated; and officers can more easily evaluate the reliability of incoming information.17

However, the implementation of the CTC model agency-wide carries significant organizational risk. Critics argue that breaking down the wall between analysts and operations officers risks analytical objectivity.17 The primary concern is that analysts, working closely with operators whose careers and budgets depend on the perceived effectiveness of their covert actions, may become reluctant to issue critical assessments or state that an operation is failing.17 This inherent conflict between mission success and objective analysis represents a persistent internal challenge for the agency, even with the structural benefits of the new model.

 

3.3 Evaluating the Causal Claim

 

While the Bustamantes assert their cell was the model for the 2014 restructuring 3, it is more analytically accurate to view this as convergence rather than direct, singular causation. The agency's need for integrated units was systemic, driven by decades of institutional failure: the inability of traditional compartmentalization to prevent devastating internal penetrations (Ames, Hanssen) 10, and the difficulty of responding rapidly to asymmetric threats like terrorism.18 Compartmentalization, originally designed for security, was found to often protect the mole more effectively than the agency itself.

The Shadow Cell’s success, however, provided a crucial, high-stakes, real-world proof-of-concept. Operating the integrated model against a sophisticated peer competitor like "Falcon" and achieving a favorable outcome (ferreting out the mole and restoring operational advantage) 3 provided the necessary institutional confidence and impetus for Director Brennan to extend the CTC model universally. This proved that fusion could work not just for terrorist cells but also in great power competition.

The operational decision to create the Shadow Cell and locate it outside "Falcon House" suggests that the institutional rigidity and potential for compromise within the traditional structure were so profound that cultural change could only be enforced through necessity and decentralized action. The fact that the cell’s integrated methodology succeeded against the deep compromise presented a template that could then be codified and implemented across the agency as Mission Centers, formally acknowledging that 21st-century threats require the same level of integrated urgency previously reserved for kinetic counterterrorism operations.18

 

Section 4: The Financial Shadow: Funding Mechanisms and the Black Budget

 

 

4.1 The Legal Basis for Covert Finance

 

The existence and operation of proprietary commercial fronts like Acme Commercial 7 necessitate an understanding of the extraordinary financial mechanisms available to the intelligence community, specifically the "Black Budget."

The foundation of this financial opacity is the CIA Act of 1949, which created a budget mechanism authorizing the CIA to spend money "without regard to the provisions of law and regulations relating to the expenditure of government funds".19 This legal exemption ensures that the CIA has the flexibility to fund any operation, regardless of its sensitivity or legality, under the mantle of national security law.19

The consequence of this unique statutory exemption is the creation of the Black Budget, which has ballooned significantly—tripling under the Reagan administration and now equaling large domestic spending sectors like federal healthcare.20 While secrecy is essential for national security operations, this extreme lack of public and detailed congressional oversight compounds the risk of fraud, mismanagement, or poorly conceived programs, leaving the Pentagon and Congress unable to "cut wisely what it can't see".20 Congressional oversight is reduced to what is colloquially known as the "hose treatment," where representatives are briefed in highly secure chambers without being permitted to take notes or copies.20

 

4.2 Proprietary Companies and Commercial Cover

 

Proprietary companies like Acme Commercial 7 are critical instruments for deep-cover operations. They fulfill the dual mandate of providing plausible cover (legend) for covert officers operating in high-threat environments and creating a self-sustaining or shielded financial ecosystem outside the traceable appropriations process.7 The fact that Acme Commercial was designed to conduct legitimate international sourcing and distribution of disposable goods demonstrates the level of detail required to maintain operational plausibility and avoid drawing the attention of sophisticated adversaries like "Falcon".7

 

4.3 Revenue Generation through Seized Assets

 

The discussion of operational funding necessitates examining methods of generating non-appropriated revenue, specifically through asset seizure and forfeiture. The Department of Justice (DOJ) maintains the Assets Forfeiture Fund (AFF), established by the Comprehensive Crime Control Act of 1984.22 Forfeiture allows the government to seize property (cash, real estate, cryptocurrency, vehicles) that was used in or obtained through criminal activity, such as drug trafficking or financial fraud.24

The AFF is primarily administered by the U.S. Marshals Service and the FBI.23 Recent high-value criminal activities, such as cryptocurrency investment fraud, have led to massive seizures—including one case where $225 million in crypto was forfeited.26 These funds are legally used for various purposes, including compensating crime victims and supporting law enforcement efforts.25

Crucially, the Attorney General is authorized to use the AFF to pay "necessary expenses associated with forfeiture operations" and to finance "certain general investigative expenses".22 While there is no public documentation confirming the direct flow of AFF proceeds to the CIA’s exempt Black Budget, the use of these funds for joint, high-priority counterintelligence investigations—such as the massive multi-agency effort to identify and prosecute the Falcon mole (like Alexander Yuk Ching Ma)—is legally viable under the umbrella of "general investigative expenses."

