Read Disinformation Book of Lists Online
Authors: Russ Kick
LIST 37 | 46 Nuclear Tests by the US |
The nuclear priesthood has a tradition of giving interesting names to test detonations of atomic weapons. Often, they're named after animals, food, Southwestern cities, Native American tribes, and everyday objects. Most are pretty mundane, but out of the hundreds of tests, a few monikers are memorable. Some reveal gallows humor (Dead, Bye, and Calamity), while others seem darkly humorous only in retrospect (Rummy, Waco). Many will make your mouth water (Brie, Chocolate, Cinnamon, and Cognac), and still others make me wonder what else was happening at the Nevada Test Site (Sappho, Climax).
Department of Energy photo of the Climax test detonation.
1950s
1.
Annie
2.
Climax
3.
Eddy
4.
Fig
5.
Flathead
6.
Koon
7.
Tesla
8.
Zuccini
Â
1960s
9.
Absinthe
10.
Anchovy
11.
Barracuda
12.
Bye
13.
Calamity
14.
Chinchilla
15.
Chipmunk
16.
Chocolate
17.
Cinnamon
18.
Cognac
19.
Daiquiri
20.
Dead
21.
Diluted Waters
22.
Fizz
23.
Gerbil
24.
Gum Drop
25.
Mad
26.
Marshmallow
27.
Nipper
28.
Numbat
29.
Persimmon
30.
Platypus
31.
Red Hot
32.
Tiny Tot
37.
Gazook
38.
Haplopappus
39.
Rummy
40.
Sappho
41.
Sheepshead
Â
1970s
33.
Backgammon
34.
Diamond Dust
35.
Diana Mist
36.
Dido Queen
Â
1980s
42.
Brie
43.
Darwin
44.
Midas Myth
45.
Waco
Â
1990s
46.
Hunters Trophy
Number of Civilians Killed by Bombing During World War II
Britain: over 60,500
Germany: 570,000 to 800,000
Japan: 442,000 to 1,000,000 or more
LIST 38 | 33 Names of Defense Department Internal Investigations |
Unlike almost all other government agencies and offices, the Inspector General of the Defense Department still uses imaginative names for its investigations.
1.
Operation Electric Avenue
2.
Operation Brown Bag
3.
Operation Cobra Nest
4.
Operation Afterglow
5.
Operation Bad Back
6.
Operation Kaboom
7.
Project Knotdock
8.
Operation Bad Gas
9.
Operation Goldbrick
10.
Operation Shrinkwrap
11.
Project Mongoose
12.
Emergentology
13.
Operation Busted Dreams
14.
Operation Treasure Trolls
15.
Operation Wingit
16.
Project Excess
17.
Operation Big Foot
18.
Project Crank Call
19.
Project Easy Pickings
20.
Operation Aquaknot
21.
Project Can't Be
22.
Project Crypto Night
23.
Operation Kill-Dare
24.
Operation Kick the Can
25.
Project Deadpool
26.
Project Back Orifice 2000
27.
Operation The Craft
28.
Project Walk Along
29.
Operation Chosen Path
30.
Project Blue Lagoon
31.
Project: X-Files
32.
Operation Hack in the Box
33.
Operation Gold Coat
The investigations listed above have been closed in the past few years. If you'd like to find out more about any of them, write a letter mentioning the Freedom of Information Act and asking for the final report and/or closing memo on whichever investigations tickle your fancy. Mention how much you're willing to pay. Mail, fax, or email it to:
Â
Inspector General, Department of Defense
Freedom of Information Act & Privacy
Act Office
400 Army Navy Drive, Room 223
Arlington, Virginia 22202-4704
fax: 703-602-0294
email:
[email protected]
Thanks to Michael Ravnitzky
LIST 39 | 13 Programs From DARPA's Defunct Information Awareness Office |
After 9/11, the Defense Advanced Research Projects Agency (DARPA)âthe group that develops technology for the military and homeland defenseâformed the Information Awareness Office. The IAO's most famous project was Total Information Awareness, a system to gather and interpret in real-time the activities of whomever the government wanted to watch. The man in charge was Iran-contra felon Admiral John Poindexter.
