Secrecy
Encyclopedia
Secrecy is the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
Secrecy is often controversial, depending on the content of the secret, the group or people keeping the secret, and the motivation for secrecy. Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of privacy
and confidentiality
.
s conceal the location of their den
or nest
from predators
. Squirrels bury nuts, hiding them, and they try to remember their locations later.
Human
s attempt to consciously conceal aspects of themselves from others due to shame
, or from fear
of violence, rejection, harassment, loss of acceptance
, or loss of employment
. Humans may also attempt to conceal aspects of their own self
which they are not capable of incorporating psychologically into their conscious
being. Families
sometimes maintain "family secret
s", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family honor. The information may even be something as trivial as a recipe
.
Keeping one's strategy
secret is important in many aspects of game theory
.
secret sharing is one way for men and women to establish traditional relations with other men and women. A commonly used narrative that describes this kind of behavior is Joseph Conrad
's short story "The Secret Sharer
".
s often attempt to conceal information from other governments and the public. These state secrets can include weapon
designs, military plans, diplomatic
negotiation
tactics, and secrets obtained illicitly from others ("intelligence
"). Most nations have some form of Official Secrets Act
(the Espionage Act in the U.S.) and classify material according to the level of protection needed (hence the term "classified information
"). An individual needs a security clearance
for access and other protection methods, such as keeping documents in a safe
, are stipulated.
Few people dispute the desirability of keeping Critical Nuclear Weapon Design Information
secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S. Freedom of Information Act
and sunshine laws. Government officials sometimes leak information they are supposed to keep secret. (For a recent (2005) example, see Plame affair
.)
Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.
s to nonprofit charities, keep secrets for competitive advantage, to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by trade secret
laws. The patent
system encourages inventors to publish information in exchange for a limited time monopoly
on its use, though patent applications are initially secret. Secret societies
use secrecy as a way to attract members by creating a sense of importance.
Other laws require organizations to keep certain information secret, such as medical record
s (HIPAA
in the U.S.), or financial reports that are under preparation (to limit insider trading
). Europe
has particularly strict laws about database
privacy.
In many countries, neoliberal reforms of government have included expanding the outsourcing of government tasks and functions to private businesses with the aim of improving efficiency and effectiveness in government administration. However, among the criticisms of these reforms is the claim that the pervasive use of "Commercial-in-confidence" (or secrecy) clauses in contracts between government and private providers further limits public accountability of governments and prevents proper public scrutiny of the performance and probity of the private companies. Concerns have been raised that 'commercial-in-confidence' is open to abuse because it can be deliberately used to hide corporate or government maladministration and even corruption. A string of publicly scandalous revelations about poor, wasteful or corrupt management of government-funded private contracts left unchecked for lengthy periods, often in prison management, has added credence to the views of skeptics about the prudency of the neoliberal reforms themselves.
. Techniques used include physical security
and cryptography
. The latter depends on the secrecy of cryptographic keys. Secrecy is central to organized crime
. Many believe that security technology can be more effective if it itself is not kept secret.
Information hiding
is a design principle in much software engineering
. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.
in order to gain an advantage or to not reveal a weakness, avoid embarrassment
or to help in propaganda
efforts.
Most military
secrets are military in nature, such as the strengths and weaknesses of weapon
s systems, tactics
, training methods, number and location of specific weapons and plans.
Some involve information in broader areas, such as secure communications, cryptography
, intelligence operations and cooperation with third-parties.
in order to hold a secret, which might lead to psychological
repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question. Nearly 2500 years ago, Sophocles
wrote, "Do nothing secretly; for Time sees and hears all things, and discloses all." And Gautama Siddhartha, the Buddha
, once said "Three things cannot long stay hidden: the sun, the moon and the truth
".
Secrecy is often controversial, depending on the content of the secret, the group or people keeping the secret, and the motivation for secrecy. Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of privacy
Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...
and confidentiality
Confidentiality
Confidentiality is an ethical principle associated with several professions . In ethics, and in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to...
.
