Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Will WikiLeaks unravel the American 'secret government'?
#41
Thanks Peter. As you say, the worry is that the the content may be managed by the five MSM partners in to becoming a sort of long running infotainment special - a factual "X Factor".

Time will tell us for sure, but so far I'm unimpressed.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#42
Peter Presland Wrote:That said, I've been trawling through the stuff so far available from the ME embassies and they really do paint a damning picture of the Arab States as Israeli/Zionist stooges. That has me asking "is that REALLY in Israel's interests (from the perspective of their elites that is)"? - and the answer has to be 'no'. There is apparently a deafening silence about the leaks in the Arab press generally; minimal even in al Jazeera. No doubt fearful of blatant exposure of precisely that Zionist subservience and its potential to stir up popular rebellion.

My working hypothesis is that the cables are genuine (indeed this has not been denied), and that they originally constituted a genuine leak.

This material has subsequently been through several middlemen, including most notably Assange and Wikileaks, and then three MSM organs - Der Spiegel, NYT and The Guardian.

It is clear that either Wikileaks or the MSM organs have referred certain cables to the national security state and abided by government requests for non-publication or redaction. (Eg the cable about North Korea that has been withheld at the reqeust of the Obama adminstration.)

So, the original leak has been heavily diluted before any publcation.

Then add to the mix the fact that:

i) these are SECRET not TOP SECRET cables;

ii) the natural tendency of diplomats to talk in diplomatic lanaguage (even if this is often bitchy and gossipy);

iiii) the tendency of career civil servants, ambassadors, the military etc to adhere to the group mind think around matters such as the reality of Al Qaeda and the danger of the Iranian nuclear programme.

The ultimate consequence is the current damp squib: diverting, but of no threat to the Volkland Security elites and their bogus War on Terror.

If there was a cable saying eg "Osama died eight years ago, and Al Qaeda is a creation of western intelligence", it would not have made it through the triple whammy of Wikileaks, MSM and referral to Volkand Security for vetting, DA notices etc.

Charles Drago Wrote:More likely than not, false flag attacks directly linked to one or more leaked documents will be mounted. At which point the Great Unaware will rise up to support official clamp-downs on Internet content and use.

My Hunt analogy holds: These systemic "confessions" to date have benefited no one except those who stand to benefit from the imposition of restrictions on information flow.

This is my biggest fear.

Regardless of whether this is a genuine leak, a limited hangout or even deliberate disinformation, I'm in little doubt that it will be used to suppress freedom of information still further.

From the Volkland Security perspective, these relatively harmless leaks MUST have real and damaging consequences to the Volkland.

This may be expressed in a single terrorist or nuclear incident, which enables the Volkland Security apparatus to impose still more stringent restrictions on the flow of information, and to remove whistleblower protections.
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#43
The Iranian press view.

'Mideast enemies behind Wiki-releases'

Mon Nov 29, 2010 6:33PM




[Image: miriam20101129173950310.jpg]
Iran's Parliament Speaker Ali Larijani
Iran's Parliament Speaker Ali Larijani says the enemies of regional stability, who seek to create discord, are probably behind the release of Wikileaks documents.


Wikileaks website on Sunday released 250,000 classified US documents, some of which touch on issues ranging from US involvement in spying against UN to the involvement of US embassies across the world in an espionage network.

"The Wikileaks documents are not precise and it is possible that the countries which are the enemies of stability in the region raise such issues to sow discord," Larijani said after his meeting with Syrian President Bashar al-Assad in Damascus.

"If the Americans had the courage to attack Iran, there would have been no need to ask for permission from Saudi Arabia and United Arab Emirates," Mehr News Agency quoted Larijani as saying.

In the beginning of its activities, Wikileaks sought to shed light on Washington's belligerent polices and condemn the killing of civilians in Iraq and Afghanistan.

Nevertheless, analysts believe the recent document release is a scenario carefully orchestrated by US intelligence agencies to deflect attention from US domestic problems, to upset the situation in the region and lay the groundwork for military action against Iran.

Iranian President Mahmoud Ahmadinejad said earlier on Monday at the press briefing in Tehran that the US administration had "released" the material intentionally.

"[The documents] have no legal value and will not have the political effect they seek," Ahmadinejad added.

Ahmadinejad stressed that the Wikileaks "game" is "not worth commenting upon and that no one would waste their time reviewing them."

Larijani condemned the recent terrorist attack in Tehran which led to the martyrdom of an Iranian academic and the injury of another, adding that probably Israel is behind the bombings and that Tel Aviv will "regret" its action.

Unknown terrorists detonated bombs in the vehicles of Dr. Majid Shahriari and Professor Fereydoun Abbasi in separate locations on Monday morning between 7-8 a.m. local time.

Shahriari was martyred immediately, but professor Abbasi and his wife sustained injuries and were transferred to hospital.

Both men were professors at Shahid Beheshti University in Tehran.

MYA/HGH/MMN
http://www.presstv.ir/detail/153186.html

Related Stories:
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
Buckminster Fuller
Reply
#44
http://www.maannews.net/eng/ViewDetails.aspx?ID=337152

Israel satisfied as WikiLeaks shows 'consistency' on Iran

Published today 15:54

JERUSALEM (AFP) -- Israel expressed satisfaction on Monday after the mass release of US diplomatic cables by WikiLeaks, saying it proved Israel's position on Iran was consistent -- in public and in private.

The trove of documents released via the whistleblower website late on Sunday expose remarks made behind closed doors touching on everything from the Gaza blockade to Israeli views on the Hamas-Fatah divide, to US attempts to collect information on Israeli and Palestinian leaders.

"I don't think Israel was harmed at all," Israeli Prime Minister Benjamin Netanyahu told reporters in Tel Aviv.

"Israel is a free society and largely open society. Its assessments of the problems in the area are supported by the assessments of many others even if they are not said openly," he said, as politicians and media commentators crowed over Israel's vindication over the Iranian issue.

"We come out looking very good," a senior government official told AFP, while cautioning that his assessment was only preliminary and came before the full set of leaked documents were released.

The cables "demonstrate that Israel doesn't speak a double language and that we say in private what we say in public" about the threat of Iran's nuclear program, he added.

The documents posted online by WikiLeaks and a select group of international media outlets show widespread concern about Iran's nuclear program and reveal Saudi Arabia "repeatedly" urged a US military strike on the country.

"They confirm that the whole Middle East is terrified by the prospect of a nuclear Iran," the Israeli official added. "The Arab countries are pushing the United States towards military action more forcefully than Israel."

The cables also show that Israel discussed its planned war on Gaza with the Palestinian leadership and Egypt ahead of time, offering to hand them control there if Hamas was overthrown.

The attempt to coordinate its offensive against Gaza's Islamist rulers was revealed by Israeli Defense Minister Ehud Barak in talks with a congressional delegation in May 2009.

"He explained that the GOI (government of Israel) had consulted with Egypt and Fatah prior to Operation Cast Lead, asking if they were willing to assume control of Gaza once Israel defeated Hamas," the cable said, referring to the Fatah party of President Mahmoud Abbas.

"Not surprisingly, Barak said, the GOI received negative answers from both," it said.

