top of page
southwesterngambit

Breaking Down Part II of AARO/DHS Report: Project Kona Blue

(AI Generated Image)

(April 19, 2024)


Part 1: History and Origin of KONA BLUE

Origin of KONA BLUE: The All-domain Anomaly Resolution Office (AARO) discovered information about the KONA BLUE program through historical interviews. KONA BLUE was described as a sensitive compartmentalized program proposed by the Department of Homeland Security (DHS) to handle "non-human biologics." However, it was never officially approved or funded by DHS.


Relation to AAWSAP/AATIP: The proposal for KONA BLUE originated from the Advanced Aerospace Weapon System Application Program (AAWSAP) and the subsequent Advanced Aerospace Threat Identification Program (AATIP) managed by the Defense Intelligence Agency (DIA) from 2009-2012. Bigelow Aerospace was a contractor for AAWSAP/AATIP.


DIA Termination and Advocacy for DHS: DIA terminated AAWSAP/AATIP due to perceived lack of merit. Following this, advocates of the program proposed that DHS take over and fund a new version of AAWSAP/AATIP under the name "KONA BLUE."


Establishment and Disapproval by DHS: In 2011, DHS established KONA BLUE as a Prospective Special Access Program (PSAP) based on claims of needing to protect sensitive information and materials related to advanced aerospace technologies. However, six months later, KONA BLUE was disapproved and terminated by the DHS Deputy Secretary due to concerns about justification, information sufficiency, personnel, and budget requirements.


Outcome and Lack of Material Transfer: Despite expectations, no data or materials were transferred to DHS under KONA BLUE. Information related to AAWSAP/AATIP activities remained within DIA's archives.


Declassification and Transparency: The archived PSAP proposal and associated documents, including those related to KONA BLUE, have been declassified and are being released to the public by the Department of Defense and DHS as part of their commitment to transparency.

This excerpt outlines the background, establishment, and subsequent termination of the KONA BLUE program within the context of previous initiatives related to advanced aerospace technologies managed by DIA and later proposed under DHS oversight.


Part 2: What is the need for a report when they have "nothing"?


Congressional Interest and Critical Need: The research is identified as a Congressional interest item, indicating its importance at the legislative level. It aims to address the critical need for the U.S. science and technology community to identify emerging or potentially disruptive global technologies that could significantly impact homeland security.


Purpose of Research: The research is pivotal in assessing the impact of global science and technology on national power and security. It focuses on defining how these technologies affect key elements crucial for national strength and security.


Collaborative Approach: The research emphasizes collaboration by delivering knowledge-based outcomes that meet the requirements of the Department and its interagency partners. It aims to facilitate follow-up efforts and additional scientific investigations and technology exploitation.


Departmental Interest Area: The Department's interest area for this project includes scientific and technical investigation, threat analysis, and assessment of materials and data with unique origins, engineering, and purposes.


Knowledge Gap: The research aims to address the gap in knowledge regarding emerging or disruptive materials and technologies that could potentially impact national power and security.


Overall, this section highlights the strategic importance of the research proposed under KONA BLUE in understanding and preparing for the implications of global science and technology advancements on homeland security, and it underscores the collaborative and interdisciplinary nature of the effort.


Part 3: What is the technical/scientific approach?

Research Questions:

  • Identify emergent technologies and applications that could pose potential harm to U.S. vital and major interests.

  • Determine the vulnerabilities and opportunities presented by new technologies.

Strategic Direction and Planning:

  • Successful concept and principal validation will guide strategic scientific and technical direction, focusing on technological exploitation and solutions.

  • It will also inform strategic planning for countermeasure and mitigation efforts within the homeland security enterprise.

Methodologies and Approaches:

  • Specific methodologies will be used to assess available materials, technologies, and observations.

  • Nuanced approaches may be required, which could be of significant interest to foreign intelligence security services due to the sensitivity of the subject matter.

Research Centers:

Four designated research centers will be involved in the investigation and inventory of information and materials, as well as the study of emerging and disruptive technologies:

  • Data Collection and Analysis Center

  • Advanced Technology Center

  • Consciousness Center

  • Technology Application Center

Scope of Investigation:

The research will cover a wide range of areas including:

  • Investigation of emerging and disruptive advanced materials and controls.

