874 results on '"CLASSIFIED defense information"'
Search Results
2. International Hot Stories.
- Subjects
SECURITY classification (Government documents) ,CLASSIFIED defense information ,MILITARY supplies - Abstract
The article focuses on the U.S. Department of Defense (DoD) suffers worst classified document breach in years and leaked classified documents from DoD were posted on social media sites related to (U.S.) and NATO aid to Ukraine. It mentions e documents seem to contain details on the transfer of weapons and other military equipment being sent to Ukraine. It also mentions Department of Defense made a formal referral to the Department of Justice (DOJ) requesting an investigation.
- Published
- 2023
3. THE SECRET DOGFIGHT.
- Author
-
KINDY, DAVE
- Subjects
- *
NAVAL aviation , *MIG-15 (Jet fighter plane) , *KOREAN War, 1950-1953 , *CLASSIFIED defense information , *PANTHER (Jet fighter plane) - Abstract
The article discusses that Royce Williams, the Naval Aviator who became the only fighter pilot to shoot down four Soviet MiG-15s in one fight, during the Korean War. It mentions military secrecy and U.S. concerns over broadening the Korean conflict. It also mentions Williams was still in the Navy when the conflict in Korea broke out, and he received jet training and learned how to fly the F9F-5 Panther.
- Published
- 2023
4. COUNTERSPIN.
- Author
-
Durnbrooke, Newell
- Subjects
CLASSIFIED defense information ,TRANSBORDER data flow - Published
- 2024
5. The Copenhagen School in South America: the (de)securitization of UNASUR (2008-2017).
- Author
-
Antonio Sanahuja, José and Verdes-Montenegro Escánez, Francisco Javier
- Subjects
- *
ASSET backed financing , *WAR , *CRITICAL theory , *CLASSIFIED defense information - Abstract
This paper examines the most significant processes of securitization and desecuritization occurring at the Union of South American Nations (UNASUR) from its inception in 2008 until 2017, when UNASUR began to experience a gridlock. The analysis begins with the hypotheses of desecuritization of armed conflict among the South American countries, as well as their approach to problems drug-related. To this end, the paper is based on a critical theory of security with focus on securitization, and offers an expanded and/or discursive conception of security that goes beyond the military dimension. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
6. ELETTROCHIMICA D'ECCELLENZA IN ABRUZZO LE PRODUZIONI BELLICHE SPECIALI DEL POLO DI BUSSI, 1928-1943.
- Author
-
BENEGIAMO, MARCELLO and NARDONE, PAOLA
- Subjects
ELECTROCHEMISTRY ,CLASSIFIED defense information ,CHEMICAL weapons ,RAW materials ,CHLORATES ,ANTIKNOCK gasoline - Abstract
The paper analyzes the activity related to the production of weapons in the period between the end of the twenties and the early forties, in the electrochemical site of Bussi in Abruzzo. The Site was a strategic plant for the Italian government which productions were subjected to the strictest military secret. The plant was producing chemical weapons (phosgene and mustard gas) and super explosives such as the T4, the most powerful explosive in the world that together with the pentrite, always produced on site, were considered essential products for the defense of the Italian country. In particular, the T4 was produced for the first time in the plant with a process that was using only domestic raw materials, so an independent process that set Italy free from German imports. Additional military productions of interest of the Abruzzo's plant were the chlorate-based explosives for which it was initiated a completely new industrial cycle that boosted even further the capacities of Montecatini. Finally, in the paper we report the production of antiknock compound for fuels and the complex relationship between the Italian State (site of Bussi) the General Motor Chemical Company and the Du Pont de Nemours. [ABSTRACT FROM AUTHOR]
- Published
- 2021
7. The Common Operational Picture at the Company and Below.
- Author
-
GRUNING, NICK and MEIER, VANCE
- Subjects
CLASSIFIED defense information ,SPECIAL operations (Military science) ,INFORMATION resources management ,MILITARY education ,COMBAT patrols - Abstract
The author focuses on tool common operational picture (COP) which feeds commanders information to inform decision and mentions lack of emphasis on command post (CP) operations. Topics discussed include mismanaged information due to lack of competence, emphasis and training of military personnel, need of formalizing CP operation while conducting patrol base operations, and providing platoons courses on COP system and information management.
- Published
- 2021
8. Assessing How the U.S. Intelligence Community Analyzes Foreign Leaders.
- Author
-
Dyson, Stephen Benedict and Duelfer, Charles A.
- Subjects
INTELLIGENCE service ,CLASSIFIED defense information ,HEADS of state - Abstract
The article investigates the manner in which the U.S. intelligence community analyzes foreign leaders who have significant incentives to be deceptive. Topics discussed include a history of the practice of leader profiling since 1943 by the Office of Strategic Services, examination of declassified Central Intelligence Agency records, and main uses of leadership analyses, as well as useful sources of information for leader assessments.