Israel launched "Operation Cast Lead" on 27 December 2008 with the stated aim of halting rocket attacks from Gaza. During the 22-day war, some 1,400 Palestinians, mostly civilians, were killed as well as 13 Israelis, 10 of them soldiers.

Several of the telegrams quote conversations with Netanyahu when he was leader of the opposition. In one, dated April 2007, he says there would be no peace with the Palestinians until they drop demands for the refugees' right of return.

"Netanyahu noted that he thought dropping the 'right of return' was the acid test of Arab intentions and insisted that he would never allow a single Palestinian refugee to return to Israel," it said.

And a withdrawal by Israeli forces to the pre-1967 borders would only encourage radical Islamic elements, Netanyahu was quoted as saying.

The issue of refugees is one of the thorniest elements of the conflict, with the Palestinians demanding that Israel recognize the right of return of refugees who, with their descendants, now number 4.7 million people.

In the same 2007 meeting, Netanyahu also revealed Israel's preoccupation with the bitter rivalry between Fatah and Hamas.

Asked his opinion of Abbas, Netanyahu described the Palestinian leader as a "nice man who means well" whom he would have no problem supporting, but he said "Israel and the US should first focus more on 'strangling' Hamas."

It would be easier, he said, "to weaken Hamas than to strengthen Abbas."

Peter Presland Wrote:I'm aware of my own tendency to vacillate on some of these unfolding DP issues. I think I was maybe a little too forthright in my post above. The possibility of Zionist/Mossad control or penetration of WL is seductive. There's no doubt Mossad will try hard to use/turn WL geeks and if any are Israeli or Jewish then 'offers that cannot be refused' apply in spades - similar with others SIS's too I guess.

That said, I've been trawling through the stuff so far available from the ME embassies and they really do paint a damning picture of the Arab States as Israeli/Zionist stooges. That has me asking "is that REALLY in Israel's interests (from the perspective of their elites that is)"? - and the answer has to be 'no'. There is apparently a deafening silence about the leaks in the Arab press generally; minimal even in al Jazeera. No doubt fearful of blatant exposure of precisely that Zionist subservience and its potential to stir up popular rebellion.

I'm going to reserve judgement even though I have a major issue with the obvious commercialisation of the whole thing. There has to be serious big bucks involved across the 5 MSM outlets and we all know where that leads. I simply do not buy any alleged necessity for drip-feeding the stuff either. Get the lot out to a hundred thousand other geeks and then we'll see some REAL analysis un-fettered by UK D notices and the like.
Reply
#45
26 November 2010

Source: http://www.nsa.gov/public_info/_files/cryp..._a_taxonomy.pdf




Toward a Taxonomy of Secrets
Cryptologic Quarterly
Spring/Summer 2001-Vol. 20, Nos. 1-2, pp. 65-74.

(U/FOUO) [Redacted] is an engineer in V22. He is certified as an Engineer and is a senior member of the Engineering and Physical Sciences Technical Track.

Introduction

A great deal of the effort expended in the realm of information security is devoted to the protection of secrets. In the context of this paper, we will use the most general meaning of term - a piece of information that one individual or organization wishes to prevent another individual or organization knowing. This is a definition that is explicitly intended to be far broader than the association of the term "Secret" with traditional hierarchical military/governmental classification schemes. In some cases, the definition of "knowing" may include "being aware of the existence of."

While most of the literature on information security accepts the existence of secrets as a given and proceeds to develop various solutions for the preservation and handling of secrets, it is our intent to step back from this and consider briefly the basic nature of secrets. We will explore the various types of secrets and the different motivations that lead to the creation and keeping of secrets. The information presented on this topic may be viewed as a rudimentary taxonomy of secrets, which may be fleshed out further if it is deemed useful by the community. We will also consider the implications that might be drawn about how best to deal with secrets. In all cases where we refer to the keeper of the secret, it should be assumed that this term may refer to either an individual or an organization, such as a corporation, religious body, or government, unless other distinctions are explicitly made.

This paper will work within a multidimensional categorization structure. Each dimension will be discussed separately, and it is assumed that the taxonomical description of any given secret will be an n-tuple, with each dimension being described by one of a limited number of choices within that dimension.

Motivations for Keeping Secrets

As an initial step into the world of secrets, we will attempt to categorize secrets based on the motivation for creating and keeping them. At first glance, one may instinctively assume that all secrets are alike, especially if one has previously considered secrets primarily in the context of classic information security techniques. Most of information security is at its core based on a hierarchical model of classification that is an outgrowth of military environments and policies.

Because of the nature of that area of study, there has been a lot of thought applied to the "how" of keeping secrets with relatively little analysis of the "who," "what," or "why" of the secrets themselves. In considering these questions, it seems that while there are several basic and largely distinct motivations for creating secrets, they can be grouped into two major categories. In the one group there are those cases where the regulation of the secret-keeping behavior is largely from the beliefs and motivations of the secret-keeper, and in the other are those cases where the regulating action is more external, in the form of an entity distinct from the secret-keeper. An evolutionary psychologist might assert that both of these reduce to the same thing, namely, "competitive advantage." In practice, though, humans seem to treat the two subclasses differently.

While the various subcategories are not purely divisible between these two general forms, we will postpone consideration of the nature of and reasons for the overlap, leaving those topics for those more philosophically inclined to debate. The goal here is a rough generalization that can be refined further, as the community sees fit.

Self-Regulated Secrets

The first category in this dimension of secret space is a self-regulated secret. This is a secret that is kept based on an internal perception of risk. This perception of risk comes in two forms, rational and irrational. In other words, the perception of risk that the keeper of the secret acts upon may be plausible given the available information, or it may be an irrational fear, entirely out of proportion to the actual or plausible risk. In either case, the motivating factors tend to cluster around two centers - embarrassment and control.

Embarrassment

Embarrassment is a slight variation on privacy. In the case of embarrassment, the keeper believes (accurately or not) that the revelation of the information will lead to ridicule, derision, exclusion, or other repercussions based on social factors. Embarrassment does not entail the ability to do harm directly. Instead it deals with information that, when revealed, will change social dynamics and cause others to reassess their opinion of the subject of the secret, who may not be the keeper of the secret. In other words, the keeper of a secret motivated by embarrassment is motivated by the fear of "what people will think" (or "do") if the secret is revealed.

Fear and shame are two of the greatest motivators in human behavior, and both provide impetus for secrets, even though they are likely to be inaccurately calibrated. This type of secret is the driving force behind blackmail, scandal, PR disasters, and some of the less savory aspects of democracy. Oddly enough, experience shows us that embarrassment often leads the keeper of the secret to cause himself additional harm in attempting to avoid the revelation of a secret. In many scandals through history, the initial indiscretion might have been forgivable, had it been admitted to and dealt with. It is often the attempted cover-up that is deemed to have been unforgivable. And how many missteps have been turned into brilliant coups by those perceptive enough to highlight the actions taken to correct the mistake, and thus rise above it? One could write a book about the dynamics of confession and forgiveness, but suffice it to say that the dynamics of embarrassment do not yield easily to formulaic solutions, thus considerably complicating the handling of such secrets.

