“
O divine art of subtlety and secrecy! Through you we learn to be invisible, through you inaudible, and hence we can hold the enemy's fate in our hands.
”
”
Sun Tzu (The Art of War)
“
The corporations that profit from permanent war need us to be afraid. Fear stops us from objecting to government spending on a bloated military. Fear means we will not ask unpleasant questions of those in power. Fear permits the government to operate in secret. Fear means we are willing to give up our rights and liberties for promises of security. The imposition of fear ensures that the corporations that wrecked the country cannot be challenged. Fear keeps us penned in like livestock.
”
”
Chris Hedges (The Death of the Liberal Class)
“
Some information is classified legitimately; as with military hardware, secrecy sometimes really is in the national interest. Further, military, political, and intelligence communities tend to value secrecy for its own sake. It's a way of silencing critics and evading responsibility - for incompetence or worse. It generates an elite, a band of brothers in whom the national confidence can be reliably vested, unlike the great mass of citizenry on whose behalf the information is presumably made secret in the first place. With a few exceptions, secrecy is deeply incompatible with democracy and with science.
”
”
Carl Sagan
“
The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings...Our way of life is under attack. Those who make themselves our enemy are advancing around the globe...no war ever posed a greater threat to our security. If you are awaiting a finding of "clear and present danger," then I can only say that the danger has never been more clear and its presence has never been more imminent...For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.
”
”
John F. Kennedy
“
Some of the speed and secrecy of our victory, and its regularity, might perhaps be ascribed to this double endowment's offsetting and emphasizing the rare feature that from end to end of it there was nothing female in the Arab movement, but the camels.
”
”
T.E. Lawrence (Seven Pillars of Wisdom: With Maps, Photographs, Illustrations & Compendium Of Military Articles)
“
Chinese literature on strategy from Sun Tzu through Mao Tse-tung has emphasized deception more than many military doctrines. Chinese deception is oriented mainly toward inducing the enemy to act inexpediently and less toward protecting the integrity of one’s own plans. In other cultures, particularly Western, deception is used primarily with the intention of ensuring that one’s own forces can realize their maximum striking potential … the prevalent payoff of deception for the Chinese is that one does not have to use one’s own forces.… Chinese tend to shroud their means in secrecy and not publicize the day-to-day activities of those in power; for surprise and deception are assumed to be vital.28
”
”
Michael Pillsbury (The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower)
“
...individuals so employed need almost never accept responsibility for their actions. They are protected and anonymous. Military secrecy makes the military the most difficult sector of any society for the citizens to monitor. If we do not know what they do, it is very hard for us to stop them.
”
”
Carl Sagan (Cosmos)
“
It's the secrecy surrounding drone strikes that's most troubling. . . We don't know the targeting criteria, or whether the rules for CIA and military drone strikes differ; we don't know the details of the internal process through which targets are vetted; we don't know the chain of command, or the details of congressional oversight. The United States does not release the names of those killed, or the location or number of strikes, making it impossible to know whether those killed were legitimately viewed as combatants or not. We also don't know the cost of the secret war: How much money has been spent on drone strikes? What's the budget for the related targeting and intelligence infrastructures? How is the government assessing the costs and benefits of counterterrorism drone strikes? That's a lot of secrecy for a targeted killing program that has reportedly caused the deaths of several thousand people. (117-118)
”
”
Rosa Brooks (How Everything Became War and the Military Became Everything: Tales from the Pentagon)
“
As a result, we receive panicked calls from police chiefs, government ministers, members of the aristocracy, military officers, councillors, intelligence agents, churchmen, surgeons, diplomats, hospital administrators, etc. We also have people placed in key organizations who keep us abreast of significant developments. Still, despite all these connections, we maintain our secrecy. Our name does not appear on any piece of paper outside of our organization. In fact, very few on the outside know that we exist. People are given a phone number to call, and information comes to us through twisty channels. Our computer network is not connected to any external system. If you try to track us down, you will not find us, but we will find you.
