Showing posts with label classified. Show all posts
Showing posts with label classified. Show all posts

Tuesday, March 20, 2018

Nicola Tesla Wasn’t the Only One: U.S. places ‘Secrecy Orders’ on Thousands of Inventions

 Nicola Tesla Wasn


By Arjun Walia, Collective-Evolution


Government secrecy is running rampant in an age where more and more people are demanding transparency. Did you know that the U.S. Government classifies over 500 million pages of documents each year? Justification for the mass classification of information is (apparently) done for the sake of “national security,” but as we know:





“The dangers of excessive and unwarranted concealment of pertinent facts, far outweigh the dangers that are cited to justify them. There is a very grave danger that an announced need for an increased level of security will be seized upon by those anxious to expand its meaning to the very limits of censorship and concealment. That I do not tend to permit, so long as it’s in my control.” – JFK (source)


If a scholar wanted to research political, historical, scientific, or any other type of archival work, it would prove difficult and limiting seeing that most of their government’s activities are kept a secret. It is truly impossible to access the factual history of their country.


The office is supposed to legally protect the inventions of entrepreneurs and companies, some of whom have developed ground breaking technology. Unfortunately, that’s not the case as new documents obtained via the Freedom of Information Act (FOIA) reveal how the Patent Office has been using a secret system to withhold the approval of some applications.


This 50-page document was obtained by Kilpatrick Towsend & Stockton, LLP, who commonly represent major tech companies that include Apple, Google and Twitter (to name a few). You can view that entire document HERE. (1)


The program delaying patent applications is called the Sensitive Application Warning System (SWAS). Usually, when an application is submitted for a patent approval it requires a couple of examiners who work with the Patent office to go through their process of approval. This process usually takes approximately 1 to 2 years, but  applications that are filed in SAWS must be approved from several people, and can be delayed for a number of years.


“There is no official channel to notify an applicant once their patent is placed in the system, and the Patent Office has denied requests to divulge what applications are on the SAWS list.” (source)


The documents also indicate areas of technology that might have a patent application placed in the SAWS program – these include smartphones, internet-enabling systems and more. This information is set to be published in an online journal called “Law360” to inform the public. Tech Columnist Alyssa Bereznak at Yahoo News states that most companies are fully aware of this.


I first came across this recent information in her article, which you can view here, but I felt compelled to add more information.


As you will see below, there is more information that has surfaced prior to these documents that suggest this type of “invention secrecy” goes far beyond these technologies.


One great example (out of many) of delayed patent applications comes from Dr. Gerald F. Ross. He filed a patent application for a new invention he had devised to defeat the jamming of electromagnetic transmissions at specified frequencies. It was not until June 17, 2014 (almost 37 years later) that this patent was granted. (2)


Invention Secrecy Is Still Going Strong


As great as it is to see new information pertaining to invention secrecy come to light, it’s also important to note (as reported by the Federation of American Scientists; see annotated bibliography) that there were over 5000 inventions that were under secrecy orders at the end of Fiscal Year 2014, which marked the highest number of  secrecy orders in effect since 1994.(3)


This is all thanks to an act many people are unaware of. It’s called the “Invention Secrecy Act” and it was written up in 1951. Under this act, patent applications on new inventions can be subject to secrecy orders. These orders can restrict their publication if government agencies believe that their disclosure would be harmful to national security.(4)(5)


As mentioned earlier, “national security” has become an excuse and justification for the classification of a large amount of information on a variety of topics that the public is deliberately kept in the dark about. Apparently, many of these projects and inventions go far above and beyond presidential knowledge.


“It is ironic that the U.S. should be fighting monstrously expensive wars allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy when trillions, and I mean thousands of billions of dollars, have been spent on projects which both congress and the commander in chief know nothing about.”  (source) – Paul Hellyer, Former Canadian Defense Minister.


