Classified Information Quotes

We've searched our database for all the quotes and captions related to Classified Information. Here they are! All 100 of them:

I was told you are carrying around a USB. Is there classified information on it?
Karl Braungart (Lost Identity (Remmich/Miller, #1))
It’s not classified information, Chace. You can read all about it on Wookieepedia.” His body started shaking again, as did his voice when he asked, “Wookieepedia?” “Stop making fun at me when I’m pissed,” I snapped. “Wookieepedia?” Chace repeated, his body now rocking, taking mine and the bed with it.
Kristen Ashley (Breathe (Colorado Mountain, #4))
Valek had learned the best way to distribute information was to classify it as secret.
Maria V. Snyder (Shadow Study (Soulfinders, #1))
Why doesn’t the CIA hire your grandmother to interrogate terror suspects? She does a much better job than they do of getting classified information.
Meg Cabot (Royal Wedding (The Princess Diaries, #11))
What are the dead, anyway, but waves and energy? Light shining from a dead star? That, by the way, is a phrase of Julian's. I remember it from a lecture of his on the Iliad, when Patroklos appears to Achilles in a dream. There is a very moving passage where Achilles overjoyed at the sight of the apparition – tries to throw his arms around the ghost of his old friend, and it vanishes. The dead appear to us in dreams, said Julian, because that's the only way they can make us see them; what we see is only a projection, beamed from a great distance, light shining at us from a dead star… Which reminds me, by the way, of a dream I had a couple of weeks ago. I found myself in a strange deserted city – an old city, like London – underpopulated by war or disease. It was night; the streets were dark, bombed-out, abandoned. For a long time, I wandered aimlessly – past ruined parks, blasted statuary, vacant lots overgrown with weeds and collapsed apartment houses with rusted girders poking out of their sides like ribs. But here and there, interspersed among the desolate shells of the heavy old public buildings, I began to see new buildings, too, which were connected by futuristic walkways lit from beneath. Long, cool perspectives of modern architecture, rising phosphorescent and eerie from the rubble. I went inside one of these new buildings. It was like a laboratory, maybe, or a museum. My footsteps echoed on the tile floors.There was a cluster of men, all smoking pipes, gathered around an exhibit in a glass case that gleamed in the dim light and lit their faces ghoulishly from below. I drew nearer. In the case was a machine revolving slowly on a turntable, a machine with metal parts that slid in and out and collapsed in upon themselves to form new images. An Inca temple… click click click… the Pyramids… the Parthenon. History passing beneath my very eyes, changing every moment. 'I thought I'd find you here,' said a voice at my elbow. It was Henry. His gaze was steady and impassive in the dim light. Above his ear, beneath the wire stem of his spectacles, I could just make out the powder burn and the dark hole in his right temple. I was glad to see him, though not exactly surprised. 'You know,' I said to him, 'everybody is saying that you're dead.' He stared down at the machine. The Colosseum… click click click… the Pantheon. 'I'm not dead,' he said. 'I'm only having a bit of trouble with my passport.' 'What?' He cleared his throat. 'My movements are restricted,' he said. 'I no longer have the ability to travel as freely as I would like.' Hagia Sophia. St. Mark's, in Venice. 'What is this place?' I asked him. 'That information is classified, I'm afraid.' 1 looked around curiously. It seemed that I was the only visitor. 'Is it open to the public?' I said. 'Not generally, no.' I looked at him. There was so much I wanted to ask him, so much I wanted to say; but somehow I knew there wasn't time and even if there was, that it was all, somehow, beside the point. 'Are you happy here?' I said at last. He considered this for a moment. 'Not particularly,' he said. 'But you're not very happy where you are, either.' St. Basil's, in Moscow. Chartres. Salisbury and Amiens. He glanced at his watch. 'I hope you'll excuse me,' he said, 'but I'm late for an appointment.' He turned from me and walked away. I watched his back receding down the long, gleaming hall.
Donna Tartt (The Secret History)
By instructing students how to learn, unlearn and relearn, a powerful new dimension can be added to education. Psychologist Herbert Gerjuoy of the Human Resources Research Organization phrases it simply: ‘The new education must teach the individual how to classify and reclassify information, how to evaluate its veracity, how to change categories when necessary, how to move from the concrete to the abstract and back, how to look at problems from a new direction—how to teach himself. Tomorrow’s illiterate will not be the man who can’t read; he will be the man who has not learned how to learn.
Alvin Toffler
Accountability is the essence of democracy. If people do not know what their government is doing, they cannot be truly self-governing. The national security state assumes the government secrets are too important to be shared, that only those in the know can see classified information, that only the president has all the facts, that we must simply trust that our rulers of acting in our interest.
Garry Wills (Bomb Power: The Modern Presidency and the National Security State)
Some information is classified legitimately; as with military hardware, secrecy sometimes really is in the national interest. Further, military, political, and intelligence communities tend to value secrecy for its own sake. It's a way of silencing critics and evading responsibility - for incompetence or worse. It generates an elite, a band of brothers in whom the national confidence can be reliably vested, unlike the great mass of citizenry on whose behalf the information is presumably made secret in the first place. With a few exceptions, secrecy is deeply incompatible with democracy and with science.
Carl Sagan
It’s not classified information, Chace. You can read all about it on Wookieepedia.
Kristen Ashley (Breathe (Colorado Mountain, #4))
The average expert was a horrific forecaster. Their areas of specialty, years of experience, academic degrees, and even (for some) access to classified information made no difference. They were bad at short-term forecasting, bad at long-term forecasting, and bad at forecasting in every domain. When experts declared that some future event was impossible or nearly impossible, it nonetheless occurred 15 percent of the time. When they declared a sure thing, it failed to transpire more than one-quarter of the time.
David Epstein (Range: Why Generalists Triumph in a Specialized World)
What is your job?” “Now that’s classified information, ma’am. If I tell you, I may have to kiss you.” “Shouldn’t that be, ‘I’d have to kill you?’” “No, it’s definitely kiss you,” he says seriously. “I think I would know.” And by the look on his face, I know he really does want to kiss me.
J.B. Morgan (Holly Lane)
The lines between his brows smooth. “I need you to know that no matter what information I hold, you trust me, love me enough to realize I’d never let it hurt you. I’m not the easiest person to know, but I’ve learned my lesson, believe me. Even if it’s classified, I won’t withhold any information that affects your agency.” He swallows, then balances his weight on one arm and runs the back of his hand down the side of my cheek. “I need to know you won’t run, that you know you’ll never have to.
Rebecca Yarros (Iron Flame (The Empyrean, #2))
In Hinayana Buddhism, practice is classified in four ways. The best way is just to do it without having any joy in it, not even spiritual joy. This way is just to do it, forgetting your physical and mental feeling, forgetting all about yourself in your practice.
Shunryu Suzuki (Zen Mind, Beginner's Mind: Informal Talks on Zen Meditation and Practice)
Our investigation required us to answer two questions. The first question was whether classified documents were moved outside of classified systems or whether classified topics were discussed outside of a classified system. If so, the second question was what the subject of the investigation was thinking when she mishandled that classified information.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received.
James B. Comey
In Secretary Clinton’s case, the answer to the first question—was classified information mishandled?—was obviously “yes.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
Heinrich replied, “The fact that Kramer’s radio station has  been wiped out by the British Navy in now classified information!
Michael G. Kramer (His Forefathers and Mick)
I have never seen any indication that Powell discussed on his AOL account information that was classified at the time, but there were numerous examples of Secretary Clinton having done so.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
I have information about things that our government has lied to us about. I know. For example, to say that since the fall of the Soviet Union we ceased all of our intimate relationship with Bin Laden and the Taliban - those things can be proven as lies, very easily, based on the information they classified in my case, because we did carry very intimate relationship with these people, and it involves Central Asia, all the way up to September 11.
Sibel Edmonds
Even with the misdemeanor, the Department of Justice has long required that investigators develop strong evidence to indicate government employees knew they were doing something improper in their handling of the classified information.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
President Reagan proposed further broadening the use of the polygraph test. All executive departments were authorized to “require employees to take a polygraph examination in the course of investigations of unauthorized disclosures of classified information.
Paul Ekman (Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage)
Some children like how-to-do-it or all-about-everything type books, but I suspect parents like them best because they look so educational. These really should be in a separate category because they don't usually classify and literature but are more nearly manuals of information. Paul Hazard suggests that instead of pouring out so much knowledge on a child's soul that it is crushed, we should plant a seed of an idea that will develop from the inside.