”
”
Daniel O'Malley (The Rook (The Checquy Files, #1))
“
Building the bomb was the single most expensive engineering project in the history of the United States. It began in 1942, and by the time the bomb was tested, inside the White Sands Proving Ground in the New Mexico high desert on July 16, 1945, the bomb’s price tag, adjusted for inflation, was $28,000,000,000. The degree of secrecy maintained while building the bomb is almost inconceivable.
”
”
Annie Jacobsen (Area 51: An Uncensored History of America's Top Secret Military Base)
“
The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings...Our way of life is under attack. Those who make themselves our enemy are advancing around the globe...no war ever posed a greater threat to our security. If you are awaiting a finding of "clear and present danger," then I can only say that the danger has never been more clear and its presence has never been more imminent...For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.
”
”
ohn F. Kennedy
“
By 1950, then, the three primary fossil fuels—coal, petroleum, and natural gas—all fed the large energy needs of the United States and, in various portion, the rest of the developed world. If coal share was declining worldwide, petroleum was approaching dominance, and natural gas had only begun to penetrate the world market. In those immediate postwar years as well, an entirely new source of energy, nuclear fission, the first potentially major energy source not derived directly or indirectly from sunlight, languished behind walls of secrecy, released as yet only to military use.
”
”
Richard Rhodes (Energy: A Human History)
“
No, that’s not the style of these people,’ explained Maxy. ‘You shouldn’t think of these Bolsheviks as modern politicians. They were religious fanatics. Their Marxism was fanatical; their fervour was semi-Islamic; and they saw themselves as members of a secret military-religious order like the medieval Crusaders or the Knights Templar. They were ruthless, amoral and paranoid. They believed that millions would have to die to create their perfect world. Family, love and friendship were nothing compared to the holy grail. People died of gossip at Stalin’s court. For a man like Satinov, secrecy was everything.
”
”
Simon Sebag Montefiore (Sashenka)
“
He thought the sovereignty of the states only enfeebled the union. “The fundamental defect is a want of power in Congress,” he declared. He favored granting Congress supreme power in war, peace, trade, finance, and foreign affairs. Instead of bickering congressional boards, he wanted strong executives and endorsed single ministers for war, foreign affairs, finance, and the navy: “There is always more decision, more dispatch, more secrecy, more responsibility where single men than when bodies are concerned. By a plan of this kind, we should blend the advantages of a monarchy and of a republic in a happy and beneficial union.” Hamilton was especially intent upon subjecting all military forces to centralized congressional control:
”
”
Ron Chernow (Alexander Hamilton)
“
For many years there have been rumours of mind control experiments. in the United States. In the early 1970s, the first of the declassified information was obtained by author John Marks for his pioneering work, The Search For the Manchurian Candidate. Over time retired or disillusioned CIA agents and contract employees have broken the oath of secrecy to reveal small portions of their clandestine work. In addition, some research work subcontracted to university researchers has been found to have been underwritten and directed by the CIA. There were 'terminal experiments' in Canada's McGill University and less dramatic but equally wayward programmes at the University of California at Los Angeles, the University of Rochester, the University of Michigan and numerous other institutions. Many times the money went through foundations that were fronts or the CIA. In most instances, only the lead researcher was aware who his or her real benefactor was, though the individual was not always told the ultimate use for the information being gleaned. In 1991, when the United States finally signed the 1964 Helsinki Accords that forbids such practices, any of the programmes overseen by the intelligence community involving children were to come to an end. However, a source recently conveyed to us that such programmes continue today under the auspices of the CIA's Office of Research and Development. The children in the original experiments are now adults. Some have been able to go to college or technical schools, get jobs. get married, start families and become part of mainstream America. Some have never healed. The original men and women who devised the early experimental programmes are, at this point, usually retired or deceased. The laboratory assistants, often graduate and postdoctoral students, have gone on to other programmes, other research. Undoubtedly many of them never knew the breadth of the work of which they had been part. They also probably did not know of the controlled violence utilised in some tests and preparations. Many of the 'handlers' assigned to reinforce the separation of ego states have gone into other pursuits. But some have remained or have keen replaced. Some of the 'lab rats' whom they kept in in a climate of readiness, responding to the psychological triggers that would assure their continued involvement in whatever project the leaders desired, no longer have this constant reinforcement. Some of the minds have gradually stopped suppression of their past experiences. So it is with Cheryl, and now her sister Lynn.