- Published
- 2020
- Full Text
- View/download PDF
9. Leon Turrou and the Nazi spy ring in America.
- Author
-
Jeffreys-Jones, Rhodri
- Subjects
- *
NAZIS , *SPIES , *CLASSIFIED defense information - Published
- 2020
- Full Text
- View/download PDF
10. TRANSFORMATION TOWARDS A CIRCULAR ECONOMY IN THE POLISH ARMED FORCES.
- Author
-
JANIKOWSKI, Ryszard
- Subjects
ECONOMICS ,ARMED Forces ,CLASSIFIED defense information ,LOOPS (Group theory) - Abstract
Copyright of Economics & Environment / Ekonomia i Środowisko is the property of Fundacja Ekonomistow Srodowiska i Zasobow Naturalnych and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
11. Russian nuclear forces, 2006.
- Author
-
Norris, Robert S. and Kristensen, Hans M.
- Subjects
- *
NUCLEAR weapons , *NUCLEAR weapons information , *ORDNANCE , *CLASSIFIED defense information - Abstract
The article provides information on the Russian nuclear forces for 2006. The country continues to reduce its total nuclear forces in 2005, however, it plans for a new weapon systems and upgrades of existing one. Russian President Vladimir Putin attempts to reassert the country's nuclear strength and reinstate large-scale military exercises. Statistical data on the operational Russian strategic offensive weapons, nonstrategic and defensive weapons and projected strategic warheads from 2006 to 2015 are presented.
- Published
- 2006
- Full Text
- View/download PDF
12. TIMES PAST 1971: The Pentagon Papers: 50 Year Later.
- Author
-
BERGER, JOSEPH
- Subjects
FREEDOM of the press ,OFFICIAL secrets ,CLASSIFIED defense information ,LEAKS (Disclosure of information) ,ELECTRONIC information resources - Abstract
The article examines the challenge posed by the digital age to the landmark ruling in the Pentagon Papers case in 1971 that fortified the First Amendment's guarantee of freedom of the press. Topics discussed include a brief background of the First Amendment of the U.S. Constitution, the importance of a free press to democracy, and the threat posed by the Internet to government information.
- Published
- 2021
13. Embracing the Media: Eisenhower Worked With, Not Against, the Press.
- Author
-
Kingseed, Cole
- Subjects
- *
WORLD War II , *CLASSIFIED defense information , *MILITARY personnel , *COMBAT patrols - Abstract
The article discusses about Gen. Dwight Eisenhower during World War II address the public's right to know and the need for military secrecy. It further states that although he was well-versed in public relations, but initially he struggled to balance military secrecy with his civic duty to keep the public informed about soldiers at war. The period when combat operations were stopped and correspondents speculate on future operations was toughest phases that Eisenhower has to face.
- Published
- 2021
14. Does online anonymity undermine the sense of personal responsibility?
- Author
-
Jordan, Tim
- Subjects
- *
CYBERBULLYING , *CLASSIFIED defense information , *AMERICAN military personnel , *RESPONSIBILITY , *COMPUTER hacking - Abstract
This article begins by exploring the media visibility of anonymity online, in particular in relation to trolls and online bullying. It then explores anonymity in the case of Chelsea Manning who leaked US military secrets but only lost anonymity sometime after her leak was made public. This discussion explores issues of responsibility and the reasons for being anonymous. The article then briefly discusses anonymity based on the discussion of the Manning case in relation to the Snowden case, where Snowden refused anonymity, and the Pentagon Papers. The article concludes by pointing out that issues of responsibility in relation to anonymity remain similar whether digital or not, but that anonymity now exists in a context in which there is greater ability to share information between many more people, faster and with radically lowered costs of publishing than before. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
15. Concealing Collusion: The Suez Crisis, Political Memoirs and Official Secrecy, 1956–1969 *.
- Author
-
Moran, Christopher
- Subjects
- *
OFFICIAL secrets , *CLASSIFIED defense information , *SECRECY ,SUEZ Crisis, Egypt, 1956 - Abstract
The article examines how details of British Prime Minister Anthony Eden's secret accord with French and Israeli officials signed on October 24, 1956 to invade Egypt and seize the nationalized Suez Canal came to light in the following two decades despite opposition from officials. Topics covered include the efforts of Labour Members of Parliament to secure a Suez inquiry and official history, and arguments that emerged in the analysis, and the social underpinnings of secrecy in Britain.
