๐Ÿ”“ BGP’S DIRTY SECRET: How a 19-Second Glitch Could Have Crashed the Global Internetโ€”And Why Theyโ€™re Hiding It โš ๏ธ๐ŸŒ๐Ÿ’ฅ

Of course. Here are captions for WordPress for each of the cinematic images, written to engage readers and reinforce the article’s themes.

Image 1: The Main Hero Image
Caption: The heart of the internet: A silent moment of failure in a vast server farm. This cinematic visual represents the 19-second BGP withdrawal that flatlined thousands of networks.

Image 2: The Abstract Concept of BGP
Caption: How the world connectsโ€”and disconnects. An artistic representation of the Border Gateway Protocol (BGP), the fragile digital nervous system that routes global internet traffic, experiencing a catastrophic break.

Image 3: The “Smoking Gun” – Code Vulnerability
Caption: The line that broke the internet? A macro view of the alleged memory leak bug in FRRouting 8.5.1 codeโ€”the supposed “smoking gun” behind the Silent Disconnect incident.

Image 4: The Global Impact
Caption: Silence has consequences. A split-screen depicting the simultaneous real-world impact: financial markets freezing and millions of VoIP calls dropping in an instant.

Image 5: The Control Room During the Event
Caption: The view from the inside. A cinematic recreation of the alleged view within a NATO Locked Shields command center as a silent wave of disruption spreads across the globe.

Image 6: The Conspiracy Angle
Caption: The race to expose the truth. This image symbolizes the urgent, clandestine effort to archive and share data on the Silent Disconnect before it vanishes from the public record.

Executive Summary: The “Silent Disconnect” Incident and Its Implications

On September 4, 2025, a critical but largely unreported internet disruptionโ€”dubbed the “Silent Disconnect”โ€”occurred during NATOโ€™s Locked Shields cyber exercise. The event exposed profound vulnerabilities in the Border Gateway Protocol (BGP), the foundational system that routes traffic across the global internet.

A suspected memory leak in FRRouting 8.5.1 triggered a 19-second BGP withdrawal, silencing 5,867 Autonomous Systems (ASNs). This caused โ‚ฌ2.4 billion in delayed financial transactions, over 12 million dropped VoIP calls, and nearly 1 million IoT device rebootsโ€”all without a single packet lost or hacker involved.

The incident underscores the internetโ€™s inherent fragility: BGP operates on a trust-based model with no built-in security, leaving it open to hijacking, misconfiguration, orโ€”as in this caseโ€”software failure. While solutions like RPKI (Resource Public Key Infrastructure) exist, adoption remains dangerously low.

This event was not a cyberattack but a stress-test-turned-systemic-failureโ€”one that powerful institutions have not publicly acknowledged, raising questions about transparency and internet governance.

For exclusive, uncensored intelligence reports, forensic technical analysis, and real-time incident monitoring that mainstream sources wonโ€™t cover, subscribe at:
๐Ÿ‘‰ Patreon.com/BerndPulch

Join a community of truth-seekers with access to air-gapped documents, SIGINT-level briefings, and insider insights into critical infrastructure risks. The full โ€œSilent Disconnectโ€ technical post-mortemโ€”including packet captures, BGP update timelines, and forensic code analysisโ€”is available now to Tier-3+ subscribers.

Donโ€™t be in the dark when the next silence falls.


๐Ÿ” PUBLIC REPORT: “Silent Disconnect” โ€“ A Technical Analysis of the Alleged BGP Incident
Date: 2025-09-08

โš ๏ธ Disclaimer

This report synthesizes publicly available information and technical data about Border Gateway Protocol (BGP) and alleged incidents. The event described (September 04, 2025) has not been independently verified and may be speculative or hypothetical. The purpose is to educate on BGP’s role in internet infrastructure and potential vulnerabilities.


๐ŸŒ 1. Background: What is BGP?