”
”
Cheryl Hersha (Secret Weapons: How Two Sisters Were Brainwashed to Kill for Their Country)
“
There is safety in learning doctrine in gatherings which are sponsored by proper authority. Some members, even some who have made covenants in the temple, are associating with groups of one kind or another which have an element of secrecy about them and which pretend to have some higher source of inspiration concerning the fulfillment of prophecies than do ward or stake leaders or the General Authorities of the Church. Know this: There are counterfeit revelations which, we are warned, “if possible . . . shall deceive the very elect, who are the elect according to the covenant.” (JS—M 1:22.) . . .
For the past several years we have watched patterns of reverence and irreverence in the Church. While many are to be highly commended, we are drifting. We have reason to be deeply concerned.
The world grows increasingly noisy. Clothing and grooming and conduct are looser and sloppier and more disheveled. Raucous music, with obscene lyrics blasted through amplifiers while lights flash psychedelic colors, characterizes the drug culture. Variations of these things are gaining wide acceptance and influence over our youth. . . .
This trend to more noise, more excitement, more contention, less restraint, less dignity, less formality is not coincidental nor innocent nor harmless.
The first order issued by a commander mounting a military invasion is the jamming of the channels of communication of those he intends to conquer.
Irreverence suits the purposes of the adversary by obstructing the delicate channels of revelation in both mind and spirit.
”
”
Boyd K. Packer
“
In a 2013 speech, President Barack Obama laid out three rules for deciding whether to launch a drone strike against a specific target. The starting point was the national security, geopolitical, and civilian-safety objectives the president hoped to achieve. Three simple rules translated these broad goals into more concrete guidelines: Does the target pose a continuing and imminent threat to the American people? Are there no other governments capable of effectively addressing the threat? Is there near certainty that no civilians will be killed or injured? Only if the answer to all three of these questions was yes would a drone strike be authorized. The American drone program is shrouded in secrecy, and it is unclear exactly how these simple rules have been used within the chain of decision making. By virtue of their simplicity and directness, however, they could provide a useful framework to structure discussions about these very tough decisions. And there is some evidence that they are working. In 2013, the year Obama articulated these simple rules, there was a sharp decline in confirmed civilian casualties by drone strikes. The concreteness of these rules also makes communicating them, both to U.S. citizens and the international community, straightforward. The United States has enjoyed a virtual monopoly on military drones, but that will not last forever. The U.K., China, Israel, and Iran had operational military drones in 2014, while other countries, including India, Pakistan, and Turkey, have advanced development programs. By articulating and adhering to a set of principles governing the use of drones, the United States has an opportunity to shape the international standards that other countries will use to guide their decisions in the future.