This convergence of the CIA’s statutory financial opacity and the availability of vast, liquid, non-appropriated funds (such as seized cryptocurrency) creates an increasingly insulated financial ecosystem for sensitive national security operations.26 While this grants the intelligence community exceptional operational flexibility, it simultaneously compounds the already limited congressional oversight provided by the 1949 Act.19 The reliance on high-value criminal seizure assets, particularly in the rapidly evolving digital financial space, further detaches covert operational funding from the traditional, traceable annual public appropriations cycle.

Table 2: Covert Funding Mechanisms and Legal Shielding

 

Mechanism

Legal Authorization

Purpose in Covert Operations

Oversight Challenge

Black Budget Appropriations

CIA Act of 1949 19

Personnel, logistics, infrastructure, proprietary companies 7

Exempt from normal public review; highly limited congressional visibility ("hose treatment") 20

Proprietary Companies (e.g., Acme)

Internal CIA Authority

Deep cover, financial sustainment, operational logistics

Shielded by national security classification; financial records are non-public 7

Asset Forfeiture Funds (AFF)

28 U.S.C. $\S$ 524(c) 22

Investigative support, joint CI operational expenses, asset acquisition

Proceeds are traceable to law enforcement/justice agencies; direct flow to CIA is opaque but potentially permissible for "investigative expenses."

 

Section 5: The Geopolitical Thesis: Decoupling Before 2030

 

 

5.1 The Macro-Strategic Framework

 

The most striking public claim made by the Bustamantes is the warning to "Leave the USA Before 2030".1 This is not presented as a tactical warning concerning an imminent military attack, but rather as a long-term strategic projection regarding the fundamental instability and potential systemic failure of the American geopolitical and economic structure.

The theoretical basis for this forecast relies heavily on deterministic historical and economic models, specifically Kondratiev economic cycles (predicting long waves of economic growth and decline) and the observed cyclical patterns of empires.27 The analysis concludes that the US empire is nearing a critical inflexion point due to structural flaws. The argument is that the shift in global power is inevitable, and that the long-term reliance on "limitless money" and escalating national debt will precipitate downfall.27

This deterministic worldview is common among intelligence professionals trained to identify systemic risks and vulnerabilities. When this framework is applied to the home country, the focus shifts to internal political and economic factors that are exploitable by adversaries.

 

5.2 The Rise of China and Economic Warfare

 

The "Falcon" adversary, inferred to be the PRC, is central to the geopolitical thesis, representing the rising global superpower challenging American dominance.27 This competition is defined not primarily by military conflict but by the cheaper and equally devastating means of economic warfare.27

The contemporary conflict landscape emphasizes non-kinetic means: mass technological theft, supply chain infiltration (as the Acme Commercial model was designed to navigate), financial leverage, and information warfare.28 Terrorist groups are already leveraging advanced technologies like AI and unmanned aerial vehicles.28 The intelligence community views foreign powers as actively attempting to shape and influence US elections and political decision-making, confirming the pervasive nature of this informational and psychological conflict.27

The geopolitical forecast predicts a "shift in power".27 This analysis directly links the internal intelligence battle against the Falcon mole—a battle to protect intellectual property, sources, and methods—with the broader macroeconomic deterioration of the US position relative to a rising peer competitor. The projected decline is a consequence of failing to secure internal systems against external and internal exploitation.

 

5.3 Assessment of Critical Risk Factors for the US

 

The 2030 warning is a professional judgment that internal political and economic fragmentation constitutes a greater long-term threat than any singular external attack. It forecasts a necessary "hard reset" of the American system.8

The deep skepticism regarding government competence is a recurring theme. The Bustamantes discuss the tension between political appointees and national service, noting high turnover at the CIA driven by "box-checking and political climbing".8 This suggests deep internal distrust that loyalty to a political administration often supersedes national service goals, creating instability that adversaries can exploit.

Andrew Bustamante’s discussion of potential political solutions—specifically his support for a "level-headed, centrist female leader from the Republican party" 27—underscores the belief that the forecasted crisis is solvable through competent political leadership, but that current leadership models are insufficient. The primary driver of the instability, from this perspective, is internal political and financial mismanagement.