Gladys M. Hunt (Honey for a Child's Heart)
I might be seeing you all sooner than you think,” said Charlie, grinning, as he hugged Ginny good-bye. “Why?” said Fred keenly. “You’ll see,” said Charlie. “Just don’t tell Percy I mentioned it … it’s ‘classified information, until such time as the Ministry sees fit to release it,’ after all.” “Yeah, I sort of wish I were back at Hogwarts this year,” said Bill, hands in his pockets, looking almost wistfully at the train. “Why?” said George impatiently. “You’re going to have an interesting year,” said Bill, his eyes twinkling. “I might even get time off to come and watch a bit of it. …” “A bit of what?” said Ron.
J.K. Rowling (Harry Potter and the Goblet of Fire (Harry Potter, #4))
The underlying ideology within social media is not to enhance choice or agency, but rather to narrow, filter, and reduce choice to benefit creators and advertisers. Social media herds the citizenry into surveilled spaces where the architects can track and classify them and use this understanding to influence their behavior. If democracy and capitalism are based on accessible information and free choice, what we are witnessing is their subversion from the inside.
Christopher Wylie (Mindf*ck: Cambridge Analytica and the Plot to Break America)
Despite the endless drumbeat in the conservative media, filled with exaggerated scandals and breathless revelations of little practical import, Hillary Clinton’s case, at least as far as we knew at the start, did not appear to come anywhere near General Petraeus’s in the volume and classification level of the material mishandled. Although she seemed to be using an unclassified system for some classified topics, everyone she emailed appeared to have both the appropriate clearance and a legitimate need to know the information.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
strong team working solely on this special access program. This means only those around this table—and some hand-picked intelligence specialists and NSC officials—have access to this most sensitive of classified information.” Lieutenant General Black leaned forward and allowed his gaze to wander around the assembled faces. “Assistant Director Meyerstein’s word is law. She
J.B. Turner (Hard Kill (Jon Reznick, #2))
I know people who read interminably, book after book, from page to page, and yet I should not call them 'well-read people'. Of course they 'know' an immense amount; but their brain seems incapable of assorting and classifying the material which they have gathered from books. They have not the faculty of distinguishing between what is useful and useless in a book; so that they may retain the former in their minds and if possible skip over the latter while reading it, if that be not possible, then--when once read--throw it overboard as useless ballast. Reading is not an end in itself, but a means to an end. Its chief purpose is to help towards filling in the framework which is made up of the talents and capabilities that each individual possesses. Thus each one procures for himself the implements and materials necessary for the fulfilment of his calling in life, no matter whether this be the elementary task of earning one's daily bread or a calling that responds to higher human aspirations. Such is the first purpose of reading. And the second purpose is to give a general knowledge of the world in which we live. In both cases, however, the material which one has acquired through reading must not be stored up in the memory on a plan that corresponds to the successive chapters of the book; but each little piece of knowledge thus gained must be treated as if it were a little stone to be inserted into a mosaic, so that it finds its proper place among all the other pieces and particles that help to form a general world-picture in the brain of the reader. Otherwise only a confused jumble of chaotic notions will result from all this reading. That jumble is not merely useless, but it also tends to make the unfortunate possessor of it conceited. For he seriously considers himself a well-educated person and thinks that he understands something of life. He believes that he has acquired knowledge, whereas the truth is that every increase in such 'knowledge' draws him more and more away from real life, until he finally ends up in some sanatorium or takes to politics and becomes a parliamentary deputy. Such a person never succeeds in turning his knowledge to practical account when the opportune moment arrives; for his mental equipment is not ordered with a view to meeting the demands of everyday life. His knowledge is stored in his brain as a literal transcript of the books he has read and the order of succession in which he has read them. And if Fate should one day call upon him to use some of his book-knowledge for certain practical ends in life that very call will have to name the book and give the number of the page; for the poor noodle himself would never be able to find the spot where he gathered the information now called for. But if the page is not mentioned at the critical moment the widely-read intellectual will find himself in a state of hopeless embarrassment. In a high state of agitation he searches for analogous cases and it is almost a dead certainty that he will finally deliver the wrong prescription.
Adolf Hitler
Writers and other artistic personalities historically attempted to describe art, what consist of, and inform us how a person creates art. If art is so difficult to describe and quantify, why do we feel compelled to attempt to describe the ineffable? At its core, does all art represent an attempt to communicate the unsayable? Is any discussion about art absurd? Is classifying a piece of writing as literature simply another form of elitism?
Kilroy J. Oldster (Dead Toad Scrolls)
On July 6, 2015, the Bureau received a referral from the inspector general of the intelligence community, a congressionally created independent office focused on finding risks and vulnerabilities across the nation’s vast intelligence community. The referral raised the issue of whether Secretary of State Hillary Clinton had mishandled classified information while using her personal email system. On July 10, the FBI opened a criminal investigation.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
Finally, another large-scale study [of false rape allegations] was conducted in Australia, with the 850 rapes reported to the Victoria police between 2000 and 2003 (Heenan & Murray, 2006). Using both quantitative and qualitative methods, the researchers examined 812 cases with sufficient information to make an appropriate determination, and found that only 2.1% of these were classified as false reports. All of these complainants were then charged or threatened with charges for filing a false police report." Lonsway, K. A., Archambault, J., & Lisak, D. (2009). False reports: Moving beyond the issue to successfully investigate and prosecute non-stranger sexual assault. The Voice, 3(1), 1-11.
David Lisak
Between the Benghazi Committee, which would take depositions from Cheryl Mills, Huma Abedin, and Jake Sullivan among other Hillary aides, the drip-drip nature of evolving federal lawsuits, and judicial orders for the State Department to release Hillary’s e-mails on a rolling basis, the early months of the campaign became a private and public hell. It was only a matter of time before voters would know that Hillary had not told the truth about not sending or receiving classified information.
Jonathan Allen (Shattered: Inside Hillary Clinton's Doomed Campaign)
Sensei?” she asked. “Yes?” “Why are you always leaving about halfway through a workout to give Oberon a snack?” “What? Well, he’s a good dog.” “Granted, but he’s a good dog all the time, and the only times you interrupt what you’re doing to give him a snack are during workouts.” “I reward him sometimes for using big words. And sometimes I reward him for shutting up.” Now would be a good time to shut up. Deal. “So what did he say just now?” Granuaile asked. “I’m sorry, but that’s classified information.
Kevin Hearne (Two Ravens and One Crow (The Iron Druid Chronicles #4.3))
Humans are actually reservoir hosts for countless bacteria and viruses that haven’t even been classified yet. About twenty percent of the genetic information in the nose doesn’t match any known or cataloged organism. In the gut, forty to fifty percent of all the DNA is from bacteria and viruses that have never been classified. Even in the blood, up to two percent is a sort of “biological dark matter.” In many ways, this biological dark matter, this sea of unknown viruses and bacteria, is the ultimate frontier.
A.G. Riddle (The Atlantis Plague (The Origin Mystery, #2))
Decades of information control proved difficult to cast off in such a short time, however, and while the report was made available in the West, it was classified in the Soviet Union. This meant those most affected by the disaster knew less than everyone else.
Andrew Leatherbarrow (Chernobyl 01:23:40: The Incredible True Story of the World's Worst Nuclear Disaster)
James Comey should have been fired the day he held a very public news conference in July 2016 announcing his recommendation that Hillary Clinton not be criminally prosecuted for mishandling classified information and jeopardizing national security. He acted without authorization and in dereliction of his duty to follow the policies and regulations established by both the FBI and the Department of Justice. In so doing, he demeaned the work of the agency he led, damaged the integrity of the nation’s premier law enforcement agency, and breached the public’s trust.
Gregg Jarrett (The Russia Hoax: The Illicit Scheme to Clear Hillary Clinton and Frame Donald Trump)
It would have been so easy for her--men would have told her anything. They’d have given up secret information just like that.” Snapping her fingers, Ashley coolly confronted Parker’s indignation. “Come on, give us guys a little credit. Why would any high-ranking officer share classified information with his little groupie, huh?” “Because those high-ranking officers were men.” Roo’s stare was as condescending as her tone. “And men only think with their--” “Downstairs brain,” Ashley finished. While the guys conceded with slight embarrassment, Roo and Miranda laughed. “Good one, Ash.
Richie Tankersley Cusick (Walk of the Spirits (Walk, #1))
Humans are actually reservoir hosts for countless bacteria and viruses that haven’t even been classified yet. About twenty percent of the genetic information in the nose doesn’t match any known or cataloged organism. In the gut, forty to fifty percent of all the DNA is from bacteria and viruses that have never been classified.
