Operational Security Quotes

We've searched our database for all the quotes and captions related to Operational Security. Here they are! All 100 of them:

I think of the security of cages. How violence, cruelty, oppression, become a kind of home, a familiar pattern, a cage, in which we know how to operate and define ourselves…
V (formerly Eve Ensler) (Insecure at Last)
And how we burned in the camps later, thinking: What would things have been like if every Security operative, when he went out at night to make an arrest, had been uncertain whether he would return alive and had to say good-bye to his family? Or if, during periods of mass arrests, as for example in Leningrad, when they arrested a quarter of the entire city, people had not simply sat there in their lairs, paling with terror at every bang of the downstairs door and at every step on the staircase, but had understood they had nothing left to lose and had boldly set up in the downstairs hall an ambush of half a dozen people with axes, hammers, pokers, or whatever else was at hand?... The Organs would very quickly have suffered a shortage of officers and transport and, notwithstanding all of Stalin's thirst, the cursed machine would have ground to a halt! If...if...We didn't love freedom enough. And even more – we had no awareness of the real situation.... We purely and simply deserved everything that happened afterward.
Aleksandr Solzhenitsyn (The Gulag Archipelago 1918–1956 (Abridged))
The operations of the federal government will be most extensive and important in times of war and danger; those of the State governments, in times of peace and security.
James Madison (The Federalist Papers)
The corporations that profit from permanent war need us to be afraid. Fear stops us from objecting to government spending on a bloated military. Fear means we will not ask unpleasant questions of those in power. Fear permits the government to operate in secret. Fear means we are willing to give up our rights and liberties for promises of security. The imposition of fear ensures that the corporations that wrecked the country cannot be challenged. Fear keeps us penned in like livestock.
Chris Hedges (The Death of the Liberal Class)
The offer of certainty, the offer of complete security, the offer of an impermeable faith that can’t give way, is an offer of something not worth having. I want to live my life taking the risk all the time that I don’t know anything like enough yet; that I haven’t understood enough; that I can’t know enough; that I’m always hungrily operating on the margins of a potentially great harvest of future knowledge and wisdom. I wouldn’t have it any other way.
Christopher Hitchens
Alexandra drew her shawl closer about her and stood leaning against the frame of the mill, looking at the stars which glittered so keenly through the frosty autumn air. She always loved to watch them, to think of their vastness and distance, and of their ordered march. It fortified her to reflect upon the great operations of nature, and when she thought of the law that lay behind them, she felt a sense of personal security. That night she had a new consciousness of the country, felt almost a new relation to it. Even her talk with the boys had not taken away the feeling that had overwhelmed her when she drove back to the Divide that afternoon. She had never known before how much the country meant to her. The chirping of the insects down in the long grass had been like the sweetest music. She had felt as if her heart were hiding down there, somewhere, with the quail and the plover and all the little wild things that crooned or buzzed in the sun. Under the long shaggy ridges, she felt the future stirring.
Willa Cather (O Pioneers!)
In other words, that the discussion about what is good, what is beautiful, what is noble, what is pure, and what is true could always go on. Why is that important? Why would I like to do that? Because that’s the only conversation worth having. And whether it goes on or not after I die, I don’t know. But, I do know that it is the conversation I want to have while I am still alive. Which means that to me the offer of certainty, the offer of complete security, the offer of an impermeable faith that can’t give way is an offer of something not worth having. I want to live my life taking the risk all the time that I don’t know anything like enough yet… that I haven’t understood enough… that I can’t know enough… that I am always hungrily operating on the margins of a potentially great harvest of future knowledge and wisdom. I wouldn’t have it any other way. And I’d urge you to look at those who tell you, those people who tell you at your age, that you are dead until you believe as they do. What a terrible thing to be telling to children. …and that you can only live by accepting an absolute authority. Don’t think of that as a gift. Think of it as a poisoned chalice. Push it aside however tempting it is. Take the risk of thinking for yourself. Much more happiness, truth, beauty and wisdom will come to you that way.
Christopher Hitchens
In The Descent of Man he gave some powerful pages to illustrate its proper, wide sense. He pointed out how, in numberless animal societies, the struggle between separate individuals for the means of existence disappears, how struggle is replaced by co-operation, and how that substitution results in the development of intellectual and moral faculties which secure to the species the best conditions for survival.
Pyotr Kropotkin (Mutual Aid; a factor of evolution)
Confront all the angry thoughts, feelings, the jealousies and condemnations, to find their cause, seek the root of such feelings and then operate on that. Need of security and reassurance can cause criminal acts.
Anaïs Nin (The Diary of Anaïs Nin, Vol. 1: 1931-1934)
The president operates effectively as head of the national security state as long as he stays within the parameters of its primary dedication—which is to advance the interests of corporate investors and protect the overall global capital accumulation process.
Michael Parenti (Contrary Notions: The Michael Parenti Reader)
It is the politicians who dream their dreams - sometimes dangerous dreams, (...). A top intelligence officer has to be harder-headed than the toughest businessman. One has to trim to the reality, (...) (Sir Nigel Irvine, p. 428-429).
Frederick Forsyth (The Fourth Protocol)
The Sackler empire is a completely integrated operation,” Blair wrote. They could develop a drug, have it clinically tested, secure favorable reports from the doctors and hospitals with which they had connections, devise an advertising campaign in their agency, publish the clinical articles and the advertisements in their own medical journals, and use their public relations muscle to place articles in newspapers and magazines.
Patrick Radden Keefe (Empire of Pain: The Secret History of the Sackler Dynasty)
You get what you design for. Chester, your peer in Development, is spending all his cycles on features, instead of stability, security, scalability, manageability, operability, continuity, and all those other beautiful ’itties.
Gene Kim (The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win)
The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings...Our way of life is under attack. Those who make themselves our enemy are advancing around the globe...no war ever posed a greater threat to our security. If you are awaiting a finding of "clear and present danger," then I can only say that the danger has never been more clear and its presence has never been more imminent...For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.
John F. Kennedy
And how we burned in the camps later, thinking: What would things have been like if every security operative, when he went out at night to make an arrest, had been uncertain whether he would return alive and had to say good-bye to his family? Or if, during periods of mass arrests, as for example in Leningrad, when they arrested a quarter of the entire city, people had not simply sat there in their lairs, paling with terror at every bang of the downstairs door and at every step on the staircase, but had understood they had nothing left to lose and had boldly set up in the downstairs hall an ambush of half a dozen people with axes, hammers, pokers, or whatever else was at hand? After all, you knew ahead of time that those bluecaps were out at night for no good purpose. And you could be sure ahead of time that you’d be cracking the skull of a cutthroat.
Aleksandr Solzhenitsyn (The Gulag Archipelago 1918–1956 (Abridged))
Military operations alone cannot defeat an insurgency because only economic development and political action can address most sources of disaffection. If military operations are not conducted consistent with political objectives or occur without economic development, they are certain to alienate the population further, reduce the amount of intelligence available to [...] security forces, and strengthen rather than weaken the enemy.
H.R. McMaster
Closing a letter—a physical object without even a ghost in the cloud, all that data on one frail piece of paper—with an even more malleable substance, bearing, of all things, an ideographic signature! Informing any handler of the message’s sender, her role, perhaps even her purpose! Madness—from an operational-security perspective. But,
Amal El-Mohtar (This Is How You Lose the Time War)
There has never been a military operation remotely approaching the scale and the complexity of D-Day. It involved 176,000 troops, more than 12,000 airplanes, almost 10,000 ships, boats, landing craft, frigates, sloops, and other special combat vessels--all involved in a surprise attack on the heavily fortified north coast of France, to secure a beachhead in the heart of enemy-held territory so that the march to Germany and victory could begin. It was daring, risky, confusing, bloody, and ultimately glorious [p.25]
Tom Brokaw (The Greatest Generation)
I know the capacity that is there to make tyranny total in America, and we must see to it that this agency [the National Security Agency] and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return. —Senator Frank Church (1975)
Peter Dale Scott (The American Deep State: Wall Street, Big Oil & the Attack on U.S. Democracy (War & Peace Library))
When the navy hears the phrase 'secure the building', they turn off the lights and go home; the marines kill everything inside and set up a base of their operations, the Airforce takes out a five-year lease with the option to buy.
C.C. Masters (Finding Somewhere to Belong (Seaside Wolf Pack, #1))
What rules, then, can one follow if one is dedicated to the truth? First, never speak falsehood. Second, bear in mind that the act of withholding the truth is always potentially a lie, and that in each instance in which the truth is withheld a significant moral decision is required. Third, the decision to withhold the truth should never be based on personal needs, such as a need for power, a need to be liked or a need to protect one’s map from challenge. Fourth, and conversely, the decision to withhold the truth must always be based entirely upon the needs of the person or people from whom the truth is being withheld. Fifth, the assessment of another’s needs is an act of responsibility which is so complex that it can only be executed wisely when one operates with genuine love for the other. Sixth, the primary factor in the assessment of another’s needs is the assessment of that person’s capacity to utilize the truth for his or her own spiritual growth. Finally, in assessing the capacity of another to utilize the truth for personal spiritual growth, it should be borne in mind that our tendency is generally to underestimate rather than overestimate this capacity. All this might seem like an extraordinary task, impossible to ever perfectly complete, a chronic and never-ending burden, a real drag. And it is indeed a never-ending burden of self-discipline, which is why most people opt for a life of very limited honesty and openness and relative closedness, hiding themselves and their maps from the world. It is easier that way. Yet the rewards of the difficult life of honesty and dedication to the truth are more than commensurate with the demands. By virtue of the fact that their maps are continually being challenged, open people are continually growing people. Through their openness they can establish and maintain intimate relationships far more effectively than more closed people. Because they never speak falsely they can be secure and proud in the knowledge that they have done nothing to contribute to the confusion of the world, but have served as sources of
M. Scott Peck (The Road Less Traveled: A New Psychology of Love, Traditional Values and Spiritual Growth)
Money is just one of the forces that blind us to information and issues which we could pay attention to - but don't. It exacerbates and often rewards all the other drivers of willful blindness; our preference for the familiar, our love for individuals and for big ideas, a love of busyness and our dislike of conflict and change, the human instinct to obey and conform and our skill at displacing and diffusing responsibility. All of these operate and collaborate with varying intensities at different moments in our lives. The common denominator is that they all make us protect our sense of self-worth, reducing dissonance and conferring a sense of security, however illusory. In some ways, they all act like money; making us feel good at first, with consequences we don't see. We wouldn't be so blind if our blindness didn't deliver rewards; the benefit of comfort and ease.
Margaret Heffernan (Willful Blindness: Why We Ignore the Obvious at Our Peril)
Bob Iger, Disney's chief operating officer, had to step in and do damage control. He was as sensible and solid as those around him were volatile. His background was in television; he had been president of the ABC network, which was acquired in 1996 by Disney. His reputation was as an corporate suit, and he excelled at deft management, but he also had a sharp eye for talent, a good-humored ability to understand people, and a quiet flair that he was secure enough to keep muted. Unlike Eisner and Jobs, he had a disciplined calm, which helped him deal with large egos. " Steve did some grandstanding by announcing that he was ending talks with us," Iger later recalled. " We went into crisis mode and I developed some talking points to settle things down.