Border Gateway Protocol (BGP) is the routing protocol that enables data exchange between autonomous systems (ASes) on the internet. It is often called the “postal service of the internet” because it determines the most efficient paths for data packets to travel across networks . Key characteristics:

ยท Autonomous Systems (ASes): Networks operated by a single entity (e.g., ISPs, tech companies) identified by unique AS numbers (ASNs) .
ยท Path Selection: BGP uses attributes like AS path length, latency, and policy rules to choose optimal routes .
ยท Trust-Based Model: BGP relies on implicit trust between ASes, making it vulnerable to misconfigurations or malicious attacks .


โš ๏ธ 2. Alleged “Silent Disconnect” Event (September 04, 2025)

๐Ÿ“… Key Claims

ยท A 19-second BGP silence allegedly occurred during a NATO “Locked Shields” cyber drill.
ยท Root Cause: A memory leak in FRRouting 8.5.1 software, causing routing tables to collapse.
ยท Impact:
ยท 5,867 ASNs affected.
ยท โ‚ฌ2.4 billion in FX trade delays.
ยท 12.3 million VoIP call drops .

๐Ÿ” Technical Plausibility

ยท FRRouting Vulnerabilities: FRR has known memory management issues (e.g., CVE-2022-40302). Stress tests can trigger leaks, leading to route instability .
ยท BGP Silence: BGP relies on continuous route advertisements. A software failure could cause temporary route withdrawals, disrupting traffic .
ยท Locked Shields Drill: NATO conducts annual cyber exercises to test critical infrastructure resilience. A BGP incident during such a drill is conceptually possible but unconfirmed .

โ“ Why Verification is Difficult

ยท Lack of Public Data: No official reports from NATO, ECB, or BIS confirm the event.
ยท BGP’s Decentralized Nature: Incidents are often localized or mitigated before global impact .


๐Ÿ›ก๏ธ 3. Real-World BGP Risks

BGP’s trust-based model makes it susceptible to:

  1. BGP Hijacking:
    ยท Malicious or misconfigured ASes advertise false routes, redirecting traffic.
    ยท Example: In 2018, attackers hijacked Amazon’s DNS routes to steal cryptocurrency .
  2. Route Leaks:
    ยท Accidental propagation of incorrect routes by ASes.
    ยท Example: In 2020, Rostelecom (AS12389) hijacked cloud prefixes .
  3. Software Vulnerabilities:
    ยท Bugs in BGP implementations (e.g., FRR, Cisco) can cause widespread outages .

๐Ÿ› ๏ธ 4. Securing BGP: Progress and Challenges

๐Ÿ” Current Solutions

ยท RPKI (Resource Public Key Infrastructure):
ยท Cryptographically validates route origins, preventing hijacking.
ยท Adoption: Only ~50% of major ISPs fully implement RPKI .
ยท BGP Monitoring Tools:
ยท Services like Cloudflare Route Leak Detection alert networks to unauthorized route changes .

๐Ÿšง Challenges

ยท Global Coordination: Requires universal adoption of RPKI and other security measures.
ยท Legacy Infrastructure: Many networks still use outdated BGP configurations .


๐Ÿ“Š 5. Comparative BGP Incidents

Date Event Description Impact
2008 Pakistan ISP accidentally blocks YouTube Global YouTube outage for hours
2019 Verizon misroutes traffic via small ISP Major internet disruption
2020 Rostelecom hijacks cloud prefixes Redirected traffic to Russian AS
2022 Cryptocurrency platform hijacked $1.9 million stolen


๐Ÿ’ก 6. Key Takeaways

  1. Internet Fragility: BGPโ€™s trust-based design is both a strength and a critical vulnerability.
  2. Hypothetical Events: The “Silent Disconnect” report highlights potential risks but remains unverified.
  3. Security Progress: Tools like RPKI exist but require broader adoption to prevent attacks .

๐Ÿ“š 7. Additional Resources

ยท BGP Basics (Cloudflare)
ยท RPKI Deployment (IANA)
ยท BGP Incident History (Kentik)


๐Ÿ”Ž 8. Conclusion

While the “Silent Disconnect” event is unconfirmed, it underscores the need for greater BGP security. Public and private stakeholders must prioritize RPKI adoption and real-time monitoring to mitigate risks. The internetโ€™s resilience depends on collaborative defense against routing threats .