The core implication of the 2030 warning is that it is less a prediction of tactical military invasion and more a forecast of a severe reduction in US geopolitical influence, accompanied by a resulting collapse of domestic financial and political stability. The advice to "decode the signals" and avoid "blindly trusting" governmental narratives 8 is a direct application of counterintelligence training to civil society, reflecting a deep awareness of the prevalence of information warfare and geopolitical "spin".8

 

Section 6: Conclusion and Strategic Recommendations

 

 

6.1 Synthesis of Verified Operational Data and Critical Gaps

 

The analysis confirms strong contextual support for the operational claims of the Andrew and Jihei Bustamante. The integrated "Shadow Cell" model proved successful in restoring operational capability against a high-priority adversary ("Falcon," inferred to be the PRC), whose long-term espionage activities were highly detrimental to national security. The timeline and context of the mole hunt align closely with the 2020 arrest and prosecution of former CIA officer Alexander Yuk Ching Ma, who spied for the PRC.3

Structurally, the cell’s integrated fusion of analysis and operations provided critical validation for the sweeping 2014 CIA reorganization into Mission Centers under Director Brennan.3 This adaptation demonstrates the institutional acknowledgment that peer competition requires the same unified operational tempo previously limited to counterterrorism.

However, significant structural challenges remain. The legal framework provided by the CIA Act of 1949 ensures intentional financial opacity.19 This, combined with the emergence of massive, non-appropriated revenue streams via criminal asset forfeiture (such as cryptocurrency seizures) 22, creates an increasingly insulated financial ecosystem for intelligence operations that continues to resist comprehensive public or congressional oversight.20

 

6.2 Recommendations for Policy Analysts

 

Based on the analysis of these systemic vulnerabilities and successful adaptive operational models, the following strategic recommendations are warranted:

1.     Reinforce the Integrated CI Model: The success of the Shadow Cell model validates the necessary systemic shift toward integrated Mission Centers. Policy must ensure that this fusion is fully enforced to address sophisticated peer-competitor espionage, treating CI against nations like Falcon/PRC with the same prioritization and resource allocation reserved for kinetic threats.

2.     Mitigate Analytical Bias: Ongoing efforts must be made to safeguard analytical objectivity within Mission Centers. Mechanisms should be formalized to ensure that analysts feel empowered to issue critical assessments of operations, regardless of the perceived political or budgetary consequences of operational failures.17

3.     Enhance Oversight of Non-Appropriated Funds: Given the increasing complexity of covert finance, specific, classified congressional oversight protocols should be developed to track the use of proprietary companies and the potential leveraging of non-appropriated funds, particularly high-value liquid assets derived from federal asset forfeiture programs, thereby balancing operational necessity with mandatory democratic accountability.

 

6.3 Final Assessment of the Bustamante Legacy and Public Value

 

The public disclosure by the former officers, despite professional criticism regarding the delineation of roles 14 and the inherent conflict with secrecy agreements, offers a critical, unclassified perspective on modern intelligence tradecraft and the internal struggles for institutional reform.6

The "2030" warning should be interpreted as a high-confidence strategic projection derived from deterministic historical analysis, positing the likely decline of US hegemonic stability driven by internal structural flaws (financial insolvency and political incompetence) exploited by external pressures (Falcon/PRC). The value of this warning lies not in predicting a specific tactical threat, but in compelling institutional and public introspection regarding deep, systemic domestic vulnerabilities before external competition renders corrective action impossible.

Works cited

1.     Former CIA Spies (NEW): Leave the USA Before 2030! The CIA Tried To Ban This Story! - YouTube, accessed October 20, 2025, https://www.youtube.com/watch?v=fu6bYPTp_kE

2.     Brand New Espionage Memoir! THE SHADOW CELL with Andrew & Jihi Bustamante, accessed October 20, 2025, https://www.youtube.com/watch?v=XeZKu89I0jw

3.     Transcript: Ex-CIA Spies Andrew and Jihi Bustamante on DOAC Podcast - The Singju Post, accessed October 20, 2025, https://singjupost.com/transcript-ex-cia-spies-andrew-and-jihi-bustamante-on-doac-podcast/

4.     CIA Sues Former Officer over Critical Book - CBS News, accessed October 20, 2025, https://www.cbsnews.com/news/cia-sues-former-officer-over-critical-book/

5.     Shadow Cell: An Insider Account of America's New Spy War - Goodreads, accessed October 20, 2025, https://www.goodreads.com/book/show/198493679-shadow-cell

6.     Shadow Cell by Andrew Bustamante | Hachette Book Group, accessed October 20, 2025, https://www.hachettebookgroup.com/titles/andrew-bustamante/shadow-cell/9780316572149/?lens=little-brown