”
”
Donald Sull (Simple Rules: How to Thrive in a Complex World)
“
In Nevada, at Frenchman’s Flat, a bright flash and ugly mushroom cloud had signified a gigantic change in the tactical battlefield—a change that had not come about at Hiroshima, despite statements to the contrary. In its early years the atomic device had remained a strategic weapon, suitable for delivery against cities and industries, suitable to obliterate civilians, men, women, and children by the millions, but of no practical use on a limited battlefield—until it was fired from a field gun. Until this time, 1953, the armies of the world, including that of the United States, had hardly taken the advent of fissionable material into account. The 280mm gun, an interim weapon that would remain in use only a few years, changed all that, forever. With an atomic cannon that could deliver tactical fires in the low-kiloton range, with great selectivity, ground warfare stood on the brink of its greatest change since the advent of firepower. The atomic cannon could blow any existing fortification, even one twenty thousand yards in depth, out of existence neatly and selectively, along with the battalions that manned it. Any concentration of manpower, also, was its meat. It spelled the doom of Communist massed armies, which opposed superior firepower with numbers, and which had in 1953 no tactical nuclear weapons of their own. The 280mm gun was shipped to the Far East. Then, in great secrecy, atomic warheads—it could fire either nuclear or conventional rounds—followed, not to Korea, but to storage close by. And with even greater secrecy, word of this shipment was allowed to fall into Communist hands. At the same time, into Communist hands wafted a pervasive rumor, one they could neither completely verify nor scotch: that the United States would not accept a stalemate beyond the end of summer. The psychological pressures on Chinese Intelligence became enormous. Neither an evaluative nor a collective agency, even when it feels it is being taken, dares ignore evidence.
”
”
T.R. Fehrenbach (This Kind of War: The Classic Military History of the Korean War)
“
This is a special kind of depression. It comes from the great burden laid on our shoulders. A depression you can't shake off, so that it is part and parcel of you all the time you go on with your military activities. This depression leads to melancholy. It's od to point to somebody young and say: there goes a sad man. That is our lot. One of the things that weighs me down most is that it's forbidden to speak of this sadness outside the limits of the army. In fact, I'm forbidden to share it with anyone. The main reason is the secrecy that surrounds everything that has to do with the military. In order to explain the depression, you have to talk about its origins, and that's prohibited, of course. Another reason is that it's almost impossible to explain the nature of this sadness to anyone who doesn't know it; the sadness will always be interpreted as something else. Within itself it's not mentioned-- It exists, but for each man separately. it is never discussed. Thus another factor comes into the picture-- loneliness. But loneliness, sadness and depression are the lot of great masses of people in this world. Well, then, What kind of God-forsaken world are we living in? It contains so much beauty, so much grandeur and nobility- but men destroy everything that is beautiful in the world. It seems, indeed, that from time immemorial we have been forgotten by the gods.
”
”
Jonathan Netanyahu
“
Over and above the nagging pain, Marin had a reaction to that. It was as if he had somehow been hoping all this time, and now, suddenly, there was no hope. He felt the letdown, a kind of apathy of acceptance, a dull conviction that the worst was true, and a great sadness. He looked toward where he remembered having seen Riva that first night, her nude, tanned body half covered by the sheets of the bed. And then he visualized the same body at the instant of the titanic explosion, charred and smoldering, quickly burned to a fine ash. And in the shattered buildings all around him the members of Group 814, who had offered Wade Trask their good will, had died in a flash of dissolving fire. What was immensely disturbing was that they had died because he had discovered a secret.
As he walked stiffly over the broken floor, back to where the laboratory had been, he had another thought: Even if he could survive the sentence of death, the Brain would search ceaselessly for the individual—himself—who knew of its existence. And, accordingly, it was time to be logical. “Am I going to try to save myself?” Marin asked himself the question.
He had been waiting, he realized tensely, for something to happen that would automatically get him out of his predicament. He thought, Suppose I handled this entire affair as if it were a military campaign—who is the enemy?
The Brain?
He felt restless and indecisive. He bent down painfully and pushed a charred metal bar out of the way. And then he was able to look at the spot where—if his calculation was correct—his own body had lain. Right here, two days ago, the awareness entity that was Wade Trask inhabiting the body of David Marin had met instant death. Because of that event, the issue was now confused, but not too much. If the enemy were truly the Brain, then he could treat everyone else as if they were but puppets.
“They were . . .” He tried to think it with intense conviction. “They are!”
How could any competent authority fail to find the Brain? All those who were looking must be agents of the Brain. The entire search for such a massive structure was a farce. It was impossible to fail. He recalled Slater’s words and attitude, the secrecy of the search. Every Control officer who sought with such apparent determination was sworn to silence, and somehow they had managed to create a mental attitude whereby it became dangerous for anyone to remember that the Brain existed.