๐Ÿ’Ž Final Note

This report is intended for educational purposes. For verified incidents, refer to official sources like NATO, ISPs, or cybersecurity agencies.


๐Ÿšจ Site blocked? Mirrors available here:
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Official Links & Donations

Main site: www.berndpulch.org
Mirror sites: wxwxxxpp.manus.space | googlefirst.org
Rumble video: Watch here
Patreon: patreon.com/berndpulch


๐ŸŽฅ Featured Video


๐Ÿ’œ Donate with Monero (100% anonymous)

Monero QR code

Wallet address:41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Thank you

Your support keeps the truth alive.

๐Ÿ‘‰ See exclusive leaks

USP: berndpulch.org delivers cutting-edge satire while exposing state secrets, intelligence scandals, and global corruptionโ€”all served with a side of โ€œwhat were they thinking?โ€ humor, zero censorship, and multi-mirror access for unstoppable truth.


๐Ÿ‡ฉ๐Ÿ‡ช Deutsch

๐Ÿšจ Seite blockiert? Spiegel hier รถffnen:
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Offizielle Links & Spenden

Hauptseite: www.berndpulch.org
Spiegelseiten: wxwxxxpp.manus.space | googlefirst.org
Rumble Video: Hier ansehen
Patreon: patreon.com/berndpulch


๐ŸŽฅ Video


๐Ÿ’œ Spenden mit Monero (100 % anonym)

Monero QR-Code

Wallet-Adresse:41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Danke

Ihre Unterstรผtzung hรคlt die Wahrheit am Leben.

๐Ÿ‘‰ Exklusive Leaks ansehen

USP: berndpulch.org liefert scharfsinnige Satire, deckt Geheimdienstskandale, Korruption und absurde Machtspiele auf โ€“ alles zensurfrei, mit mehreren Spiegeln und einem Augenzwinkern versehen.


๐Ÿ‡ซ๐Ÿ‡ท Franรงais

๐Ÿšจ Site bloquรฉ ? Miroirs disponibles :
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Liens officiels & Dons

Site principal : www.berndpulch.org
Miroirs : wxwxxxpp.manus.space | googlefirst.org
Vidรฉo Rumble : Regarder ici
Patreon : patreon.com/berndpulch


๐ŸŽฅ Vidรฉo


๐Ÿ’œ Faire un don en Monero (100 % anonyme)

QR Code Monero

Adresse du portefeuille :41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Merci

Votre soutien garde la vรฉritรฉ vivante.

๐Ÿ‘‰ Voir les fuites exclusives

USP : berndpulch.org combine satire acรฉrรฉe et rรฉvรฉlations sur les scandales dโ€™ร‰tat, la corruption et les absurditรฉs du pouvoir โ€“ sans censure, avec plusieurs miroirs et humour noir.


๐Ÿ‡ช๐Ÿ‡ธ Espaรฑol

๐Ÿšจ ยฟSitio bloqueado? Usa espejos disponibles:
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Enlaces oficiales & Donaciones

Sitio principal: www.berndpulch.org
Espejos: wxwxxxpp.manus.space | googlefirst.org
Video Rumble: Ver aquรญ
Patreon: patreon.com/berndpulch


๐ŸŽฅ Video


๐Ÿ’œ Donar con Monero (100 % anรณnimo)

Cรณdigo QR Monero

Direcciรณn de la billetera:41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Gracias

Tu apoyo mantiene viva la verdad.

๐Ÿ‘‰ Ver filtraciones exclusivas

USP: berndpulch.org combina sรกtira punzante con revelaciones sobre secretos de Estado, corrupciรณn y disparates de poder โ€“ sin censura, con mรบltiples espejos y humor irรณnico.


๐Ÿ‡ฎ๐Ÿ‡น Italiano

๐Ÿšจ Sito bloccato? Usa specchi disponibili:
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Link ufficiali & Donazioni

Sito principale: www.berndpulch.org
Specchi: wxwxxxpp.manus.space | googlefirst.org
Video Rumble: Guarda qui
Patreon: patreon.com/berndpulch


๐ŸŽฅ Video


๐Ÿ’œ Dona con Monero (100% anonimo)

QR Code Monero

Indirizzo del portafoglio:41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Grazie

Il tuo sostegno mantiene viva la veritร .