- Published
- 2019
- Full Text
- View/download PDF
16. SECRET POLICIES.
- Author
-
Virelli III, Louis J. and Podgor, Ellen S.
- Subjects
TRANSPARENCY in government ,NATIONAL security ,IMMIGRANTS ,FALSE claims laws ,FREEDOM of Information Act (U.S.) ,CLASSIFIED defense information - Abstract
This Article examines secret agency policies. Clearly when the directives relate to military or national security matters, secrecy is essential. But should the public be viewers of the DACA Manual's guidance on when administrative relief will be provided to immigrants brought to the U.S. as children by their undocumented parents? What about the Department o f Justice policy related to the dismissal of False Claims Act cases or the written procedures that are used by Assistant United States Attorneys in providing criminal discovery to defense counsel? Written policies veiled in secrecy can be detrimental to achieving transparency and legitimacy in government. In focusing on these written internal policies that do not pertain to a specific legal matter, this Article looks beyond the Freedom of Information Act and its exemptions. It discusses the need to maintain an appropriate balance between government transparency and the need for some matters to be kept private, and the importance of agency expertise, accountability, and efficiency in determining a need for transparency. Factored into this equation are the ethical repercussions of secret policies when government employees leave the agency with inside information. [ABSTRACT FROM AUTHOR]
- Published
- 2019
17. Leaky Revelations: Commitments in Exposing Militarism.
- Author
-
Rappert, Brian
- Subjects
- *
MILITARISM , *LEAKS (Disclosure of information) , *CLASSIFIED defense information , *DATA security failures - Abstract
Contests over the control of information are central to the perpetuation and critique of militarism. This article examines one of the most prominent sets of state document leaks in recent political history: the online posting of hundreds of thousands of US war logs and diplomatic cables by WikiLeaks. Bold statements were advanced in 2010 and afterward regarding what these releases made visible. In contrast, this article considers how disclosure and nondisclosure came bundled together. With reference to the tensions of keeping secrets and producing transparency, I suggest that the promise attached to the released documents did not just derive from the argument that they revealed modern statecraft, nor that such knowledge was tantalizingly out of reach, but from the manner in which what had been rendered knowable could be revisited over time. Through this argument I want to explore the affective knots, conceptual tangles, and problematic story lines associated with exposing militarism. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. An ensemble learning approach to lip-based biometric verification, with a dynamic selection of classifiers.
- Author
-
Porwik, Piotr, Doroz, Rafal, and Wrobel, Krzysztof
- Subjects
- *
MACHINE learning , *ARTIFICIAL intelligence , *CLASSIFIED defense information , *INFORMATION storage & retrieval systems , *COEFFICIENTS (Statistics) - Abstract
Highlights • Ensemble classifier system is applied to biometric verification. • For each base classifier, the classifier's competence is separately calculated. • A lip geometrical features measurements are proposed. • Experiments confirmed our method outperforms other state-of-the-art methods. Abstract Machine learning approaches are largely focused on pattern or object classification, where a combination of several classifier systems can be integrated to help generate an optimal or suboptimal classification decision. Multiple classification systems have been extensively developed because a committee of classifiers, also known as an ensemble, can outperform the ensemble's individual members. In this paper, a classification method based on an ensemble of binary classifiers is proposed. Our strategy consists of two phases: (1) the competence of the base heterogeneous classifiers in a pool is determined, and (2) an ensemble is formed by combining those base classifiers with the greatest competences for the given input data. We have shown that the competence of the base classifiers can be successfully calculated even if the number of their learning examples was limited. Such a situation is particularly observed with biometric data. In this paper, we propose a new biometric data structure, the Sim coefficients, along with an efficient data processing technique involving a pool of competent classifiers chosen by dynamic selection. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. PERIODICALS AND MILITARY CENSORSHIP DURING THE FIRST WORLD WAR: MILITARY SECRETS AND THE FREEDOM OF INFORMATION PROBLEM.
- Author
-
Blokhin, Valery Fedorovich, Alferova, Irina Viktorovna, Ustinova, Julia Nikolaevna, and Fisher, Ekaterina Sergeevna
- Subjects
- *
WARTIME censorship , *CLASSIFIED defense information , *WORLD War I - Abstract
The article reveals some of the problems that arose between military censors and the media during the First World War. The article is written on the basis of the military censorship materials of the Supreme Commander headquarters of the Russian army, the censorship department of the Minsk military district and the materials of the periodical press. The authors conclude that the conflict was predetermined both by the imperfection of the censorship legislation, which provided an opportunity for the censors to evaluate the publications of newspapers and magazines at their own discretion, and by the censorship omissions of the media, which printed inaccurate news and placed information that the enemy could use. The result was ineffective military censorship and the failure of the press to fulfill its important mission: to contribute to the formation of public opinion in the rear in the interests of the state. [ABSTRACT FROM AUTHOR]
- Published
- 2019
20. A historian's view.
- Author
-
Hewlett, Richard G.
