The Pentagon has classified the list of groups that the USA believes itself to be at war with. They say that releasing a list of the groups that it considers to itself to be fighting could be used by those groups to boast about the fact that America takes them seriously, and thus drum up recruits. Ladies and gentlemen, I give you the most transparent administration in history.
In a major national security speech this spring, President Obama said again and again that the U.S. is at war with “Al Qaeda, the Taliban, and their associated forces.”
So who exactly are those associated forces? It’s a secret.
At a hearing in May, Sen. Carl Levin, D-Mich., asked the Defense Department to provide him with a current list of Al Qaeda affiliates.
The Pentagon responded – but Levin’s office told ProPublica they aren’t allowed to share it. Kathleen Long, a spokeswoman for Levin, would say only that the department’s “answer included the information requested.”
A Pentagon spokesman told ProPublica that revealing such a list could cause “serious damage to national security.”
Who Are We at War With? That’s Classified
(via Memex 1.1)
The Freedom of the Press Foundation’s lawsuit against the DoJ has resulted in the release of documents showing that a bill with that was nearly unanimously supported in Congress and the Senate was killed by behind-the-scene lobbying by the Department of Justice, which feared that they would lose the ability to arbitrarily reject Freedom of […]
Lee Jae-yong is nominally “vice-chairman” of Samsung, but his father, Samsung chairman Lee Kun-hee, is considered to be a mere figurehead, with Lee Jae-yong as the true boss of the company.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]