Secrecy in sociology and zoology
AnimalAnimal
Animals are a major group of multicellular, eukaryotic organisms of the kingdom Animalia or Metazoa. Their body plan eventually becomes fixed as they develop, although some undergo a process of metamorphosis later on in their life. Most animals are motile, meaning they can move spontaneously and...
s conceal the location of their den
Den
Den may refer to:*Den , a part of a house similar to the living room: a den is about the size of a living room, but smaller than a family room*Den , a Ukrainian newspaper*Den , a Pharaoh of Egypt...
or nest
Nest
A nest is a place of refuge to hold an animal's eggs or provide a place to live or raise offspring. They are usually made of some organic material such as twigs, grass, and leaves; or may simply be a depression in the ground, or a hole in a tree, rock or building...
from predators
Predation
In ecology, predation describes a biological interaction where a predator feeds on its prey . Predators may or may not kill their prey prior to feeding on them, but the act of predation always results in the death of its prey and the eventual absorption of the prey's tissue through consumption...
. Squirrels bury nuts, hiding them, and they try to remember their locations later.
Human
Human
Humans are the only living species in the Homo genus...
s attempt to consciously conceal aspects of themselves from others due to shame
Shame
Shame is, variously, an affect, emotion, cognition, state, or condition. The roots of the word shame are thought to derive from an older word meaning to cover; as such, covering oneself, literally or figuratively, is a natural expression of shame....
, or from fear
Fear
Fear is a distressing negative sensation induced by a perceived threat. It is a basic survival mechanism occurring in response to a specific stimulus, such as pain or the threat of danger...
of violence, rejection, harassment, loss of acceptance
Acceptance
Acceptance is a person's agreement to experience a situation, to follow a process or condition without attempting to change it, protest, or exit....
, or loss of employment
Employment
Employment is a contract between two parties, one being the employer and the other being the employee. An employee may be defined as:- Employee :...
. Humans may also attempt to conceal aspects of their own self
Self (psychology)
The psychology of self is the study of either the cognitive and affective representation of one's identity or the subject of experience. The earliest formulation of the self in modern psychology derived from the distinction between the self as I, the subjective knower, and the self as Me, the...
which they are not capable of incorporating psychologically into their conscious
Consciousness
Consciousness is a term that refers to the relationship between the mind and the world with which it interacts. It has been defined as: subjectivity, awareness, the ability to experience or to feel, wakefulness, having a sense of selfhood, and the executive control system of the mind...
being. Families
Family
In human context, a family is a group of people affiliated by consanguinity, affinity, or co-residence. In most societies it is the principal institution for the socialization of children...
sometimes maintain "family secret
Family secret
A family secret is a secret kept within a family. Most families have secrets, but the kind and importance vary. Family secrets can be shared by the whole family, but some family members or kept by an individual member of the family. The secret can relate to taboo topics,rule violations or just...
s", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family honor. The information may even be something as trivial as a recipe
Recipe
A recipe is a set of instructions that describe how to prepare or make something, especially a culinary dish.-Components:Modern culinary recipes normally consist of several components*The name of the dish...
.
Keeping one's strategy
Strategy
Strategy, a word of military origin, refers to a plan of action designed to achieve a particular goal. In military usage strategy is distinct from tactics, which are concerned with the conduct of an engagement, while strategy is concerned with how different engagements are linked...
secret is important in many aspects of game theory
Game theory
Game theory is a mathematical method for analyzing calculated circumstances, such as in games, where a person’s success is based upon the choices of others...
.
Secret sharing (anthropology)
In anthropologyAnthropology
Anthropology is the study of humanity. It has origins in the humanities, the natural sciences, and the social sciences. The term "anthropology" is from the Greek anthrōpos , "man", understood to mean mankind or humanity, and -logia , "discourse" or "study", and was first used in 1501 by German...
secret sharing is one way for men and women to establish traditional relations with other men and women. A commonly used narrative that describes this kind of behavior is Joseph Conrad
Joseph Conrad
Joseph Conrad was a Polish-born English novelist.Conrad is regarded as one of the great novelists in English, although he did not speak the language fluently until he was in his twenties...
's short story "The Secret Sharer
The Secret Sharer
"The Secret Sharer" is a short story by Joseph Conrad written in 1909, first published in Harper's Magazine in 1910, and as a book in the short-story collection Twixt Land and Sea ....
".