Control

Control is a slightly different motivation for secrets. In this case, the information being kept secret is believed by the keeper to relate directly to the control of assets, processes, or knowledge that might give others the ability to more directly do harm or gain advantage. This type of secret might include such things as military plans, financial data, bargaining positions in negotiations, trade secrets, safe combinations, etc. Even in situations where there are social dynamics involved, a control secret is one which gives the holder the ability to directly act - to build the bomb, to buy low and sell high, to "head 'em off at the pass," to call the other guy's bluff, or whatever.

Relationship of Embarrassment, Control, and Privacy

If one can envision a spectrum of harm, embarrassment secrets deal with the subjective end of the spectrum. Embarrassment brings in social and emotional factors, and is imprecisely measured, and often based on a seriously inaccurate assessment of likely outcomes. Control secrets tend to be on the objective end, dealing with more tangible, quantifiable factors. The estimation of harm that drives the valuation of a control secret may be inaccurate, but it is usually based in tangible factors.

Privacy secrets may be found anywhere along the spectrum, in that they are not based on the valuation of the secret, or the estimate of harm. Privacy, for the purposes of this discussion, is the keeping of secrets out of a belief that others simply have no need or right to know. While a concern for the harm (in either the embarrassment or control sense) caused by disclosure may coexist with the desire for privacy, we will use the term privacy to cover the principled or philosophical objection that may be overlaid onto the more pragmatic calculation of potential damage.

Externally Regulated Secrets

Externally regulated secrets are those where the keeping of the secret is dictated or regulated by somebody other than the keeper of the secret. If the keeper is an individual, the regulator may be a group to which the keeper belongs, or a third party not directly involved in the dynamics between the keeper of the secret and those from whom the secret is being kept. In the case of organizations, the regulator may be a larger organization, or the governing body of the organization.

In either case, there is some sort of "higher authority" relationship in place, relating the individual to the group, or the members of the group to established group norms. Where the keeper's own assessment of the situation drove the behaviors involving self-regulated secrets, externally regulated secrets bring rules and the judgment of outside arbiters into play.

Legal Requirements

The most obvious instance of external regulation of secrets is law or policy. In such cases, there are extant rules that the keeper of the secret is expected to comply with. Examples of areas where such regulations regarding the keeping or revealing of secrets might be found include SEC disclosures, torts, clearances, corporate security policies, etc. The keeper is bound by the rules, and there is clear understanding that violations of the rules will bring punishment by a specified adjudication process, in addition to whatever harm results directly from the revelation of the secret.

Note that in these cases, it is entirely possible for the keeper of the secrets to find that the regulations covering the handling of a particular secret may be derived from multiple regulating regimes that are not mutually, or even internally, consistent. This has been a recurring problem for those designing information security tools. The laws, regulations, and policies as expressed are not always feasibly implemented using the available technology. If the policies are not correctly and unambiguously formulated, it may be impossible to implement them, regardless of technology, simply due to the inconsistencies.

Social Cohesion

Social cohesion is an interesting motivator for secrets, and one that goes to the core of the human dynamics of secrets. Social cohesion secrets are those whose existence is not necessarily predicated on the inherent value of the secret, or the potential harm if it is revealed. Instead, these secrets are kept more for their usefulness in delineating "us" and "them." Humans, whether individually or in groups, tend to define themselves in part by demarcating the differences between themselves and the "others." We are good, hardworking, honest members of the company, the group, the tribe, while "they" are outsiders who follow other norms.

A trivial example of a socially cohesive secret might be noted when ordering a hotdog in the city of Chicago. One might walk up to the hotdog vendor and ask for one hotdog with mustard, relish, and ketchup. Perhaps the order would be filled as specified, but the vendor knows a secret - you are from out of town. The vendor knows this because it is Chicago tradition that a true hotdog consists of a Vienna brand beef wiener (steamed, not grilled), on a Rosen's poppy-seed bun, with cucumber slices, tomato slices, diced onion, sport peppers, pickle relish (a shade of near-fluorescent green seldom found in nature), yellow mustard, and celery salt. Any of the "sacred seven" condiments may be changed slightly or omitted, but one never asks for ketchup. It is just not done, except by somebody from out of town. If a Chicagoan were to do such a thing, he would feel compelled to make some comment about the fact that he was doing it. By commenting, he would indicate that even though he was violating the social norm, he was aware of it, and thus still a member of the group, even if a somewhat odd member. This is precisely the sort of "secret" which binds people in shared experience, and separation from those who do not know the liturgy, the cultural references of a particular place and time, the jargon, the recipes, or whatever the secret may be. As one might guess, it is the holding of the secret, and the trust bonds established by doing so, that has value to the keepers of the secret. The actual objective content of the secret may be of little value, either to those holding the secret, or to any outsider. If such a secret is lost, it may easily be replaced - the value is not in the secret itself.

It may be noted that while there are many trivial examples of such secrets, one should not underestimate the fervor with which some secrets of this type may be defended. This is due to the enormous value placed on the trust of the group holding the secret and the exclusivity of it. No matter how meaningless or even silly the secret may appear, the powerful desire to be one of the included few may lead the keeper of such a secret to extraordinary lengths to preserve and protect the secret, simply as a matter of personal honor.

Tradition/Momentum

A last external regulatory force for secrets is tradition or momentum. This is the case where a secret continues to be kept beyond its useful life. Perhaps there has been no revocation of the rules rendering it a secret, despite the fact that the information has already become known through other means. Possibly the driving factor is the notion that "we've always done it this way." Whatever the reason, the basic characteristic is that the secret does not need to be kept any longer, but the processes, habits or regulations that governed the keeping of the secret continue on. Bureaucracies are especially suited to this type of secret, due to the lack of a mechanism for periodic review and revision of the regulatory and cultural structures that maintain the secret, either formally or by convention.

Note that it may not even be intentional for such secrets to endure. An example might be a database system originally designed to keep certain fields secret. After the need for the secrecy has gone away, it may still be more trouble than it is worth to revise the system to eliminate the protections on those fields. The owners of the system understand that they no longer need to give special protection to those fields, but the benefit of removing the protection is outweighed by the cost of doing so. Thus the fields remain protected by the system, even though the need to do so has been overtaken by events. This general case has the perverse twist that, over time, the understanding that the protected fields are no longer secret might be forgotten, and the protection may be carried over into new systems if the requirements are not reexamined and updated appropriately as the legacy system or process is replaced.

Valuations of Secrets

In this section, we will set aside the matter of motivation, and look at the actual or perceived value of the secret as another way of viewing secret-space. As previously mentioned, this classification is an overlay to the set of motivations, rather than somehow a further subdivision of it. By this, we mean that any of the secret types denoted here may be paired with any of the motivating factors noted previously. While it may be the case that some of the motivation categories may tend toward a particular valuation type, they are by no means exclusively coupled, nor is there any type noted here which is inherently excluded from any of the motivation categories.

"Real" Value

This valuation is perhaps the simplest, yet it is still a somewhat fuzzy concept. The idea is that this type of secret is kept secret due to some relatively accurate mapping between the attempt to keep it secret, and the value judgment made in the process of responding to the motivating factors. As an example, if the secret is being kept due to legal reasons, it is because the information being kept secret does, in fact, fall within the bounds of the law or policy in question. The law applies to the data, and the data are being handled correctly in accordance with the law. A situation where the law was mistakenly believed to apply to particular information, or where the legally mandated protection was not properly carried out, would not be considered to have "real" valuation in our sense of the term.