- Subjects
NUCLEAR energy policy ,SECURITY classification (Government documents) ,LEGISLATION ,NATIONAL security ,CLASSIFIED defense information ,DEBATE ,LAW reform - Abstract
The article discusses the concept of born classified as embodied and incorporated by the U.S. Atomic Energy Commission in 1946 for dissemination of classified information which continued till 1960. The move was largely spurred by an urgent need to regulate access to restricted data related to nuclear technology on account of security concerns. The act dealing with the regulation of restricted data was partly amended in December 1967 in response to criticism of an ambiguous definition of restricted data and to make the regulations commensurate with constitutional requirements. These changes were effective till the dissolution of the agency in 1975.
- Published
- 1981
- Full Text
- View/download PDF
21. Some reflections on The Progressive Case: publish and perish?
- Author
-
Tribe, Laurence H. and Remes, David H.
- Subjects
NUCLEAR weapons information ,CLASSIFIED defense information ,JOURNALISTS ,OFFICIAL secrets ,SECURITY classification (Government documents) ,WEAPONS of mass destruction ,UNITED States politics & government - Abstract
The article presents information about the Pentagon Papers case in which the U.S. government tried and failed to subdue publication of a classified, top-secret government history of the Vietnam war. In 1978, Howard Morlland, a journalist with one published article to his credit, with no scientific training, after just six months of research, the basic design concepts and various design features of U.S. thermonuclear weapons. Morland was convinced that what he had so easily deciphered could not be considered secret knowledge and thus he could not spell the difference between thermonuclear proliferation and the thermonuclear status quo.
- Published
- 1980
- Full Text
- View/download PDF
22. 3 Julian Assange.
- Author
-
Gellman, Barton and Harrell, Eben
- Subjects
LEAKS (Disclosure of information) ,CLASSIFIED defense information ,21ST century international relations ,TRANSPARENCY in government ,CYBERPUNK culture - Abstract
The article discusses the release of thousands of classified U.S. government documents by the website WikiLeaks, subsequent attacks on the website, and charges of sexual misconduct filed against WikiLeaks founder Julian Assange. The large quantity of information involved, and its dissemination across the internet, are described as unprecedented. Assange is said to represent a subset of computer hacker culture known as cypherpunk. A discussion of whether WikiLeaks will help to increase government transparency, or sabotage efforts at diplomacy is included.
- Published
- 2010
23. Some secret military programs are getting a little less secret.
- Author
-
Williams, Lauren C.
- Subjects
MILITARY readiness ,MILITARY policy ,DEFENSE procurement ,CLASSIFIED defense information ,ARMED Forces - Abstract
The Pentagon has signed a memo to make certain space-related programs and activities less secret in order to improve collaboration and daily operations. The classified document, signed at the end of 2023, updates decades-old internal guidance and establishes minimum classifications for various programs. The goal is to potentially downgrade some special access programs to top secret, which would facilitate communication and information sharing with allies and partners. The Pentagon has been working to address overclassification and improve access to classified data for contractors. [Extracted from the article]
- Published
- 2024
24. Beyond Atomic Stalemate.
- Author
-
Meier, R. L.
- Subjects
NUCLEAR weapons (International law) ,BALANCE of power ,NUCLEAR arms control ,NUCLEAR crisis stability ,STRATEGIC forces ,INTERNATIONAL relations ,DETERRENCE (Military strategy) ,POWER (Social sciences) ,MILITARY policy ,NATIONAL security ,CLASSIFIED defense information - Abstract
The article discusses the possible consequences on the continuance of inventing nuclear weapons by the superpower nations. Each of this nation's aim focuses on national security. The system of thinking based on security through military dominance has been their core strategy in achieving world peace. However, this mode of analysis is becoming obsolete and is far more positively dangerous in that it will bring about catastrophic damages to the humanity. At a certain point, where tests of thermonuclear weapons in the Pacific and Siberia dramatized this transition. Understandably, accidents and misunderstandings are always a possibility should this misadventure continues, thus, the term stalemate.