A.G. Riddle (The Atlantis Plague (The Origin Mystery, #2))
Although the British Home Office knew all about his communist past, by the spring of 1941 Fuchs was working with Peierls and other British scientists on the highly classified Tube Alloys project. In June 1942, Fuchs received British citizenship—by then, he was already passing information to the Soviets about the British bomb program.
Kai Bird (American Prometheus)
The cult of government secrecy is growing. ¶ The practice has become so widespread and routine that, according to testimony given before the House government information sub-committee, more than a million Federal employees are empowered to classify information. This means that one out of every 180 Americans is stamping the word 'secret' on papers.
William J. Lederer (A Nation Of Sheep)
Humans are actually reservoir hosts for countless bacteria and viruses that haven’t even been classified yet. About twenty percent of the genetic information in the nose doesn’t match any known or cataloged organism. In the gut, forty to fifty percent of all the DNA is from bacteria and viruses that have never been classified. Even in the blood, up to two percent is a sort of “biological dark matter.” In many ways, this biological dark matter, this sea of unknown viruses and bacteria, is the ultimate frontier. Almost all viruses are harmless until they jump to another host—a life form different from their natural hosts. The virus then combines with a completely new genome and causes a new and unexpected reaction—an illness. That was the ultimate danger with viruses,
A.G. Riddle (The Atlantis Plague (The Origin Mystery, #2))
[ Dr. Lois Jolyon West was cleared at Top Secret for his work on MKULTRA. ] Dr. Michael Persinger [235], another FSMF Board Member, is the author of a paper entitled “Elicitation of 'Childhood Memories' in Hypnosis-Like Settings Is Associated With Complex Partial Epileptic-Like Signs For Women But Not for Men: the False Memory Syndrome.” In the paper Perceptual and Motor Skills,In the paper, Dr. Persinger writes: On the day of the experiment each subject (not more than two were tested per day) was asked to sit quietly in an acoustic chamber and was told that the procedure was an experiment in relaxation. The subject wore goggles and a modified motorcycle helmet through which 10-milligauss (1 microTesla) magnetic fields were applied through the temporal plane. Except for a weak red (photographic developing) light, the room was dark. Dr. Persinger's research on the ability of magnetic fields to facilitate the creation of false memories and altered states of consciousness is apparently funded by the Defense Intelligence Agency through the project cryptonym SLEEPING BEAUTY. Freedom of Information Act requests concerning SLEEPING BEAUTY with a number of different intelligence agencies including the CIA and DEA has yielded denial that such a program exists. Certainly, such work would be of direct interest to BLUEBIRD, ARTICHOKE, MKULTRA and other non-lethal weapons programs. Schnabel [280] lists Dr. Persinger as an Interview Source in his book on remote viewing operations conducted under Stargate, Grill Flame and other cryptonyms at Fort Meade and on contract to the Stanford Research Institute. Schnabel states (p. 220) that, “As one of the Pentagon's top scientists, Vorona was privy to some of the strangest, most secret research projects ever conceived. Grill Flame was just one. Another was code-named Sleeping Beauty; it was a Defense Department study of remote microwave mind-influencing techniques ... [...] It appears from Schnabel's well-documented investigations that Sleeping Beauty is a real, but still classified mind control program. Schnabel [280] lists Dr. West as an Interview Source and says that West was a, “Member of medical oversight board for Science Applications International Corp. remote-viewing research in early 1990s.
Colin A. Ross (The CIA Doctors: Human Rights Violations by American Psychiatrists)
David had spent the last fourteen days, while Kate was away, learning how to operate the ship’s systems. He was still learning them. Kate had enabled the voice command routines to help with any commands David couldn’t figure out. “Alpha, what is Dr. Warner’s location?” David asked. The disembodied computer voice of the Alpha Lander boomed into the small room. “That information is classified.” “Why?” “You are not a senior member of the research staff.
A.G. Riddle (The Atlantis World (The Origin Mystery #3))
The government must realize that it is the leader and not the slave of public opinion; that public opinion is not a static thing to be discovered and classified by public-opinion polls as plants are by botanists, but that it is a dynamic, ever changing entity to be continuously created and recreated by informed and responsible leadership; that it is the historic mission of the government to assert that leadership lest it be the demagogue who asserts it.
Hans J. Morgenthau (Politics Among Nations)
During mission planning, we had intelligence concerning dogs that might impede our goal and were part of the target’s contingencies. The exact method used to neutralize aggressive dogs in the field is classified information. However, Special Ops has some really incredible dogs. In fact, during the raid to kill Osama bin Laden, the highly trained men of SEAL Team Six had with them a uniquely trained dog as part of the mission. SEAL canines are not your standard bomb-sniffing dogs. The dog on the bin Laden mission was specially trained to jump from planes and rappel from helicopters while attached to its handler. The dog wore ballistic body armor, had a head-mounted infrared (night-vision) camera, and wore earpieces to take commands from the handler. The dog also had reinforced teeth, capped with titanium. I would not want to try the techniques this book recommends on this dog. Thank God he’s on our side.
Cade Courtley (SEAL Survival Guide: A Navy SEAL's Secrets to Surviving Any Disaster)
Flouting federal laws governing record-keeping requirements. Failing to preserve emails sent or received from her personal accounts, as required by law. Circumventing the Freedom of Information Act. Instructing her aides to send classified materials on her unsecure network. Running afoul of the “gross negligence” clause of the Espionage Act (which meant prosecutors would not have to prove “intent” to find her guilty). Pretending she didn’t know that Sensitive Compartmented Information (SCI) was classified. Transferring classified material that originated at the CIA, the National Security Agency, and other intelligence sources, to her unsecured network. Authoring hundreds of emails with classified information to people who did not have security clearance. Inducing aides to commit perjury. Lying to the FBI. Engaging in public corruption by using the office of secretary of state to feather the nest of the Clinton family foundation.
Edward Klein (Guilty as Sin: Uncovering New Evidence of Corruption and How Hillary Clinton and the Democrats Derailed the FBI Investigation)
Lest you dismiss this as just another conspiracy theory, in November 1998 in an interview with The Observer, former US Ambassador to Chile Edward Korry told a remarkable story. Korry described still classified cables, and information censored in papers, but now available under the FOIA. He had served under Presidents Kennedy, Johnson, and Nixon. He told how US companies from Cola to copper used the CIA as an international debt collection agency and investment security force. The Observer reported that the CIA's Oct. 1970 plot to overthrow Chile's Allende was the result of a plea for action a month earlier by PepsiCo chairman Kendall to the company's former lawyer, President Nixon.
Carol Rutz (A Nation Betrayed: Secret Cold War Experiments Performed on Our Children and Other Innocent People)
Kay found six and a half acres of land just off the Ouachita River at the mouth of Cypress Creek outside of West Monroe, Louisiana. It was at the end of a dirt road in one of the most heavily forested areas on the river. The classified advertisement in the newspaper described it as a “Sportsman’s Paraside.” When we drove out to see the land, I knew it was perfect as soon as we crested the hill that leads down to the house where we still live today. The place was absolutely perfect. The real estate lady sensed my excitement and told me, “Now, Mr. Robertson, I’m required by law to inform you that this home sits in a floodplain.” “Perfect,” I told her. “I wouldn’t want it if it didn’t.
Phil Robertson (Happy, Happy, Happy: My Life and Legacy as the Duck Commander)
Laura Poitras I knew as a documentarian, primarily concerned with America’s post-9/11 foreign policy. Her film My Country, My Country depicted the 2005 Iraqi national elections that were conducted under (and frustrated by) the US occupation. She had also made The Program, about the NSA cryptanalyst William Binney—who had raised objections through proper channels about TRAILBLAZER, the predecessor of STELLARWIND, only to be accused of leaking classified information, subjected to repeated harassment, and arrested at gunpoint in his home, though never charged. Laura herself had been frequently harassed by the government because of her work, repeatedly detained and interrogated by border agents whenever she traveled in or out of the country. Glenn Greenwald I knew as a civil liberties lawyer turned columnist, initially for Salon—where he was one of the few who wrote about the unclassified version of the NSA IG’s Report back in 2009—and later for the US edition of the Guardian. I liked him because he was skeptical and argumentative, the kind of man who’d fight with the devil, and when the devil wasn’t around fight with himself. Though Ewen MacAskill, of the British edition of the Guardian, and Bart Gellman of the Washington Post would later prove stalwart partners (and patient guides to the journalistic wilderness), I found my earliest affinity with Laura and Glenn, perhaps because they weren’t merely interested in reporting on the IC but had personal stakes in understanding the institution.