”
”
A.E. van Vogt (The Mind Cage (Masters of Science Fiction))
“
Back in the ’70s, a former prosecutor named Jules Kroll founded his eponymous firm, catering to law firms and banks, and staffed by former cops, FBI agents, and forensic accountants. The formula, and a generation of copycats, flourished. In the 2000s, Israel became a hotbed for such firms. The country’s mandatory military service, and the legendary secrecy and accomplishment of its intelligence agency, Mossad, created a ready pipeline of trained operatives. The Israeli firms began emphasizing less conventional forms of corporate espionage, including “pretexting”: using operatives with false identities.
”
”
Ronan Farrow (Catch and Kill: Lies, Spies, and a Conspiracy to Protect Predators)
“
This is the fundamental game of the Secret Team. They have this power because they control secrecy and secret intelligence and because they have the ability to take advantage of the most modern communications system in the world, of global transportation systems, of quantities of weapons of all kinds, and when needed, the full support of a world-wide U.S. military supporting base structure. They can use the finest intelligence system in the world, and most importantly, they have been able to operate under the canopy of an assumed, ever-present enemy called “Communism.” It will be interesting to see what “enemy” develops in the years ahead. It appears that “UFO’s and Aliens” are being primed to fulfill that role for the future. To top all of this, there is the fact that the CIA, itself, has assumed the right to generate and direct secret operations.
”
”
L. Fletcher Prouty (The Secret Team: The CIA & its Allies in Control of the United States & the World)
“
If the First Gulf War made PLA military planners pay close attention to American battle prowess, the appearance in Beijing in 1999 of a volume called Unrestricted Warfare returned the favor. This book gave Pentagon strategists an alarming window into Chinese thinking about the nature of their engagement with the Western world, particularly the United States. The authors were two senior PLA colonels from China’s rising military elite, Qiao Liang and Wang Xiangsui, whose work obviously had official sanction.19 Qiao and Wang argued that China should use all means, armed and unarmed, military and nonmilitary, and lethal and nonlethal, to compel the enemy to accept its interests.
”
”
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
“
America’s power position as “the hammer of the whole earth” extends to more than military power. America tells other nations what to do and how to do it. For example, America forced the UBS AG Bank in Switzerland to close all of the offshore accounts in the Swiss Bank held by U.S. citizens, as part of an IRS “tax investigation which challenges Switzerland’s famous banking secrecy laws.” (Reuters, January 9, 2009).
”
”
John Price (The End of America: The Role of Islam in the End Times and Biblical Warnings to Flee America)
“
This is the fundamental game of the Secret Team. They have this power because they control secrecy and secret intelligence and because they have the ability to take advantage of the most modern communications system in the world, of global transportation systems, of quantities of weapons of all kinds, of a world-wide U.S. military supporting base structure. They can use the finest intelligence system in the world, and most importantly, they are able to operate under the canopy of an ever-present “enemy” called “Communism.” And then, to top all of this, there is the fact that the CIA has assumed the right to generate and direct secret operations.
”
”
L. Fletcher Prouty (The Secret Team: The CIA & its Allies in Control of the United States & the World)
“
The lecturer’s name was Dr. Shen Weiguang, and although he’s now regarded as the founding sage of Chinese information warfare theory, his views were then on the fringe in strategic circles in the Middle Kingdom. “Virus-infected microchips can be put in weapon systems,” he pointed out. “An arms manufacturer can be asked to write a virus into software, or a biological weapon can be embedded into the computer system of an enemy nation and then activated as needed. . . . Preparation for a military invasion can include hiding self-destructing microchips in systems designed for export.” Tactics like these, he said, could have profound strategic implications if carried out carefully and systematically. They could “destroy the enemy’s political, economic, and military information infrastructures, and, perhaps, even the information infrastructure for all of society.” If China could do that, Shen said, it could achieve the greatest of all strategic military objectives: It could “destroy the enemy’s will to launch a war or wage a war.