The IAO started backtracking as soon as the public, the press, and privacy watchdogs expressed alarm. First, the biographies of Poindexter and the other senior staff of the IAO disappeared from the website. Then the IAO's famously creepy logoâa Masonic pyramid with an eye shooting a beam that envelops the Earthâwas pulled. Then TIA was changed to
Terrorism
Information Awareness. Next, Congress outlawed funding for the program (in name onlyâsimilar projects under a different moniker could be, and probably are, funded). Finally, in late 2003, DARPA scrapped the entire Information Awareness Office. A few of its programs were transferred to DARPA's Information Processing Technology Office. Below are all the projects that IAO was working on, with official descriptions from the website before it was deleted.
1
Babylon
“The goal of the Babylon program is to develop rapid, two-way, natural language speech translation interfaces and platforms for the warfighter for use in field environments for force protection, refugee processing, and medical triage. Babylon will focus on overcoming the many technical and engineering challenges limiting current multilingual translation technology to enable future full-domain, unconstrained dialog translation in multiple environments.” The first four languages to be tackled were Pashto, Dari, Arabic, and Mandarin.
2
Bio-Surveillance
“The goal of the Bio-Surveillance program is to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approachesâ¦. The Bio-Surveillance program will dramatically increase DoD's ability to detect a clandestine biological warfare attack in time to respond effectively and so avoid potentially thousands of casualties. The Bio-Surveillance program is seeking to achieve its objective by monitoring non-traditional data sources such as animal sentinels, behavioral indicators, and pre-diagnostic medical data.”
3
Communicator
“The specific goal of the Communicator program is to develop and demonstrate âdialogue interaction' technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The Communicator Platform will be wireless and mobile, and will function in a networked environment. Software enabling dialogue interaction will automatically focus on the context of a dialogue to improve performance, and the system will be capable of automatically adapting to new topics so conversation is natural and efficient.”
“Hands-on exercises have been conducted involving small unit logistics operations with the Marines designed to stress test the technology in extreme environments.”
4
Effective, Affordable, Reusable Speech-to-Text (EARS)
“The Effective Affordable Reusable Speech-To-Text (EARS) program is developing speech-to-text (automatic transcription) technology whose output is substantially richer and much more accurate than currently possible. This will make it possible for machines to do a much better job of detecting, extracting, summarizing, and translating important information. It will also enable humans to understand what was said by reading transcripts instead of listening to audio signals. EARS is focusing on natural, unconstrained human-human speech from broadcasts and telephone conversations in multiple languages.”
5
Evidence Extraction and Link Discovery (EELD)
“The goal of the Evidence Extraction and Link Discovery (EELD) program is development of technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources. EELD is developing detection capabilities to extract relevant data and relationships about people, organizations, and activities from message traffic and open source data. It will link items relating potential terrorist groups or scenarios, and learn patterns of different groups or scenarios to identify new organizations or emerging threats.”
“EELD's initial activities demonstrated the feasibility of extracting relationships from text, and validated the detectability of patterns representing terrorist groups and scenarios.”
6
Futures Markets Applied to Prediction (FutureMap)
“FutureMAP will concentrate on market-based techniques for avoiding surprise and predicting future events. Strategic decisions depend upon the accurate assessment of the likelihood of future events. This analysis often requires independent contributions by experts in a wide variety of fields, with the resulting difficulty of combining the various opinions into one assessment. Market-based techniques provide a tool for producing these assessments.
“There is potential for application of market-based methods to analyses of interest to the DoD [Department of Defense]. These may include analysis of political stability in regions of the world, prediction of the timing and impact on national security of emerging technologies, analysis of the outcomes of advanced technology programs, or other future events of interest to the DoD. In addition, the rapid reaction of markets to knowledge held by only a few participants may provide an early warning system to avoid surprise.”