Edward Snowden (Permanent Record)
Every Pirate Wants to Be an Admiral IT’S NOT AS though this is the first time we’ve had to rethink what copyright is, what it should do, and whom it should serve. The activities that copyright regulates—copying, transmission, display, performance—are technological activities, so when technology changes, it’s usually the case that copyright has to change, too. And it’s rarely pretty. When piano rolls were invented, the composers, whose income came from sheet music, were aghast. They couldn’t believe that player-piano companies had the audacity to record and sell performances of their work. They tried—unsuccessfully—to have such recordings classified as copyright violations. Then (thanks in part to the institution of a compulsory license) the piano-roll pirates and their compatriots in the wax-cylinder business got legit, and became the record industry. Then the radio came along, and broadcasters had the audacity to argue that they should be able to play records over the air. The record industry was furious, and tried (unsuccessfully) to block radio broadcasts without explicit permission from recording artists. Their argument was “When we used technology to appropriate and further commercialize the works of composers, that was progress. When these upstart broadcasters do it to our records, that’s piracy.” A few decades later, with the dust settled around radio transmission, along came cable TV, which appropriated broadcasts sent over the air and retransmitted them over cables. The broadcasters argued (unsuccessfully) that this was a form of piracy, and that the law should put an immediate halt to it. Their argument? The familiar one: “When we did it, it was progress. When they do it to us, that’s piracy.” Then came the VCR, which instigated a landmark lawsuit by the cable operators and the studios, a legal battle that was waged for eight years, finishing up in the 1984 Supreme Court “Betamax” ruling. You can look up the briefs if you’d like, but fundamentally, they went like this: “When we took the broadcasts without permission, that was progress. Now that someone’s recording our cable signals without permission, that’s piracy.” Sony won, and fifteen years later it was one of the first companies to get in line to sue Internet companies that were making it easier to copy music and videos online. I have a name for the principle at work here: “Every pirate wants to be an admiral.
Cory Doctorow (Information Doesn't Want to Be Free: Laws for the Internet Age)
In the EPJ results, there were two statistically distinguishable groups of experts. The first failed to do better than random guessing, and in their longer-range forecasts even managed to lose to the chimp. The second group beat the chimp, though not by a wide margin, and they still had plenty of reason to be humble. Indeed, they only barely beat simple algorithms like “always predict no change” or “predict the recent rate of change.” Still, however modest their foresight was, they had some. So why did one group do better than the other? It wasn’t whether they had PhDs or access to classified information. Nor was it what they thought—whether they were liberals or conservatives, optimists or pessimists. The critical factor was how they thought. One group tended to organize their thinking around Big Ideas, although they didn’t agree on which Big Ideas were true or false. Some were environmental doomsters (“We’re running out of everything”); others were cornucopian boomsters (“We can find cost-effective substitutes for everything”). Some were socialists (who favored state control of the commanding heights of the economy); others were free-market fundamentalists (who wanted to minimize regulation). As ideologically diverse as they were, they were united by the fact that their thinking was so ideological. They sought to squeeze complex problems into the preferred cause-effect templates and treated what did not fit as irrelevant distractions. Allergic to wishy-washy answers, they kept pushing their analyses to the limit (and then some), using terms like “furthermore” and “moreover” while piling up reasons why they were right and others wrong. As a result, they were unusually confident and likelier to declare things “impossible” or “certain.” Committed to their conclusions, they were reluctant to change their minds even when their predictions clearly failed. They would tell us, “Just wait.” The other group consisted of more pragmatic experts who drew on many analytical tools, with the choice of tool hinging on the particular problem they faced. These experts gathered as much information from as many sources as they could. When thinking, they often shifted mental gears, sprinkling their speech with transition markers such as “however,” “but,” “although,” and “on the other hand.” They talked about possibilities and probabilities, not certainties. And while no one likes to say “I was wrong,” these experts more readily admitted it and changed their minds. Decades ago, the philosopher Isaiah Berlin wrote a much-acclaimed but rarely read essay that compared the styles of thinking of great authors through the ages. To organize his observations, he drew on a scrap of 2,500-year-old Greek poetry attributed to the warrior-poet Archilochus: “The fox knows many things but the hedgehog knows one big thing.” No one will ever know whether Archilochus was on the side of the fox or the hedgehog but Berlin favored foxes. I felt no need to take sides. I just liked the metaphor because it captured something deep in my data. I dubbed the Big Idea experts “hedgehogs” and the more eclectic experts “foxes.” Foxes beat hedgehogs. And the foxes didn’t just win by acting like chickens, playing it safe with 60% and 70% forecasts where hedgehogs boldly went with 90% and 100%. Foxes beat hedgehogs on both calibration and resolution. Foxes had real foresight. Hedgehogs didn’t.
Philip E. Tetlock (Superforecasting: The Art and Science of Prediction)
To understand my doctor’s error, let’s employ Bayes’s method. The first step is to define the sample space. We could include everyone who has ever taken an HIV test, but we’ll get a more accurate result if we employ a bit of additional relevant information about me and consider only heterosexual non-IV-drug-abusing white male Americans who have taken the test. (We’ll see later what kind of difference this makes.) Now that we know whom to include in the sample space, let’s classify the members of the space. Instead of boy and girl, here the relevant classes are those who tested positive and are HIV-positive (true positives), those who tested positive but are not positive (false positives), those who tested negative and are HIV-negative (true negatives), and those who tested negative but are HIV-positive (false negatives). Finally, we ask, how many people are there in each of these classes? Suppose we consider an initial population of 10,000. We can estimate, employing statistics from the Centers for Disease Control and Prevention, that in 1989 about 1 in those 10,000 heterosexual non-IV-drug-abusing white male Americans who got tested were infected with HIV.6 Assuming that the false-negative rate is near 0, that means that about 1 person out of every 10,000 will test positive due to the presence of the infection. In addition, since the rate of false positives is, as my doctor had quoted, 1 in 1,000, there will be about 10 others who are not infected with HIV but will test positive anyway. The other 9,989 of the 10,000 men in the sample space will test negative. Now let’s prune the sample space to include only those who tested positive. We end up with 10 people who are false positives and 1 true positive. In other words, only 1 in 11 people who test positive are really infected with HIV.
Leonard Mlodinow (The Drunkard's Walk: How Randomness Rules Our Lives)
Although there are no set methods to test for psychiatric disorders like psychopathy, we can determine some facets of a patient’s mental state by studying his brain with imaging techniques like PET (positron emission tomography) and fMRI (functional magnetic resonance imaging) scanning, as well as genetics, behavioral and psychometric testing, and other pieces of information gathered from a full medical and psychiatric workup. Taken together, these tests can reveal symptoms that might indicate a psychiatric disorder. Since psychiatric disorders are often characterized by more than one symptom, a patient will be diagnosed based on the number and severity of various symptoms. For most disorders, a diagnosis is also classified on a sliding scale—more often called a spectrum—that indicates whether the patient’s case is mild, moderate, or severe. The most common spectrum associated with such disorders is the autism spectrum. At the low end are delayed language learning and narrow interests, and at the high end are strongly repetitive behaviors and an inability to communicate.
James Fallon (The Psychopath Inside: A Neuroscientist's Personal Journey into the Dark Side of the Brain)
The disaster was the first major crisis to occur under the fledgling leadership of the USSR’s most recent General Secretary, Mikhail Gorbachev. He chose not to address the public for three weeks after the accident, presumably to allow his experts time to gain a proper grasp of the situation. On May 14th, in addition to expressing his anger at Western Chernobyl propaganda, he announced to the world that all information relating to the incident would be made available, and that an unprecedented conference would be held with the International Atomic Energy Agency (IAEA) in August at Vienna. Decades of information control proved difficult to cast off in such a short time, however, and while the report was made available in the West, it was classified in the Soviet Union. This meant those most affected by the disaster knew less than everyone else. In addition, although the Soviet delegation’s report was highly detailed and accurate in most regards, it was also misleading. It had been written in line with the official cause of the accident - that the operators were responsible - and, as such, it deliberately obfuscated vital details about the reactor.
Andrew Leatherbarrow (Chernobyl 01:23:40: The Incredible True Story of the World's Worst Nuclear Disaster)
People today are used to seeing not only the incredible but the impossible as well, all provided by the mega-pixel. We witness miracles and dismiss them as diversions. The line between reality and fantasy has been blurred to the point that we no longer know what it is we see, and so put little faith in the experience. And there is no darkness anymore, no place for things like mystery and magic to make their abode. There is nothing nowadays that is not exposed, caught on camera and pixilated to be stored and classified forever in some phantom zone called cyber space. Nothing is too small to remain unseen by our microscopes or too far away to be seen by our satellites. The world is a strumpet, every inch of her exposed and explored. Whether she is thrusting herself into the camera's gaze, or we as voyeurs intrude upon her most intimate moments, nothing is left to the imagination. The world today is all light and no darkness. But too much light can blind. An excess of it deprives our eyes from the necessary contrast required to give definition to what we see. The light precludes magic, gives us explanations in its place. It denies love and informs us of the chemicals in the brain that are active given certain conditions. We have gained knowledge but in the process we have been forced to surrender the very reasons we sought knowledge in the first place.