So what type of technology is under restriction under the Invention Secrecy Act? We don’t really know, but a previous list from 1971 was obtained by researcher Michael Ravnitzky. Most of the technology listed seems to be related to various military applications. You can view that list HERE. (6)


As Steven Aftergood from the Federation of American Scientists reports:


“The 1971 list indicates that patents for solar photovoltaic generators were subject to review and possible restriction if the photovoltaics were more than 20% efficient. Energy conversion systems were likewise subject to review and possible restriction if they offered conversion efficiencies in “excess of 70-80%.” (source)



Secrecy is No Secret


A couple of years before the Invention Secrecy Act of 1951, the National Security Act was created. As a result, a number of intelligence groups and executive bodies followed. None of these groups had any active congressional oversight. The United States has a history of government agencies existing in secret for years. The National Security Agency (NSA) was founded in 1952, its existence was hidden until the mid 1960’s. Even more secretive is the National Reconnaissance Office, which was founded in 1960 but remained completely secret for 30 years. Along with this secrecy is the information these agencies obtained, and continue to obtain until this day.


Special Access Programs are another great example of secrecy. From these we have unacknowledged and waived SAPs. These programs do not exist publicly, but they do indeed exist. They are better known as ‘deep black programs.’ A 1997 US Senate report described them as “so sensitive that they are exempt from standard reporting requirements to the Congress.” (7)(8)


We don’t really hear about black budget programs, or about people who have actually looked into them. However, the topic was discussed in 2010 by Washington Post journalists Dana Priest and William Arkin. Their investigation lasted approximately two years and concluded that America’s classified world has:


“Become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.” (9)


You can read more about the Black Budget in detail HERE.


Today, it seems to be evidently clear that secrecy has lead to what Dwight Eisenhower warned us about:


“In the council of government, we must guard against the acquisition of unwarranted influence whether sought or unsought, by the military industrial complex. The potential disaster of the rise of misplaced power exists, and will persist. We must never let the weight of this combination endanger our liberties or democratic processes.” (source)


What Has All This Secrecy Led To?


The fact that so much information is concealed from the public domain has led to a kind of “breakaway civilization.” A term coined by Richard Dolan.


Someone, or some groups are “in the know.” This or these groups who have had access to information over many decades that the public hasn’t is no doubt living and perceiving the world in a different way from what the masses do. This has led to a world within worlds, a separate civilization apart of our own who have access to knowledge that we don’t. Who are they? What are they doing? Why are they doing it? What do they know?


You can read what Richard has to say about it here.


Sources:


(1) http://www.scribd.com/doc/249032641/SAWS-FOIA-Response 


(2)http://patft.uspto.gov/netacgi/nph-Parser Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=8,754,801.PN.&OS=PN/8,754,801&RS=PN/8,754,801


(3)  http://fas.org/sgp/othergov/invention/stats.html


(4) http://www.law.cornell.edu/uscode/text/35/part-II/chapter-17


(5)http://fas.org/sgp/othergov/invention/35usc17.html


About FAS: Visit their website here. View their board members here.


The Federation of American Scientists (FAS) works to provide science-based analysis of and solutions to protect against catastrophic threats to national and international security. Specifically, FAS works to reduce the spread and number of nuclear weapons, prevent nuclear and radiological terrorism, promote high standards for nuclear energy’s safety and security, illuminate government secrecy practices, as well as track and eliminate the global illicit trade of conventional, nuclear, biological and chemical weapons.


FAS was founded in 1945 by many of the Manhattan Project scientists who wanted to prevent nuclear war and is one of the longest serving organizations in the world dedicated to reducing nuclear threats and informing the public debate by providing technically-based research and analysis on these issues.


FAS is a non-profit membership organization, with members from the academic, non-profit and government communities. For more information on FAS membership and to join, please visit our Membership page.


FAS staff comprise a highly skilled and dedicated team with professional experience in biology, biochemistry, chemistry, environmental science, nuclear engineering, physics, and political science. More than 65 Nobel science laureates have endorsed FAS as members of the Board of Sponsors.