Walter Isaacson (Steve Jobs)
Alan Blunt and Mrs. Jones were both in the audience. As the head and deputy head of MI6 Special Operations, it was their responsibility to keep up with the latest developments, although as far as Blunt was concerned, the whole thing was a waste of time. There were security conferences all the time in every major city, but they never achieved anything. The experts talked. The politicians lied. The press wrote it all down. And then everyone went home and nothing changed. Alan Blunt was bored. He looked half asleep.
Anthony Horowitz (Ark Angel (Alex Rider #6))
Remaining for a moment with the question of legality and illegality: United Nations Security Council Resolution 1368, unanimously passed, explicitly recognized the right of the United States to self-defense and further called upon all member states 'to bring to justice the perpetrators, organizers and sponsors of the terrorist attacks. It added that 'those responsible for aiding, supporting or harboring the perpetrators, organizers and sponsors of those acts will be held accountable.' In a speech the following month, the United Nations Secretary General Kofi Annan publicly acknowledged the right of self-defense as a legitimate basis for military action. The SEAL unit dispatched by President Obama to Abbottabad was large enough to allow for the contingency of bin-Laden's capture and detention. The naïve statement that he was 'unarmed' when shot is only loosely compatible with the fact that he was housed in a military garrison town, had a loaded automatic weapon in the room with him, could well have been wearing a suicide vest, had stated repeatedly that he would never be taken alive, was the commander of one of the most violent organizations in history, and had declared himself at war with the United States. It perhaps says something that not even the most casuistic apologist for al-Qaeda has ever even attempted to justify any of its 'operations' in terms that could be covered by any known law, with the possible exception of some sanguinary verses of the Koran.
Christopher Hitchens (The Enemy)
With many high-earning, public women espousing operating as individuals, "feminism" was reduced to a self-empowerment strategy. A way to get things. A way to get more of the things you thought you deserved. A way to consume. But it also performed something far more sinister: "feminism" became automatically imbued with agency and autonomy, starting popular feminist discourse with a lack of class literacy. Centering popular feminism there meant that the women and other marginalized genders who didn't have the necessary means to secure independence or power—in broader culture, in their families, in their communities, in their workplaces—were not a part of this conversation about becoming an optimized agent of self.
Koa Beck (White Feminism: From the Suffragettes to Influencers and Who They Leave Behind)
Green had been amazed by their discovery: you could break into a Titan II complex with just a credit card. Once the officers showed him how to do it, Green requested permission to stage a black hat operation at 4-7—an unannounced demonstration of how someone could sneak into the launch control center undetected. SAC had a long history of black hatting to test the security at its facilities. Black hat teams would plant phony explosives on bombers, place metal spikes on runways, infiltrate a command post and then hand a letter to the base commander that said, “You’re dead.
Eric Schlosser (Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety)
Attachment theory teaches us that true autonomy relies on feeling securely connected to other human beings. Current developments in the field of attachment science have recognized that bonded pairs, such as couples, or parents and children, build bonds that physiologically shape their nervous systems. Contrary to many Western conceptions of the self as disconnected and atomized, operating in isolation using nothing but grit and determination, it turns out that close-knit connections to others are in large part how we grow into our own, fully expressed, autonomous selves.
Nora Samaran (Turn This World Inside Out: The Emergence of Nurturance Culture)
But no soldier above the rank of sergeant ever served jail time. No civilian interrogators ever faced legal proceedings. Nobody was ever charged with torture, or war crimes, or any violation of the Geneva Conventions. Nobody ever faced charges for keeping prisoners naked,or shackled. Nobody ever faced charges for holding prisoners as hostages. Nobody ever faced charges for incarcerating children who were accused of no crime and posed no known security threat. Nobody ever faced charges for holding thousands of prisoners in a combat zone in constant danger of their lives. Nobody ever faced charges for arresting thousands of civilians without direct cause and holding them indefinitely, incommunicado, in concentration camp conditions. Nobody ever faced charges for shooting and killing prisoners who were confined behind concertina wire. And nobody has ever been held to account for murdering al-Jamadi in the Tier 1B shower, although Sabrina Harman initially faced several charges for having photographed him there.
Philip Gourevitch (Standard Operating Procedure)
we’re hearing more lately: something called “DevOps.” Maybe everyone attending this party is a form of DevOps, but I suspect it’s something much more than that. It’s Product Management, Development, IT Operations, and even Information Security all working together and supporting one another.
Gene Kim (The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win)
If you have to maintain self-esteem by pulling down the standing of others, you are extraordinarily unfortunate in a variety of ways. Since you have to protect your feeling of personal worth by noting how unworthy everybody around you is, you are not provided with any data that are convincing evidence of your having personal worth; so it gradually evolves into 'I am not as bad as the other swine.' To be the best of swine, when it would be nice to be a person, is not a particularly good way of furthering anything except security operations. When security is achieved that way, it strikes at the very roots of that which is essentially human -- the utterly vital role of interpersonal relations.' from The Interpersonal Theory of Psychiatry
Helen Swick Perry (Psychiatrist of America: The Life of Henry Stack Sullivan)
Principles of Liberty 1. The only reliable basis for sound government and just human relations is Natural Law. 2. A free people cannot survive under a republican constitution unless they remain virtuous and morally strong. 3. The most promising method of securing a virtuous and morally strong people is to elect virtuous leaders. 4. Without religion the government of a free people cannot be maintained. 5. All things were created by God, therefore upon him all mankind are equally dependent, and to Him they are equally responsible. 6. All men are created equal. 7. The proper role of government is to protect equal rights, not provide equal things. 8. Men are endowed by their Creator with certain unalienable rights. 9. To protect man's rights, God has revealed certain principles of divine law. 10. The God-given right to govern is vested in the sovereign authority of the whole people. 11. The majority of the people may alter or abolish a government which has become tyrannical. 12. The United States of America shall be a republic. 13. A constitution should be structured to permanently protect the people from the human frailties of their rulers. 14. Life and Liberty are secure only so long as the Igor of property is secure. 15. The highest level of securitiy occurs when there is a free market economy and a minimum of government regulations. 16. The government should be separated into three branches: legislative, executive, and judicial. 17. A system of checks and balances should be adopted to prevent the abuse of power. 18. The unalienable rights of the people are most likely to be preserved if the principles of government are set forth in a written constitution. 19. Only limited and carefully defined powers should be delegated to the government, all others being retained by the people. 20. Efficiency and dispatch require government to operate according to the will of the majority, but constitutional provisions must be made to protect the rights of the minority. 21. Strong human government is the keystone to preserving human freedom. 22. A free people should be governed by law and not by the whims of men. 23. A free society cannot survive a republic without a broad program of general education. 24. A free people will not survive unless they stay strong. 25. "Peace, commerce, and honest friendship with all nations; entangling alliances with none." 26. The core unit which determines the strength of any society is the family; therefore, the government should foster and protect its integrity. 27. The burden of debt is as destructive to freedom as subjugation by conquest. 28. The United States has a manifest destiny to be an example and a blessing to the entire human race.
Founding Fathers
The Secret Government went into place in 1947,” Mark explained to a caller. “As did the National Security Act. The Constitution of the United States was founded in truth and justice for all, not for a few self appointed secret leaders operating on the philosophy that ‘secret knowledge equals power.’ Secrets have now compounded to the point where people no longer think to ask the right questions. Technological secrets emerge as technological control. Ask what HAARP is about. Ask about DARPA. Ask now while you can still think to do so because technology is breeding itself through computerization and it’s time we took it out of the hands of the Secret Government.
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
A soldier knows that a satisfactory observation point provides an unobstructed view to the front and adequate security to the flanks and the rear. He knows it provides protection from the elements and concealment of the observers. He knows it offers a reasonable likelihood of undisturbed occupation for the full duration of the operation.
Lee Child (The Hard Way (Jack Reacher, #10))
The fact that political efforts of dissent and critique are often labeled as “violent” by the very state authorities that are threatened by those efforts is not a reason to despair of language use. It means only that we have to expand and refine the political vocabulary for thinking about violence and the resistance to violence, taking account of how that vocabulary is twisted and used to shield violent authorities against critique and opposition. When the critique of continuing colonial violence is deemed violent (Palestine), when a petition for peace is recast as an act of war (Turkey), when struggles for equality and freedom are construed as violent threats to state security (Black Lives Matter), or when “gender” is portrayed as a nuclear arsenal directed against the family (anti-gender ideology), then we are operating in the midst of politically consequential forms of phantasmagoria.
Judith Butler (The Force of Nonviolence: An Ethico-Political Bind)
All the suffering and torment wrought at places of execution, in torture chambers, madhouses, operating theatres, under the arches of bridges in late autumn—all these are stubbornly imperishable, all these persist, are inaccessible but cling on, envious of everything that is, stuck in their own terrible reality. People would like to be allowed to forget much of it, their sleep gliding softly over these furrows in the brain, but dreams come and push sleep aside and fill the picture again. And so they wake up breathless, let the light of a candle dissolve the darkness as they drink the comforting half-light as if it was sugared water. But, alas, the edge on which this security is balancing is a narrow one. Given the slightest little turn and their gaze slips away from the familiar and the friendly, and the contours that had so recently been comforting take the sharp outlines of an abyss of horror.
Rainer Maria Rilke (The Notebooks of Malte Laurids Brigge)
The global securities industry, for example, once overwhelmingly concentrated in the financial districts of London and New York, has gradually shifted an ever larger share of their operations to their respective suburban rings, other smaller cities, and overseas. The headquarters might remain in a midtown high-rise, but more and more the jobs are located elsewhere.
Joel Kotkin (The City: A Global History (Modern Library Chronicles Series Book 21))
America, secure in its fortress of neutrality, watched the war at a remove and found it all unfathomable. Undersecretary of State Robert Lansing, number two man in the State Department, tried to put this phenomenon into words in a private memorandum. “It is difficult, if not impossible, for us here in the United States to appreciate in all its fullness the great European War,” he wrote. “We have come to read almost with indifference of vast military operations, of battle lines extending for hundreds of miles, of the thousands of dying men, of the millions suffering all manner of privation, of the wide-spread waste and destruction.” The nation had become inured to it all, he wrote. “The slaughter of a thousand men between the trenches in northern France or of another thousand on a foundering cruiser has become commonplace. We read the headlines in the newspapers and let it go at that. The details have lost their interest.
Erik Larson (Dead Wake: The Last Crossing of the Lusitania)
Given this order of operations, children’s sense of security, trust in the world, interrelationships with others, and, above all, connection to their authentic emotions hinge on the consistent availability of attuned, non-stressed, and emotionally reliable caregivers. The more stressed or distracted the latter, the shakier the emotional architecture of the child’s mind will be.
Gabor Maté (The Myth of Normal: Trauma, Illness and Healing in a Toxic Culture)
Hitler/Himler research into genetics and mutigenerational families led them to believe that they could control the future by controlling society. Operating on the philosophy that secret knowledge equals power, they would keep pertinent facts from the people and alter their natural evolutionary process. They knew that traumas like incest and torture left people highly suggestible and easily led. After three generations of incest, abuse, and ignorance it becomes genetically encoded and people are born more compliant. It was believed that this could be a formula for mass mind control.