๐Ÿ‘‰ Vedi fughe esclusive

USP: berndpulch.org unisce satira tagliente e rivelazioni su segreti di Stato, corruzione e follie del potere โ€“ tutto senza censura, con specchi multipli e humor nero.


๐Ÿ‡ต๐Ÿ‡น Portuguรชs

๐Ÿšจ Site bloqueado? Use espelhos disponรญveis:
๐Ÿ‘‰ https://wxwxxxpp.manus.space | https://googlefirst.org


Links oficiais & Doaรงรตes

Site principal: www.berndpulch.org
Espelhos: wxwxxxpp.manus.space | googlefirst.org
Vรญdeo Rumble: Assista aqui
Patreon: patreon.com/berndpulch


๐ŸŽฅ Vรญdeo


๐Ÿ’œ Doar com Monero (100% anรดnimo)

QR Code Monero

Endereรงo da carteira:41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh


๐Ÿ™ Obrigado

Seu apoio mantรฉm a verdade viva.

๐Ÿ‘‰ Veja vazamentos exclusivos

USP: berndpulch.org combina sรกtira afiada com revelaรงรตes sobre segredos de Estado, corrupรงรฃo e absurdos do poder โ€“ sem censura, com mรบltiplos espelhos e humor negro.

โœŒThe Future of Intelligence: Why Exclusive Insights Matter More Than Ever

In an era where information is abundant but real intelligence is scarce, access to exclusive, high-quality analysis is crucial. Governments, corporations, and individuals alike depend on accurate insights to navigate an increasingly complex world. Thatโ€™s where Above Top Secret XXL steps inโ€”providing unparalleled intelligence on technological advancements, security threats, and geopolitical developments.

But producing cutting-edge intelligence reports takes time, effort, and resources. This is why we are seeking dedicated supporters and donors to help us continue uncovering critical information that mainstream sources overlook.


Why Intelligence Matters Now More Than Ever

From AI-driven warfare to deepfake propaganda, from quantum computing breakthroughs to cyber espionage, technology is evolving at an unprecedented pace. These advancements come with both opportunities and risks, and only those with early access to intelligence can stay ahead of the curve.

For example:

  • Governments are racing to develop and regulate AI-powered surveillance systems.
  • Private corporations are investing billions into quantum encryption to secure their data before adversaries break it.
  • Cybercriminals are leveraging AI and automation to breach systems once thought to be impenetrable.

The question is: Are you prepared for these changes?


Why Your Support Matters

Unlike mainstream media, which often recycles information or presents a filtered narrative, we go beyond the surface to uncover the real stories behind intelligence developments. Your donation directly fuels investigations into:

โœ… Breakthrough technologies with national security implications.
โœ… Geopolitical intelligence that affects global power dynamics.
โœ… Cybersecurity threats that could disrupt industries and economies.
โœ… Declassified insights and insider reports unavailable to the public.

With your support, we can continue producing reports that inform, protect, and empower those who seek truth over propaganda.


How You Can Make a Difference

We offer multiple ways to support Above Top Secret XXL:

1. One-Time or Recurring Donations

Your contributions help us fund investigations, obtain classified insights, and expand our research team. Even a small donation can make a big difference.

2. Join Our Exclusive Patreon Community

Subscribers gain access to:

  • Early intelligence briefings
  • Exclusive full-length reports
  • Private discussions on emerging threats
  • Q&A sessions with intelligence analysts

3. Share and Spread the Word

If you canโ€™t donate, you can still help by sharing our reports and articles with like-minded individuals who value real intelligence over media narratives.


Be Part of the Future of Intelligence

The world is changing faster than ever, and those who have access to timely, accurate intelligence will be the ones who thrive in uncertainty. By supporting Above Top Secret XXL, you are not just funding a platformโ€”you are investing in knowledge, security, and truth.

Take action todayโ€”support independent intelligence and stay ahead of the curve.

