HOME
*





Invention Secrecy Act
The Invention Secrecy Act of 1951 (, codified at ) is a body of United States federal law designed to prevent disclosure of new inventions and technologies that, in the opinion of selected federal agencies, present a possible threat to the national security of the United States. The U.S. government has long sought to control the release of new technologies that might threaten the national defense and economic stability of the country. During World War I, Congress authorized the United States Patent and Trademark Office (PTO) to classify certain defense-related patents. This initial effort lasted only for the duration of that war but was reimposed in October 1941 in anticipation of the U.S. entry into World War II. Patent secrecy orders were initially intended to remain effective for two years, beginning on July 1, 1940, but were later extended for the duration of the war (). The Invention Secrecy Act of 1951 made such patent secrecy permanent, though the order to suppress a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Congress
The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washington, D.C. Senators and representatives are chosen through direct election, though vacancies in the Senate may be filled by a governor's appointment. Congress has 535 voting members: 100 senators and 435 representatives. The U.S. vice president has a vote in the Senate only when senators are evenly divided. The House of Representatives has six non-voting members. The sitting of a Congress is for a two-year term, at present, beginning every other January. Elections are held every even-numbered year on Election Day. The members of the House of Representatives are elected for the two-year term of a Congress. The Reapportionment Act of 1929 establishes that there be 435 representatives and the Uniform Congressional Redistricting Act requires ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of pers ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Government Secrecy
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments. The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clear ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


United States Federal Patent Legislation
United may refer to: Places * United, Pennsylvania, an unincorporated community * United, West Virginia, an unincorporated community Arts and entertainment Films * ''United'' (2003 film), a Norwegian film * ''United'' (2011 film), a BBC Two film Literature * ''United!'' (novel), a 1973 children's novel by Michael Hardcastle Music * United (band), Japanese thrash metal band formed in 1981 Albums * ''United'' (Commodores album), 1986 * ''United'' (Dream Evil album), 2006 * ''United'' (Marvin Gaye and Tammi Terrell album), 1967 * ''United'' (Marian Gold album), 1996 * ''United'' (Phoenix album), 2000 * ''United'' (Woody Shaw album), 1981 Songs * "United" (Judas Priest song), 1980 * "United" (Prince Ital Joe and Marky Mark song), 1994 * "United" (Robbie Williams song), 2000 * "United", a song by Danish duo Nik & Jay featuring Lisa Rowe Television * ''United'' (TV series), a 1990 BBC Two documentary series * ''United!'', a soap opera that aired on BBC One from 1965-19 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

1951 In Law
Events January * January 4 – Korean War: Third Battle of Seoul – Chinese and North Korean forces capture Seoul for the second time (having lost the Second Battle of Seoul in September 1950). * January 9 – The Government of the United Kingdom announces abandonment of the Tanganyika groundnut scheme for the cultivation of peanuts in the Tanganyika Territory, with the writing off of £36.5M debt. * January 15 – In a court in West Germany, Ilse Koch, The "Witch of Buchenwald", wife of the commandant of the Buchenwald concentration camp, is sentenced to life imprisonment. * January 20 – Winter of Terror: Avalanches in the Alps kill 240 and bury 45,000 for a time, in Switzerland, Austria and Italy. * January 21 – Mount Lamington in Papua New Guinea 1951 eruption of Mount Lamington, erupts catastrophically, killing nearly 3,000 people and causing great devastation in Oro Province. * January 25 – Dutch author Anne de Vries releases the first volume of his children's nove ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Legal Information Institute
The Legal Information Institute (LII) is a non-profit, public service of Cornell Law School that provides no-cost access to current American and international legal research sources online alaw.cornell.edu The organization is a pioneer in the delivery of legal information online. Founded in 1992 by Peter Martin and Tom Bruce, LII was the first law site developed on the internet. LII electronically publishes on the Web the U.S. Code, U.S. Supreme Court opinions, Uniform Commercial Code, the US Code of Federal Regulations, several Federal Rules, and a variety of other American primary law materials.. LII also provides access to other national and international sources, such as treaties and United Nations materials. According to its website, the LII serves over 40 million unique visitors per year. Since its inception, the Legal Information Institute has inspired others around the world to develop namesake operations. These services are part of the Free Access to Law Movement. His ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Export Of Cryptography From The United States
The export of cryptography from the United States to other countries has experienced various levels of restrictions over time. World War II illustrated that code-breaking and cryptography can play an integral part in national security and the ability to prosecute war. Changes in technology and the preservation of free speech have been competing factors in the regulation and constraint of cryptographic technologies for export. History Cold War era In the early days of the Cold War, the U.S. and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc. All export of technology classed as 'critical' required a license. CoCom was organized to coordinate Western export controls. Two types of technology were protected: technology associated only with weapons of war ("munitions") and dual use technology, which also had commercial applications. In th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Classified Information In The United States
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments. The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security cle ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Free Energy Suppression Conspiracy Theory
Free energy suppression (or new energy suppression) is a conspiracy theory that technologically viable, pollution-free, no-cost energy sources are being suppressed by government, corporations, or advocacy groups. Devices allegedly suppressed include perpetual motion machines, cold fusion generators, torus-based generators, reverse-engineered extraterrestrial technology, anti-gravity propulsion systems, and other generally unproven, low-cost energy sources. Claims The alleged suppression (or weakening) is claimed to have occurred since the mid-19th century and allegedly perpetrated by various government agencies, corporate powers, special interest groups, and fraudulent inventors. The special interest groups are usually claimed to be associated with the fossil fuel or nuclear industry, whose business model would be threatened. Claims of suppression include: * The claim that the scientific community has controlled and suppressed research into alternative avenues of energy generat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Born Secret
"Born secret" and "born classified" are both terms which refer to a policy of information being classified from the moment of its inception, usually regardless of where it was created, and usually in reference to specific laws in the United States that are related to information that describes the operation of nuclear weapons. It has been extensively used in reference to a clause in the Atomic Energy Act of 1946, which specified that all information about nuclear weapons and nuclear energy was to be considered "Restricted Data" (RD) until it had been officially declassified. In the 1954 revision of the Act, the United States Atomic Energy Commission was given the power to declassify entire categories of information. The "born secret" policy was created under the assumption that nuclear information could be so important to national security that it would need classification before it could be formally evaluated. The wording of the 1954 act specified as secret: The constituti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security ( data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Fiscal Year
A fiscal year (or financial year, or sometimes budget year) is used in government accounting, which varies between countries, and for budget purposes. It is also used for financial reporting by businesses and other organizations. Laws in many jurisdictions require company financial reports to be prepared and published on an annual basis but generally not the reporting period to align with the calendar year (1 January to 31 December). Taxation laws generally require accounting records to be maintained and taxes calculated on an annual basis, which usually corresponds to the fiscal year used for government purposes. The calculation of tax on an annual basis is especially relevant for direct taxes, such as income tax. Many annual government fees—such as council tax and license fees, are also levied on a fiscal year basis, but others are charged on an anniversary basis. Some companies, such as Cisco Systems, end their fiscal year on the same day of the week each year: the day ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]