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
The natural effort of every individual to better his own condition, when suffered to exert itself with freedom and security, is so powerful a principle, that it is alone, and without any assistance, not only capable of carrying on the society to wealth and prosperity, but of surmounting a hundred impertinent obstructions with which the folly of human laws too often encumbers its operations
Adam Smith (An Inquiry into the Nature and Causes of the Wealth of Nations)
That's what arrest is: it's a blinding flash and a blow which shifts the present instantly into the past and the impossible into omnipotent actuality. That's all. And neither for the first hour nor for the first day will you be able to grasp anything else. Except that in your desperation the fake circus moon will blink at you: "It's a mistake! They'll set things right!" And everything which is by now comprised in the traditional, even literary, image of an arrest will pile up and take shape, not in your own disordered memory, but in what your family and your neighbors in your apartment remember: The sharp nighttime ring or the rude knock at the door. The insolent entrance of the unwiped jackboots of the unsleeping State Security operatives. The frightened and cowed civilian witness at their backs. (And what function does this civilian witness serve? The victim doesn't even dare think about it and the operatives don't remember, but that's what the regulations call for, and so he has to sit there all night long and sign in the morning. 1 For the witness, jerked from his bed, it is torture too—to go out night after night to help arrest his own neighbors and acquaintances.
Aleksandr Solzhenitsyn (The Gulag Archipelago 1918–1956 (Abridged))
The weakest link in any chain of security is not the technology itself, but the person operating it; iron gates have no compassion to appeal to, nor fears to exploit, nor insecurities to use to one’s advantage. They are, however, operated by us – by beings of unlimited vulnerability and limited energy. Why waste time brute-forcing what can be easily circumvented by a clever façade and a crimson tongue?
A.J. Darkholme (Rise of the Morningstar (The Morningstar Chronicles, #1))
The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings...Our way of life is under attack. Those who make themselves our enemy are advancing around the globe...no war ever posed a greater threat to our security. If you are awaiting a finding of "clear and present danger," then I can only say that the danger has never been more clear and its presence has never been more imminent...For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.
ohn F. Kennedy
Buddha rode in the trunk, which had to be roped shut. I thought this was going to be the first in a long line of hassles. But, as it turned out, Tsung Tsai was right: Buddha was a breeze. He flowed through the porters, ticket checkers, and security at JFK, gliding on a benevolent cloud. His strange gray Buddha shadow floated on the x-ray monitor. 'Jesus!' said the x-ray operator to the guard. 'Similar', Tsung Tsai said.
George Crane (Bones of the Master: A Journey to Secret Mongolia)
The majority of the employees here are civilians," explained my Alderman guide/protector/companion/would-be-executioner as we strode without a word to the security guards through the foyer towards the lifts. "They conduct themselves within perfectly standard financial services and regulations. There is one specialist suboperational department catering to the financing of more...unusual extra-capital ventures, and the executive assets who operate it have to undergo a rigorous level of training, psyche evaluation, personality assessment, and team operational analyses." We stared at him, and said, "We barely understood the little words." "No," he replied, "I didn't think you would.
Kate Griffin (The Midnight Mayor (Matthew Swift, #2))
... To me the offer of certainty, the offer of complete security, the offer of an impermeable faith that can’t give way is an offer of something not worth having. I want to live my life taking the risk all the time that I don’t know anything like enough yet… that I haven’t understood enough… that I can’t know enough… that I am always hungrily operating on the margins of a potentially great harvest of future knowledge and wisdom. I wouldn’t have it any other way.
Christopher Hitchens
The question, from pundits and constituents, was obvious and loud: If you aren't transparent, what are you hiding? Though some citizens and commentators objected on grounds of privacy, asserting that government, at virtually every level, had always needed to do some things in private for the sake of security and efficiency, the momentum crushed all such arguments and the progression continued. If you weren't operating in the light of day, what were you doing in the shadows?
Dave Eggers (The Circle (The Circle, #1))
Curiously, while drone operators are perhaps the safest of all combat troops physically, they have among the highest rates of depression and post-traumatic stress in the military and national security services. Sitting at a video console in Colorado or New York City, killing someone six thousand miles away and then collecting the kids at gymnastics or football practice, having dinner and sitting down to watch Dancing with the Stars in your suburban den was disorienting beyond belief.
Jeffery Deaver (The Kill Room (Lincoln Rhyme #10))
The State has a legal monopoly on the right to use aggression against others in the form of taxation and compulsory edicts (legislation). Not only must “customers” pay into its operation without regard to their consent, but they must surrender to the rules its internal processes determine at all times. Additionally, the State has a monopoly on the provision of security, and has anointed itself as the ultimate arbiter in all conflicts, including those conflicts which involve its own agents. It
Christopher Chase Rachels (A Spontaneous Order: The Capitalist Case For A Stateless Society)
Not many years ago, nearly 100 percent of people who thought they were being constantly watched were certifiable paranoids. But recently it was revealed that, in the name of public safety, Homeland Security and more than a hundred other local, state, and federal agencies are operating aerial surveillance drones of the kind previously used only on foreign battlefields— at low altitudes outside the authority of air-traffic control. Soon, the bigger worry will not be that, as you walk your dog, you are secretly being watched but that the rapidly proliferating drones will begin colliding with one another and with passenger aircraft, and that you’ll be killed by the plummeting drone that was monitoring you to be sure that you picked up Fido’s poop in a federally approved pet-waste bag.
Dean Koontz (Odd Interlude (Odd Thomas, #4.5))
In an ope-ed in The Washington Post in February 2020, Navy Admiral William McRaven, who was the U.S. Special Operations commander who oversaw the raid that killed Al Qaeda leader Osama bin Laden a decade earlier said: As Americans we should be frightened - deeply afraid for the future of the nation. When good men and women can't speak the truth, when facts are inconvenient, when integrity and character no longer matter, when presidential ego and self preservation are more important than national security - then there is nothing left to stop the triumph of evil.
Bob Woodward (War)
If you expose what it is that we’re doing, if you inform your fellow citizens about all the things that we’re doing in the dark, we will destroy you. This is what their spate of prosecutions of whistleblowers have [sic] been about. It’s what trying to threaten journalists, to criminalize what they do, is about. It’s to create a climate of fear, so that nobody will bring accountability to them. It’s not going to work. I think it’s starting to backfire, because it shows their true character and exactly why they can’t be trusted to operate with power in secret. And we’re certainly not going to be deterred by it in any way. The people who are going to be investigated are not the people reporting on this, but are people like Dianne Feinstein and her friends in the National Security Agency, who need investigation and transparency for all the things that they’ve been doing.
Glenn Greenwald
Adaptive perfectionists are connected to their self-worth. When you know you’re already whole and complete (i.e., perfect) as you are, you’re operating from a mindset of abundance. You already have what you need, and you feel secure. For adaptive perfectionists, striving towards an ideal is a celebratory expression of that security. Maladaptive perfectionists do not feel whole or secure. They feel broken, and they operate from a mindset of deficit. Their striving is driven by the need to compensate, to fix what’s broken, and to try to offer substitutes for or try to hide what’s missing.
Katherine Morgan Schafler (The Perfectionist's Guide to Losing Control: A Path to Peace and Power)
Private sector networks in the United States, networks operated by civilian U.S. government agencies, and unclassified U.S. military and intelligence agency networks increasingly are experiencing cyber intrusions and attacks,” said a U.S.-China Economic and Security Review Commission report to Congress that was published the same month Conficker appeared. “. . . Networks connected to the Internet are vulnerable even if protected with hardware and software firewalls and other security mechanisms. The government, military, businesses and economic institutions, key infrastructure elements, and the population at large of the United States are completely dependent on the Internet. Internet-connected networks operate the national electric grid and distribution systems for fuel. Municipal water treatment and waste treatment facilities are controlled through such systems. Other critical networks include the air traffic control system, the system linking the nation’s financial institutions, and the payment systems for Social Security and other government assistance on which many individuals and the overall economy depend. A successful attack on these Internet-connected networks could paralyze the United States [emphasis added].
Mark Bowden (Worm: The First Digital World War)
You reflect that he is worth twenty thousand dollars, and you incur no risk by endorsing his note; you like to accommodate him, and you lend your name without taking the precaution of getting security. Shortly after, he shows you the note with your endorsement canceled, and tells you, probably truly, "that he made the profit that he expected by the operation," you reflect that you have done a good action, and the thought makes you feel happy. By and by, the same thing occurs again and you do it again; you have already fixed the impression in your mind that it is perfectly safe to indorse his notes without security.
P.T. Barnum (The Art of Money Getting; Or, Golden Rules for Making Money)
By some estimates, there are 250 hacker groups in China that are tolerated and may even be encouraged by the government to enter and disrupt computer networks,” said the 2008 U.S.–China Security Review. “The Chinese government closely monitors Internet activities and is likely aware of the hackers’ activities. While the exact number may never be known, these estimates suggest that the Chinese government devotes a tremendous amount of human resources to cyber activity for government purposes. Many individuals are being trained in cyber operations at Chinese military academies, which does fit with the Chinese military’s overall strategy.
Mark Bowden (Worm: The First Digital World War)
In Moscow last night Ribbentrop and Molotov signed a treaty and a declaration of purpose. The text of the latter tells the whole story: “After the German government and the government of the U.S.S.R., through a treaty signed today, definitely solved questions resulting from the disintegration of the Polish state and thereby established a secure foundation for permanent peace in eastern Europe, they jointly voice their opinion that it would be in the interest of all nations to bring to an end the state of war presently existing between Germany and Britain and France. Both governments therefore will concentrate their efforts, if necessary, in co-operation with other friendly powers, towards reaching this goal. “Should, however, the effort of both governments remain unsuccessful, the fact would thereby be established that Britain and France are responsible for a continuation of the war, in which case the governments of Germany and Russia will consult each other as to necessary measures.” This
William L. Shirer (Berlin Diary: The Journal of a Foreign Correspondent 1934-41)
the group listed dangerous insufficiencies that DARPA had to shore up at once: “Inadequate nuclear, BW, CW [biological weapon, chemical weapon] detection; inadequate underground bunker detection; limited secure, real-time command and control to lower-echelon units [i.e., getting the information to soldiers on the ground]; limited ISR [intelligence, surveillance, and reconnaissance] and dissemination; inadequate mine, booby trap and explosive detection capabilities; inadequate non-lethal capabilities [i.e., incapacitating agents]; inadequate modeling/simulation for training, rehearsal and operations; no voice recognition or language translation; inadequate ability to deal with sniper attacks.
Annie Jacobsen (The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency)
The course (of duty), virtue, benevolence, and righteousness cannot be fully carried out without the rules of propriety; nor are training and oral lessons for the rectification of manners complete; nor can the clearing up of quarrels and discriminating in disputes be accomplished; nor can (the duties between) ruler and minister, high and low, father and son, elder brother and younger, be determined; nor can students for office and (other) learners, in serving their masters, have an attachment for them; nor can majesty and dignity be shown in assigning the different places at court, in the government of the armies, and in discharging the duties of office so as to secure the operation of the laws; nor can there be the (proper) sincerity and gravity in presenting the offerings to spiritual Beings on occasions of supplication, thanksgiving, and the various sacrifices. Therefore the superior man is respectful and reverent, assiduous in his duties and not going beyond them, retiring and yielding - thus illustrating (the principle of) propriety.