If the motivation is embarrassment, then categorizing the secret as having "real" value indicates that the secret is in fact not known by others, and is of a nature that it would cause a change in the social dynamics were it to be revealed. In general terms, the exposure of a secret with "real" value will have"an effect at least somewhat correlated to what was expected by the secret-keeper. There is a value to the secret, though the results of revealing it may not be of exactly the form or magnitude anticipated by the secret-keeper.

Illusory Value

A secret with illusory value is one where there is a markedly inaccurate valuation assumption made by either the secret-keeper or those on the outside attempting to derive or reveal the secret. A classic example might be the Geraldo Rivera television special where, on live television, Mr. Rivera presided over the opening of "Al Capone's secret vault." The vault in question was a bricked off area in the basement of a hotel in Chicago that had once been the headquarters of the notorious gangster Al Capone. Mr. Rivera became aware of the existence of the vault, and through a series of mistaken assumptions came to the erroneous conclusions that (A) the vault was "secret"; ([Image: cool.gif] it contained items put there by Al Capone; © it had been subsequently bricked over by Capone, or at his direction; and (D) it had not been opened since. In fact, the "vault" is now generally presumed to have been a coal bin of a type common to commercial buildings in Chicago of similar vintage. If this assumption is accurate, it is likely that the bin was bricked off not by Al Capone's gang, but by the owners of the building when the coal-fired furnace was upgraded. In this case, there was no "secret" to be found - only the illusion of a secret, pursued by the sadly mistaken Mr. Rivera.

Another example might be the substance abuser who, for fear of embarrassment, job repercussions, or other social stigma, keeps his addiction hidden. When it is at last revealed, the addict may discover that the response is not the vilification he expected, and that his "secret" was, in fact, already widely known to others, possibly even before he himself was aware of it. In this case, the "secret" had value that was illusory on two grounds - it was not at all well mapped to the reality of the consequences of revelation, and it was not even a secret at all.

It should also be clear that it is possible for a secret to be illusory in multiple ways. In such cases, both the keeper and those trying to find out the secret may be acting out their respective roles based on inaccurate assessments of what the secret is, the fact that it is (or isn't) a secret, and the value of it.

Irrelevant Secrets

Irrelevant secrets are, as the name implies, secrets that nobody really cares about for their value. Examples might be the secret handshakes, costumes, and rituals of fraternal organizations, or the "secret sauce" (usually either Thousand Island salad dressing or some combination of two or more common condiments) touted by fast food restaurants. These are the secrets that one keeps not for what they are, but for the air of mystery, the sense of fun, or the fellowship surrounding the act of keeping the secret. There is ample room for overlap between the irrelevant and illusory valuation categories. It is entirely possible for either party (the keeper or the one excluded from knowing the secret) to deem a given secret irrelevant, while the other party continues to behave as though it is a secret with real value, as noted above.

Derivation of Secrecy

The next overlay, after motivation and valuation, is the derivation of secrecy. This categorization deals with how a secret becomes a secret. There are two options that are immediately apparent, and while others may exist, it is unclear at this time what they might be. The two categories are discretionary and mandatory secrets. The terminology is chosen for the rough analogy to discretionary and mandatory access control, which is a familiar concept in computer security, but better or more precise terminology may be substituted at a later date to prevent semantic overloading of these terms. Suggestions are welcomed.

Discretionary Secrets

A discretionary secret is found in a situation where there is a set of data items that are related, but the secret-keeper wishes to hide the relationship from the outsider. Another possible construct is where the total data set may not be known, but some subset may be safely revealed. In either case, as long as a sufficient number of the pieces of related information are kept secret, the adversary is denied the complete picture. A common means of protecting such data sets is to pick one or more data elements and keep them secret, while allowing others to be perused freely. This makes it easier to access and process the data, as only a subset of the total dataset is restricted in its usage and handling.

As an example, a record in a government or corporate database might contain a variety of fields pertaining to an individual - name, home address, phone number, social security number, gross annual income, marital status, race, etc. It might be desirable to allow public use of some of the data for statistical analysis reasons, while still keeping other data confidential. In these cases, it may be the secret-keeper's discretion (thus the name) as to which of the fields to reveal, and which to keep secret. It may not matter functionally, for example, if the name or the salary is kept secret, as long as the result is that a particular name/salary combination is not revealed.

Either-or, pick and choose, but the danger remains. If multiple parties are attempting to manipulate the same data, there is a good chance that they will not make the same choices. The result in such cases is that a clever adversary may structure her queries to infer the relationships over the whole that the individual subsystems are attempting to keep secret, barring adequate coordination of their protection efforts.

Mandatory Secrets

Mandatory secrets allow no discretion. It may be that the mandatory secret is, in itself, a unitary item of such value that it must be kept secret, even if there is no contextual linkage to any other information. Alternatively, mandatory secrets may be the result of a comprehensive and cohesive approach to prior discretionary secrets. As an example of the latter case, let us imagine a system made up of multiple subsystems, each of which starts with multiple data fields that are treated as discretionary secrets. Let us further assume that the secret-keeper in charge of the first subsystem makes choices about which data fields to keep secrets. Then the next subsystem secret-keeper makes further choices, and so on. At some point, there may be a situation where the choices made by prior subsystem secret-keepers will have limited the possibilities such that subsequent secret-keepers will be faced with mandatory secrets, rather than discretionary ones. The possible permutations will have been constrained in such a way that some fields must not be revealed, lest an adversary be able to infer or deduce the linkages between fields that are desired to be kept secret.

Whether a secret is mandatory due to its intrinsic nature, or due to its relationships to other data items and their respective openness or secrecy, the effect is the same. The stage has been set such that the revelation of a particular piece of information will logically complete the conditions required to allow or cause the predicted harm to occur. The nature and accuracy of the prediction of harm due to revelation are the subjects of the prior categorizations.

The essence of mandatory secrets is that there is no choice, for whatever reason. You do not get to take your pick of what item to focus on, and you do not get to pick whether or not to keep the particular item secret. The keeping of the specific data item as a secret is mandatory, or the penalty conditions will be satisfied.

The Perceived Nature of Secrets

The last categorization overlay or dimension that we will discuss is the way in which the secret is perceived and understood. While the previous categorizations dealt with why the secrets became secrets, their relative value to various parties, and the ways in which the secrecy might be allocated, this categorization deals with the essential being of the secret itself.

These categorizations may be more open to interpretation than those previous, and are inherently fuzzy. One could start all manner of philosophical debate over this segment of the paper, but it is included because of the importance we humans attach to these aspects of secrets, despite our frustration at the lack of precision. The three categories we have come up with are factual secrets, perceptual secrets, and attribution secrets.

Factual Secrets

Factual secrets are more or less discretely discernable and objective. Examples might be formulas, algorithms, laws of nature, and objective truths. These are the sorts of secrets that are demonstrably the "right" (or wrong) answer to a particular question. Even in areas where the measurement is imprecise, a factual secret is one where the application of the secret is not in doubt. In the story of the lady and the tiger, a man is given a choice between two doors. One holds a lady, the other a deadly tiger. If the man were told the "secret," that a lion was behind the right hand door, he probably would not quibble about the lack of zoological accuracy about the specific genus and species of carnivorous feline, as long as the location of said feline was conveyed accurately. And if the gentleman were smart, he would find no fault with the lady, whatever her qualities, given the alternative! In either case, the secret is factual and may be verified. There is no opinion involved - it's a lady or a tiger.

