The CIA made these systems unclassified.
Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
One of the more interesting passages. The arsenal must not be classified to protect those who deploy it from legal action. This cyberwarfare kit, which can just as easily be used to destroy the US as one of its enemies, is public domain software created and released at US taxpayer expense.
This is almost hilarious.
Not that being classified would make any difference: cyber-"weapons" have something in common with biological weapons in that they're prone to leaking and blowing upwind, but also once used it's possible for the enemy to vaccinate against them.
"[U]naware of the opposing air force's knowledge of the chaff concept, planners felt that using it was even more dangerous than not, since, as soon as it was used, the enemy could easily duplicate it and use it against them... for over a year the curious situation arose where both sides of the conflict knew how to use chaff to jam the other side's radar, but refrained from doing so fearing that if they did so the other side would 'learn the trick' and use it against themselves."
Using a modern missile against an indigenous people will only impart that you are capable of that type of attach.
Using a modern missile against WWII Germany would likely quickly result in refinements to their V2 Rocket program, given enough remains to study.
Using a modern missile against Vietnam era USA would likely result in advancements in miniaturization and computation, given enough remains (even if they did not have the resources/facilities to capitalize on some aspects of those for years, I think it's likely it would advance the fields by a least a few years).
One of the biggest advantages the Allies had in WWII was that they had cracked the "uncrackable" Axis encryption. Even though they were able to decipher enemy messages, they often didn't act on that information because that would tip their hand. The strategic value of reading the enemies messages is enormous when the enemy doesn't know you can do it, and much less so, and possibly even negative when they do know.
It's also along the lines of Sun Tzu-esque deception.
I suppose the modern example are the constant probing of air defenses by the attacker (i.e. the US and its array of electronic warfare suites), and the game theoretic calculation by the defender on whether to turn on their radars or not...
IIRC the proximity fuses were developed at the Johns Hopkins University Applied Physics Laboratory (JHU/APL); that is the story I got when I worked there.
IIRC, the shells were also especially effective as anti-aircraft artillery.
It does. WWII tanks' armor is mostly concentrated to the front and sides, because those tanks are designed to force enemy lines against ground-bursting shells, field pieces, and other tanks, all of which fire mostly on low trajectories; what's on top is much thinner, because no one expects to need to withstand a lot of damage there. Bursting a shell above ground level throws a lot of fragments at that weak armor, where a ground burst mostly wastes them against armor designed to withstand direct hits from much more powerful weapons. For infantry, it's even worse; the whole point of a trench or a foxhole is to put a thick layer of earth between you and all the metal that's flying around at ground level. When an airburst can send fragments right down into the hole with you, that earth doesn't help one bit.
Fun fact: "daisy cutter" bombs work the same way. Up until Vietnam at least, their proximity fuse was on the end of a rod protruding a few feet from the nose of the bomb. Low-tech compared to a radar proximity fuse, but fearsomely effective; probably the only reason you wouldn't find it on a shell is that, unlike an air-dropped bomb, a shell has to withstand the force of being fired from a gun, and I doubt any such expedient could. (That's also why bombs tend to be so much more effective than shells, even when no more accurate. When the strongest force involved is 1g, you can spend a lot less mass on structure, and a lot more on explosive.)
The sight is arranged so that if you aim at the tank, the weapon is actually aiming above it. Then the round will detonate as it pass over the target, sending a molten metal shaped charge right down.
sink (one's own ship) deliberately by holing it or opening its seacocks to let water in
The more important role of scuttling—at least during wartime—is to prevent the ship you just abandoned getting hauled into the enemy's shipyard as a "prize" and restored to service with its guns pointed back toward you.
This is also more toward what is meant by Naval captains "going down with the ship" during battle: they stick around to act as a guard (and proximity fuse) for the scuttling charges, so that whoever just disabled the vessel can't just hop on-board and drive her home. (And, just maybe, catch a large enemy marine contingent in a grand old explosion if they try.)
> I look upon the sinking of the German fleet as a real blessing. It disposes, once and for all, the thorny question of the redistribution of these ships.
Also of note - in WWI ships had been deliberately scuttled ('the Blockships') to secure the smaller entry ways into Scapa Flow, by WWII these (and the anti-submarine netting in the larger channels) were shown to be inadequate when U-47 sunk the HMS Royal Oak. This attack led to the building of the Churchill Barriers without which I doubt we would have anywhere near as strong a community as we currently have in the Orkney Isles.
Today the wrecks of both the German Fleet and the Blockships are excellent shallow dive sites in slightly chilly water. If you dive I strongly recommend going to Orkney.
Was: they committed to destroying those weapons, and have been doing so for 24 years. They were 89.75% complete in 2012. The video you linked was from 1973.
I think you're letting your cynicism get in the way of truth and understanding.
The US has signed and ratified a treaty committing to destroy all chemical weapons and never produce them again , and it has built the infrastructure to do so  .
It's conspiracy-nut territory to think the US is simultaneously stockpiling chemical weapons in some super-secret program without good evidence for it.
Wide spread market fixing, libor, gold, silver was conspiracy nut territory.
The US engaging in blscksites and systematic torture was conspiracy nut territory.
But criticizing your pro Government apologia only results in comments being banned and removed -- perhaps just more conspiracy nut territory?
Or am I supposed to trust a stopped clock [the nuts] since it was shown to be right twice a day?
Anyhow, the Organization for the Prohibition of Chemical Weapons out of The Hague oversees compliance with the Chemical Weapons Convention. That includes verifying the destruction of stockpiles and weapons facilities as well as industry inspections that closely monitor precursors, as well as investigating cases of alleged production or usage. As of last October, 93% of declared stockpiles has been destroyed and independently verified by the OPCW. You don't have to take the US government's word for their numbers.
here is even a hertiage foundation report talking about sharing privacy keeping technologies with the government in the name of 'fighting terrorism'
and here is the ACLU sounding the alarm in August of 2004:
Ironically, its around the same time the NSA purported to have their own 'rules' in how they gather, which were obtained here:
and of course, not more than a few years later we have these reports:
It was never a wing nut conspiracy theory. Its just nobody was looking close enough to care.
I'm not convinced in any way this couldn't be foreseen if people would've paid more attention
My bar of cynicism is a little higher when you're talking about the United States discretely stockpiling mustard gas versus taking down a smartphone, you know? (Maybe I, too, am irresponsibly naive.)
They are so terribly afraid of committing war crimes they do not recognize the International Crime Court and are reading to invade any country trying an american soldier.
Surely the US would never do that!
While I agree, it was also considered conspiracy-nut territory to have believed most of the stuff in this leak. Look at how the wider tech community treats people like McAffee and Stallman.
Yeah, why won't people respect the opinions of a meth-cooking, bath-salt abusing, murderer who lived in Belize with underage 'girlfriends'?
Unless containment has been set up in such a way that this is a geographical impossibility (for instance, on two sides of the Rocky mountains to stop accidental mixing in groundwater).
So think long term...
Is this an innoculation game >10 years out????
"Classification" only pertains to how the material should be treated within the government.
Once its out, the only penalty can fall on the person who let it out into the wild.
But, yes a random citizen has no responsibility or rules they most follow.
Especially in this case as these are all offensive tools.
Does the author really think that if the tools were exposed then people who wanted to use these tools actually wouldn't simply because they were labelled "classified" somewhere?
Having code be copyrighted does not require any explicit registration.
I don't think I've followed the larger point, I don't see how copyright is relevant to the production or dissemination of malware.