Confucius (The Book of Rites (Li Ji))
To think of food as a weapon, or of a weapon as food, may give an illusory security and wealth to a few, but it strikes directly at the life of all. The concept of food-as-weapon is not surprisingly the doctrine of a Department of Agriculture that is being used as an instrument of foreign political and economic speculation. This militarizing of food is the greatest threat so far raised against the farmland and the farm communities of this country. If present attitudes continue, we may expect government policies that will encourage the destruction, by overuse, of farmland. This, of course, has already begun. To answer the official call for more production -- evidently to be used to bait or bribe foreign countries -- farmers are plowing their waterways and permanent pastures; lands that ought to remain in grass are being planted in row crops. Contour plowing, crop rotation, and other conservation measures seem to have gone out of favor or fashion in official circles and are practices less and less on the farm. This exclusive emphasis on production will accelerate the mechanization and chemicalization of farming, increase the price of land, increase overhead and operating costs, and thereby further diminish the farm population. Thus the tendency, if not the intention, of Mr. Butz confusion of farming and war, is to complete the deliverance of American agriculture into the hands of corporations.
Wendell Berry (The Unsettling of America: Culture and Agriculture)
The administration had spent $4.5 billion on the 2001 war in Afghanistan, including $390 million just to replace a bomber, a tanker, two helicopters, and two unmanned aerial vehicles that crashed during operations. Yet the administration would not propose to spend even 10 percent of the war’s cost on Afghanistan’s recovery or to secure the peace with new Afghan forces.
Steve Coll (Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan, 2001-2016)
Another view of the Constitution was put forward early in the twentieth century by the historian Charles Beard (arousing anger and indignation, including a denunciatory editorial in the New York Times). He wrote in his book An Economic Interpretation of the Constitution: Inasmuch as the primary object of a government, beyond the mere repression of physical violence, is the making of the rules which determine the property relations of members of society, the dominant classes whose rights are thus to be determined must perforce obtain from the government such rules as are consonant with the larger interests necessary to the continuance of their economic processes, or they must themselves control the organs of government. In short, Beard said, the rich must, in their own interest, either control the government directly or control the laws by which government operates. Beard applied this general idea to the Constitution, by studying the economic backgrounds and political ideas of the fifty-five men who gathered in Philadelphia in 1787 to draw up the Constitution. He found that a majority of them were lawyers by profession, that most of them were men of wealth, in land, slaves, manufacturing, or shipping, that half of them had money loaned out at interest, and that forty of the fifty-five held government bonds, according to the records of the Treasury Department. Thus, Beard found that most of the makers of the Constitution had some direct economic interest in establishing a strong federal government: the manufacturers needed protective tariffs; the moneylenders wanted to stop the use of paper money to pay off debts; the land speculators wanted protection as they invaded Indian lands; slaveowners needed federal security against slave revolts and runaways; bondholders wanted a government able to raise money by nationwide taxation, to pay off those bonds. Four groups, Beard noted, were not represented in the Constitutional Convention: slaves, indentured servants, women, men without property. And so the Constitution did not reflect the interests of those groups. He wanted to make it clear that he did not think the Constitution was written merely to benefit the Founding Fathers personally, although one could not ignore the $150,000 fortune of Benjamin Franklin, the connections of Alexander Hamilton to wealthy interests through his father-in-law and brother-in-law, the great slave plantations of James Madison, the enormous landholdings of George Washington. Rather, it was to benefit the groups the Founders represented, the “economic interests they understood and felt in concrete, definite form through their own personal experience.
Howard Zinn (A People's History of the United States: 1492 to Present)
Separated from the rest of Europe, she has contracted an unsocial habit of manners, and imagines in others the jealousy she creates in herself. never long satisfied with peace, she supposes the discontent universal, and buoyed up with her own importance, conceives herself the only object pointed at. The expression has been often used, and always with a fraudulent design; for when the idea of a natural enemy is conceived, it prevents all other inquiries and the real cause of the quarrel is hidden in the universality of the conceit. Men start at the notion of a natural enemy, and ask no other question. The cry obtains credit like the alarm of a mad dog, and is one of those kind of tricks, which, by operating on the common passions, secures their interest through their folly.
Thomas Paine (The Crisis)
The whole secret lies in confusing the enemy, so that he cannot fathom our real intent.’” To put it perhaps a little more clearly: any attack or other operation is CHENG, on which the enemy has had his attention fixed; whereas that is CH’I,” which takes him by surprise or comes from an unexpected quarter. If the enemy perceives a movement which is meant to be CH’I,” it immediately becomes CHENG.”] 4.    That the impact of your army may be like a grindstone dashed against an egg— this is effected by the science of weak points and strong. 5.    In all fighting, the direct method may be used for joining battle, but indirect methods will be needed in order to secure victory. [Chang Yu says: “Steadily develop indirect tactics, either by pounding the enemy’s flanks or falling on his rear.” A brilliant example of “indirect tactics” which decided the fortunes of a campaign was Lord Roberts’ night march round the Peiwar Kotal in the second Afghan war.76 6.    Indirect tactics, efficiently applied, are inexhausible as Heaven and Earth, unending as the flow of rivers and streams; like the sun and moon, they end but to begin anew; like the four seasons, they pass away to return once more. [Tu Yu and Chang Yu understand this of the permutations of CH’I and CHENG.” But at present Sun Tzu is not speaking of CHENG at all, unless, indeed, we suppose with Cheng Yu-hsien that a clause relating to it has fallen out of the text. Of course, as has already been pointed out, the two are so inextricably interwoven in all military operations, that they cannot really be considered apart. Here we simply have an expression, in figurative language, of the almost infinite resource of a great leader.] 7.    There are not more than five musical notes, yet the combinations of these five give rise to more melodies than can ever be heard. 8.    There are not more than five primary colors (blue, yellow, red, white, and black), yet in combination they produce more hues than can ever been seen. 9.    There are
Sun Tzu (The Art of War)
As Donilon [President Obama's security advisor] would tell me, Obama said: "Here's the deal. I want this hunt for Osama bin Laden and al-Zawahiri to come to the front of the line. I worry that the trail has gone cold. This has to be our top priority and it needs leadership in the tops of your organizations. You need to ensure that we have expended every effort to take down the top leadership of al Qaeda, especially these two individuals. And I want regular reports on this *to me* and I want them starting in thirty days. Donilon followed up and drove and drove the point home with a memo, which the president signed. He sent it to each of those present. It read: 'In order to ensure that we have extended every effort - directly provide to me a detailed operational plan for locating and bringing to justice Osama bin Laden.
Mark Bowden
The charge that Anarchism is destructive, rather than constructive, and that, therefore, Anarchism is opposed to organization, is one of the many falsehoods spread by our opponents. They confound our present social institutions with organization; hence they fail to understand how we can oppose the former, and yet favor the latter. The fact, however, is that the two are not identical. “The State is commonly regarded as the highest form of organization. But is it in reality a true organization? Is it not rather an arbitrary institution, cunningly imposed upon the masses? “Industry, too, is called an organization; yet nothing is farther from the truth. Industry is the ceaseless piracy of the rich against the poor. “We are asked to believe that the Army is an organization, but a close investigation will show that it is nothing else than a cruel instrument of blind force. “The Public School! The colleges and other institutions of learning, are they not models of organization, offering the people fine opportunities for instruction? Far from it. The school, more than any other institution, is a veritable barrack, where the human mind is drilled and manipulated into submission to various social and moral spooks, and thus fitted to continue our system of exploitation and oppression. “Organization, as WE understand it, however, is a different thing. It is based, primarily, on freedom. It is a natural and voluntary grouping of energies to secure results beneficial to humanity. “It is the harmony of organic growth which produces variety of color and form, the complete whole we admire in the flower. Analogously will the organized activity of free human beings, imbued with the spirit of solidarity, result in the perfection of social harmony, which we call Anarchism. In fact, Anarchism alone makes non-authoritarian organization of common interests possible, since it abolishes the existing antagonism between individuals and classes. “Under present conditions the antagonism of economic and social interests results in relentless war among the social units, and creates an insurmountable obstacle in the way of a co-operative commonwealth. “There is a mistaken notion that organization does not foster individual freedom; that, on the contrary, it means the decay of individuality. In reality, however, the true function of organization is to aid the development and growth of personality. “Just as the animal cells, by mutual co-operation, express their latent powers in formation of the complete organism, so does the individual, by co-operative effort with other individuals, attain his highest form of development. “An organization, in the true sense, cannot result from the combination of mere nonentities. It must be composed of self-conscious, intelligent individualities. Indeed, the total of the possibilities and activities of an organization is represented in the expression of individual energies. “It therefore logically follows that the greater the number of strong, self-conscious personalities in an organization, the less danger of stagnation, and the more intense its life element. “Anarchism asserts the possibility of an organization without discipline, fear, or punishment, and without the pressure of poverty: a new social organism which will make an end to the terrible struggle for the means of existence,—the savage struggle which undermines the finest qualities in man, and ever widens the social abyss. In short, Anarchism strives towards a social organization which will establish well-being for all. “The germ of such an organization can be found in that form of trades unionism which has done away with centralization, bureaucracy, and discipline, and which favors independent and direct action on the part of its members.
Emma Goldman (Anarchism and Other Essays)
You know, I still feel in my wrists certain echoes of the pram-pusher’s knack, such as, for example, the glib downward pressure one applied to the handle in order to have the carriage tip up and climb the curb. First came an elaborate mouse-gray vehicle of Belgian make, with fat autoid tires and luxurious springs, so large that it could not enter our puny elevator. It rolled on sidewalks in a slow stately mystery, with the trapped baby inside lying supine, well covered with down, silk and fur; only his eyes moved, warily, and sometimes they turned upward with one swift sweep of their showy lashes to follow the receding of branch-patterned blueness that flowed away from the edge of the half-cocked hood of the carriage, and presently he would dart a suspicious glance at my face to see if the teasing trees and sky did not belong, perhaps to the same order of things as did rattles and parental humor. There followed a lighter carriage, and in this, as he spun along, he would tend to rise, straining at his straps; clutching at the edges; standing there less like the groggy passenger of a pleasure boat than like an entranced scientist in a spaceship; surveying the speckled skeins of a live, warm world; eyeing with philosophic interest the pillow he had managed to throw overboard; falling out himself when a strap burst one day. Still later he rode in one of those small contraptions called strollers; from initial springy and secure heights the child came lower and lower, until, when he was about one and a half, he touched ground in front of the moving stroller by slipping forward out of his seat and beating the sidewalk with his heels in anticipation of being set loose in some public garden. A new wave of evolution started to swell, gradually lifting him again from the ground, when, for his second birthday, he received a four-foot-long, silver-painted Mercedes racing car operated by inside pedals, like an organ, and in this he used to drive with a pumping, clanking noise up and down the sidewalk of the Kurfurstendamm while from open windows came the multiplied roar of a dictator still pounding his chest in the Neander valley we had left far behind.
Vladimir Nabokov
month later, on July 9, 2012, Stevens and the embassy’s security staff, led by DS agent Eric Nordstrom, asked the State Department to extend the presence of a Site Security Team, or SST, that consisted of sixteen active-duty military special operators. The Defense Department’s Africa Command, which oversaw the unit, was willing to extend the team’s stay in Tripoli. But State Department officials decided that DS agents and locally hired guards could do the job, and that the SST operators weren’t needed. In the weeks that followed, General Carter Ham, head of Africa Command, twice asked Stevens if he wanted the SST to remain in Libya. Despite his earlier request to extend the team’s stay, Stevens wouldn’t buck the decision of State Department officials in Washington. He declined Ham’s offers and the SST left Libya, even as Stevens moved forward with plans to visit the restive city of Benghazi.