”
”
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
“
The agents of imperial demise would certainly be backed up by military power—the Chinese have never wavered in that view—but the agents would be many and varied: economic, legal, public relations—and electronic sabotage. The success of George Soros’s then recent speculative attack on the currencies of several East Asian nations impressed but appalled the Chinese (who have pegged their own currency to the dollar in part to discourage such tactics). Soros and his traders had driven down the value of these currencies, forcing them into line with their true worth! But that point was lost on Qiao and Wang, as it was lost on noncapitalists (i.e., most people) around the world, who saw only economic chaos in Asia created by Western capitalists. To the authors of Unrestricted Warfare, these attacks were a form of economic terrorism on par with bin Laden’s bombings of U.S. embassies in East Africa, Aum Shinrikyo’s sarin gas attack in the Tokyo subway, and the depredations of malicious hackers on the Internet. They “represent semi-warfare, quasi-warfare, and sub-warfare, that is, the embryonic form of another kind of warfare.” Such warfare knows no boundaries, and against it, borders have no meaning.
”
”
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
“
The Chinese are forcing Mao’s PLA into the twenty-first century as fast as they can, and have launched the most ambitious naval modernization program since the PRC was founded in 1949.38 Yet the principle of the “people’s war” remains a pillar of military doctrine as well as national mythology, and they have not abandoned it.39
”
”
Joel Brenner (Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World)
“
The Secrets of Skunk: Part Two At the Lockheed skunk works, Kelly Johnson ran a tight ship. He loved efficiency. He had a motto—“be quick, be quiet, and be on time”—and a set of rules.6 And while we are parsing the deep secrets of skunk, it’s to “Kelly’s rules” we must now turn. Wall the skunk works off from the rest of the corporate bureaucracy—that’s what you learn if you boil Johnson’s rules down to their essence. Out of his fourteen rules, four pertain solely to military projects and can thus be excluded from this discussion. Three are ways to increase rapid iteration (a topic we’ll come back to in a moment), but the remaining seven are all ways to enforce isolation. Rule 3, for example: “The number of people with any connection to the project should be restricted in an almost vicious manner.” Rule 13 is more of the same: “Access by outsiders to the project and its personnel must be strictly controlled by appropriate security measures.” Isolation, then, according to Johnson, is the most important key to success in a skunk works. The reasoning here is twofold. There’s the obvious need for military secrecy, but more important is the fact that isolation stimulates risk taking, encouraging ideas weird and wild and acting as a counterforce to organizational inertia. Organizational inertia is the notion that once any company achieves success, its desire to develop and champion radical new technologies and directions is often tempered by the much stronger desire not to disrupt existing markets and lose their paychecks. Organizational inertia is fear of failure writ large, the reason Kodak didn’t recognize the brilliance of the digital camera, IBM initially dismissed the personal computer, and America Online (AOL) is, well, barely online. But what is true for a corporation is also true for the entrepreneur. Just as the successful skunk works isolates the innovation team from the greater organization, successful entrepreneurs need a buffer between themselves and the rest of society. As Burt Rutan, winner of the Ansari XPRIZE, once taught me: “The day before something is truly a breakthrough, it’s a crazy idea.” Trying out crazy ideas means bucking expert opinion and taking big risks. It means not being afraid to fail. Because you will fail. The road to bold is paved with failure, and this means having a strategy in place to handle risk and learn from mistakes is critical. In a talk given at re:Invent 2012, Amazon CEO Jeff Bezos7 explains it like this: “Many people misperceive what good entrepreneurs do. Good entrepreneurs don’t like risk. They seek to reduce risk. Starting a company is already risky . . . [so] you systematically eliminate risk in those early days.