  • Exploration of alternative energy/power sources and generation opportunities.

  • Study of temporal translation, human effects, and interface considerations.

  • Research on signature reduction and weaponry.

  • Examination of technology integration across various domains.

Overall, this section outlines the comprehensive approach and scope of the research activities planned under KONA BLUE, emphasizing the need to address critical security questions related to emerging technologies and their potential impact on national interests.


Part 4: Different Center for Different Activities

Advanced Technology Center:

  • Access recovered advanced technology and previous assessments to evaluate threat capability and potential countermeasures against such technology.

  • Collect oral histories from retired military, intelligence, and contractor personnel to aid in identifying additional recovered advanced technology.

Consciousness Center:

  • Utilize remote sensing techniques to collect critical data aimed at understanding the activity and purpose of advanced technology, particularly to assess any potential threats.

  • Expand remote sensing capabilities to assist in countering illicit activities against the U.S., demonstrating the effectiveness of these techniques.

Integration Center:

  • Serve as the central hub for integrating information and data gathered from other centers.

  • Responsible for report writing based on findings.

  • Identify follow-on research proposals and efforts based on integrated data and analysis from the various centers.

Each center within the KONA BLUE program has a specific focus and set of responsibilities aimed at advancing the understanding of advanced technologies, assessing their potential threats, and developing strategic responses or countermeasures. The integration center plays a critical role in synthesizing information and facilitating collaboration across different areas of investigation. This comprehensive approach underscores the program's goal of addressing emerging or disruptive technologies that could impact national security.


Part 5: Departments and Involvement Charts

(Shows the different "Centers" that were planned to be utilized. Notice, Consciousness is again a center piece.)


(The DHS is the top authority on this Project along with Company X or Z [I assume is AARO])


Part 6: What does each center do?

Data Collection Center:

  • Develop Internet-based reporting sites for advanced aerospace vehicle reports.

  • Expand existing data warehouse to accommodate up to 200,000 reports.

  • Deploy in-house investigators to work on select cases related to advanced aerospace technology.

  • Operate as a liaison center to facilitate cooperation with state, local, tribal police, and the FBI for information sharing and collaboration.

Data Analysis Center:

  • Serve as the coordination hub for all other centers within the program.

  • Maintain in-house technical, computational, and laboratory facilities capable of conducting analyses in physics, chemistry, biology, and engineering.

Advanced Technology Center:

  • Analyze recovered technology in partnership with major aerospace and electronics companies.

  • Establish protocols to gain access to newly acquired materials.

  • Formulate an assessment team comprising top scientists and engineers available to the government.

  • Collect oral histories from retirees regarding recovered technology and its current location.

Experimental Centers:

(Not specified in the provided excerpt)

Consciousness Center:

(Not specified in the provided excerpt)

Medical Center:

(Not specified in the provided excerpt)

Education Center:

(Not specified in the provided excerpt)


Each operational center within the Advanced Aerospace Threat Identification Program (AATIP) has specific functions and objectives contributing to the overall mission of analyzing and understanding advanced aerospace technologies. Notably, the Advanced Technology Center focuses on technology analysis and collaboration with industry partners, while the Data Collection and Data Analysis Centers are pivotal in gathering and processing information related to advanced aerospace vehicle reports and investigations. The program emphasizes collaboration between government agencies and industry experts to advance understanding and capabilities in this critical area of national security.


Part 7: Justification and Techniques

Remote Vision and Communication Techniques:

Techniques involving remote vision, communication, and material transfer across dimensional and spacetime barriers are of significant interest to adversarial intelligence and security services. Countering such techniques is a priority for collection efforts.

b) Access to Advanced Aerospace Vehicle (AAV) Technology:

Recovered AAV technology is accessible only within a Special Access Program (SAP) construct, emphasizing the need for specialized access channels and protection.

c) Retrieval of Historical Data and Knowledge:

Retrieving and integrating historical data from personnel with knowledge of recovered AAV technology is restricted to SAP constructs, underscoring the necessity for controlled access.

d) Risk of Undue Attention:

The program requires protection from undue attention by unauthorized government entities, private sector organizations, or international interests, which could interfere with its mission and threaten its success.

e) Security Risks and Personnel Acknowledgment:

Overt acknowledgment of personnel involved in the program poses unnecessary security risks due to the specialized nature and sensitivity of the program's activities.

f) Security Consequences of Compromise:

Without appropriate SAP protection, compromising specific features of the program (such as remote vision and AAV technology access) could have severe and irreversible consequences for U.S. security.