Mitchell Zuckoff (13 Hours: The Inside Account of What Really Happened In Benghazi)
In retrospect, it is easy to see that Hitler's successful gamble in the Rhineland brought him a victory more staggering and more fatal in its immense consequences than could be comprehended at the time. At home it fortified his popularity and his power, raising them to heights which no German ruler of the past had ever enjoyed. It assured his ascendancy over his generals, who had hesitated and weakened at a moment of crisis when he had held firm. It taught them that in foreign politics and even in military affairs his judgment was superior to theirs. They had feared that the French would fight; he knew better. And finally, and above all, the Rhineland occupation, small as it was as a military operation, opened the way, as only Hitler (and Churchill, alone, in England) seemed to realize, to vast new opportunities in a Europe which was not only shaken but whose strategic situation was irrevocably changed by the parading of three German battalions across the Rhine bridges. Conversely, it is equally easy to see, in retrospect, that France's failure to repel the Wehrmacht battalions and Britain's failure to back her in what would have been nothing more than a police action was a disaster for the West from which sprang all the later ones of even greater magnitude. In March 1936 the two Western democracies were given their last chance to halt, without the risk of a serious war, the rise of a militarized, aggressive, totalitarian Germany and, in fact - as we have seen Hitler admitting - bring the Nazi dictator and his regime tumbling down. They let the chance slip by. For France, it was the beginning of the end. Her allies in the East, Russia, Poland, Czechoslovakia, Rumania and Yugoslavia, suddenly were faced with the fact that France would not fight against German aggression to preserve the security system which the French government itself had taken the lead in so laboriously building up. But more than that. These Eastern allies began to realize that even if France were not so supine, she would soon not be able to lend them much assistance because of Germany's feverish construction of a West Wall behind the Franco-German border. The erection of this fortress line, they saw, would quickly change the strategic map of Europe, to their detriment. They could scarcely expect a France which did not dare, with her one hundred divisions, to repel three German battalions, to bleed her young manhood against impregnable German fortifications which the Wehrmacht attacked in the East. But even if the unexpected took place, it would be futile. Henceforth the French could tie down in the West only a small part of the growing German Army. The rest would be free for operations against Germany's Eastern neighbors.
William L. Shirer (The Rise and Fall of the Third Reich: A History of Nazi Germany)
Your computer operates automatically in a default mode unless you deliberately tell it to do something else. So Luther says that even after you are converted by the gospel your heart will go back to operating on other principles unless you deliberately, repeatedly set it to gospel-mode. We habitually and instinctively look to other things besides God and his grace as our justification, hope, significance, and security. We believe the gospel at one level, but at deeper levels we do not. Human approval, professional success, power and influence, family and clan identity—all of these things serve as our heart’s “functional trust” rather than what Christ has done, and as a result we continue to be driven to a great degree by fear, anger, and a lack of self-control. You cannot change such things through mere will-power, through learning Biblical principles and trying to carry them out. We can only change permanently as
Timothy J. Keller (The Prodigal God: Recovering the Heart of the Christian Faith)
Operating from the idea that a relationship (or anything else) will somehow complete you, save you, or make your life magically take off is a surefire way to keep yourself unhappy and unhitched. Ironically, quite the opposite is true. What you really need to understand is that nothing outside of you can ever produce a lasting sense of completeness, security, or success. There’s no man, relationship, job, amount of money, house, car, or anything else that can produce an ongoing sense of happiness, satisfaction, security, and fulfillment in you. Some women get confused by the word save. In this context, what it refers to is the mistaken idea that a relationship will rid you of feelings of emptiness, loneliness, insecurity, or fear that are inherent to every human being. That finding someone to be with will somehow “save” you from yourself. We all need to wake up and recognize that those feelings are a natural part of the human experience. They’re not meaningful. They only confirm the fact that we are alive and have a pulse. The real question is, what will you invest in: your insecurity or your irresistibility? The choice is yours. Once you get that you are complete and whole right now, it’s like flipping a switch that will make you more attractive, authentic, and relaxed in any dating situation—instantly. All of the desperate, needy, and clingy vibes that drive men insane will vanish because you’ve stopped trying to use a relationship to fix yourself. The fact is, you are totally capable of experiencing happiness, satisfaction, and fulfillment right now. All you have to do is start living your life like you count. Like you matter. Like what you do in each moment makes a difference in the world. Because it really does. That means stop putting off your dreams, waiting for someday, or delaying taking action on those things you know you want for yourself because somewhere deep inside you’re hoping that Prince Charming will come along to make it all better. You know what I’m talking about. The tendency to hold back from investing in your career, your health, your home, your finances, or your family because you’re single and you figure those things will all get handled once you land “the one.” Psst. Here’s a secret: holding back in your life is what’s keeping him away. Don’t wait until you find someone. You are someone.
Marie Forleo (Make Every Man Want You: How to Be So Irresistible You'll Barely Keep from Dating Yourself!)
Under the leadership of Henry Kissinger, first as Richard Nixon’s national security adviser and later as secretary of state, the United States sent an unequivocal signal to the most extreme rightist forces that democracy could be sacrificed in the cause of ideological warfare. Criminal operational tactics, including assassination, were not only acceptable but supported with weapons and money. A CIA internal memo laid it out in unsparing terms:        On September 16, 1970 [CIA] Director [Richard] Helms informed a group of senior agency officers that on September 15, President Nixon had decided that an Allende regime was not acceptable to the United States. The President asked the Agency to prevent Allende from coming to power or to unseat him and authorized up to $10 million for this purpose. . . . A special task force was established to carry out this mandate, and preliminary plans were discussed with Dr. Kissinger on 18 September 1970.
John Dinges (The Condor Years: How Pinochet and His Allies Brought Terrorism to Three Continents)
All groups operate by means of phantasy. The type of experience a group gives us is one of the main reasons, if not for some people the only reason, for being in a group. What do people want to get from the experience of being in a particular set of human collectivities? The close-knit groups that occur in some families and other groupings are bound together by the need to find pseudo-real experience that can be found only through the modality of phantasy. This means that the family is not experienced as the modality of phantasy but as ‘reality’. However, ‘reality’ in this sense is not a modality, but a quality attachable to any modality. If a family member has a tenable position within the family phantasy system, his call to leave the system in any sense is likely only to come from outside the phantasy system. We vary in readiness, and in desire, to emerge from the unconscious phantasy systems we take to be our realities. As long as we are in apparently tenable positions, we find every reason not to suppose that we are in a false sense of reality or unreality, security or insecurity, identity or lack of identity. A false social sense of reality entails, among other things, phantasy unrecognized as such. If [someone] begins to wake up from the [group] phantasy system, he can only be classified as mad or bad by [that group] since to them their phantasy is reality, and what is not their phantasy is not real.
R.D. Laing (Self and Others)
A successful special operation defies conventional wisdom by using a small force to defeat a much larger or well-entrenched opponent. This book develops a theory of special operations that explains why this phenomenon occurs. I will show that through the use of certain principles of warfare a special operations force can reduce what Carl von Clausewitz calls the frictions of war to a manageable level. By minimizing these frictions the special operations force can achieve relative superiority over the enemy. Once relative superiority is achieved, the attacking force is no longer at a disadvantage and has the initiative to exploit the enemy’s weaknesses and secure victory. Although gaining relative superiority doesn’t guarantee success, it is necessary for success. If we can determine, prior to an operation, the best way to achieve relative superiority, then we can tailor special operations planning and preparation to improve our chances of victory.
William H. McRaven (Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice)
In estimating what amount of power would be requisite to secure the objects of government, we must take into the reckoning, what would be necessary to defend the community against external, as well as internal dangers. Government must be able to repel assaults from abroad, as well as to repress violence and disorders within. It must not be overlooked, that the human race is not comprehended in a single society or community. The limited reason and faculties of man, the great diversity of language, customs, pursuits, situation and complexion, and the difficulty of intercourse, with various other causes, have, by their operation, formed a great many separate communities, acting independently of each other. Between these there is the same tendency to conflict—and from the same constitution of our nature—as between men individually; and even stronger—because the sympathetic or social feelings are not so strong between different communities, as between individuals of the same community.
John C. Calhoun
The panic was blamed on many factors—tight money, Roosevelt’s Gridiron Club speech attacking the “malefactors of great wealth,” and excessive speculation in copper, mining, and railroad stocks. The immediate weakness arose from the recklessness of the trust companies. In the early 1900s, national and most state-chartered banks couldn’t take trust accounts (wills, estates, and so on) but directed customers to trusts. Traditionally, these had been synonymous with safe investment. By 1907, however, they had exploited enough legal loopholes to become highly speculative. To draw money for risky ventures, they paid exorbitant interest rates, and trust executives operated like stock market plungers. They loaned out so much against stocks and bonds that by October 1907 as much as half the bank loans in New York were backed by securities as collateral—an extremely shaky base for the system. The trusts also didn’t keep the high cash reserves of commercial banks and were vulnerable to sudden runs.
Ron Chernow (The House of Morgan: An American Banking Dynasty and the Rise of Modern Finance)
Congress would later find that though bureau officials undertook COINTELPRO in the name of national security, its purpose was “preventing or disrupting the exercise of First Amendment rights.” The program took tactics developed for use against foreign adversaries during war and applied them to citizens: leaking phony allegations, sending anonymous poison-pen letters, interfering with jobs, having people arrested on drug charges, distributing misinformation, and encouraging violence. “In essence, the Bureau took the law into its own hands, conducting a sophisticated vigilante operation against domestic enemies,” the committee said. “Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that. The unexpressed major premise of the programs was a law enforcement agency has the duty to do whatever is necessary to combat perceived threats to the existing social and political order.
Seth Rosenfeld (Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power)
The young girl giggled again and Jake shook his head in amazement. Not only was the U.S. dark operative cooking pancakes, but it seemed he'd won over the timid teenager in no time flat. "I've been entertaining this pretty girl with my vast repertoire of daring and heroic adventures from around the globe." Jake snorted as he opened the refrigerator and pulled out the container of orange juice. "You sound like Blackbeard the pirate. Don't believe a word he says, Alyssa. He's actually Insurance salesman and lies like a rug." "An Insurance salesman?" She narrowed her eyes at Carter as he flipped three pancackes off the electric griddle sitting on the island and onto a plate for her. "I knew you were conning me," she chastised, then rolled her eyes toward Jake. "He said he was a government spy, like James Bond." After filling a glass, Jake smirked at his friend who shrugged his shoulders and gave the girl a sad puppy-dog expression. "Who are you going to believe, me or Jake from State Farm?
Samantha A. Cole (Topping the Alpha (Trident Security, #4))
Dinah said, “Ivy, you want to take this or should I?” “I’ll do it. You’re busy,” Ivy said. Dinah could hear her twisting around in the pilot’s seat to look at Julia. She spoke as follows: “Julia. Shut up. If you say another fucking word I’ll stave your fucking head in and put your corpse out the airlock. Nothing about this is acceptable. Starting with the fact that you are flapping your gums, posing a distraction to Dinah while she is carrying out a difficult mission-critical operation to protect the Cloud Ark. You just attempted to countermand a direct order from Markus, who is in charge of everything here under the PSAPS clause of the Cloud Ark Constitution. You are up here illegally. The Crater Lake Accord specifically barred the sending of national leaders to the Cloud Ark. You have violated that commitment and found a way to be launched up here anyhow, and judging from the looks of it there was no end of dirty dealing along the way. Your vehicle approached the Cloud Ark in a manner incompatible with our safety and security procedures, endangering the lives of everyone up here, and forcing arklets and Izzy itself to expend priceless and irreplaceable fuel to perform evasive maneuvers. We were sent here on an emergency basis, placing ourselves in harm’s way and expending more scarce resources to clean up the mess that you created by your cowardly and dishonorable act. For all of these reasons I am commanding you, by my authority as the commander of this vessel, to remain silent until we have docked safely at Izzy.