Government secrecy
GovernmentGovernment
Government refers to the legislators, administrators, and arbitrators in the administrative bureaucracy who control a state at a given time, and to the system of government by which they are organized...
s often attempt to conceal information from other governments and the public. These state secrets can include weapon
Weapon
A weapon, arm, or armament is a tool or instrument used with the aim of causing damage or harm to living beings or artificial structures or systems...
designs, military plans, diplomatic
Diplomacy
Diplomacy is the art and practice of conducting negotiations between representatives of groups or states...
negotiation
Negotiation
Negotiation is a dialogue between two or more people or parties, intended to reach an understanding, resolve point of difference, or gain advantage in outcome of dialogue, to produce an agreement upon courses of action, to bargain for individual or collective advantage, to craft outcomes to satisfy...
tactics, and secrets obtained illicitly from others ("intelligence
Intelligence (information gathering)
Intelligence assessment is the development of forecasts of behaviour or recommended courses of action to the leadership of an organization, based on a wide range of available information sources both overt and covert. Assessments are developed in response to requirements declared by the leadership...
"). Most nations have some form of Official Secrets Act
Official Secrets Act
The Official Secrets Act is a stock short title used in the United Kingdom, Ireland, India and Malaysia and formerly in New Zealand for legislation that provides for the protection of state secrets and official information, mainly related to national security.-United Kingdom:*The Official Secrets...
(the Espionage Act in the U.S.) and classify material according to the level of protection needed (hence the term "classified information
Classified information
Classified information is sensitive information to which access is restricted by law or regulation to particular groups of persons. A formal security clearance is required to handle classified documents or access classified data. The clearance process requires a satisfactory background investigation...
"). An individual needs a security clearance
Security clearance
A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal...
for access and other protection methods, such as keeping documents in a safe
Safe
A safe is a secure lockable box used for securing valuable objects against theft or damage. A safe is usually a hollow cuboid or cylinder, with one face removable or hinged to form a door. The body and door may be cast from metal or formed out of plastic through blow molding...
, are stipulated.
Few people dispute the desirability of keeping Critical Nuclear Weapon Design Information
Critical Nuclear Weapon Design Information
Critical Nuclear Weapon Design Information is a U.S. Department of Defense category of Top Secret Restricted Data or Secret Restricted Data that reveals the theory of operation or design of the components of a thermonuclear or fission bomb, warhead, demolition munition, or test device...
secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S. Freedom of Information Act
Freedom of Information Act (United States)
The Freedom of Information Act is a federal freedom of information law that allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States government. The Act defines agency records subject to disclosure, outlines mandatory disclosure...
and sunshine laws. Government officials sometimes leak information they are supposed to keep secret. (For a recent (2005) example, see Plame affair
Plame affair
The Plame Affair involved the identification of Valerie Plame Wilson as a covert Central Intelligence Agency officer. Mrs. Wilson's relationship with the CIA was formerly classified information...
.)
Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.
Corporate security
Organizations, ranging from multi-national for profit corporationCorporation
A corporation is created under the laws of a state as a separate legal entity that has privileges and liabilities that are distinct from those of its members. There are many different forms of corporations, most of which are used to conduct business. Early corporations were established by charter...
s to nonprofit charities, keep secrets for competitive advantage, to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by trade secret
Trade secret
A trade secret is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known or reasonably ascertainable, by which a business can obtain an economic advantage over competitors or customers...
laws. The patent
Patent
A patent is a form of intellectual property. It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assignee for a limited period of time in exchange for the public disclosure of an invention....
system encourages inventors to publish information in exchange for a limited time monopoly
Monopoly
A monopoly exists when a specific person or enterprise is the only supplier of a particular commodity...
on its use, though patent applications are initially secret. Secret societies
Secret society
A secret society is a club or organization whose activities and inner functioning are concealed from non-members. The society may or may not attempt to conceal its existence. The term usually excludes covert groups, such as intelligence agencies or guerrilla insurgencies, which hide their...
use secrecy as a way to attract members by creating a sense of importance.