- Published
- 1956
- Full Text
- View/download PDF
25. Atomic Weapons and American Policy.
- Author
-
Oppenheimer, J. Robert
- Subjects
NUCLEAR weapons ,GOVERNMENT policy ,NUCLEAR weapons information ,AMERICAN nuclear weapons information ,WEAPONS of mass destruction ,CLASSIFIED defense information ,MILITARY weapons ,CIVIL defense - Abstract
The article offers insights on the nuclear weapons policy in United States. It is a popular knowledge that nuclear weapons were incorporated by the government in the plans for the defense of Europe. They were developed for many tactical military uses such as on anti-submarine campaign, air campaign and ground campaign. According to the author, there are three reforms which the U.S. government should consider concerning its nuclear policies. The first action concerns the need of the U.S. government to be open to its officials, representatives and people regarding nuclear-related information. The second one concerns the need of the government to be open to its major allies regarding its nuclear technology and the last one, concerns the improvement of civil defense.
- Published
- 1953
- Full Text
- View/download PDF
26. KEEPING SECRETS.
- Author
-
Schmitt, Christopher H. and Pound, Edward T.
- Subjects
- *
SECRECY , *CONFIDENTIAL communications , *OFFICIAL secrets , *DISCLOSURE , *FEDERAL government , *SECURITY classification (Government documents) , *GOVERNMENT information , *DEPORTATION , *IMMIGRATION law , *EXECUTIVE power , *CLASSIFIED defense information , *COURTS , *ELECTRONIC surveillance , *INTELLIGENCE service ,UNITED States politics & government, 2001-2009 - Abstract
Examines the U.S. President George W. Bush administration's secrecy policies concerning many critical operations of the federal government. Reversal of a decades-long trend of government openness; Examples, including secret deportation of immigrants suspected as terrorists; Contention that the administration's efforts to shield the executive branch are more extensive than previously documented; How the government has withheld business and consumer information, and health and safety information; Policies that thwart Congress' ability to monitor the executive branch; Classification of records; How the White House has resisted efforts to disclose information; Government pressure on courts to impose more secrecy; Surveillance.
- Published
- 2003
27. THE LONG WAY HOME.
- Author
-
Duffy, Michael, Harbert, Nancy, Jackson, David S., Calabresi, Massimo, Novak, Viveca, and Shannon, Elaine
- Subjects
NUCLEAR weapons ,PLEA bargaining ,CLASSIFIED defense information ,ACTIONS & defenses (Law) - Abstract
Discusses the United States government trial against nuclear scientist Wen Ho Lee. Allegations that he downloaded classified data about US nuclear weapons programs; Purpose of the trial to ascertain what happened to discs on which the information was copied; Dismissal of most of the charges against Lee as part of a plea bargain; Opinion that the government could have obtained the information without a long trial. INSET: THE STORY WITHIN THE STORY, by Jodie Morse, Jay Branegan, et al.
- Published
- 2000
28. Open Secret.
- Author
-
Klaidman, Daniel, Liu, Melinda, Barry, John, Stone, Brad, and Hammer, Joshua
- Subjects
- *
AMERICAN nuclear weapons information , *CLASSIFIED defense information , *INTERNATIONAL relations ,FOREIGN relations of the United States - Abstract
Discusses allegations that Taiwanese-born Los Alamos National Laboratory scientist Wen Ho Lee passed classified nuclear weapons information to the Chinese. Politicization of the story; Possibility that Lee, and espionage, were not involved; Chinese, and other foreign nationals', study of science in the United States; Impact of the story on relations between the US and China; Investigation of the allegations. INSET: Mystery in the Desert.
- Published
- 1999
29. Featured Country.
- Author
-
Coleman, Denise Youngblood
- Subjects
SECURITY classification (Government documents) ,CLASSIFIED defense information ,MILITARY supplies - Abstract
The article focuses on the U.S. Department of Defense (DoD) suffers worst classified document breach in years and leaked classified documents from DoD were posted on social media sites related to (U.S.) and NATO aid to Ukraine. It mentions e documents seem to contain details on the transfer of weapons and other military equipment being sent to Ukraine. It also mentions Department of Defense made a formal referral to the Department of Justice Department (DOJ) requesting an investigation.
- Published
- 2023
30. The Russian Peasant at the Front during the First World War.
- Author
-
Astashov, Aleksandr Borisovich
- Subjects
- *
WORLD War I , *PEASANTS , *MILITARY personnel , *CLASSIFIED defense information ,WORLD War I campaigns - Abstract
The main factor undermining the Russian army during World War I was not revolutionary propaganda but the predominance of peasants among the soldiers. The underlying peasant mindset, which persisted despite orders from above, led to fraternization with the enemy, the unintentional revelation of military secrets, and the development of views on internal and external enemies that contributed to military defeat and revolutionary upheavals. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