Neal Stephenson (Seveneves)
Not only in antiquity but in our own times also laws have been passed...to secure good conditions for workers; so it is right that the art of medicine should contribute its portion for the benefit and relief of those for whom the law has shown such foresight...[We] ought to show peculiar zeal...in taking precautions for their safety. I for one have done all that lay in my power, and have not thought it beneath me to step into workshops of the meaner sort now and again and study the obscure operations of mechanical arts.
Bernardino Ramazzini
But the Hermetists claim that the Master or advanced student is able, to a great degree, to escape tile swing toward Pain, by the process of Neutralization before mentioned. By rising on to the higher plane of the Ego, much of the experience that comes to those dwelling on the lower plane is avoided and escaped. The Law of Compensation plays an important part in the lives of men and women. It will be noticed that one generally "pays the price" of anything he possesses or lacks. If he has one thing, he lacks another the balance is struck. No one can "keep his penny and have the bit of cake" at the same time. Everything has its pleasant and unpleasant sides. The things that one gains are always paid for by the things that one loses. The rich possess much that the poor lack, while the poor often possess things that are beyond the reach of the rich. The millionaire may have the inclination toward feasting, and the wealth wherewith to secure all the dainties and luxuries of the table while he lacks the appetite to enjoy the same; he envies the appetite and digestion of the laborer, who lacks the wealth and inclinations of the millionaire, and who gets more pleasure from his plain food than the millionaire could obtain even if his appetite were not jaded, nor his digestion ruined, for the wants, habits and inclinations differ. And so it is through life. The Law of Compensation is ever in operation, striving to balance and counterbalance, and always succeeding in time, even though several lives may be required for the return swing of the Pendulum of Rhythm.
Three Initiates (Kybalion: A Study of the Hermetic Philosophy of Ancient Egypt and Greece)
Social cohesion is a necessity, and mankind has never yet succeeded in enforcing cohesion by merely rational arguments. Every community is exposed to two opposite dangers: ossification through too much discipline and reverence for tradition, on the one hand; on the other hand, dissolution, or subjection to foreign conquest, through the growth of an individualism and personal independence that makes co-operation impossible. In general, important civilizations start with a rigid and superstitious system, gradually relaxed, and leading, at a certain stage, to a period of brilliant genius, while the good of the old tradition remains and the evil inherent in its dissolution has not yet developed. But as the evil unfolds, it leads to anarchy, thence, inevitably, to a new tyranny, producing a new synthesis secured by a new system of dogma. The doctrine of liberalism is an attempt to escape from this endless oscillation. The essence of liberalism is an attempt to secure a social order not based on irrational dogma, and insuring stability without involving more restraints than are necessary for the preservation of the community. Whether this attempt can succeed only the future can determine.
Bertrand Russell
Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
Jason Fried (Remote: Office Not Required)
Countries measured their success by the size of their territory, the increase in their population and the growth of their GDP – not by the happiness of their citizens. Industrialised nations such as Germany, France and Japan established gigantic systems of education, health and welfare, yet these systems were aimed to strengthen the nation rather than ensure individual well-being. Schools were founded to produce skilful and obedient citizens who would serve the nation loyally. At eighteen, youths needed to be not only patriotic but also literate, so that they could read the brigadier’s order of the day and draw up tomorrow’s battle plans. They had to know mathematics in order to calculate the shell’s trajectory or crack the enemy’s secret code. They needed a reasonable command of electrics, mechanics and medicine in order to operate wireless sets, drive tanks and take care of wounded comrades. When they left the army they were expected to serve the nation as clerks, teachers and engineers, building a modern economy and paying lots of taxes. The same went for the health system. At the end of the nineteenth century countries such as France, Germany and Japan began providing free health care for the masses. They financed vaccinations for infants, balanced diets for children and physical education for teenagers. They drained festering swamps, exterminated mosquitoes and built centralised sewage systems. The aim wasn’t to make people happy, but to make the nation stronger. The country needed sturdy soldiers and workers, healthy women who would give birth to more soldiers and workers, and bureaucrats who came to the office punctually at 8 a.m. instead of lying sick at home. Even the welfare system was originally planned in the interest of the nation rather than of needy individuals. When Otto von Bismarck pioneered state pensions and social security in late nineteenth-century Germany, his chief aim was to ensure the loyalty of the citizens rather than to increase their well-being. You fought for your country when you were eighteen, and paid your taxes when you were forty, because you counted on the state to take care of you when you were seventy.30 In 1776 the Founding Fathers of the United States established the right to the pursuit of happiness as one of three unalienable human rights, alongside the right to life and the right to liberty. It’s important to note, however, that the American Declaration of Independence guaranteed the right to the pursuit of happiness, not the right to happiness itself. Crucially, Thomas Jefferson did not make the state responsible for its citizens’ happiness. Rather, he sought only to limit the power of the state.
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
Roosevelt fought hard for the United States to host the opening session [of the United Nations]; it seemed a magnanimous gesture to most of the delegates. But the real reason was to better enable the United States to eavesdrop on its guests. Coded messages between the foreign delegations and their distant capitals passed through U.S. telegraph lines in San Francisco. With wartime censorship laws still in effect, Western Union and the other commercial telegraph companies were required to pass on both coded and uncoded telegrams to U.S. Army codebreakers. Once the signals were captured, a specially designed time-delay device activated to allow recorders to be switched on. Devices were also developed to divert a single signal to several receivers. The intercepts were then forwarded to Arlington Hall, headquarters of the Army codebreakers, over forty-six special secure teletype lines. By the summer of 1945 the average number of daily messages had grown to 289,802, from only 46,865 in February 1943. The same soldiers who only a few weeks earlier had been deciphering German battle plans were now unraveling the codes and ciphers wound tightly around Argentine negotiating points. During the San Francisco Conference, for example, American codebreakers were reading messages sent to and from the French delegation, which was using the Hagelin M-209, a complex six-wheel cipher machine broken by the Army Security Agency during the war. The decrypts revealed how desperate France had become to maintain its image as a major world power after the war. On April 29, for example, Fouques Duparc, the secretary general of the French delegation, complained in an encrypted note to General Charles de Gaulle in Paris that France was not chosen to be one of the "inviting powers" to the conference. "Our inclusion among the sponsoring powers," he wrote, "would have signified, in the eyes of all, our return to our traditional place in the world." In charge of the San Francisco eavesdropping and codebreaking operation was Lieutenant Colonel Frank B. Rowlett, the protégé of William F. Friedman. Rowlett was relieved when the conference finally ended, and he considered it a great success. "Pressure of work due to the San Francisco Conference has at last abated," he wrote, "and the 24-hour day has been shortened. The feeling in the Branch is that the success of the Conference may owe a great deal to its contribution." The San Francisco Conference served as an important demonstration of the usefulness of peacetime signals intelligence. Impressive was not just the volume of messages intercepted but also the wide range of countries whose secrets could be read. Messages from Colombia provided details on quiet disagreements between Russia and its satellite nations as well as on "Russia's prejudice toward the Latin American countries." Spanish decrypts indicated that their diplomats in San Francisco were warned to oppose a number of Russian moves: "Red maneuver . . . must be stopped at once," said one. A Czechoslovakian message indicated that nation's opposition to the admission of Argentina to the UN. From the very moment of its birth, the United Nations was a microcosm of East-West spying. Just as with the founding conference, the United States pushed hard to locate the organization on American soil, largely to accommodate the eavesdroppers and codebreakers of NSA and its predecessors.
James Bamford (Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century)
...the founders of our nation were nearly all Infidels, and that of the presidents who had thus far been elected {George Washington, John Adams, Thomas Jefferson, James Madison, James Monroe, John Quincy Adams, and Andrew Jackson}, not a one had professed a belief in Christianity... When the war was over and the victory over our enemies won, and the blessings and happiness of liberty and peace were secured, the Constitution was framed and God was neglected. He was not merely forgotten. He was absolutely voted out of the Constitution. The proceedings, as published by Thompson, the secretary, and the history of the day, show that the question was gravely debated whether God should be in the Constitution or not, and after a solemn debate he was deliberately voted out of it.... There is not only in the theory of our government no recognition of God's laws and sovereignty, but its practical operation, its administration, has been conformable to its theory. Those who have been called to administer the government have not been men making any public profession of Christianity... Washington was a man of valor and wisdom. He was esteemed by the whole world as a great and good man; but he was not a professing Christian... [Sermon by Reverend Bill Wilson (Episcopal) in October 1831, as published in the Albany Daily Advertiser the same month it was made]
Bird Wilson
We maintain therefore that in matters of Religion, no man’s right is abridged by the institution of Civil Society, and that Religion is wholly exempt from its cognizance. True it is, that no other rule exists, by which any question which may divide a Society, can be ultimately determined, but the will of the majority; but it is also true, that the majority may trespass on the rights of the minority. ...Because it is proper to take alarm at the first experiment on our liberties. We hold this prudent jealousy to be the first duty of Citizens, and one of the noblest characteristics of the late Revolution. The free men of America did not wait till usurped power had strengthened itself by exercise, and entangled the question in precedents. They saw all the consequences in the principle, and they avoided the consequences by denying the principle. We revere this lesson too much soon to forget it. Who does not see that the same authority which can establish Christianity, in exclusion of all other Religions, may establish with the same ease any particular sect of Christians, in exclusion of all other Sects? that the same authority which can force a citizen to contribute three pence only of his property for the support of any one establishment, may force him to conform to any other establishment in all cases whatsoever? ...Because experience witnesseth that ecclesiastical establishments, instead of maintaining the purity and efficacy of Religion, have had a contrary operation. During almost fifteen centuries has the legal establishment of Christianity been on trial. What have been its fruits? More or less in all places, pride and indolence in the Clergy, ignorance and servility in the laity, in both, superstition, bigotry and persecution. ...What influence in fact have ecclesiastical establishments had on Civil Society? In some instances they have been seen to erect a spiritual tyranny on the ruins of the Civil authority; in many instances they have been seen upholding the thrones of political tyranny: in no instance have they been seen the guardians of the liberties of the people. Rulers who wished to subvert the public liberty, may have found an established Clergy convenient auxiliaries. A just Government instituted to secure & perpetuate it needs them not. Such a Government will be best supported by protecting every Citizen in the enjoyment of his Religion with the same equal hand which protects his person and his property; by neither invading the equal rights of any Sect, nor suffering any Sect to invade those of another. [Memorial and Remonstrance Against Religious Assessments, 20 June 1785. This was written in response to a proposed bill that would establish 'teachers of the Christian religion', violating the 1st Amendment's establishment clause]
James Madison (A Memorial And Remonstrance, On The Religious Rights Of Man: Written In 1784-85 (1828))
Lavabit was an e-mail service that offered more security privacy than the large corporate e-mail services most of us use. It was a small company, owned and operated by a programmer named Ladar Levison, and it was popular among the tech-savvy. It had half a million users, Edward Snowden amongst them. Soon after Snowden fled to Hong Kong in 2013, Levison received a National Security Letter demanding that the company turn over the master encryption key that protected all of Lavabit’s users—and then not tell any of its customers that they could be monitored. Levison fought this order in court, and when it became clear that he had lost, he shut down his service rather than deceive and compromise his customers. The moral is clear. If you run a business, and the FBI or the NSA wants to turn it into a mass surveillance tool, it believes that it is entitled to do so, solely on its own authority. The agency can force you to modify your system. It can do it all in secret and then force your business to keep that secret. Once it does that, you no longer control that part of your business. If you’re a large company, you can’t shut it down. You can’t realistically terminate part of your service. In a very real sense, it is not your business anymore. It has become an arm of the vast US surveillance apparatus, and if your interest conflicts with the agency’s, the agency wins. Your business has been commandeered.