James Rozoff
Ultimately, the World Top Incomes Database (WTID), which is based on the joint work of some thirty researchers around the world, is the largest historical database available concerning the evolution of income inequality; it is the primary source of data for this book.24 The book’s second most important source of data, on which I will actually draw first, concerns wealth, including both the distribution of wealth and its relation to income. Wealth also generates income and is therefore important on the income study side of things as well. Indeed, income consists of two components: income from labor (wages, salaries, bonuses, earnings from nonwage labor, and other remuneration statutorily classified as labor related) and income from capital (rent, dividends, interest, profits, capital gains, royalties, and other income derived from the mere fact of owning capital in the form of land, real estate, financial instruments, industrial equipment, etc., again regardless of its precise legal classification). The WTID contains a great deal of information about the evolution of income from capital over the course of the twentieth century. It is nevertheless essential to complete this information by looking at sources directly concerned with wealth. Here I rely on three distinct types of historical data and methodology, each of which is complementary to the others.25 In the first place, just as income tax returns allow us to study changes in income inequality, estate tax returns enable us to study changes in the inequality of wealth.26 This
Thomas Piketty (Capital in the Twenty-First Century)
MEANWHILE, a group of scientists in Chicago, spurred on by Szilard, organized an informal committee on the social and political implications of the bomb. In early June 1945, several members of the committee produced a twelve-page document that came to be known as the Franck Report, after its chairman, the Nobelist James Franck. It concluded that a surprise atomic attack on Japan was inadvisable from any point of view: “It may be very difficult to persuade the world that a nation which was capable of secretly preparing and suddenly releasing a weapon as indiscriminate as the [German] rocket bomb and a million times more destructive, is to be trusted in its proclaimed desire of having such weapons abolished by international agreement.” The signatories recommended a demonstration of the new weapon before representatives of the United Nations, perhaps in a desert site or on a barren island. Franck was dispatched with the Report to Washington, D.C., where he was informed, falsely, that Stimson was out of town. Truman never saw the Franck Report; it was seized by the Army and classified. By contrast to the people in Chicago, the scientists in Los Alamos, working feverishly to test the plutonium implosion bomb model as soon as possible, had little time to think about how or whether their “gadget” should be used on Japan. But they also felt that they could rely on Oppenheimer. As the Met Lab biophysicist Eugene Rabinowitch, one of the seven signatories of the Franck Report, observed, the Los Alamos scientists shared a widespread “feeling that we can trust Oppenheimer to do the right thing.
Kai Bird (American Prometheus)
The largest and most rigorous study that is currently available in this area is the third one commissioned by the British Home Office (Kelly, Lovett, & Regan, 2005). The analysis was based on the 2,643 sexual assault cases (where the outcome was known) that were reported to British police over a 15-year period of time. Of these, 8% were classified by the police department as false reports. Yet the researchers noted that some of these classifications were based simply on the personal judgments of the police investigators, based on the victim’s mental illness, inconsistent statements, drinking or drug use. These classifications were thus made in violation of the explicit policies of their own police agencies. There searchers therefore supplemented the information contained in the police files by collecting many different types of additional data, including: reports from forensic examiners, questionnaires completed by police investigators, interviews with victims and victim service providers, and content analyses of the statements made by victims and witnesses. They then proceeded to evaluate each case using the official criteria for establishing a false allegation, which was that there must be either “a clear and credible admission by the complainant” or “strong evidential grounds” (Kelly, Lovett, & Regan,2005). On the basis of this analysis, the percentage of false reports dropped to 2.5%." Lonsway, Kimberly A., Joanne Archambault, and David Lisak. "False reports: Moving beyond the issue to successfully investigate and prosecute non-stranger sexual assault." The Voice 3.1 (2009): 1-11.
David Lisak
Though Hoover conceded that some might deem him a “fanatic,” he reacted with fury to any violations of the rules. In the spring of 1925, when White was still based in Houston, Hoover expressed outrage to him that several agents in the San Francisco field office were drinking liquor. He immediately fired these agents and ordered White—who, unlike his brother Doc and many of the other Cowboys, wasn’t much of a drinker—to inform all of his personnel that they would meet a similar fate if caught using intoxicants. He told White, “I believe that when a man becomes a part of the forces of this Bureau he must so conduct himself as to remove the slightest possibility of causing criticism or attack upon the Bureau.” The new policies, which were collected into a thick manual, the bible of Hoover’s bureau, went beyond codes of conduct. They dictated how agents gathered and processed information. In the past, agents had filed reports by phone or telegram, or by briefing a superior in person. As a result, critical information, including entire case files, was often lost. Before joining the Justice Department, Hoover had been a clerk at the Library of Congress—“ I’m sure he would be the Chief Librarian if he’d stayed with us,” a co-worker said—and Hoover had mastered how to classify reams of data using its Dewey decimal–like system. Hoover adopted a similar model, with its classifications and numbered subdivisions, to organize the bureau’s Central Files and General Indices. (Hoover’s “Personal File,” which included information that could be used to blackmail politicians, would be stored separately, in his secretary’s office.) Agents were now expected to standardize the way they filed their case reports, on single sheets of paper. This cut down not only on paperwork—another statistical measurement of efficiency—but also on the time it took for a prosecutor to assess whether a case should be pursued.
David Grann (Killers of the Flower Moon: The Osage Murders and the Birth of the FBI)
who view the CIA as complicit in Kennedy’s assassination point to the CIA’s role in covert operations in Vietnam as the reason why the CIA wanted Kennedy’s removal from office. Col. Fletcher Prouty, in his highly documented book, JFK: The CIA, Vietnam and the Plot to Assassinate John F. Kennedy, reveals that Kennedy was attempting to end the CIA’s influence over covert operations.[301] Chief among these was the escalating U.S. involvement in Vietnam that Kennedy wanted to end. This he posits is why Kennedy was assassinated. There is, however, a more compelling reason why the CIA wanted Kennedy’s removal from office - the CIA’s role in controlling classified UFO information, and denying access to other government agencies including the office of the President. The assassination of President Kennedy was the direct result of his efforts to gain access to the CIA’s control of classified UFO files. Unknown to Kennedy, a set of secret MJ-12 directives issued by his former CIA Director, Allen Dulles, ruled out any cooperation with Kennedy and his National Security staff on the UFO issue. It was Dulles and another six MJ-12 Group members who sanctioned the directives found in the burned document, including a political assassination directive against non-cooperative officials in the Kennedy administration. This could be applied to Kennedy himself if the official entrusted to carry out the MJ-12 Assassination Directive concluded the President threatened MJ-12 operations.
Michael E. Salla (Kennedy's Last Stand: Eisenhower, UFOs, MJ-12 & JFK's Assassination)
But U.S. computer systems have back doors, too: just ask Edward Snowden, the former NSA contractor who leaked classified information about such vulnerabilities. In cybersecurity, a good offense is the worst defense. U.S. officials should work to prevent a “cyber–Pearl Harbor” through better defenses. But waiting for cyberwar, as Limnéll suggests, is a failure of imagination. “This is our cyber-9/11,” a British intelligence official told me, referring to the Snowden leaks. “We just imagined it differently.
Anonymous
Dulles knew of Jung through his wife, who had an interest in psychoanalysis and had trained as an analyst in Zürich before the war. He also knew of the reports of Jung’s Nazi fellow traveling. He had these checked and found they were unsubstantiated. Eventually Dulles and Jung met and began an “experimental marriage between espionage and psychology” involving the “psychological profile” of political and military leaders. Dulles was so impressed by Jung’s insights that he urged his OSS chiefs to pay great attention to his analyses, especially of Hitler, who Jung had cautioned wouldn’t shy from suicide if things got desperate. By this time, Hitler was living in an underground bunker in East Prussia, and required anyone wanting an interview to be disarmed and X-rayed. This is how Jung became “Agent 488,” his code name in Dulles’ OSS reports. Dulles was convinced that Jung’s assessments of Nazi and Fascist leaders “showed a deep antipathy to what Nazism and Fascism stood for,” and in later life, Dulles remarked that “Nobody will probably ever know how much Professor Jung contributed to the Allied cause during the war.” When asked for details, Dulles demurred, saying the information was “highly classified for the indefinite future,” which meant that Jung’s “services would have to remain undocumented.