(6) http://fas.org/sgp/othergov/invention/pscrl.pdf 


(7) http://www.gpo.gov/fdsys/pkg/GPO-CDOC-105sdoc2/content-detail.html


(8) Dolan, M. Richard and Zabel, Bryce. A.D. After Disclosure. New Page Books. 2012


(9) http://projects.washingtonpost.com/top-secret-america/


The post Nicola Tesla Wasn’t the Only One: U.S. places ‘Secrecy Orders’ on Thousands of Inventions appeared first on The Sleuth Journal.

Wednesday, October 11, 2017

Is It Time To Take North Korea’s Cyber Weaponry Seriously?


northkoreacyberattack


Analysts say cyber capabilities have become a key asset in North Korea’s war chest. Pyongyang’s increasingly bold attacks in the virtual space have come in tandem with the hermit nation’s rapidly progressing ballistic missile and nuclear programs and some say that it’s time this is taken very seriously.


The rogue regime has used cyber attacks for a wide range of purposes including hacking adversaries like South Korea and pilfering money. North Korea’s hackers have been accused of carrying out some of the most audacious cyber attacks of the past few years, from siphoning millions of dollars to stealing state secrets.


“North Korea’s cyber weapons are as destructive as its conventional weapons,” Lim Jong-in, a cybersecurity professor at Korea University, told CNN. “Tomahawk missiles can paralyze a major country’s power grid and financial system. So do North Korea’s cyber weapons.” Lim continued, saying: “Cyber experts say North Korea should be ranked among the top 5 in the world. I believe North Korea can steal anything they want through cyber espionage. No country is safe from its cyber espionage.”



In the latest revelation, a member of the South Korean ruling party said Tuesday that North Korea stole classified military documents from a South Korean Defense Ministry database in September 2016. They included a document that included plans to “decapitate” the North Korean leadership.-CNN



But that isn’t all. Cybersecurity firm FireEye said Tuesday that it detected and stopped an attack on US electric companies by people with links to the North Korean government. The skill of these hackers is actually impressive considering they live in a country where the internet is heavily regulated by the government. The citizens living under Kim Jong-Un’s dictatorship only have access to a government-run, heavily censored intranet rather than the full depths of the world wide web. Yet those restrictions have not stopped the hackers from improving their abilities.



“North Korea almost certainly has the capability to conduct disruptive and potentially destructive attacks, as well as more traditional cyber espionage operations,” Bryce Boland, the chief technology officer for Asia-Pacific at FireEye, told CNN. “North Korea has little connectivity and relatively limited reliance on technology, making it less vulnerable to attacks,” he said.


In February 2016, $101 million was fraudulently transferred out of the Bangladesh central bank’s account at the New York Federal Reserve and eventually made its way to the Philippines. Researchers found that the hackers responsible for the theft carefully routed their signal through France, South Korea, and Taiwan to set up their attack server, but made a critical mistake that established a connection to North Korea. Nonetheless, most of the funds have not been recovered.


Analysts also say that North Korea has been preparing similar operations targeting cryptocurrencies like Bitcoin, as international sanctions make it harder for North Korea to use the dollar.


North Korea’s advancements in their weapons is concerning enough, but add in the actual real threat of a cyber attack, and we could experience a major disruption to our way of life.



Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.

Gas Masks, Filters, Body Suits, Anti Radiation Pills

Please Spread The Word And Share This Post






Author: Mac Slavo
Views: Read by 24 people
Date: October 11th, 2017
Website: www.SHTFplan.com


Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.


Wednesday, June 21, 2017

Clinton may lose security clearance from mishandling of classified intel


Clinton spokesman suggests that the Clinton camp hasn’t learned from its mistakes




clinton, hillaryUS Embassy/Flickr



The State Department confirmed months of speculation on Tuesday when it leaked to Fox News that it had opened a formal inquiry into Hillary Clinton’s alleged mishandling of classified information on her private email server. Clinton, who has repeatedly blamed the FBI’s handling of the inquiry for her embarrassing defeat in November, is now facing the possibility of having her top-level security clearance revoked – a penalty that echoes the investigation of former National Security Adviser Mike Flynn.