”
”
Peter H. Diamandis (Bold: How to Go Big, Create Wealth and Impact the World (Exponential Technology Series))
“
But there were others with reason to be thankful for the disappearance of that peculiar airplane—intelligence professionals enjoying the unprecedented influence conferred on them by the cold war’s cult of secrecy; military brass sitting atop armed forces that still consumed a tenth of the nation’s gross domestic product seven years after the end of the Korean War; and above all the missile manufacturers—Convair, Douglas, Lockheed, the Martin Company—girding themselves for an open-ended arms race to outproduce the Soviets in the technologies of an exotic new national defense that only Eisenhower seemed ready to resist. It is no surprise that many believed Article 360’s loss was no accident on America’s part; nor that some still do. *
”
”
Giles Whittell (Bridge of Spies)
“
in the 1980s it was only government, the military and large businesses that owned computers powerful enough to run RSA. Not surprisingly, RSA Data Security, Inc., the company set up to commercialize RSA, developed their encryption products with only these markets in mind.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
How can a man be still if he sees such a great wrong being instigated?'
'It's difficult, but it's necessary,' Professor While insisted. 'Science must go on unhindered, and if we bring politics into our work we will cease to be scientists.'
'Will we cease being human?' MacGregor demanded with the rudeness of justifying himself. 'Should we hand over our affairs to men we despise?'
'I suppose that is unanswerable.' Professor White was an deep into it now as MacGregor. 'But when we dabble in politics we suffer what you are suffering now, and it isn't worth it. Is it?'
'I don't know,' MacGregor said morosely.
'Then why destroy yourself?'
'I don't believe a man has much choice any more,' MacGregor said. 'There seems to be some kind of a battle going on for any existence, science and all.'
'You may be right,' the Professor said. 'We are certainly facing a situation of terrible choice. Only yesterday the physicist chaps back from America brought in a petition to sign against control and secrecy of information and research in nuclear physics. Once they start on this secrecy business there is no telling where it will end. It was bad enough when we were working at Tennessee. We cannot have those ignorant politicians telling us what we must do.'
'They are already telling us what we must do,' MacGregor argued. 'The military control so much research that the phyusicist are becoming straight-out weapon makers and nothing else.'
'It's not the physicists' fault...'
'Then why don't they stop working for the military. Now they are talking about radio-active dust clouds and the biologists are producing concentrates of bacteria for wholesale disease-making. What's the matter with them? Have the Generals got them so scared that they meekly do as they are told?'
'Weapons are a part of life,' the Professor commented sadly, 'and since the politicians refuse to be peaceful, at least they ask for weapons and give us a chance we would not otherwise have of making enormous strides in costly research.'
'Perhaps. But don't we care how the products of our research are used?'
'You are looking for logic where there isn't any,' the Professor said. 'It isn't science which shapes the world, young man.'
'No sir, but we are part of it.'
'Really a very small part of it. The ultimate decision on human affairs lies outside science. We may be part of it, but if you are looking for the deciding factor in the shape of existence then I don't know where you'll find it.
”
”
James Aldridge (The Diplomat)
“
the U.S. government has a long history of overclassifying information that shouldn't be classified at all—and keeping information classified until long after any justification for classifying it has disappeared.
”
”
Rosa Brooks (How Everything Became War and the Military Became Everything: Tales from the Pentagon)
“
You study the Path of Peace. I practice the Art of War. There are some congruities between these different approaches but there are many more differences, and they are significant. The Art of War is carried out on the battlefield with deadly weaponry and sometimes, more importantly, in other places and in other ways that you would find distasteful. If I speak little about my plans it's because the Art of War teaches that it is the business of a general to ensure secrecy. You might want to mollify or change my tactics or strategies to fit the morals of your peacetime world and I'd be shackled and hampered in seeing the victory won as it should be, as quickly as possible, with as little fighting as possible, and at the lowest cost possible. You cannot bear the consequences of battle and you don't know the resources required. I do.
”
”
Aleksandra Layland (Of Wisdom and Valor: The Art of War. The Path of Peace.)