7.     Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!, accessed October 20, 2025, https://www.shortform.com/podcast/episode/the-diary-of-a-ceo-with-steven-bartlett-2025-08-28-episode-summary-former-cia-spies-the-cia-tried-to-ban-this-story-we-re-leaving-the-us-by-2030

8.     Inside the CIA: Andrew & Jihi Bustamante Expose Government Spin, Honeypots, Epstein Questions & Lines the U.S. Won't Cross PT 1 - Apple Podcasts, accessed October 20, 2025, https://podcasts.apple.com/am/podcast/inside-the-cia-andrew-jihi-bustamante-expose/id1191775648?i=1000721624060

9.     Aldrich Ames — FBI, accessed October 20, 2025, https://www.fbi.gov/history/famous-cases/aldrich-ames

10.  Robert Hanssen - FBI, accessed October 20, 2025, https://www.fbi.gov/history/famous-cases/robert-hanssen

11.  Alexander Yuk Ching Ma - Wikipedia, accessed October 20, 2025, https://en.wikipedia.org/wiki/Alexander_Yuk_Ching_Ma

12.  Former CIA Officer Arrested and Charged with Espionage - Department of Justice, accessed October 20, 2025, https://www.justice.gov/archives/opa/pr/former-cia-officer-arrested-and-charged-espionage

13.  case-study-ma.pdf - CDSE, accessed October 20, 2025, https://www.cdse.edu/Portals/124/Documents/casestudies/case-study-ma.pdf

14.  The good and bad opinions of Andrew Bustemante. : r/Intelligence - Reddit, accessed October 20, 2025, https://www.reddit.com/r/Intelligence/comments/1eqoh8e/the_good_and_bad_opinions_of_andrew_bustemante/

15.  Case Studies - Security Awareness Hub, accessed October 20, 2025, https://securityawareness.dcsa.mil/cdse/case-studies/case.html?Ma

16.  CIA chief announces sweeping agency overhaul | PBS News Weekend, accessed October 20, 2025, https://www.pbs.org/newshour/politics/cia-chief-announces-sweeping-agency-overhaul

17.  Why Brennan's Reform Would Hurt the CIA - New America, accessed October 20, 2025, https://www.newamerica.org/weekly/why-brennans-reform-would-hurt-cia/

18.  Approved for Release: 2014/09/12 C05618308 - CIA, accessed October 20, 2025, https://www.cia.gov/readingroom/docs/DOC_0005618308.pdf

19.  The Black Budget of the United States: The Engine of a "Negative Return Economy", accessed October 20, 2025, https://ciaotest.cc.columbia.edu/olj/wa/wa_apr04/wa_apr04_sac01.html

20.  THE DARK SECRET OF THE BLACK BUDGET - BY MAKING $35 BILLION IN DEFENSE PROGRAMS INVISIBLE, THE PENTAGON IS HURTING NATIONAL SECU - CIA, accessed October 20, 2025, https://www.cia.gov/readingroom/docs/CIA-RDP90-00965R000707040013-3.pdf

21.  The Black Budget: The Crossroads of (Un)Constitutional Appropriations and Reporting, accessed October 20, 2025, https://missingmoney.solari.com/the-black-budget-the-crossroads-of-unconstitutional-appropriations-and-reporting/

22.  Assets Forfeiture Fund (AFF) - Department of Justice, accessed October 20, 2025, https://www.justice.gov/afp/assets-forfeiture-fund-aff

23.  Asset Forfeiture | U.S. Marshals Service, accessed October 20, 2025, https://www.usmarshals.gov/what-we-do/asset-forfeiture

24.  DEA Asset Forfeiture, accessed October 20, 2025, https://www.dea.gov/operations/asset-forfeiture

25.  Asset Forfeiture - FBI, accessed October 20, 2025, https://www.fbi.gov/investigate/white-collar-crime/asset-forfeiture

26.  District of Columbia | Largest Ever Seizure of Funds Related to Crypto Confidence Scams, accessed October 20, 2025, https://www.justice.gov/usao-dc/pr/largest-ever-seizure-funds-related-crypto-confidence-scams

27.  Urgent Warning: China's Takeover & Global Power Shifts | Andrew Bustamante PT 2, accessed October 20, 2025, https://podcasts.apple.com/us/podcast/urgent-warning-chinas-takeover-global-power-shifts/id1191775648?i=1000662721472&l=ru

28.  2040 - DNI.gov, accessed October 20, 2025, http://www.dni.gov/files/ODNI/documents/assessments/GlobalTrends_2040.pdf

No comments:

Post a Comment

Leave the USA Before 2030

The core reasons they advocate for preparing to move abroad are based on the convergence of two major threats: economic collapse and interna...