Other laws require organizations to keep certain information secret, such as medical record
Medical record
The terms medical record, health record, and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdiction....
s (HIPAA
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act of 1996 was enacted by the U.S. Congress and signed by President Bill Clinton in 1996. It was originally sponsored by Sen. Edward Kennedy and Sen. Nancy Kassebaum . Title I of HIPAA protects health insurance coverage for workers and their...
in the U.S.), or financial reports that are under preparation (to limit insider trading
Insider trading
Insider trading is the trading of a corporation's stock or other securities by individuals with potential access to non-public information about the company...
). Europe
Europe
Europe is, by convention, one of the world's seven continents. Comprising the westernmost peninsula of Eurasia, Europe is generally 'divided' from Asia to its east by the watershed divides of the Ural and Caucasus Mountains, the Ural River, the Caspian and Black Seas, and the waterways connecting...
has particularly strict laws about database
Database
A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality , in a way that supports processes requiring this information...
privacy.
In many countries, neoliberal reforms of government have included expanding the outsourcing of government tasks and functions to private businesses with the aim of improving efficiency and effectiveness in government administration. However, among the criticisms of these reforms is the claim that the pervasive use of "Commercial-in-confidence" (or secrecy) clauses in contracts between government and private providers further limits public accountability of governments and prevents proper public scrutiny of the performance and probity of the private companies. Concerns have been raised that 'commercial-in-confidence' is open to abuse because it can be deliberately used to hide corporate or government maladministration and even corruption. A string of publicly scandalous revelations about poor, wasteful or corrupt management of government-funded private contracts left unchecked for lengthy periods, often in prison management, has added credence to the views of skeptics about the prudency of the neoliberal reforms themselves.
Technology secrecy
Preservation of secrets is one of the goals of information securityInformation security
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction....
. Techniques used include physical security
Physical security
Physical security describes measures that are designed to deny access to unauthorized personnel from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts...
and cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
. The latter depends on the secrecy of cryptographic keys. Secrecy is central to organized crime
Organized crime
Organized crime or criminal organizations are transnational, national, or local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. Some criminal organizations, such as terrorist organizations, are...
. Many believe that security technology can be more effective if it itself is not kept secret.
Information hiding
Information hiding
In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed...
is a design principle in much software engineering
Software engineering
Software Engineering is the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software, and the study of these approaches; that is, the application of engineering to software...
. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.
Military secrecy
A military secret is secret information that is purposely not made available to the general public and hence to any enemy, by the militaryMilitary
A military is an organization authorized by its greater society to use lethal force, usually including use of weapons, in defending its country by combating actual or perceived threats. The military may have additional functions of use to its greater society, such as advancing a political agenda e.g...
in order to gain an advantage or to not reveal a weakness, avoid embarrassment
Embarrassment
Embarrassment is an emotional state of intense discomfort with oneself, experienced upon having a socially unacceptable act or condition witnessed by or revealed to others. Usually some amount of loss of honour or dignity is involved, but how much and the type depends on the embarrassing situation...
or to help in propaganda
Propaganda
Propaganda is a form of communication that is aimed at influencing the attitude of a community toward some cause or position so as to benefit oneself or one's group....
efforts.
Most military
Military
A military is an organization authorized by its greater society to use lethal force, usually including use of weapons, in defending its country by combating actual or perceived threats. The military may have additional functions of use to its greater society, such as advancing a political agenda e.g...
secrets are military in nature, such as the strengths and weaknesses of weapon
Weapon
A weapon, arm, or armament is a tool or instrument used with the aim of causing damage or harm to living beings or artificial structures or systems...
s systems, tactics
Military tactics
Military tactics, the science and art of organizing an army or an air force, are the techniques for using weapons or military units in combination for engaging and defeating an enemy in battle. Changes in philosophy and technology over time have been reflected in changes to military tactics. In...
, training methods, number and location of specific weapons and plans.
Some involve information in broader areas, such as secure communications, cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
, intelligence operations and cooperation with third-parties.