Perceptual Secrets

Perceptual secrets are those that are less objective. They are subject to interpretation, based on context, supposition, or the individual thought process of the secret-keeper or the secret-obtainer. If factual secrets are by their nature tolerant of some minor imprecision, perceptual secrets reside almost entirely in the realm of speculation and interpretation. A perceptual secret is seldom the answer in isolation, but is rather a part of a larger framework that may lead one to discernment.

For example, let us presume that a general in a given country holds a secret - he thinks the dictator is an obnoxious idiot. Let us then presume that a foreign government finds out this secret. The exact implications of the secret are still somewhat nebulous. If the general thinks the dictator is an obnoxious idiot, does that mean that the general is amenable to being disloyal and perhaps becoming the leader of a coup? Or does the general believe that his personal self-interest may be best served by staying loyal to a man who he finds personally loathsome? Knowing the fact of the general's loathing does not tell us - the fact is open to interpretation.

As extreme examples, mathematical secrets are likely to be factual, while religious secrets are almost certain to be perceptual by the intent of these categorizations. It is possible to ask a question, to which a perceptual secret is a factual answer, such as "Question: What does General X think of President Y? Answer: General X thinks President Y is an obnoxious idiot" in the example above. That said, it is ,the interpretation of the importance and context of that factual component of a perceptual secret that is of interest, more than the factual formulation.

Attribution Secrets

Attribution secrets are the basis of many a plot twist in bad novels and farce comedy movies. These are the secrets where the actual secret is of little importance compared to the knowledge of who knows it. These secrets are the foundation of chains of reasoning along the lines "I know that he knows that she knows that Fred doesn't know, but she knows that I know; therefore, I will hide the jewels in Clyde's suitcase, and throw them all off!"

Much of game theory ties in to the conundrums presented by attribution secrets, because if we can know what the other knows, we can often predict his behavior, regardless of whether the data he is basing his decisions on are correct or not. Attribution secrets may also be perceptual or factual, making this a somewhat messy genre for taxonomy purposes. That said, the problem of attributable secrets is of sufficient interest to warrant a place somewhere, and this is where we've stuck it for now. Let the formalists amend our structure as necessary in the future.

So, Why Should We Care?

From the discussion so far, we can see that we've got a few problems in our traditional approach. In the past the computer security community has attempted to develop mechanisms and models of security based on some assumptions that, unfortunately, do not hold true in all circumstances.

The first common assumption is that the quality of being secret is a largely static attribute that has a unitary value - something is a secret of a particular level, at a given moment in time, or it is not. Changes in the secrecy of a particular piece of information are few, and very infrequent, if they are allowed at all by the system.

The second assumption is that secrecy is an abstract quality which can be defined in the absence of context or relationships.

The third is that all secrets are secrets because of their intrinsic value, rather than due to any other cause, or for any other purpose.

Based on these assumptions, we in the security community have constructed very structured ways of dealing with secrets based on mathematical rigor and automated precision. By doing so, we have attempted to distill the inherently messy illogic of human beings into something which may be predictably repeated in a deterministic fashion in silicon. All the sociological factors are of necessity approximated away in the reduction. There are many situations where this is an appropriate strategy. There are contexts (particularly in hierarchically structured organizations) where the functional model of secrets is such that the mathematical structure maps perfectly to the actual behavior of the users of the system in that context. As an example, if one asks whether an "AI" system (using the TCSEC rating scale) was a useful thing, many will say that it was too limiting, and no useful work could be done with it. Others will counter that "AI" machines worked fine, and cite places where such systems were used to great effect. How can both be right?

The difference is not that the mathematical rigor went away, or failed in one usage but not in another. It is that in one instance, the model was appropriate to the context in which the system was used. The human system operated under the same assumptions as the digital system in that context. There was no conflict between how the human understood the problem at hand and viewed the elements of the problem, and how the machine behaved to support the human. In the other context, the model perhaps did not map to the needs of the humans. It is not that the humans didn't have 'secrets to protect, it is that the context in which the humans dealt with those secrets followed different rules, or changed the rules out of synch with the computing system. The mismatch caused more perceived harm than the perceived value of the rigor imposed by the system.

To further complicate matters, we have not even begun to map all the nonintuitive aspects of the rough taxonomy presented here into a model that can be elegantly automated or mathematically described. One can make the case that even in situations where the secret being kept has no intrinsic value, there is still a need to keep it. This is true, but the nondeterministic nature of some of the reasons that humans keep secrets makes this task particularly difficult, as the existence and importance of secrets may fluctuate in relation to context, in ways that we have not yet begun to formalize.

What is missing is the understanding that there might be a different approach to be taken. There is no absolute rule that all problems dealing with secrets must be mapped to, and solved in, the digital domain. There are some types of secrets in the taxonomy above that may defy any attempt at such logical expression. By examining a particular problem with due consideration to both the taxonomy and the discussion above, we may find there is another way. Our efforts might, in some cases, be better applied to understanding the motivations and dynamics that are creating the secrets in the first place, with an eye toward coming up with a system that better maps to the human processes and behavioral tendencies.

We may find that by shifting the structures, rules, and value systems in human space, we have fewer secrets to deal with. We may find that we can alter the human-space systems to clarify the context and valuation of secrets, and put them into a form more amenable to elegant automation. We must get back to the notion that, in dealing with secrets, the human/automation construct works better if the whole system is adapted to the behaviors, values, and motivations of the humans. We must stop expecting the humans to adapt to a model of secrets and behavior formulated for the ease of the digital designer.

It is not our position, however, that automation and mathematical rigor are of no value. We merely assert that such rigor must be in the service of the humans, and not an end in and of itself. It must support, not oppose, the needs and desires of the users. If the human system is inconsistent, security professionals may identify the problems and offer assistance in removing the ambiguities. The rigor and formalism of the field may be used as a tool to help the humans come up with systems that are both acceptable to the users and internally consistent. Ultimately, though, the revised system must be acceptable to the humans or they will actively subvert the system.