Gary Lachman (Jung the Mystic: The Esoteric Dimensions of Carl Jung's Life & Teachings)
Furthermore, after the Justice Department targeted a Fox News reporter for a criminal investigation under the Espionage Act, in a matter involving unauthorized disclosure of classified information, the attorney general provided Congress with misleading information about his knowledge and approval of the investigation. Specifically, he testified: With regard to the potential prosecution of the press for the disclosure of [classified] material, that is not something I’ve ever been involved in, heard of, or would think would be wise policy.14 It subsequently emerged, however, that the attorney general had actually approved a search warrant for the reporter’s private emails.
Andrew McCarthy (Faithless Execution: Building the Political Case for Obama’s Impeachment)
No Some Yes G. Overall Performance Objective Is the performance objective: ___ ___ ___ 1. Clear (you/others can construct an assessment to test learners)? ___ ___ ___ 2. Feasible in the learning and performance contexts (time, resources, etc)? ___ ___ ___ 3. Meaningful in relation to goal and purpose for instruction (not insignificant)? H. (Other) ___ ___ ___ 1. Your complete list of performance objectives becomes the foundation for the next phase of the design process, developing criterion-referenced test items for each objective. The required information and procedures are described in Chapter 7. Judge the completeness of given performance objectives. Read each of the following objectives and judge whether it includes conditions, behaviors, and a criterion. If any element is missing, choose the part(s) omitted. 1. Given a list of activities carried on by the early settlers of North America, understand what goods they produced, what product resources they used, and what trading they did. a. important conditions and criterion b. observable behavior and important conditions c. observable behavior and criterion d. nothing 2. Given a mimeographed list of states and capitals, match at least 35 of the 50 states with their capitals without the use of maps, charts, or lists. a. observable response b. important conditions c. criterion performance d. nothing 3. During daily business transactions with customers, know company policies for delivering friendly, courteous service. a. observable behavior b. important conditions c. criterion performance d. a and b e. a and c 4. Students will be able to play the piano. a. important conditions b. important conditions and criterion performance c. observable behavior and criterion performance d. nothing 5. Given daily access to music in the office, choose to listen to classical music at least half the time. a. important conditions b. observable behavior c. criterion performance d. nothing Convert instructional goals and subordinate skills into terminal and subordinate objectives. It is important to remember that objectives are derived from the instructional goal and subordinate skills analyses. The following instructional goal and subordinate skills were taken from the writing composition goal in Appendix E. Demonstrate conversion of the goal and subordinate skills in the goal analysis by doing the following: 6. Create a terminal objective from the instructional goal: In written composition, (1) use a variety of sentence types and accompanying punctuation based on the purpose and mood of the sentence, and (2) use a variety of sentence types and accompanying punctuation based on the complexity or structure of the sentence. 7. Write performance objectives for the following subordinate skills: 5.6 State the purpose of a declarative sentence: to convey information 5.7 Classify a complete sentence as a declarative sentence 5.11 Write declarative sentences with correct closing punctuation. Evaluate performance objectives. Use the rubric as an aid to developing and evaluating your own objectives. 8. Indicate your perceptions of the quality of your objectives by inserting the number of the objective in either the Yes or No column of the checklist to reflect your judgment. Examine those objectives receiving No ratings and plan ways the objectives should be revised. Based on your analysis, revise your objectives to correct ambiguities and omissions. P
Walter Dick (The Systematic Design of Instruction)
Terminology and classification Leukaemias are traditionally classified into four main groups: • acute lymphoblastic leukaemia (ALL) • acute myeloid leukaemia (AML) • chronic lymphocytic leukaemia (CLL) • chronic myeloid leukaemia (CML). In acute leukaemia there is proliferation of primitive stem cells leading to an accumulation of blasts, predominantly in the bone marrow, which causes bone marrow failure. In chronic leukaemia the malignant clone is able to differentiate, resulting in an accumulation of more mature cells. Lymphocytic and lymphoblastic cells are those derived from the lymphoid stem cell (B cells and T cells). Myeloid refers to the other lineages, i.e. precursors of red cells, granulocytes, monocytes and platelets (see Fig. 24.2, p. 989). The diagnosis of leukaemia is usually suspected from an abnormal blood count, often a raised white count, and is confirmed by examination of the bone marrow. This includes the morphology of the abnormal cells, analysis of cell surface markers (immunophenotyping), clone-specific chromosome abnormalities and molecular changes. These results are incorporated in the World Health Organization (WHO) classification of tumours of haematopoietic and lymphoid tissues; the subclassification of acute leukaemias is shown in Box 24.47. The features in the bone marrow not only provide an accurate diagnosis but also give valuable prognostic information, allowing therapy to be tailored to the patient’s disease.
Nicki R. Colledge (Davidson's Principles and Practice of Medicine (MRCP Study Guides))
functions as an art. The functions are recording, classifying and summarizing transaction and events. Also it says that events & transactions should be of financial character. This definition also adds another function of interpreting the results of accounting. 1.1.2. The American Accounting Association (AAA) defines Accounting as “the process of identifying, measuring and communicating economic information to permit informed judgment and decision by user of the information.
Anonymous
year, hackers steal roughly $300 billion worth of information, from intellectual property to classified state secrets, according to a 2013 study by the Center for Strategic and International Studies.
Anonymous
Examples of aggregated simple appearances occurring during concentration include: seeds (thig le), subtle attributes (mtshan ma phra mo), and light rays (od zer gyi yan lag; JP, f. 36b). These are all experienced as a consequence of visualization. Because they appear during meditation, they are classified as perceptual events, and are therefore considered to be supports to concentration training.366 Seeds (thig le) are the most common type of aggregated simple appearance used in concentration training. A seed is a highly condensed perceptual event. In its simplest absorbed (bsdu ba’i thig le) form a seed is largely undifferentiated. A seed no longer pertains to a single sense modality like a visual form, but has “condensed the six sense systems into one” (RD, p. 6). A seed is the pool of sensory information occurring prior to the occurrence of a specific perception. A seed condenses all potential phenomena of saṃsāra and nirvāṇa within it. If it were thoroughly analyzed, the practitioner would find the seed ultimately to be the essential nature (rang bzhin) of all phenomena, namely space. Yet, just as something seems to arise from nothing, specific appearances come forth from a seed.
Daniel P. Brown (Pointing Out the Great Way: The Stages of Meditation in the Mahamudra Tradition)
Yeah, baby, I know about the X-wing Fighter. I just had no fuckin’ clue it was called the T-65 X-wing Starfighter.” “It’s not classified information, Chace. You can read all about it on Wookieepedia.
Kristen Ashley (Breathe (Colorado Mountain, #4))
No king could move safely or effectively without the support of such organized 'higher knowledge,' any more than the Pentagon can move today without consulting its specialized scientists, technical experts, games theorists and computers-a new hierarchy supposedly less fallible than the entrail-diviners, but, to judge by their gross miscalculations, not notably so. To be effective, this kind of knowledge must remain a secret priestly monopoly. If everyone had equal access to the sources of knowledge and to the system of interpretation, no one would believe in their infallibility, since their errors could then not be concealed. Hence the shocked protest of Ipu-wer against the revolutionaries who overthrew the Old Kingdom in Egypt was based on the fact that the "secrets of the temple lay unbared"; that is, they had made 'classified information' public. Secret knowledge is the key to any system of total control. Until printing was invented, the written word remained largely a class monopoly. Today the language of higher mathematics plus computerism has restored both the secrecy and the monopoly, with a consequent resumption of totalitarian control.
Lewis Mumford (Technics and Human Development (The Myth of the Machine, Vol 1))
I am so not kissing you tonight,” she informed him. He chuckled softly. And if she thought his smile was dangerous, his chuckle should’ve been classified as a biological weapon. Sin in a sound wave. “But now you’re thinking about what it would be like, ain’t you?” he said. “Only my stupid parts.
Jamie Farrell (Smittened (Misfit Brides, #3))
growth of the World Wide Web (WWW), computer entertainment, and multimedia. These factors, no doubt, played a major role in the recent Telecommunication Act that was passed by the United States Congress in 1996. This reform act, in short, was designed to promote competition among the major network operators for providing these services. Superhighway is the term used to define high-speed integrated access, and it has become a national goal spearheaded by vice president Al Gore under the National Information Infrastructure Act. One can classify today’s worldwide network as service-specific, more or less. Telecommunication networks were designed and deployed to handle voice traffic. Both platform and fabric were
Albert Azzam (High-Speed Cable Modems: Including IEEE 802.14 Standards (McGraw-Hill Series on Computer Communications))
Stone was no admirer of Snowden: he valued certain whistleblowers who selectively leaked secret information in the interest of the public good; but Snowden’s wholesale pilfering of so many documents, of such a highly classified nature, struck him as untenable. Maybe Snowden was right and the government was wrong—he didn’t know—but he thought no national security apparatus could function if some junior employee decided which secrets to preserve and which to let fly.