31. Recovering the military Enigma using permutations—filling in the details of Rejewski's solution.
- Author
-
Vázquez, Manuel and Jiménez–Seral, Paz
- Subjects
- *
ENIGMA cipher system , *CLASSIFIED defense information - Abstract
During the last few months of 1932, the Polish mathematician Marian Rejewski solved the problem of finding the internal connections of the rotors and reflector of the Enigma cipher machine used by the German army at that time. This allowed the Polish Cipher Bureau to construct an analogue of the machine, and subsequently to find effective methods for deciphering secret messages. Rejewski performed this feat virtually alone using cryptographic material provided by the Polish secret services. His knowledge of the theory of permutation groups was essential in solving this problem. This article describes in detail how to find the complete wiring of the rotors and reflector of Enigma, as well as other specifics, using data that Rejewski had at his disposal, by systematically presenting the resolution of all cases that could have been encountered. Similarly, we complete those stages of the procedure that were only outlined by Rejewski. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. German Secrets by the Thousands.
- Author
-
Walker, Charles Lester
- Subjects
CLASSIFIED defense information ,WEAVING equipment - Published
- 2019
33. Nukes you can use.
- Author
-
Schwartz, Stephen I.
- Subjects
- *
MILITARY policy , *NUCLEAR weapons , *CLASSIFIED defense information - Abstract
Comments on the Nuclear Posture Review, a congressionally ordered assessment of current and future plans for the U.S. nuclear arsenal from the administration of U.S. President George W. Bush. Position on nuclear war planning system; Details on the concept of adaptive planning; Views on the idea regarding the effectiveness of a nuclear weapon.
- Published
- 2002
- Full Text
- View/download PDF
34. Top-Secret Mania.
- Author
-
Stevens, Leonard A.
- Subjects
TELESCOPES ,CLASSIFIED defense information ,PATENTS ,SCIENTISTS ,INTELLECTUAL property - Abstract
The article presents information on U.S. military secret. A Minneapolis scientist applied in Washington for a patent on an earth-orbiting telescope. The U.S. Patent Office responded by notifying the Minnesotan that his telescope had just been classified a U.S. military secret by a group of defense officials who had reviewed his plans. The news startled the scientist: he had recently returned from Stockholm where a large international conference, including eight Russian scientists, had heard him explain the device. The telescope remained a "military secret" for next few months and no U.S. citizen, including the inventor, could speak of it without risking a $10,000 fine or two years in prison.
- Published
- 1963
35. Pentagon Papers: The Secret War.
- Subjects
OFFICIAL secrets ,CLASSIFIED defense information ,LEAKS (Disclosure of information) ,DEPLOYMENT (Military strategy) - Abstract
The article presents information on a war that resulted due to the massive leak of secret documents in U.S. history. Daniel Ellsberg, a former Pentagon analyst, was reportedly so concerned about his involvement in the Vietnam tragedy that he had conveyed about 40 volumes of an extraordinary Pentagon history of the war to a newspaper. This included 4,000 pages of top secret documents. The first U.S. ground troops were deployed in South Vietnam during the spring of 1965.
- Published
- 1971
36. Problem: How to Make Jet Engines Quieter.
- Subjects
JET plane noise ,ACOUSTICAL engineering conferences ,CLASSIFIED defense information ,AIRCRAFT industry ,NOISE pollution ,PREVENTION - Abstract
The article focuses on the approach of aircraft firms to reduce noise on their jet engine lines. It states that the issue was the concern at the 44th meeting of Acoustical Society of America. It says that acoustical engineers found developments in several aspects of aircraft noise reduction, but they did not disclose all the details since some features are considered as military's secrets. It also cites aircraft production as one source of noise pollution.
- Published
- 1952
37. Allies Want Space Defenses Too, US Official Says.
- Author
-
Weisgerber, Marcus
- Subjects
GLOBAL Positioning System ,ARTIFICIAL satellites ,MILITARY technology ,CLASSIFIED defense information - Abstract
U.S. allies are increasingly interested in developing their own space industries and are concerned about protecting their assets, according to Kelli Seybolt, the deputy Air Force undersecretary for international affairs. There is a growing focus on counter-space capabilities, as satellites are vulnerable to attack. The Air Force is conducting studies to help allies acquire the necessary capabilities to defend their assets, and there may be opportunities for U.S. companies to sell turnkey systems to allies. Efforts are also being made to streamline the foreign-sales process for space capabilities. [Extracted from the article]