Conclusions

We have laid out a very rough, multidimensional taxonomy of secrets, focusing on their nature and origins. We have proposed that this taxonomy will give security practitioners a framework that can be used in understanding human behavior in relation to secrets, which may vary noticeably from the common assumptions. It is the author's hope that this paper might lead those in the security community to further explore all the aspects of human behavior surrounding the motivations, creation, valuation, and handling of secrets. By doing so, we may gain more insight into how to make secure systems that actually meet the needs of the illogical, nondeterministic, oddly programmed system components known as "users."


http://cryptome.org/0003/secrets-taxonomy.htm
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#46
CIA, Mossad and Soros Behind Wikileaks

Posted: July 28, 2010 by Truth RSS in Alternative News, Cointelpro
Tags: CIA, Cointelpro, Cyber-Warfare, Espionage, Julian Assange, Mossad, Suveillance, Wikileaks
5
Suspicions abound that Wikileaks is part of U.S. cyber-warfare operations
[Image: cyber-warfare.jpg?w=500&h=302]
WMR has learned from Asian intelligence sources that there is a strong belief in some Asian countries, particularly China and Thailand, that the website Wikileaks, which purports to publish classified and sensitive documents while guaranteeing anonymity to the providers, is linked to U.S. cyber-warfare and computer espionage operations, as well as to Mossad’s own cyber-warfare activities.
Wikileaks claims to have decrypted video footage of a U.S. Predator air strike on civilians in Afghanistan and that covert U.S. State Department agents followed Wikileaks’s editor from Iceland to Norway in a surveillance operation conducted jointly by the United States and Iceland. Iceland’s financially-strapped government recently announced a policy of becoming a haven for websites that fear political oppression and censorship in their home countries. However, in the case of Wikileaks, countries like China and Thailand are suspicious of the websites’ actual “ownership.”
Wikileaks says it intends to show its video at an April 5 press conference at the National Press Club in Washington, DC but that its presenters may be detained or arrested before that time. WMR’s sources believe the Wikileaks “militancy” in the face of supposed surveillance appears fake.
Our Asian intelligence sources report the following: “Wikileaks is running a disinformation campaign, crying persecution by U.S. intelligence- when it is U.S. intelligence itself. Its [Wikileaks'] activities in Iceland are totally suspect.” Wikileaks claims it is the victim of a new COINTELPRO [Counter Intelligence Program] operation directed by the Pentagon and various U.S. intelligence agencies. WMR’s sources believe that it is Wikileaks that is part and parcel of a cyber-COINTELPRO campaign, such as that proposed by President Obama’s “information czar,” Dr. Cass Sunstein.
In January 2007, John Young, who runs Cryptome, a site that publishes a wealth of sensitive and classified information, left Wikileaks, claiming the operation was a CIA front. Young also published some 150 email messages sent by Wikileaks activists on cryptome. They include a disparaging comment about this editor by Wikileaks co-founder Dr. Julian Assange of Australia. Assange lists as one of his professions “hacker.” His German co-founder of Wikileaks uses a pseudonym, “Daniel Schmitt.”
Wikileaks claims it is “a multi-jurisdictional organization to protect internal dissidents, whistleblowers, journalists and bloggers who face legal or other threats related to publishing” [whose] primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we are of assistance to people of all nations who wish to reveal unethical behavior in their governments and corporations. We aim for maximum political impact. We have received over 1.2 million documents so far from dissident communities and anonymous sources.”
In China, Wikileaks is suspected of having Mossad connections. It is pointed out that its first “leak” was from an Al Shabbab “insider” in Somalia. Al Shabbab is the Muslim insurgent group that the neocons have linked to “Al Qaeda.”
Asian intelligence sources also point out that Assange’s “PhD” is from Moffett University, an on-line diploma mill and that while he is said to hail from Nairobi, Kenya, he actually in from Australia where his exploits have included computer hacking and software piracy.
WMR has confirmed Young’s contention that Wikileaks is a CIA front operation. Wikileaks is intimately involved in a $20 million CIA operation that U.S.-based Chinese dissidents that hack into computers in China. Some of the Chinese hackers route special hacking program through Chinese computers that then target U.S. government and military computer systems. After this hacking is accomplished, the U.S. government announces through friendly media outlets that U.S. computers have been subjected to a Chinese cyber-attack. The “threat” increases an already-bloated cyber-defense and offense budget and plays into the fears of the American public and businesses that heavily rely on information technology.
It is also pointed out that on Wikileaks advisory board is Ben Laurie, a one-time programmer and Internet security expert for Google, which recently signed a cooperative agreement with the U.S. National Security Agency (NSA) and has been charged by China with being part of a U.S. cyber-espionage campaign against China. Other Wikileaks advisory members are leading Chinese dissidents, including Wan Dan, who won the 1998 National Endowment for Democracy (NED) Democracy Award; Wang Youcai, founder of the Chinese Democracy Party; Xiao Qiang, the director of the China Internet Project at the University of California at Berkeley, member of the advisory board of the International Campaign for Tibet, and commentator on the George Soros-affiliated Radio Free Asia; and Tibetan exile and activist Tashi Namgyal Khamsitsang.
Our sources in Asia believe that Wikileaks ran afoul of their CIA paymasters after it was discovered that some of Wikileaks’s “take” was being diverted to Mossad instead of to their benefactors at Langley. After a CIA cur-off in funding, “Daniel Schmitt” took over and moved the Wikileaks operation to Belgium and Sweden with hopes of making a more secure base in Iceland.
There are strong suspicions that Wikileaks is yet another Soros-funded “false flag” operation on the left side of the political spectrum. WMR has learned that after former Senator Norm Coleman (R-MN) decided to oppose Soros’s choice of UN Secretary General Kofi Annan’s deputy Mark Malloch Brown as President of the World Bank, succeeding the disgraced Paul Wolfowitz, Soros put the Wikileaks operation into high gear. “Daniel Schmitt” hacked into Coleman’s supporters list, stealing credit card info, addresses, and publishing the “take” on Wikileaks. Democrat Al Franken, who was strongly backed by Soros, defeated Coleman in a legally-contested and very close election.
It is also believed by informed sources that Soros is behind the operation to move Wikileaks to Iceland. By becoming a power in Iceland, Soros can prevent Icelanders from paying back the British and Dutch investors in Icelandic online Ponzi scheme banking and continue his all-out war against British Prime Minister Gordon Brown, who has, in turn, targeted Soros for betting against pound sterling.
Iceland is classic prey for Soros. The Icelandic krona has been decimated as a currency and has no where to go but up in value, especially if the British pound and the euro depreciate. Soros is currently talking down the euro, planning its fall and shorting it, just like he did versus the pound in London in the 1980s. After the UK’s and Europe’s currencies are devalued, Soros will buy every Euro note in sight, thus making trillions.
Soros and his Wikileaks friends have in Iceland a practically unregulated banking system desperate for an influx of capital — money that will come from the exiled Russian tycoons in Israel, London and the United States. Israeli investors like Bank Leumi, and awash in siphoned-off Bernard Madoff cash, will do their bit for this smash-and-grab operation by Soros’s Quantum-linked hedge funds.
With Wikileaks firmly ensconced in Iceland, the “brave” and much-heralded information leakers will run an international blackmail operation against Soros’s foes and launch computer break-ins against Soros’s business rivals and non-Quantum banks. Wikileaks will be used as the info-hitmen against President Obama’s and Rahm Emanuel’s enemies in the 2012 re-election campaign.
From Iceland, Soros will be well-positioned to gain control over the massive mineral resources under the melting ice sheet of Greenland. Under the ice are the only major rare-earth deposits outside of China and with such minerals at his disposal, Soros can control the world’s electronics industries. This past week’s volcanic activity in Iceland could, however, disrupt or destroy Soros’s plans to establish and control a North American-European gateway in Iceland.
The following are some of the emails Young revealed in his exposure of Wikileaks’s CIA connections (as well as to the Russian “phishing” Mafia, an operation run by Russian-Israeli Jews using Israel as a base) [Note: in the second email, "JYA" is a reference to John Young Associates]:
To: John Young
From: Wikileaks
Subject: martha stuart pgp
Date: Sun, 7 Jan 2007 12:20:25 -0500
—–BEGIN PGP MESSAGE—–
Version: None
J. We are going to fuck them all. Chinese mostly, but not entirely a feint. Invention abounds. Lies, twists and distorts everywhere needed for protection. Hackers monitor Chinese and other intel as they burrow into their targets, when they pull, so do we.
Inxhaustible supply of material. Near 100,000 documents/emails a day. We’re going to crack the world open and let it flower into something new. If fleecing the CIA will assist us, then fleece we will. We have pullbacks from NED, CFR, Freedomhouse and other CIA teats. We have all of pre 2005 afghanistan. Almost all of india fed. Half a dozen foreign ministries. Dozens of political parties and consulates, worldbank, apec, UN sections, trade groups, tibet and fulan dafa associations and… russian phishing mafia who pull data everywhere. We’re drowing. We don’t even know a tenth of what we have or who it belongs to. We stopped storing it at 1Tb.
——————————————-
From: Julian Assange
Date: Mon, 8 Jan 2007 13:40:14 +0000
To: funtimesahead[a t]lists.riseup.net
Subject: [WL] cryptome disclosure
[This is a restricted internal development mailinglist for w-i-k-i-l-e-a-k-s-.-o-r-g. Please do not mention that word directly in these discussions; refer instead to 'WL'. This list is housed at riseup.net, an activist collective in Seattle with an established lawyer and plenty of backbone.]
No idea what JYA was saying!
It’s clear to me however, that he was not trying to protect people’s identities with his xxxxx’ing, but rather trying to increase the sexiness of the document. Perhaps he feels WL is a threat to the central status mechanism in his life? I think he just likes the controversy.
He may have done us a great favor. There’s a lot of movement in that document. It’s a little anarchist, but I think it generally reads well and sounds like people doing something they care about.
Btw, I suggest we be careful with Wayne Madsen too. He seems to be another case of someone who was fantastic a few years ago, but recently has started to see conspiracies everywhere. Both cases possibly age related.
I am not spending any more thought on it. Next week is going to be busy. The weeks earlier stories will be already done and that’ll set the agenda for the rest of the week, not jya’s attention seeker.
I’m willing to handle calls for .au, although my background may make S a better bet.
————————–
By: Wayne Madsen
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#47
James H. Fetzer Wrote:http://www.maannews.net/eng/ViewDetails.aspx?ID=337152