7
Genisys
“The Genisys program's goal is to produce technology enabling ultra-large, all-source information repositories. To predict, track, and preempt terrorist attacks, the US requires a full-coverage database containing all information relevant to identifying: potential foreign terrorists and their possible supporters; their activities; prospective targets; and, their operational plans. Current database technology is clearly insufficient to address this need.”
8
Genoa
“Project Genoa is developing information technology for the intelligence community to rapidly and systematically accumulate evidence, facilitate collaboration (while protecting critical information), and test hypothesis that support decision-making at the national level. Bases on successful demonstrations, the Defense Intelligence Agency has agreed to be a transition partner for Project Genoa technology.”
9
Genoa II
“It will focus on developing information technology needed by teams of intelligence analysts and operations and policy personnel in attempting to anticipate and preempt terrorist threats to US interestsâ¦.
“Genoa II will develop and deploy: 1) cognitive aids that allow humans and machines to âthink together' in real-time about complicated problems; 2) means to overcome the biases and limitations of the human cognitive system; 3) âcognitive amplifiers' that help teams of people rapidly and fully comprehend complicated and uncertain situations; and, 4) the means to rapidly and seamlessly cut acrossâand complementâexisting stove-piped hierarchical organizational structures by creating dynamic, adaptable, peer-to-peer collaborative networks.”
10
Human ID at a Distance (HumanID)
“The goal of the Human Identification at a Distance (HumanID) program is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances. These technologies will provide critical early warning support for force protection and homeland defense against terrorist, criminal, and other human-based threats, and will prevent or decrease the success rate of such attacks against DoD operational facilities and installations. Methods for fusing biometric technologies into advanced human identification systems will be developed to enable faster, more accurate and unconstrained identification of humans at significant standoff distances.”
The three main modes of automatic identification planned were face recognition (including long-range and infrared), iris recognition, and gait recognition. This last would involve using radar to analyze the way a person walks and I.D. them based on that. This form of Big Brotherism was accurately predicted by George Orwell in
1984.
11
Total Information Awareness System
“The goal of the Total Information Awareness (TIA) program is to revolutionize the ability of the United States to detect, classify and identify foreign terroristsâand decipher their plansâand thereby enable the US to take timely action to successfully preempt and defeat terrorist acts. To that end, the TIA program objective is to create a counter-terrorism information system that: (1) increases information coverage by an order of magnitude, and affords easy future scaling; (2) provides focused warnings within an hour after a triggering event occurs or an evidence threshold is passed; (3) can automatically queue analysts based on partial pattern matches and has patterns that cover 90% of all previously known foreign terrorist attacks; and, (4) supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories and mitigating strategies about possible futures, so decision-makers can effectively evaluate the impact of current or future policies and prospective courses of action.”
12
Translingual Information Detection, Extraction and Summarization (TIDES)
“The Translingual Information Detection, Extraction and Summarization (TIDES) program is developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.”
13
Wargaming the Asymmetric Environment (WAE)
“The goal of the Wargaming the Asymmetric Environment (WAE) program is the development and demonstration of predictive technology to better anticipate and act against terrorists. WAE is a revolutionary approach to identify predictive indicators of attacks by and the behavior of specific terrorists by examining their behavior in the broader context of their political, cultural and ideological environment.
“Test results have demonstrated the feasibility of developing automated and adaptive behavior prediction models tuned to specific terrorist groups and individuals. Specifically, WAE has developed, in conjunction with DoD and the intelligence community, indications and warning models for select terrorist individuals and organizations. These indication and warning models have been tested historically, and in some cases operationally, to predict an active terrorist group's next action (attack/no attack, target characteristics, location characteristics, tactical characteristics, timeframes, and motivating factors), and test results have been shown to be statistically significant. To date, several models have been transitioned to DoD and the Intelligence Community partners. WAE will extend its predictive technology research to model a larger set of terrorist groups and individuals, and will strive to increase the level of detail for each predictive model.”