- Published
- 2023
38. Why the Pentagon's Response to the Discord Leaks Won't Fix the Problem.
- Author
-
Tucker, Patrick
- Subjects
CLASSIFIED defense information ,MILITARY policy - Abstract
The Pentagon's response to the recent leak of classified documents on a private Discord server is missing the core problems that lead to unauthorized disclosure. The Defense Department plans to add restrictions on classified material and limit access to fewer people, but this fails to address the issue of overclassification, the inability to detect leaks, and the unrealistic expectation of keeping classified information secret for long periods of time. The government also lacks clear policies on monitoring social media and using modern tools for managing classified data. Additionally, the government overclassifies information and has a backlog of workers needing clearance, which increases the likelihood of unauthorized disclosures. A formula or data-driven approach to classifying documents could help determine if information should be classified and for how long. [Extracted from the article]
- Published
- 2023
39. HOW AREA 51 BECAME A HOTBED FOR CONSPIRACY THEORIES.
- Author
-
Sicard, Sarah
- Subjects
EXTRATERRESTRIAL beings ,UNIDENTIFIED flying objects ,POLITICAL attitudes ,CLASSIFIED defense information ,AREA 51 (Nev.) - Abstract
The article discusses how rumors of extra-terrestrial existence in Roswell, New Mexico and Area 51 near Las Vegas spread in the 1970s and 80s including the U.S. government's lack of interest in debunking unidentified flying object (UFO) rumors due to the top-secret nature of military testing and how the perceived alien connection between the two places persists even today.
- Published
- 2023
40. THE USE OF CLASSIFIED INFORMATION IN TERRORISM TRIALS.
- Author
-
MacKay, Bruce M.
- Subjects
SECURITY classification (Government documents) ,TERRORISM -- Lawsuits & claims ,TERRORISTS ,CLASSIFIED defense information ,GOVERNMENT information - Published
- 2017
41. No More Sources?
- Author
-
Lashmar, Paul
- Subjects
CLASSIFIED defense information ,NATIONAL security ,INVESTIGATIVE reporting ,GOVERNMENT communication systems - Abstract
From June 2013, documents leaked by the National Security Agency (NSA) dissident Edward Snowden revealed that Western intelligence agencies are capable of bulk collection of electronic communications flowing through global telecommunication systems. Surveillance data shared by the “Five Eyes” eavesdropping agencies of the United States, United Kingdom, Canada, Australia and New Zealand include journalist’s communications. In the wake of the Snowden leak, Zygmunt Bauman and colleagues called for a systematic assessment of the scale, reach and character of contemporary surveillance practices. This paper explores a specific part of Bauman’s task by assessing the impact of the Snowden revelations on confidential source-based journalism. Interviews were conducted with a range of investigative journalists who have experience of covering national security in Five Eyes countries. All expressed serious concern over the intelligence agencies’ greatly enhanced capability to track journalists and to identify and neutralise their sources. The paper concludes that there is clear evidence of a paradigmatic shift in journalist–source relations as those interviewed regard Five Eyes mass surveillance as a most serious threat to the fourth estate model of journalism as practised in Western democratic countries. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
42. The Russian Peasant at the Front during the First World War.
- Author
-
Astashov, Aleksandr Borisovich
- Subjects
- *
CIVILIANS in World War I , *PEASANTS , *FRATERNIZATION , *CLASSIFIED defense information , *REVOLUTIONS , *TWENTIETH century , *HISTORY - Abstract
The main factor undermining the Russian army during World War I was not revolutionary propaganda but the predominance of peasants among the soldiers. The underlying peasant mindset, which persisted despite orders from above, led to fraternization with the enemy, the unintentional revelation of military secrets, and the development of views on internal and external enemies that contributed to military defeat and revolutionary upheavals. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
43. A legal perspective.
- Author
-
Green, Harold P.
- Subjects
NUCLEAR energy policy ,SECURITY classification (Government documents) ,LEGISLATION ,DEBATE ,NATIONAL security ,LAW reform ,CLASSIFIED defense information - Abstract
The article discusses the information control provisions as defined by the U.S. Atomic Energy Act of 1940 which embodies the principle of born classified which regulates access to restricted data. The concept of restricted data has given rise to intense debate from within as well as outside of the U.S. Atomic Energy Commission due to a vaguely defined usage of the term. The restricted data was supposed to include scientific and technical information related to nuclear technology and its applications. It is suggested that there is an urgent need for reviewing and amending the regulations concerning the access to restricted data and properly defining its usage.
- Published
- 1981
- Full Text
- View/download PDF
44. Victimless secrets.
- Author
-
Barnaby, Frank
- Subjects
CLASSIFIED defense information ,CIVIL procedure ,OFFICIAL secrets ,ACTIONS & defenses (Law) - Abstract
The article focuses on professional hazards faced by researchers engaged in collecting information on military subjects. Some examples of related court cases that were brought forward in the courts of England, Norway and the United States are exemplified. It discusses the "ABC trial," which involved three Britons Crispin Aubrey, John Berry and Duncan Campbell, which was brought at London's Old Bailey Court in 1978. They were tried for several offenses under Britain's 1911 and 1920 Official Secrets Acts.