Israel satisfied as WikiLeaks shows 'consistency' on Iran

Published today 15:54
Nice one Jim - Netanyahu looks and sounds smug. Hmmm
Peter Presland

".....there is something far worse than Nazism, and that is the hubris of the Anglo-American fraternities, whose routine is to incite indigenous monsters to war, and steer the pandemonium to further their imperial aims"
Guido Preparata. Preface to 'Conjuring Hitler'[size=12][size=12]
"Never believe anything until it has been officially denied"
Claud Cockburn

[/SIZE][/SIZE]
Reply
#48
Whatever Wayne Madsen is smoking, I want some... :bandit:

Soros is certainly a geopolitical player operating in his own, largely financial and pseudo-cultural, space.

However, a casual read of Madsen's piece excerpted in post #46 above makes Soros come over as a Goldfinger-meets-Fu-Manchu figure, part Crowleyian demon, part Freddie Krueger bogeyman.

In short, this is Soros as Dr Evil.

Quote:Soros and his Wikileaks friends have in Iceland a practically unregulated banking system desperate for an influx of capital — money that will come from the exiled Russian tycoons in Israel, London and the United States. Israeli investors like Bank Leumi, and awash in siphoned-off Bernard Madoff cash, will do their bit for this smash-and-grab operation by Soros’s Quantum-linked hedge funds.
With Wikileaks firmly ensconced in Iceland, the “brave” and much-heralded information leakers will run an international blackmail operation against Soros’s foes and launch computer break-ins against Soros’s business rivals and non-Quantum banks. Wikileaks will be used as the info-hitmen against President Obama’s and Rahm Emanuel’s enemies in the 2012 re-election campaign.
From Iceland, Soros will be well-positioned to gain control over the massive mineral resources under the melting ice sheet of Greenland. Under the ice are the only major rare-earth deposits outside of China and with such minerals at his disposal, Soros can control the world’s electronics industries. This past week’s volcanic activity in Iceland could, however, disrupt or destroy Soros’s plans to establish and control a North American-European gateway in Iceland.
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#49
http://www.commongroundcommonsense.org/f...pic=128037 (a thread in a parallel universe far, far away)
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply
#50
another view;

SECRECY NEWS
from the FAS Project on Government Secrecy
Volume 2010, Issue No. 94
November 29, 2010

Secrecy News Blog: http://www.fas.org/blog/secrecy/


** THE RACE TO FIX THE CLASSIFICATION SYSTEM


THE RACE TO FIX THE CLASSIFICATION SYSTEM

The massive disclosure of a quarter million diplomatic records by Wikileaks this weekend underscores the precarious state of the U.S. national security classification system.

The Wikileaks project seems to be, more than anything else, an assault on secrecy. If Wikileaks were most concerned about whistleblowing, it would focus on revealing corruption. If it were concerned with historical truth, it would emphasize the discovery of verifiably true facts. If it were anti-war, it would safeguard, not disrupt, the conduct of diplomatic communications. But instead, what Wikileaks has done is to publish a vast potpourri of records -- dazzling, revelatory, true, questionable, embarrassing, or routine -- whose only common feature is that they are classified or otherwise restricted.

This may be understood as a reaction to a real problem, namely the fact that by all accounts, the scope of government secrecy in the U.S. (not to mention other countries) has exceeded rational boundaries. Disabling secrecy in the name of transparency would be a sensible goal -- if it were true that all secrecy is wrong. But if there is a legitimate role for secrecy in military operations, in intelligence gathering or in diplomatic negotiations, as seems self-evident, then a different approach is called for.

Although it has rarely been front-page news, important progress has been made this year in shifting U.S. government secrecy policy away from its cold war roots, and promoting greater discernment and discrimination in the use of national security classification.

In May, the U.S. government formally disclosed the current size of the U.S. nuclear weapons arsenal for the first time (5,113 warheads as of September 30, 2009). Declassification of this information, which is integral to future arms control and disarmament efforts, had been sought -- and resisted -- for decades. That battle for public disclosure has now been won. Also this year, the Report of the Nuclear Posture Review, the basic statement of U.S. nuclear weapons policy, was produced and released in unclassified form for the first time.

In September, the Director of National Intelligence and the Secretary of Defense revealed the total intelligence budget ($80.1 billion in FY2010) as well as its "national" ($53.1 billion) and military ($27 billion) components. This is a more complete and detailed disclosure of U.S. intelligence spending than has ever been provided before. (An aggregate figure -- with no further breakdown -- was disclosed in 1997 and 1998.) It also represents a major policy reversal. Just a few years ago, intelligence community leaders swore under penalty of perjury that disclosure of this information would damage national security and compromise intelligence methods. Now annual intelligence budget disclosure is the new norm.