These justifications highlight the critical need for stringent security measures and restricted access to sensitive technologies and information within the Advanced Technology Threat Program. The program's success depends on maintaining operational secrecy and minimizing exposure to external threats and unauthorized entities.


Part 8: Program History, Background, and Budget.

Historical Context and Initiatives:

  • In 2008, Senators Reid, Inouye, and Stevens expressed interest in establishing a research program focused on "exotic sciences."

  • A congressional add of $10 million was proposed for FY08 to support this effort.

  • The Defense Intelligence Agency (DIA) issued a Request for Proposal and awarded a contract to Bigelow Aerospace for research on advanced aerospace threats and technologies.

Program Milestones and Deliverables:

  • Over a two-year contract with a total funding of $22 million, the research effort produced 38 research papers, an active searchable database with over 100,000 entries, and investigative cases related to observed anomalies.

  • The program was tasked with confirming observed physical and psychological phenomena by government personnel.

Transition and Expansion:

  • In June 2009, Senator Reid requested Restricted Special Access Program (SAP) read-on for aspects of the program involving methodologies, personnel allocation, and engineering applications.

  • Discussions in December 2009 suggested that the program's growth was beyond the capacity of the Intelligence Community, and it was recommended for transition to another agency or component.

DHS Involvement and Transition:

  • In April 2011, a program briefing was presented to DHS officials, inviting them to expand research efforts on compiled data and observable anomalies.

  • Senator Reid emphasized transitioning the program into a special access program to enable broader access to data and materials held by government and industry entities.

Proposed S&T Directorate Objectives:

  • The S&T Directorate of DHS will provide program management support to analyze sensitive information and observed anomalies for potential threats and opportunities to U.S. homeland security.

  • A research council of eminent scientists with clearances will monitor and advise research efforts.

Budget and Timeline:

  • A proposed budget of $10 million for program funds, with allocations for personnel, equipment, data collection, and analysis centers.

  • The timeline includes establishing program offices, data analysis centers, and a research council, conducting data inventory, analysis, and quarterly reviews throughout FY12 and FY13.

This detailed overview underscores the complexity and strategic importance of the program in addressing advanced aerospace technologies and potential threats to national security. The timeline outlines key milestones and objectives aimed at advancing research and understanding in this specialized area.


Let's keep these reports coming. This is only a summary of the parts I found most interesting. I will probably reread it soon and make additions to the sections and add more sections. It's a 59 page report and a lot to go through. Way more than Part I by Dr. Kirkpatrick.

Last, here is some Youtube explanations of some professional reactions as well as multimedia forms of interpretations of this release below.




(NewsNation, 2024)



(Youtube, 2024)



In this UAP Government Release, it is detailed how Senators Reid, Inouye, and Stevens initiated efforts in 2008 to establish a research program focused on "exotic sciences," securing congressional funding of $10 million for FY08. This led to a contract awarded by the Defense Intelligence Agency (DIA) to Bigelow Aerospace for research on advanced aerospace threats and technologies, resulting in significant deliverables including research papers, a searchable database, and investigative cases. Over time, discussions arose about transitioning the program due to its growth beyond the Intelligence Community's capacity, with Senator Reid advocating for broader access to program data and materials through a special access program (SAP). By April 2011, efforts were made to involve the DHS, emphasizing the importance of expanded research on observed anomalies for homeland security. The proposed budget and timeline outline key steps in establishing program offices, data analysis centers, and a research council, reflecting the program's strategic goals and objectives.


Stay Kind, Question Everything!

~ Stellae Ambulator


14 views0 comments

Comments


bottom of page