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
Students at the instituted for Environmental Research at RWTH Aachen discovered something amazing about photosynthesis in undisturbed beech forests. Apparently, the trees synchronize their performance so that they are all equally successful. And that is not what one would expect. Each beech tree grows in a unique location, and conditions can vary greatly in just a few yards. The soil can be stony or loose. It can retain a great deal of water or almost no water. It can be full of nutrients or extremely barren. Accordingly, each tree experiences different growing conditions; therefore, each tree grows more quickly or more slowly and produces more or less sugar or wood, and thus you would expect every tree to be photosynthesizing at a different rate. And that's what makes the research results so astounding. The rate of photosynthesis is the same for all the trees. The trees, it seems, are equalizing differences between the strong and the weak. Whether they are thick or thin, all members of the same species are using light to produce the same amount of sugar per leaf. This equalization is taking place underground through the roots. There's obviously a lively exchange going on down there. Whoever has an abundance of sugar hands some over; whoever is running short gets help. Once again, fungi are involved. Their enormous networks act as gigantic redistribution mechanisms. It's a bit like the way social security systems operate to ensure individual members of society don't fall too far behind.
Peter Wohlleben (The Hidden Life of Trees: What They Feel, How They Communicate: Discoveries from a Secret World)
Meanwhile, in Europe, the Renaissance continued, and I began to see the full scope of the Second Insight. The power of the church to define reality was diminishing, and Europeans were feeling as though they were awakening to look at life anew. Through the courage of countless individuals, all inspired by their intuitive memories, the scientific method was embraced as a democratic process of exploring and coming to understand the world in which humans found themselves. This method—exploring some aspect of the natural world, drawing conclusions, then offering this view to others—was thought of as the consensus-building process through which we would be able, finally, to understand mankind’s real situation on this planet, including our spiritual nature. But those in the church, entrenched in Fear, sought to squelch this new science. As political forces lined up on both sides, a compromise was reached. Science would be free to explore the outer, material world, but must leave spiritual phenomena to the dictates of the still-influential churchmen. The entire inner world of experience—our higher perceptual states of beauty and love, intuitions, coincidences, interpersonal phenomena, even dreams—all were, at first, off limits to the new science. Despite these restrictions, science began to map out and describe the operation of the physical world, providing information rich in ways to increase trade and utilize natural resources. Human economic security increased, and slowly we began to lose our sense of mystery and our heartfelt questions about the purpose of life. We decided it was purposeful enough just to survive and build a better, more secure world for ourselves and our children. Gradually we entered the consensus trance that denied the reality of death and created the illusion that the world was explained and ordinary and devoid of mystery. In spite of our rhetoric, our once-strong intuition of a spiritual source was being pushed farther into the background. In this growing materialism, God could only be viewed as a distant Deist’s God, a God who merely pushed the universe into being and then stood back to let it run in a mechanical sense, like a predictable machine, with every effect having a cause, and unconnected events happening only at random, by chance alone.
James Redfield (The Tenth Insight: Holding the Vision (Celestine Prophecy #2))
There has been so much misinformation spread about the nature of this interview that the actual events that took place merit discussion. After being discreetly delivered by the Secret Service to the FBI’s basement garage, Hillary Clinton was interviewed by a five-member joint FBI and Department of Justice team. She was accompanied by five members of her legal team. None of Clinton’s lawyers who were there remained investigative subjects in the case at that point. The interview, which went on for more than three hours, was conducted in a secure conference room deep inside FBI headquarters and led by the two senior special agents on the case. With the exception of the secret entry to the FBI building, they treated her like any other interview subject. I was not there, which only surprises those who don’t know the FBI and its work. The director does not attend these kinds of interviews. My job was to make final decisions on the case, not to conduct the investigation. We had professional investigators, schooled on all of the intricacies of the case, assigned to do that. We also as a matter of procedure don’t tape interviews of people not under arrest. We instead have professionals who take detailed notes. Secretary Clinton was not placed under oath during the interview, but this too was standard procedure. The FBI doesn’t administer oaths during voluntary interviews. Regardless, under federal law, it would still have been a felony if Clinton was found to have lied to the FBI during her interview, whether she was under oath or not. In short, despite a whole lot of noise in the media and Congress after the fact, the agents interviewed Hillary Clinton following the FBI’s standard operating procedures.
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
The gross domestic product of the United States in 2001 was about $10.6 trillion. The budget of the federal government was about $1.8 trillion. In fiscal 2001, the government enjoyed a $128 billion operating surplus. Yet counterterrorism teams at the C.I.A. and the F.B.I. working on Al Qaeda and allied groups received an infinitesimal fraction of the country’s defense and intelligence budget of roughly $300 billion, the great majority of which went to the Pentagon, to support conventional and missile forces. Bush’s national security deputies did not hold a meeting dedicated to plans to thwart Al Qaeda until September 4, 2001, almost nine months after President Bush took the oath of office. The September 11 conspiracy succeeded in part because the democratically elected government of the United States, including the Congress, did not regard Al Qaeda as a priority.
Steve Coll (Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan, 2001-2016)
The extermination of the Jews has sometimes been seen as a kind of industrialized, assembly-line kind of mass murder, and this picture has at least some element of truth to it. No other genocide in history has been carried out by mechanical means - gassing - in specially constructed facilities like those in operation at Auschwitz or Treblinka. At the same time, however, these facilities did not operate efficiently or effectively, and if the impression given by calling them industrialized is that they were automated or impersonal, then it is a false one. Men such as Hess and Stangl and their subordinates tried to insulate themselves from the human dimensions of what they were doing by referring to their victims as 'cargo' or 'items.' Talking to Gerhard Stabenow, the head of the SS Security Service in Warsaw, in September 1942, Wilm Hosenfeld noted how the language Stabenow used distanced himself from the fact that what he was involved in was the mass murder of human beings: 'He speaks of the Jews as ants or other vermin, of their 'resettlement', that means their mass murder, as he would of the extermination of the bedbugs in the disinfestation of a house.' But at the same time such men were not immune from the human emotions they tried so hard to repress, and they remembered incidents in which individual women and children had appealed to their conscience, even if such appeals were in vain. The psychological strain that continual killing of unarmed civilians, including women and children, imposed on such men was considerable, just as it had been in the case of the SS Task Forces, whose troops had been shooting Jews in their hundreds of thousands before the first gas vans were deploted in an attempt not only to speed up the killing but also to make it somehow more impersonal.
Richard J. Evans (The Third Reich at War (The History of the Third Reich, #3))
Looking at a situation like the Israel-Palestine conflict, Americans are likely to react with puzzlement when they see ever more violent and provocative acts that target innocent civilians. We are tempted to ask: do the terrorists not realize that they will enrage the Israelis, and drive them to new acts of repression? The answer of course is that they know this very well, and this is exactly what they want. From our normal point of view, this seems incomprehensible. If we are doing something wrong, we do not want to invite the police to come in and try and stop us, especially if repression will result in the deaths or imprisonment of many of our followers. In a terrorist war, however, repression is often valuable because it escalates the growing war, and forces people to choose between the government and the terrorists. The terror/repression cycle makes it virtually impossible for anyone to remain a moderate. By increasing polarization within a society, terrorism makes the continuation of the existing order impossible. Once again, let us take the suicide bombing example. After each new incident, Israeli authorities tightened restrictions on Palestinian communities, arrested new suspects, and undertook retaliatory strikes. As the crisis escalated, they occupied or reoccupied Palestinian cities, destroying Palestinian infrastructure. The result, naturally, was massive Palestinian hostility and anger, which made further attacks more likely in the future. The violence made it more difficult for moderate leaders on both sides to negotiate. In the long term, the continuing confrontation makes it more likely that ever more extreme leaders will be chosen on each side, pledged not to negotiate with the enemy. The process of polarization is all the more probably when terrorists deliberately choose targets that they know will cause outrage and revulsion, such as attacks on cherished national symbols, on civilians, and even children. We can also think of this in individual terms. Imagine an ordinary Palestinian Arab who has little interest in politics and who disapproves of terrorist violence. However, after a suicide bombing, he finds that he is subject to all kinds of official repression, as the police and army hold him for long periods at security checkpoints, search his home for weapons, and perhaps arrest or interrogate him as a possible suspect. That process has the effect of making him see himself in more nationalistic (or Islamic) terms, stirs his hostility to the Israeli regime, and gives him a new sympathy for the militant or terrorist cause. The Israeli response to terrorism is also valuable for the terrorists in global publicity terms, since the international media attack Israel for its repression of civilians. Hamas military commander Salah Sh’hadeh, quoted earlier, was killed in an Israeli raid on Gaza in 2002, an act which by any normal standards of warfare would represent a major Israeli victory. In this case though, the killing provoked ferocious criticism of Israel by the U.S. and western Europe, and made Israel’s diplomatic situation much more difficult. In short, a terrorist attack itself may or may not attract widespread publicity, but the official response to it very likely will. In saying this, I am not suggesting that governments should not respond to terrorism, or that retaliation is in any sense morally comparable to the original attacks. Many historical examples show that terrorism can be uprooted and defeated, and military action is often an essential part of the official response. But terrorism operates on a logic quite different from that of most conventional politics and law enforcement, and concepts like defeat and victory must be understood quite differently from in a regular war.
Philip Jenkins (Images of Terror: What We Can and Can't Know about Terrorism (Social Problems and Social Issues))
The story of The Rape of the Lock, sylphs and all, could have been told, though not so effectively, in prose. The Odyssey and the Comedy have something to say that could have been said well, though not equally well, without verse. Most of the qualities Aristotle demands of a tragedy could occur in a prose play. Poetry and prose, however different in language, overlapped, almost coincided, in content. But modern poetry, if it ‘says’ anything at all, if it aspires to ‘mean’ as well as to ‘be’, says what prose could not say in any fashion. To read the old poetry involved learning a slightly different language; to read the new involves the unmaking of your mind, the abandonment of all the logical and narrative connections which you use in reading prose or in conversation. You must achieve a trance-like condition in which images, associations, and sounds operate without these. Thus the common ground between poetry and any other use of words is reduced almost to zero. In that way poetry is now more quintessentially poetical than ever before; ‘purer’ in the negative sense. It not only does (like all good poetry) what prose can’t do: it deliberately refrains from doing anything that prose can do. Unfortunately, but inevitably, this process is accompanied by a steady diminution in the number of its readers. Some have blamed the poets for this, and some the people. I am not sure that there need be any question of blame. The more any instrument is refined and perfected for some particular function, the fewer those who have the skill, or the occasion, to handle it must of course become. Many use ordinary knives and few use surgeons’ scalpels. The scalpel is better for operations, but it is no good for anything else. Poetry confines itself more and more to what only poetry can do; but this turns out to be something which not many people want done. Nor, of course, could they receive it if they did. Modern poetry is too difficult for them. It is idle to complain; poetry so pure as this must be difficult. But neither must the poets complain if they are unread. When the art of reading poetry requires talents hardly less exalted than the art of writing it, readers cannot be much more numerous than poets. The explication of poetry is already well entrenched as a scholastic and academic exercise. The intention to keep it there, to make proficiency in it the indispensable qualification for white-collared jobs, and thus to secure for poets and their explicators a large and permanent (because a conscript) audience, is avowed. It may possibly succeed. Without coming home any more than it now does to the ‘business and bosoms’ of most men, poetry may, in this fashion, reign for a millennium; providing material for the explication which teachers will praise as an incomparable discipline and pupils will accept as a necessary moyen de parvenir. But this is speculation.