These are not cosmetic changes. They represent real discontinuities with past practice. Stockpile secrecy and intelligence budget secrecy have each been cornerstones of entire edifices of national security classification that will now be susceptible to change. And in each case their disclosure is the culmination and the successful fruition of years or even decades of advocacy, agitation and litigation by the Federation of American Scientists and other organizations and political leaders.

In fact, the deepest significance of these disclosures may lie in the fact that they demonstrate the feasibility of effective public advocacy in national security secrecy policy. If a half century of nuclear stockpile secrecy and intelligence budget secrecy can be overturned in favor of public disclosure, then citizens can confidently seek the release of many other, less deeply entrenched official secrets as well as a continuing reduction in the overall scope of the secrecy system.

Of course, efforts to reduce government secrecy have not been uniformly successful. For example, the Obama Administration's use of the state secrets privilege to derail litigation on sensitive national security topics is indistinguishable from that of the Bush Administration, despite a September 2009 policy change promising "greater accountability" and more limited use of the privilege. Moreover, it appears that the Obama Justice Department has failed to fulfill its own policy of referring to agency Inspectors General any legitimate cases against the government that could not be litigated because of the state secrets privilege. (We are still attempting to confirm and to document that this is indeed the case.) Nor has it offered any other alternative remedy to those who may have been wronged by U.S. government actions concealed by state secrets claims.

But even when the wheels of progress move slowly -- or slip into reverse -- proponents of greater openness are not helpless. At Secrecy News, we have tried to shine a spotlight on the mechanics of secrecy, and to provide our own almost daily disclosures of official documents of public policy value that are somehow restricted or otherwise hard to find. Not just because they are restricted, but because they are also of public policy value. Over the past year, Secrecy News produced unique coverage of numerous important secrecy stories. For example:

** Leaking classified information may be the right thing to do in certain circumstances, suggested district court Judge T.S. Ellis III at a 2009 hearing, "but you have to stand up and take the consequences." We obtained and released the previously unpublished transcript of that remarkable hearing last March. ("Judge: If You Leak Classified Info, Take the Consequences," March 22).

** We offered the most complete and in-depth reporting of the dispute between Congress and the executive branch over Government Accountability Office access to intelligence information. We provided related documentation including a 1988 Office of Legal Counsel opinion and a new Department of Defense directive on GAO access to highly classified DoD special access programs. In congressional testimony and public advocacy, we also argued in favor of an increased role for GAO in intelligence oversight. Despite a veto threat from the White House earlier this year, a favorable resolution of the matter now seems to be within reach. ("GAO Gains a Foothold in Intelligence Oversight," September 29).

** We maintained and expanded our online library of reports from the JASON defense science advisory board. Ours is the most complete public collection of these consistently interesting and influential studies.

** We obtained and published numerous unreleased reports from the DNI Open Source Center, such as a March 2010 report on Turkey's mysterious underground Ergenekon movement.

** We spent more time than we would have liked criticizing the Wikileaks organization, whose spectacular releases of large collections of classified documents continue to generate controversy. From our perspective, Wikileaks has been inattentive to the unintended consequences of its actions, careless about putting individuals in harm's way, particularly in the case of the Afghan war records, and ethically deficient in its invasions of personal privacy. (In its latest release, Wikileaks did redact some names of individuals and some other sensitive information.)

** With other like-minded organizations (and, in this case, a remarkably responsive White House), we helped prevent the creation of an ominous new information control system for so-called Controlled Unclassified Information. Instead of constituting a fourth level of classification, the new CUI marking should simply facilitate information sharing without providing authority for any new restrictions on information. ("A New Policy on Controlled Unclassified Info," November 4).

** We obtained and published a previously undisclosed 2009 report from the Intelligence Science Board on the virtues of non-coercive interrogation. We also reported that the DNI had disbanded the ISB this year.

** We published hundreds of Congressional Research Service reports that had not previously been made available to the public, and numerous other popular records from a three-volume description of the Soviet army to the U.S. Army's latest weapons system handbook to a speculative scientific paper on "interstellar archeology." And quite a bit more.

It's impossible to say whether the race to fix the classification system can be won through our kind of advocacy from the outside and by enlightened self-interest within government. Before that happens, classification itself could be rendered moot and ineffective by leaks, abuse or internal collapse. Or, in a reflexive response to continuing leaks, officials might seek to expand the scope of secrecy rather than focusing it narrowly, while increasing penalties for unauthorized disclosures.

But in the coming year, we see some promise in what is called the Fundamental Classification Guidance Review. This is a procedure (mandated in executive order 13526, section 1.9) for every agency that classifies information to seek out, identify and remove classification requirements that are no longer valid. In effect, it provides an opportunity and a mechanism for rewriting the "software" of the entire classification system. Though success is not guaranteed, we expect the Review to produce a measurable reduction in the scope of national security classification. We plan to monitor its progress as closely as we can.

Finally, we want to ask for your help. If you identify with our approach and you derive value from the work that we are doing, then we encourage you to help sustain it for another year with a tax-deductible contribution. Although we make our online resources freely available to everyone who wants them, we incur costs in collecting, analyzing, and publishing them as well as in our related advocacy activities. If you can help us with that, please do.

Donations can be made online here (select "Government Secrecy" in the drop-down menu to allocate your donation for the FAS Project on Government Secrecy). Donors who contribute $25 or more will automatically be enrolled as members of the Federation of American Scientists (unless you prefer not to be). Donations can also be made by sending a check made out to Federation of American Scientists and earmarked for Secrecy News to this address:

Attn: Secrecy News
Federation of American Scientists
1725 DeSales Street NW, Suite 600
Washington, DC 20036


_______________________________________________
Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.

The Secrecy News Blog is at:
http://www.fas.org/blog/secrecy/

To SUBSCRIBE to Secrecy News, go to:
http://www.fas.org/sgp/news/secrecy/subscribe.html
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Complete Wikileaks Data Dump Lauren Johnson 1 4,122 14-12-2021, 06:08 PM
Last Post: Lauren Johnson
  Wikileaks Next Series: Vault 7 Lauren Johnson 23 60,710 09-11-2017, 05:06 PM
Last Post: Lauren Johnson
  A Very Partial List of CIA Secret & Illegal Operations Peter Lemkin 0 8,444 07-11-2017, 05:50 AM
Last Post: Peter Lemkin
  American Libertarians [Neocons?] Are Remaking Latin American Politics Peter Lemkin 1 7,276 13-08-2017, 04:29 AM
Last Post: Peter Lemkin
  Once invisible government now visible Harry Dean 0 3,145 12-03-2017, 04:21 AM
Last Post: Harry Dean
  Canada's secret Nazis Magda Hassan 0 3,449 28-02-2017, 11:06 AM
Last Post: Magda Hassan
  The hidden forces guiding the US Government Ivan De Mey 1 3,896 06-12-2016, 08:59 AM
Last Post: David Guyatt
  Wikileaks promises new release of information on Hilary. Drew Phipps 21 27,238 19-10-2016, 06:06 AM
Last Post: Peter Lemkin
  Noam Chomsky and the Manufacturing of American Dissent: 2 videos Paul Rigby 83 52,250 10-06-2015, 02:24 PM
Last Post: Matthew Hewitt
  HSBC Bank : Secret Origins to 26/11 Mumbai Attacks Paul Rigby 2 4,495 21-02-2015, 10:56 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)