Views on secrecy
Excessive secrecy is often cited as a source of much human conflict. One may have to lieLie
For other uses, see Lie A lie is a type of deception in the form of an untruthful statement, especially with the intention to deceive others....
in order to hold a secret, which might lead to psychological
Psychology
Psychology is the study of the mind and behavior. Its immediate goal is to understand individuals and groups by both establishing general principles and researching specific cases. For many, the ultimate goal of psychology is to benefit society...
repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question. Nearly 2500 years ago, Sophocles
Sophocles
Sophocles is one of three ancient Greek tragedians whose plays have survived. His first plays were written later than those of Aeschylus, and earlier than or contemporary with those of Euripides...
wrote, "Do nothing secretly; for Time sees and hears all things, and discloses all." And Gautama Siddhartha, the Buddha
Buddha
In Buddhism, buddhahood is the state of perfect enlightenment attained by a buddha .In Buddhism, the term buddha usually refers to one who has become enlightened...
, once said "Three things cannot long stay hidden: the sun, the moon and the truth
Truth
Truth has a variety of meanings, such as the state of being in accord with fact or reality. It can also mean having fidelity to an original or to a standard or ideal. In a common usage, it also means constancy or sincerity in action or character...
".
See also
- Banking secrecy
- Classified informationClassified informationClassified information is sensitive information to which access is restricted by law or regulation to particular groups of persons. A formal security clearance is required to handle classified documents or access classified data. The clearance process requires a satisfactory background investigation...
- Concealment deviceConcealment deviceConcealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin...
- ConfidentialityConfidentialityConfidentiality is an ethical principle associated with several professions . In ethics, and in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to...
- Conspiracy theoryConspiracy theoryA conspiracy theory explains an event as being the result of an alleged plot by a covert group or organization or, more broadly, the idea that important political, social or economic events are the products of secret plots that are largely unknown to the general public.-Usage:The term "conspiracy...
- DeceptionDeceptionDeception, beguilement, deceit, bluff, mystification, bad faith, and subterfuge are acts to propagate beliefs that are not true, or not the whole truth . Deception can involve dissimulation, propaganda, and sleight of hand. It can employ distraction, camouflage or concealment...
- Don't ask, don't tellDon't ask, don't tell"Don't ask, don't tell" was the official United States policy on homosexuals serving in the military from December 21, 1993 to September 20, 2011. The policy prohibited military personnel from discriminating against or harassing closeted homosexual or bisexual service members or applicants, while...
- EspionageEspionageEspionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
- Freedom of information legislationFreedom of information legislationFreedom of information legislation comprises laws that guarantee access to data held by the state. They establish a "right-to-know" legal process by which requests may be made for government-held information, to be received freely or at minimal cost, barring standard exceptions...
- Secrecy (sociology)Secrecy (sociology)The sociological aspects of secrecy were first studied by Dr. Georg Simmel. Simmel describes secrecy as the ability or habit of keeping secrets. He defines the secret as the ultimate sociological form for the regulation of the flow and distribution of information...
- Secret passageSecret passageSecret passages, also commonly referred to as hidden passages or secret tunnels, are hidden routes used for stealthy travel. Such passageways are sometimes inside buildings leading to secret rooms. Others allow occupants to enter or exit buildings without being seen...
- Secret sharingSecret sharingSecret sharing refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own.More formally, in a...
- SmugglingSmugglingSmuggling is the clandestine transportation of goods or persons, such as out of a building, into a prison, or across an international border, in violation of applicable laws or other regulations.There are various motivations to smuggle...
- State Secrets PrivilegeState Secrets PrivilegeThe state secrets privilege is an evidentiary rule created by United States legal precedent. Application of the privilege results in exclusion of evidence from a legal case based solely on affidavits submitted by the government stating that court proceedings might disclose sensitive information...
- Media transparencyMedia transparencyMedia transparency is the concept of determining how and why information is conveyed through various means.As used in the humanities,the topic of media transparency implies openness and accountability...
- WikileaksWikileaksWikiLeaks is an international self-described not-for-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers. Its website, launched in 2006 under The Sunshine Press organisation, claimed a database of more...
External links
- Rules of political misdirection
- Secrecy News from the Federation of American ScientistsFederation of American ScientistsThe Federation of American Scientists is a nonpartisan, 501 organization intent on using science and scientific analysis to attempt make the world more secure. FAS was founded in 1945 by scientists who worked on the Manhattan Project to develop the first atomic bombs...
- Page to send your secret
- conspiracynexus.com The truth is out there