Fred Kaplan (Dark Territory: The Secret History of Cyber War)
I have concluded on the basis of classified information that Arar is unequivocally inadmissible to the United States,” the
Kurt Eichenwald (500 Days: Secrets and Lies in the Terror Wars)
The classified information was nothing more than the statements from El-Maati and Almalki that had been extracted by torture, and Omar Khadr’s false identification of Arar.
Kurt Eichenwald (500 Days: Secrets and Lies in the Terror Wars)
the U.S. government has a long history of overclassifying information that shouldn't be classified at all—and keeping information classified until long after any justification for classifying it has disappeared.
Rosa Brooks (How Everything Became War and the Military Became Everything: Tales from the Pentagon)
Once we understand Hillary as single-mindedly pursuing her own interest and financial gain, we can for the first time make sense of recent Clinton scandals. Consider the email scandal. What we know is that Hillary created and maintained an entirely private email server, insulated from her State Department requirements. This took great effort and required the collaboration of a whole team of aides as well as State Department bureaucrats. Why did Hillary do this? Her official explanation is convenience. Hillary simply wanted to get things done, and she was a little careless about how she went about doing them. She claims she got into all this trouble because she didn’t want to have to carry two phones.1 But setting up a parallel email system is actually very inconvenient. Far from being careless, Hillary was careful to do it in a manner that would allow her to carry on private communications that would not show up on an official network, rendering the Freedom of Information Act useless. By doing this, in essence she stole the people’s property. Sending classified and secret information through a private network is not merely harmful to the national security; it is also illegal. Former CIA director John Deutch, former National Security Adviser Sandy Berger, and General David Petraeus were all punished for doing it. Their offenses pale before Hillary’s. Moreover, Hillary, in the middle of a government investigation, went through her private emails, deleting thousands of them that she didn’t want the government or the public to see. Normal people who do such things end up in prison. Hillary, clearly, sees herself as politically protected by the Obama gang. She acts like she’s above the law, and so far she has been proven correct.
Dinesh D'Souza (Hillary's America: The Secret History of the Democratic Party)
Genes are, in fact, classified by the type of stimulus that turns them on and off. For example, experience-dependent or activity-dependent genes are activated when we’re having novel experiences, learning new information, and healing. These genes generate protein synthesis and chemical messengers to instruct stem cells to morph into whatever types of cells are needed at the time for healing
Joe Dispenza (You Are the Placebo: Making Your Mind Matter)
You also may have heard teachers say that students have different learning styles—for example, some are “visual learners” and others are “auditory learners.” The way the brain processes information actually runs counter to these classifications. Research shows that if children are taught new information using several modalities, such as learning letters of the alphabet by looking at them, writing them, and naming them, the brain areas underlying each modality become activated even when children later process information using one modality, such as vision only (James, 2007). This suggests that rather than classify students as one type of learner or another, we should ask students to learn information in a variety of ways. This is consistent with research indicating that providing students
Cheryl Cisero Durwin (EdPsych Modules)
The fifth risk did not put him at risk of revealing classified information. “Project management,” was all he said.
Michael Lewis (The Fifth Risk: Undoing Democracy)
If I’ve learned anything over the fifteen years I’ve investigated the CIA in Vermont, I’ve learned that CIA has the power to keep certain information covered up. Social Security was likely a victim of the cover up. I learned an interesting piece of information a few years ago about how CIA insures that certain activities remain secret. The scenario goes something like this: CIA briefs Governors, Congressman and Senators on classified programs, insuring that the official can never speak publicly about the information. The penalty for doing so is treason. I suspect that this method goes a long way in keeping certain CIA activities quiet. I’m sure there are situations when this is vital to national security, but using these methods to keep Americans from knowing about CIA illegal activities conducted on American soil is a whole other ballgame.
Karen Wetmore (Suviving Evil: CIA Mind Control Experiments in Vermont)
Science has and continues to make huge mistakes, and yet continues to arrogantly declare itself as the end all and be all of rational explanation of the universe. What are some of sciences big gaffs? The list is almost endless: the efficacy of frontal lobotomies, The Blank Slate theory (or Tabula rasa), Phlogiston Theory, the definition of the “GENE” (which has changed over and over since it was coined by Johansson in 1909), that we cannot send information faster than the speed of light, classifying humans into the different races, the invention of nuclear weapons, fossil fuels, CFCs (chlorofluorocarbons), leaded petrol and DDT.
Laurence Galian (Alien Parasites: 40 Gnostic Truths to Defeat the Archon Invasion!)
One particularly egregious example was a news report that the Administration tried to classify certain public-health information regarding the United States on the spurious excuse that China was involved.33 Of course China was involved, which is a reason to disseminate the information broadly, not restrict it.
John R. Bolton (The Room Where It Happened: A White House Memoir)
These include all the tools we use to extend or support our mental powers—to find and classify information, to formulate and articulate ideas, to share know-how and knowledge, to take measurements and perform calculations, to expand the capacity of our memory.
Nicholas Carr (The Shallows: What the Internet Is Doing to Our Brains)
Later that month, the State Department’s inspector general reported that a handful of Hillary’s e-mails contained information that was classified at the time the messages were sent. While it’s not possible to send e-mails directly from the government’s classified systems to outside accounts, there are a few ways in which classified material can end up in outside e-mail—for example, information that should have been classified was not categorized that way by the sender, or someone unwittingly included secret or sensitive passages in a message sent outside the classified systems. Hillary and her aides argued that she was being railroaded by agencies retroactively classifying information in some cases, and, in others, citing material that was not marked classified when it passed into and out of her in-box. Ultimately, what they were saying was that Hillary clearly didn’t intend to transmit classified information—a legal distinction that would become important when federal investigators considered whether to charge her with a crime. In addition, the vast majority of the e-mails that included classified material were traded with people who had security clearances consistent with the levels at which the information in question was classified. That is, Hillary wasn’t giving out secrets to people who shouldn’t have had them; she was just e-mailing the right people on the wrong system. But from a public relations perspective, the technicalities didn’t matter. Hillary had told the nation that she didn’t traffic in classified information, and government investigators put the lie to that assertion day after day. In many cases, the twists and turns—the discovery of more highly classified material—played out first in stories leaked to the media for maximum impact.
Jonathan Allen (Shattered: Inside Hillary Clinton's Doomed Campaign)
the military classified Patent 2,292,387 as top secret and, in the 1950s, gave it to a contractor for the construction of a sonobuoy that could detect submarines in the water and then transmit that information to an airplane above using Hedy’s unjammable frequency-hopping idea. Later, the military and other private entities began to make their own inventions using this interpretation of spread-spectrum technology—without any recompense to Hedy, as the patent had expired—and today, aspects of her frequency-hopping idea can be found in the wireless devices we use every day. Hedy’s role in these advancements was unknown until the 1990s, when she received a few awards for her invention, recognition she considered more important than the success of her movies.
Marie Benedict (The Only Woman in the Room)
On March 7, 2017, WikiLeaks released CIA Vault 7, a cache of classified CIA documents containing information about the spy agency’s hacking tools. Vault 7
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
Despite the classified nature of the event it’s really pretty boring: we’re here to swap departmental gossip about our mutual areas of interest and what’s been going on lately, update each other on new procedural measures and paperwork hoops we need to jump through to requisition useful information from our respective front-desk operations, and generally make nice. With only a decade to go until the omega conjunction—the period of greatest risk during NIGHTMARE GREEN, when the stars are right—everyone in Europe is busy oiling the gears and wheels of our occult defense machinery. Nobody wants their neighbors to succumb to a flux of green, gibbering brain-eaters, after all: it tends to lower real estate values.
Charles Stross (The Jennifer Morgue (Laundry Files, #2))
The DOJ did not charge Wolfe with leaking classified information, though the document contained both “Secret” and “Top Secret” information about Carter Page.
