The rise in national security secrecy in the first full year of the Obama Administration was matched by a sharp increase in the financial costs of the classification system, according to a new report to the President (pdf).
The estimated costs of the national security classification system grew by 15% last year to reach $10.17 billion, according to the Information Security Oversight Office (ISOO). It was the first time that annual secrecy costs in government were reported to exceed $10 billion.
An additional $1.25 billion was incurred within industry to protect classified information, for a grand total of $11.42 in classification-related costs, also a new record high.
The law doth punish man or woman
That steals the goose from off the commons,
But lets the greater villain loose
That steals the commons from the goose.
– 16th century English rhyme
Anthropologists have noted three main pathways to power. I say there are four. And out of these pathways come four types of weapons used against us, and four types of weapon industries. One of these has been obvious to all, two became more and more visible as the 20th century progressed, and the last needs far greater exposure than it has received. What are those weapons? What are the main ways to inflict damage on human beings by those who seek to dominate?
1. Physical Weapons .. 2. Economic Weapons .. 3. Ideological Weapons including Religion & Rote Education .. 4. Government as a Weapon
Phi Beta Iota: There are two literatures that are relevant here, the first represented by such books as Tragedy & Hope and its introductory companion the Naked Capitalist, and the second by a less well known but amply robust literature on the sovereign individual. A general strike and a refusal to pay taxes are the legitimate last resort of an abused public. Similarly, a public demand for Electoral Reform, absent which the legitimacy of any government is ended in the eyes of all, can be equally compelling. The times they are a'changing. We have high hopes for 2012 as the year of awakening and reconciliation based on truth.
With additional reporting by Matthew Cardinale, News Editor.
[The purpose of this article is not to hypothesize what the real story behind the Towers' collapse is, but to address what we find to be reasonable and compelling questions about the government's official account.]
(APN) ATLANTA — It will be ten years since September 11, 2001, in just a few months. And yet some of the most basic and fundamental questions about what happened that day–based upon physics and the forensic science of structural engineering–in the collapse of three towers at the World Trade Center in New York, still linger.
Groups such as Architects & Engineers for 9/11 Truth (A&E), founded by Richard Gage; and We Are Change Atlanta want to re-examine the evidence regarding the collapse of all three buildings.
Another blockbuster by Rolling Stone raises a basic question of just who the military views as the real enemy — the threat posed by the Taliban or the threat to its money flow posed by Congress and the American people.
The U.S. Army illegally ordered a team of soldiers specializing in “psychological operations” to manipulate visiting American senators into providing more troops and funding for the war, Rolling Stone has learned – and when an officer tried to stop the operation, he was railroaded by military investigators.
The orders came from the command of Lt. Gen. William Caldwell, a three-star general in charge of training Afghan troops – the linchpin of U.S. strategy in the war. Over a four-month period last year, a military cell devoted to what is known as “information operations” at Camp Eggers in Kabul was repeatedly pressured to target visiting senators and other VIPs who met with Caldwell. When the unit resisted the order, arguing that it violated U.S. laws prohibiting the use of propaganda against American citizens, it was subjected to a campaign of retaliation.
“My job in psy-ops is to play with people’s heads, to get the enemy to behave the way we want them to behave,” says Lt. Colonel Michael Holmes, the leader of the IO unit, who received an official reprimand after bucking orders. “I’m prohibited from doing that to our own people. When you ask me to try to use these skills on senators and congressman, you’re crossing a line.”
The list of targeted visitors was long, according to interviews with members of the IO team and internal documents obtained by Rolling Stone. Those singled out in the campaign included senators John McCain, Joe Lieberman, Jack Reed, Al Franken and Carl Levin; Rep. Steve Israel of the House Appropriations Committee; Adm. Mike Mullen of the Joint Chiefs of Staff; the Czech ambassador to Afghanistan; the German interior minister, and a host of influential think-tank analysts.
Center for Strategic & International Studies Dec 21, 2010
One possible improvement to the IAEA’s monitoring and verification regime would be enhancing the IAEA’s use of intelligence by formalizing cooperation with a multilateral security organization such as the North Atlantic Treaty Organization (NATO). Working through NATO, which has established procedures and infrastructure for sharing and disseminating classified information, would avoid many problems that occur in bilateral intelligence-sharing.
Phi Beta Iota: NATO does not have any intelligence collection or processing capabilities of its own; it is completely dependent on what its members choose to provide it–and as with intelligence provided to the UN (e.g. IAEA), this is generally impoverished if not blatantly misleading. The only viable solution for multinational intelligence is the establishment of a Multinational Decision Support Centre (MDSC) with Regional MDSC, all reliant primarily on Open Source Intelligence (OSINT), but all also having full-spectrum Human Intelligence (HUMINT) capabilities as well as Advanced Information Operations (IO) capabilities. The Americans must learn that in Epoch B, must must surrender control in order to gain command of the truth.
Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off.
These phones don't keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found.