- Published
- 1981
45. DEFENSE CYBERSECURITY: Protecting Controlled Unclassified Information Systems.
- Author
-
Kirschbaum, Joseph W. and Franks, Jennifer R.
- Subjects
INTERNET security ,INFORMATION storage & retrieval systems ,CLASSIFIED defense information ,SECURITY classification (Government documents) - Abstract
The article highlights a report which shows that the status of Department of Defense (DOD) components' implementation of selected controlled unclassified information (CUI) cybersecurity requirements; and actions taken by DOD CIO to address the security of CUI systems. It highlights implementing specific controls based in part on the level of system impact; and authorizing these systems to operate.
- Published
- 2022
46. CAPTAIN CROMWELL'S DECISION.
- Author
-
Smith, Steven Trent
- Subjects
- *
SUBMARINERS , *WORLD War II , *MEDAL of Honor , *CLASSIFIED defense information - Abstract
The article offers information on the life and sacrifice of U.S submariner Captain John P. Cromwell, who decided to stay in the fatally stricken ship USS Sculpin to protect American secrets during the world war II. Topics discussed include how world war I stimulated his interest in military career, impact of Cromwell's nomadic life on his family and awarding of the Medal of Honor to Cromwell who lost his life to protect highly classified intelligence information Ultra.
- Published
- 2018
47. SHOULD WE REVEAL THE SIZE OF OUR ATOMIC STOCKPILE?
- Author
-
McMahon, Brien
- Subjects
AMERICAN nuclear weapons information ,NUCLEAR weapons information ,DEMOCRACY ,NUCLEAR weapons ,CLASSIFIED defense information ,UNITED States legislators - Abstract
The article discusses the advantages and disadvantages of releasing the information on the size of the American Atomic stockpile, particularly its relation to the democratic process of the U.S. government. U.S. Senator Brian McMahon proposed to the Atomic Energy Commission that serious consideration should be given to the advisability of disclosing information regarding the size of the Atomic stockpile, during the first meeting of the new session of the Joint Congressional Committee on Atomic Energy, from which he serves as chairman.
- Published
- 1949
- Full Text
- View/download PDF
48. HOW MATT DAMON WENT FULL ARMY FOR "OPPENHEIMER".
- Author
-
Sicard, Sarah
- Subjects
ROLE playing ,ARMY officers ,CLASSIFIED defense information - Abstract
The article focuses on Matt Damon's role as Lt. Gen. Leslie Groves in the film "Oppenheimer," highlighting his portrayal of the Army officer tasked with overseeing the Manhattan Project's brilliant scientists. Topics include the challenges Groves faces due to the scientists' disregard for military hierarchy and the tension between military secrecy and scientific openness. Damon adds levity to the role, and despite their differences, Groves and Oppenheimer develop mutual respect.
- Published
- 2023
49. NATIONAL SECURITY IN SERBIA - DE LEGE LATA ET DE LEGE FERENDA.
- Author
-
Pavlovic, Zoran
- Subjects
NATIONAL security ,MILITARY intelligence ,CLASSIFIED defense information ,HUMAN rights - Abstract
Through continuous review of the known concept of national security on the territory of the Republic of Serbia which has existed in the radius of the notion of security to the inclusion of social areas in the security of the state up to the present moment, with all known types of threats to the national security, there is a frequent emergence of new forms of threats, which have neither been identified as such, nor discussed with sufficient attention, more and more the question arises about the necessity of a wider and more frequent integration of the society in the areas of intelligence and of law enforcement agencies in the country. In this paper, the main international conventions, system laws and strategies which regulate this issue are reviewed. Attention is given to the military intelligence and security agencies in the country, with critics given, what must be changed according to the attitude of the author in order to protect the value of the goods already recognized as individual and collective human rights and freedoms, as well as eventual institutional changes in terms of creating one service within the Ministry of Defence. Here, some individual conceptual solutions in the fight against certain threats and risks to the national security are presented. At the same time, while following the systems of control of the security services in other countries, the question is whether and to what extent the parliamentary control of security is the most optimal solution, and whether the implementation of such models can provide smooth operation of these services. [ABSTRACT FROM AUTHOR]
- Published
- 2015
50. L'IDRA DEL SULTANO. LO SPIONAGGIO OTTOMANO NEL CINQUECENTO.
- Author
-
Gürkan, Emrah Safa
- Subjects
OTTOMAN Empire ,HISTORY of espionage ,SPANISH monarchy ,CLASSIFIED defense information ,CONFIDENTIAL communications ,SIXTEENTH century - Abstract
Copyright of Mediterranea - Ricerche Storiche is the property of Mediterranea-Ricerche Storiche and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.