President Donald Trump repeatedly promised to investigate the Clinton’s, so the probe could see the president fulfilling yet another campaign promise. As Fox reports, “during the FBI’s investigation of Clinton’s use of top-secret and classified information on her private server, former FBI Director James Comey said there were seven email chains on Clinton’s computer that were classified at the “Top Secret/Special Access Program level.”


Another 2,000 emails on her private server were found to have contained information deemed classified now, though not marked classified when sent. In addition, the server also contained 22 top-secret emails deemed too damaging to national security to be released.”


To paraphrase Senate Judiciary Committee Chairman Chuck Grassley, there is plenty of evidence to suggest that violations of statutes concerning the handling and dissemination of classified materials occurred.


Judicial Watch’s Chris Farrell said he believes Clinton and her “circle of national security criminals” should not have access to any classified information for any reason.



“Their conduct has cost them that privileged position of special trust and confidence,” Farrell said.



Here’s Fox:



The department’s investigation aims to determine whether Clinton and her closest aides violated government protocols by using her private server to receive, hold and transmit classified and top-secret government documents. The department declined to say when its inquiry began, but it follows the conclusion of the FBI’s probe into the matter, which did not result in any actions being taken against Clinton or any of her aides.


Depending on the outcome of the current State Department inquiry, Clinton and her aides could have their access to sensitive government documents terminated.
Senate Judiciary Committee Chair Chuck Grassley, R-Iowa, confirmed to Fox News the department’s formal inquiry.


Meanwhile, Grassley’s committee launched its own inquiry into Clinton’s handling of emails, an inquiry that began in March. Grassley cited among his concerns the July 5 statement of former FBI Director James Comey that the agency found Clinton and her staff members were “extremely careless in their handling of very sensitive, highly classified information.”



A response from a Clinton spokesman suggests that the Clinton camp hasn’t learned from its mistakes during the campaign.


In the statement, Clinton’s top spokesman, Nick Merrill told Fox that a final judgment of Clinton has already been reached. “Nothing’s been more thoroughly dissected. It’s over. Case closed. Literally,” said Merrill.


Former FBI Director Comey announced that the bureau had closed its investigation in July 2016, before turning around and announcing that it had been reopened following the discovery of emails from Clinton on a laptop owned by former Congressman Anthony Weiner.


Via Zero Hedge



Wednesday, February 22, 2017

U.S. Senate Intelligence Committee investigators request total ‘preservation of Russian-tied information or communications’ with Trump Camp.

(INTELLIHUB) — CNN’s Manu Raju has confirmed that the Senate Intelligence Committee is investigating the alleged ‘Russian interference of the 2016 U.S. Presidential Election’ and any potential Russian ties to Trump campaign staffers.


Chairman Richard Burr, R-North Carolina along with Sen. Mark Warner, D-Virginia, are heading up the panel which has already put out requests to a number of agencies, organizations, and individuals, 12 in total, requesting that they preserve any and all information or communications that fall within the scope of the investigation.


FBI Dir. James Comey attended the classified panel behind closed doors Friday where members decided to expand their investigation into Russia’s alleged meddling with the U.S. election system.


Reporting over the phone for CNN, Raju said that the panel is very concerned with any potential contacts or conversations Trump campaign staffers or transition team members may have had with the Russians.



Ruju also said according to reports “certain [Trump] campaign officials” had “constant contact” with “Russian operatives during the campaign.”


The Senate Intelligence Committee is doing a “deep dive,” Raju said.



“What they want are records to make sure that nothing that the Trump administration or that any federal agency has relating to Russia should be destroyed. They want to preserve these documents, review them and they have the power to subpoena those as well.”



Additionally, Raju reported that several other investigations into the matter are currently underway but are slow-going.




H/T: Tabertronic/Twitter


Featured Image: (Mark Warner/Flickr)

©2017. INTELLIHUB.COM. All Rights Reserved.






Comment Policy: Threats of violence, foul language, bullying, and spam will not be tolerated and may be flagged.