“
The German military were equally unenthusiastic, because they were oblivious to the damage caused by their insecure ciphers during the Great War. For example, they had been led to believe that the Zimmermann telegram had been stolen by American spies in Mexico, and so they blamed that failure on Mexican security. They still did not realize that the telegram had in fact been intercepted and deciphered by the British, and that the Zimmermann debacle was actually a failure of German cryptography.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
the Third World War would be the mathematicians’ war, because mathematicians will have control over the next great weapon of war—information. Mathematicians have been responsible for developing the codes that are currently used to protect military information.
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
first ever military cryptographic device, the Spartan scytale, dating back to the fifth century B.C. The scytale is a wooden staff around which a strip of leather or parchment is wound,
”
”
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
“
The Joint Special Operations Command (JSOC), a special unit of the North Carolina-based Special Operations Command (SOCOM), existed before Rumsfeld, but its mission, profile, and budget dramatically expanded during his tenure as secretary of defense in the Bush administration. It effectively became Rumsfeld's clandestine service. JSOC operatives did not necessarily wear uniforms, dispensed with many aspects of normal military protocol, and adopted secrecy as their byword. Consequently, the boundary lines laid down in 1947 were breached on both sides: the CIA got its own army and air force, and the Pentagon got its own CIA.
”
”
Scott Horton (Lords of Secrecy: The National Security Elite and America's Stealth Warfare)
“
a very strange and brilliant marine major named Earl “Pete” Ellis wrote a paper for the Marine Corps in which he said that Japan was the United States’ greatest enemy and the two would ultimately engage in war. He based his hypothesis on the tactical movements of Japan in the Pacific after World War I and on what he interpreted as its clear goals of expansion under the cloak of secrecy. He predicted with uncanny prescience that the initial strategy of a Japanese attack would be to destroy a great portion of the US fleet. He further predicted that the United States, in declaring war in retaliation, would adopt an island-hopping strategy across the Pacific, building up advance bases and airstrips until the Japanese homeland was close enough to be easily attacked. The only way to fend off the Japanese would be by adopting an amphibious assault doctrine as a new kind of military strategy. Ellis may have been the most brilliant marine in history and also the most tragic. Suspected to be bipolar and hospitalized several times for alcoholism, he never went above the rank of major because of his emotional instability. He died in 1923 at the age of forty-two on the Japanese-controlled island of Palau in the western Pacific while supposedly on a spy mission. No one knows quite how he died. But his amphibious assault theory, now considered one of the greatest
”
”
Buzz Bissinger (The Mosquito Bowl: A Game of Life and Death in World War II)
“
The most sophisticated apparatus for conveying top-secret orders was at the service of Nazi propaganda and terror,” Stephenson noted. “The power of a totalitarian regime rested on propaganda and terror. Heydrich had made a study of the Russian OGPU, the Soviet secret security service. He then engineered the Red Army purges carried out by Stalin. The Russian dictator believed his own armed forces were infiltrated by German agents as a consequence of a secret treaty by which the two countries helped each other rearm.* Secrecy bred suspicion, which bred more secrecy, until the Soviet Union was so paranoid it became vulnerable to every hint of conspiracy. Late in 1936, Heydrich had thirty-two documents forged to play on Stalin’s sick suspicions and make him decapitate his own armed forces. The Nazi forgeries were incredibly successful. More than half the Russian officer corps, some 35,000 experienced men, were executed or banished.* The Soviet Chief of Staff, Marshal Tukhachevsky, was depicted as having been in regular correspondence with German military commanders. All the letters were Nazi forgeries. But Stalin took them as proof that even Tukhachevsky was spying for Germany. It was a most devastating and clever end to the Russo-German military agreement, and it left the Soviet Union in absolutely no condition to fight a major war with Hitler.
”
”
William Stevenson (A Man Called Intrepid: The Incredible True Story of the Master Spy Who Helped Win World War II)