C.S. Lewis (An Experiment in Criticism)
Situation awareness means possessing an explorer mentality A general never knows anything with certainty, never sees his enemy clearly, and never knows positively where he is. When armies are face to face, the least accident in the ground, the smallest wood, may conceal part of the enemy army. The most experienced eye cannot be sure whether it sees the whole of the enemy’s army or only three-fourths. It is by the mind’s eye, by the integration of all reasoning, by a kind of inspiration that the general sees, knows, and judges. ~Napoleon 5   In order to effectively gather the appropriate information as it’s unfolding we must possess the explorer mentality.  We must be able to recognize patterns of behavior. Then we must recognize that which is outside that normal pattern. Then, you take the initiative so we maintain control. Every call, every incident we respond to possesses novelty. Car stops, domestic violence calls, robberies, suspicious persons etc.  These individual types of incidents show similar patterns in many ways. For example, a car stopped normally pulls over to the side of the road when signaled to do so.  The officer when ready, approaches the operator, a conversation ensues, paperwork exchanges, and the pulled over car drives away. A domestic violence call has its own normal patterns; police arrive, separate involved parties, take statements and arrest aggressor and advise the victim of abuse prevention rights. We could go on like this for all the types of calls we handle as each type of incident on its own merits, does possess very similar patterns. Yet they always, and I mean always possess something different be it the location, the time of day, the person you are dealing with. Even if it’s the same person, location, time and day, the person you’re dealing who may now be in a different emotional state and his/her motives and intent may be very different. This breaks that normal expected pattern.  Hence, there is a need to always be open-minded, alert and aware, exploring for the signs and signals of positive or negative change in conditions. In his Small Wars journal article “Thinking and Acting like an Early Explorer” Brigadier General Huba Wass de Czege (US Army Ret.) describes the explorer mentality:   While tactical and strategic thinking are fundamentally different, both kinds of thinking must take place in the explorer’s brain, but in separate compartments. To appreciate this, think of the metaphor of an early American explorer trying to cross a large expanse of unknown terrain long before the days of the modern conveniences. The explorer knows that somewhere to the west lies an ocean he wants to reach. He has only a sketch-map of a narrow corridor drawn by a previously unsuccessful explorer. He also knows that highly variable weather and frequent geologic activity can block mountain passes, flood rivers, and dry up desert water sources. He also knows that some native tribes are hostile to all strangers, some are friendly and others are fickle, but that warring and peace-making among them makes estimating their whereabouts and attitudes difficult.6
Fred Leland (Adaptive Leadership Handbook - Law Enforcement & Security)
In short the only fully rational world would be the world of wishing-caps, the world of telepathy, where every desire is fulfilled instanter, without having to consider or placate surrounding or intermediate powers. This is the Absolute's own world. He calls upon the phenomenal world to be, and it IS, exactly as he calls for it, no other condition being required. In our world, the wishes of the individual are only one condition. Other individuals are there with other wishes and they must be propitiated first. So Being grows under all sorts of resistances in this world of the many, and, from compromise to compromise, only gets organized gradually into what may be called secondarily rational shape. We approach the wishing-cap type of organization only in a few departments of life. We want water and we turn a faucet. We want a kodak-picture and we press a button. We want information and we telephone. We want to travel and we buy a ticket. In these and similar cases, we hardly need to do more than the wishing—the world is rationally organized to do the rest. But this talk of rationality is a parenthesis and a digression. What we were discussing was the idea of a world growing not integrally but piecemeal by the contributions of its several parts. Take the hypothesis seriously and as a live one. Suppose that the world's author put the case to you before creation, saying: "I am going to make a world not certain to be saved, a world the perfection of which shall be conditional merely, the condition being that each several agent does its own 'level best.' I offer you the chance of taking part in such a world. Its safety, you see, is unwarranted. It is a real adventure, with real danger, yet it may win through. It is a social scheme of co-operative work genuinely to be done. Will you join the procession? Will you trust yourself and trust the other agents enough to face the risk?" Should you in all seriousness, if participation in such a world were proposed to you, feel bound to reject it as not safe enough? Would you say that, rather than be part and parcel of so fundamentally pluralistic and irrational a universe, you preferred to relapse into the slumber of nonentity from which you had been momentarily aroused by the tempter's voice? Of course if you are normally constituted, you would do nothing of the sort. There is a healthy- minded buoyancy in most of us which such a universe would exactly fit. We would therefore accept the offer—"Top! und schlag auf schlag!" It would be just like the world we practically live in; and loyalty to our old nurse Nature would forbid us to say no. The world proposed would seem 'rational' to us in the most living way. Most of us, I say, would therefore welcome the proposition and add our fiat to the fiat of the creator. Yet perhaps some would not; for there are morbid minds in every human collection, and to them the prospect of a universe with only a fighting chance of safety would probably make no appeal. There are moments of discouragement in us all, when we are sick of self and tired of vainly striving. Our own life breaks down, and we fall into the attitude of the prodigal son. We mistrust the chances of things. We want a universe where we can just give up, fall on our father's neck, and be absorbed into the absolute life as a drop of water melts into the river or the sea. The peace and rest, the security desiderated at such moments is security against the bewildering accidents of so much finite experience. Nirvana means safety from this everlasting round of adventures of which the world of sense consists. The hindoo and the buddhist, for this is essentially their attitude, are simply afraid, afraid of more experience, afraid of life. And to men of this complexion, religious monism comes with its consoling words: "All is needed and essential—even you with your sick soul and heart. All are one
William James (Pragmatism: A New Name for Some Old Ways of Thinking)
You already know what you know, after all—and, unless your life is perfect, what you know is not enough. You remain threatened by disease, and self-deception, and unhappiness, and malevolence, and betrayal, and corruption, and pain, and limitation. You are subject to all these things, in the final analysis, because you are just too ignorant to protect yourself. If you just knew enough, you could be healthier and more honest. You would suffer less. You could recognize, resist and even triumph over malevolence and evil. You would neither betray a friend, nor deal falsely and deceitfully in business, politics or love. However, your current knowledge has neither made you perfect nor kept you safe. So, it is insufficient, by definition—radically, fatally insufficient. You must accept this before you can converse philosophically, instead of convincing, oppressing, dominating or even amusing. You must accept this before you can tolerate a conversation where the Word that eternally mediates between order and chaos is operating, psychologically speaking. To have this kind of conversation, it is necessary to respect the personal experience of your conversational partners. You must assume that they have reached careful, thoughtful, genuine conclusions (and, perhaps, they must have done the work tha justifies this assumption). You must believe that if they shared their conclusions with you, you could bypass at least some of the pain of personally learning the same things (as learning from the experience of others can be quicker and much less dangerous). You must meditate, too, instead of strategizing towards victory. If you fail, or refuse, to do so, then you merely and automatically repeat what you already believe, seeking its validation and insisting on its rightness. But if you are meditating as you converse, then you listen to the other person, and say the new and original things that can rise from deep within of their own accord. It’s as if you are listening to yourself during such a conversation, just as you are listening to the other person. You are describing how you are responding to the new information imparted by the speaker. You are reporting what that information has done to you—what new things it made appear within you, how it has changed your presuppositions, how it has made you think of new questions. You tell the speaker these things, directly. Then they have the same effect on him. In this manner, you both move towards somewhere newer and broader and better. You both change, as you let your old presuppositions die—as you shed your skins and emerge renewed. A conversation such as this is one where it is the desire for truth itself—on the part of both participants—that is truly listening and speaking. That’s why it’s engaging, vital, interesting and meaningful. That sense of meaning is a signal from the deep, ancient parts of your Being. You’re where you should be, with one foot in order, and the other tentatively extended into chaos and the unknown. You’re immersed in the Tao, following the great Way of Life. There, you’re stable enough to be secure, but flexible enough to transform. There, you’re allowing new information to inform you—to permeate your stability, to repair and improve its structure, and expand its domain. There the constituent elements of your Being can find their more elegant formation. A conversation like that places you in the same place that listening to great music places you, and for much the same reason. A conversation like that puts you in the realm where souls connect, and that’s a real place. It leaves you thinking, “That was really worthwhile. We really got to know each other.” The masks came off, and the searchers were revealed. So, listen, to yourself and to those with whom you are speaking. Your wisdom then consists not of the knowledge you already have, but the continual search for knowledge, which is the highest form of wisdom.
Jordan B. Peterson
told my people that I wanted only the best, whatever it took, wherever they came from, whatever it cost. We assembled thirty people, the brightest cybersecurity minds we have. A few are on loan, pursuant to strict confidentiality agreements, from the private sector—software companies, telecommunications giants, cybersecurity firms, military contractors. Two are former hackers themselves, one of them currently serving a thirteen-year sentence in a federal penitentiary. Most are from various agencies of the federal government—Homeland Security, CIA, FBI, NSA. Half our team is devoted to threat mitigation—how to limit the damage to our systems and infrastructure after the virus hits. But right now, I’m concerned with the other half, the threat-response team that Devin and Casey are running. They’re devoted to stopping the virus, something they’ve been unable to do for the last two weeks. “Good morning, Mr. President,” says Devin Wittmer. He comes from NSA. After graduating from Berkeley, he started designing cyberdefense software for clients like Apple before the NSA recruited him away. He has developed federal cybersecurity assessment tools to help industries and governments understand their preparedness against cyberattacks. When the major health-care systems in France were hit with a ransomware virus three years ago, we lent them Devin, who was able to locate and disable it. Nobody in America, I’ve been assured, is better at finding holes in cyberdefense systems or at plugging them. “Mr. President,” says Casey Alvarez. Casey is the daughter of Mexican immigrants who settled in Arizona to start a family and built up a fleet of grocery stores in the Southwest along the way. Casey showed no interest in the business, taking quickly to computers and wanting to join law enforcement. When she was a grad student at Penn, she got turned down for a position at the Department of Justice. So Casey got on her computer and managed to do what state and federal authorities had been unable to do for years—she hacked into an underground child-pornography website and disclosed the identities of all the website’s patrons, basically gift-wrapping a federal prosecution for Justice and shutting down an operation that was believed to be the largest purveyor of kiddie porn in the country. DOJ hired her on the spot, and she stayed there until she went to work for the CIA. She’s been most recently deployed in the Middle East with US Central Command, where she intercepts, decodes, and disrupts cybercommunications among terrorist groups. I’ve been assured that these two are, by far, the best we have. And they are about to meet the person who, so far, has been better. There is a hint of reverence in their expressions as I introduce them to Augie. The Sons of Jihad is the all-star team of cyberterrorists, mythical figures in that world. But I sense some competitive fire, too, which will be a good thing.
Bill Clinton (The President Is Missing)