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
I learned that a covert CIA operation known as ‘The Finders,’ based in Washington DC, was actively involved in kidnapping and trafficking of children since the early 1960s.  This matter was brought to the attention of the FBI and State Department in 1997.  A report by the Metropolitan Police Department was classified ‘Secret’ in the interest of National Security.  The investigation by the FBI was closed down,  however,  according  to  the U.S. Customs  investigation  report.  ‘The Finders’  became  an internal matter. I  have  given  this  information  to  the  FBI  on  seven  occasions,  and  have  demanded  an investigation for the international kidnapping and trafficking of children.”   Fostered,
Lori Carangelo (Chosen Children 2016: People as Commodities in America's Failed Multi-Billion Dollar Foster Care, Adoption and Prison Industries)
If Sam had been caught passing classified information on a private email server, she would be in jail. Simple as that.
William Miller (Noble Vengeance (Jake Noble, #2))
e-mailing the right people on the wrong system. But from a public relations perspective, the technicalities didn’t matter. Hillary had told the nation that she didn’t traffic in classified information, and government investigators put the lie to that assertion day after day. In
Jonathan Allen (Shattered: Inside Hillary Clinton's Doomed Campaign)
The Cover-Ups By now, most discerning conservative Americans know that anyone who is a part of the Deep-State Cabal receives the protection of the men and women within their inner-circle. A prime example is Hillary Clinton. Much of what she did with her personal servers and e-mails broke federal laws. She placed a personal server in her closet that held several classified e-mails that, by law, were only to be on a government-protected classified server. She then erased tens of thousands of e-mails to prevent them from being downloaded by investigators. She had her computer hard drive wiped clean to prevent professionals from finding what she had written, and she destroyed phones. She broke election laws by contacting a foreign government and paying for fake information to trap Trump. There are also questionable donations for the Clinton Foundation from world leaders to perhaps gain political favors. Despite all of this, why was she protected and never charged for criminal misconduct?
Perry Stone (America's Apocalyptic Reset: Unmasking the Radical's Blueprints to Silence Christians, Patriots, and Conservatives)
I am convinced now that I and the rest of the expedition were given access to these records for the simple reason that, for certain kinds of classified information, it did not matter what we knew or didn’t know. There was only one logical conclusion: Experience told our superiors that few if any of us would be coming back.
Jeff VanderMeer
Long pause. Somehow Stephan immediately knew this was a lie. Jane was interested in having a good time, not in espionage. Her smiling face momentarily appeared in his memory. But it wasn’t customary to ask the KGB for proof. Nevertheless, he asked a stupid question: “And how do you know? She’s never behaved in a strange or suspicious way.” “Well, this is our work. I can’t tell you about our sources. All you need to know is that your friend is an agent of the enemy.” Technically speaking, according to Soviet custom, this makes me a traitor, thought Stephan. Prosecutor, judge, and juror. Three in one. And not to forget, the executioner. Years of training, millions of guinea pigs. What could be his counterargument? He wished this day had never happened. The major was apparently following a familiar routine: “Do you think you can help us?” “Help how?” Stephan was receiving too much information to digest quickly. “We need to make sure that our state secrets remain safe. That the enemy doesn’t infiltrate our ranks and use such a respected family as yours to gain access to classified information.” “But I don’t have access to any secrets!” Stephan said naively. “Your brother does, though.
Sergei Kasian (The Cure: An Experimental Guide to Eternal Life)
United Airlines Contact Number +1-855-653-5006 In the event that you wish to make the most of your trip with United Airlines, you have to connect with the United Airlines customer service team for reservations without any second thoughts. United Airlines is at your administration day-and-night to give the best answers for every one of your issues and inquiries. United Airlines does a decent turn by permitting you to snatch appealing offers and plans which can be appended to the current cost of your business class flights. When you connect with the United Airlines customer service team, they make sure that you get a package to the extent that appropriateness and moderateness of flight levies are concerned. United Airlines additionally guarantees that all your personal information remains secure and classified. Dial the United Airlines Contact number +1-855-653-5006 and get the required support right away. Passengers must connect with United Airlines customer service team to use helpful administrations with regards to the flight bookings. The main focus is to provide quality service to travelers going with the United Airlines. The telephone line goes to your help in interfacing you with the inviting experts, in the occasion you go over any issue, previously, in the midst of or after the flight. Given that you've questions or fears which have to do with one or the other frivolous or vital issues, the customer service administrations of United Airlines happens to extraordinary use by permitting you to arrive at concerned authorities and get the issues identified and settled.
PAVIYEP P
Alaska Airlines Cancellation-+1-855-653-5006 Alaska Airlines Cancellation you have to connect with the Airlines customer service team for reservations without any second thoughts. Airlines are at your administration day-and-night to give the best answers for every one of your issues and inquiries. Airlines do a decent turn by permitting you to snatch appealing offers and plans which can be appended to the current cost of your business class flights. When you connect with the Airlines customer service team, they make sure that you get a package to the extent that appropriateness and moderateness of flight levies are concerned. Airlines additionally guarantee that all your personal information remains secure and classified. Airlines schedule its flight tickets to more destinations, however, there are several places where this airline still doesn’t fly owing to the connectivity issues. So, if Airlines don't fly to your desired destination, then make bookings with partner airlines and enjoy your journey without any hassle. The airline has partnered with several other trusted airlines to improve its connectivity as well as the customer service. Some of the airline’s partners are listed here for the flyers’ sake of convenience. Go through the list and then make Airlines book flights accordingly.
YOHADA
Alaska Airlines Reservations+1-855-653-5006 Alaska Airlines Reservations Passengers can call the support experts who will provide the assured solution to the issues raised by them. you have to connect with the Airlines customer service team for reservations without any second thoughts. Airlines are at your administration day-and-night to give the best answers for every one of your issues and inquiries. Airlines do a decent turn by permitting you to snatch appealing offers and plans which can be appended to the current cost of your business class flights. When you connect with the Airlines customer service team, they make sure that you get a package to the extent that appropriateness and moderateness of flight levies are concerned. Airlines additionally guarantee that all your personal information remains secure and classified. Moreover, travelers can reap the benefits of the 24/7 prompt customer service by calling on a dedicated American Airlines contact number. At any instances, when the passengers require urgent help, they can seek advice from any AA representatives by dialing American Airlines book flight phone number. Upon calling on the dedicated American Airlines reservations phone number, you will be connected to one of the customer service agents and your concern or query will be addressed within no time.
PEHIF
All forms of electronic communication use electromagnetic waves. And all electromagnetic waves have a place, classified by their length, on the electromagnetic spectrum. On one end are long waves—signals like the ones broadcast from huge antennas that project songs onto AM and FM radio stations. These undulating waves might measure several meters, or even hundreds of meters. Next come shorter waves whose lengths might only be measured in centimeters or millimeters. These wavelengths are commonly used for TV signals and radar. Generally speaking, the shorter the wavelength, the higher its frequency, and the more information it can carry. By the early 1960s, Bell Labs executives had concluded that millimeter waves would serve as the communications medium of the future. The idea at Bell Labs was to send information through such waves not by wires or broadcast towers but by means of the circular waveguide,
Jon Gertner (The Idea Factory: Bell Labs and the Great Age of American Innovation)
As in the case of the individual, not all the information which is available to the race at one time is accessible without special effort. There is a well-known tendency of libraries to become clogged by their own volume; of the sciences to develop such a degree of specialization that the expert is often illiterate outside his own minute specialty. Dr. Vannevar Bush has suggested the use of mechanical aids for the searching through vast bodies of material. These probably have their uses, but they are limited by the impossibility of classifying a book under an unfamiliar heading unless some particular person has already recognized the relevance of that heading for that particular book. In the case where two subjects have the same techniques and intellectual content but belong to widely separated fields, this still requires some individual with an almost Leibnizian catholicity of interest.
Norbert Wiener (Cybernetics: or the Control and Communication in the Animal and the Machine)
Spirit Airlines Customer Service Number-+1-855-653-5006 Spirit Airlines Customer Service Number you have to connect with the Airlines customer service team for reservations without any second thoughts. Airlines are at your administration day-and-night to give the best answers for every one of your issues and inquiries. Airlines do a decent turn by permitting you to snatch appealing offers and plans which can be appended to the current cost of your business class flights. When you connect with the Airlines customer service team, they make sure that you get a package to the extent that appropriateness and moderateness of flight levies are concerned. Airlines additionally guarantee that all your personal information remains secure and classified. Nothing compares to buying your flight tickets with the world’s largest airline. The airline offers the most affordable flight tickets option along with a safe and pleasurable journey. It provides a flexible flight reservation option and allows you to use your money by offering various budget options as per your preferences. The airline also provides the option of making changes to your current tickets without any additional effort. Yeah, yeah, you read that right! In case your travel plans change, you may make changes to your bookings. Just make a few clicks and make the adjustments you want.
POWASAP