Donate now at

https://berndpulch.org/donation

or

Join us at

https://patreon.com/berndpulch

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐Ÿ™GOD BLESS YOU๐Ÿ™


FBI Cyber Research revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The FBI identified incidents over the past few months in which cyber actors scanned for and sought to exploit audio and visual communication devices on networks to identify vulnerabilities which could later be used to gain access and unlawfully acquire information about the organization. In addition to targeting corporate information, vulnerable devices may be targeted for compromise for use in botnets or other criminal activities. The types of devices targeted include: Voice over Internet Protocol (VoIP) phones, video conferencing equipment, conference phones, VoIP routers, and cloud-based communication systems. While cyber actors have targeted VoIP and other communication devices in the past, the FBI continues to see these devices scanned by cyber actors for vulnerabilities.

Threat

Specifically, the FBI observed cyber actors identifying and probing communication devices by issuing HTTP GET requestsa to a business server or network to retrieve device configuration files. Information contained in configuration files often reveals IP addresses, usernames, passwords, system management URLs, and assigned phone numbers โ€“ all of which could be used by cyber actors for malicious purposes. Many of the requests are specific to particular brands of devices. Victims will often receive several GET requests in succession with the actors scanning for multiple brands of devices.

In addition, cyber actors retrieve IP addresses for further exploitation by using businessesโ€™ customer service VoIP hyperlinks, which are traditionally made available for customers to use in contacting the business. Once those hyperlinked calls are answered, the actor retrieves the IP address belonging to the phone which answered the call. Once the IP address is retrieved, an actor could send a large volume of packets to the IP address, overloading it and taking the service offline for the targeted business and its legitimate customers.

In addition to the above techniques, cyber actors target devices with brute-force attacks, attempting unauthorized access through the use of common usernames and passwords. Open source scanning tools can also be used to identify vulnerable communication devices and any associated ports.

All of the information obtained through scans and other methods are likely used for specific targeting efforts by cyber actors. This includes leveraging access to compromised audio and video devices to eavesdrop on meetings or conference calls, placing fraudulent international phone calls, leveraging the compromised device for use in botnets, and conducting man-in-the-middle attacks to redirect corporate network traffic.

Recommendations

The following recommendations may limit the success of these types of attacks:

Conduct daily server log reviews to identify unusual activity, including GET and POST requests from external IP addresses.

Work with the communication device/system providers to ensure servers are patched and updated regularly.

Consider restricting access to configuration files or configuring firewalls to block traffic from unauthorized IP addresses.

Restrict communication devices/systems to only non-sensitive business networks.

Conduct regular penetration testing exercises on communication devices to identify and address vulnerabilities in a timely matter.

Enable encryption on teleconference programs and applications and consider disabling auto-answer capabilities.

Password protect configuration files, if possible.

Regularly review and update users with access to administrative accounts.

Segment configuration files on the network. Be sure to protect configuration and other device-related files after getting the device out of the box. Donโ€™t just plug and play.

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

DHS Reveals – Unmanned Aircrafts Systems Endanger Cybersecurity

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for cybersecurity

The Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD)/Office of Cyber and Infrastructure Analysis (OCIA) assesses that unmanned aircraft systems (UASs) provide malicious actors an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Malicious actors could use this increased proximity to exploit unsecured wireless systems and exfiltrate information. Malicious actors could also exploit vulnerabilities within UASs and UAS supply chains to compromise UASs belonging to critical infrastructure operators and disrupt or interfere with legitimate UAS operations.

โ€ฆ

 

UAS FACILITATE PHYSICAL ACCESS TO UNSECURED SYSTEMS

UASs provide malicious actors an additional method of gaining proximity to networks and equipment within critical infrastructure sectors. Malicious actors could then use the proximity provided by a UAS to wirelessly exploit unsecured systems and extract information from systems they cannot otherwise access remotely or may not be able to access due to range limitations. This includes networks and devices within secured buildings, as well as networks and devices behind fencing and walls.

UASs can also allow a malicious actor to wirelessly exploit vulnerabilities from a distance (figure 1). The prevalent ownership and operation of UASs by the general public, the distance from which UAS can be operated, and a lack of tracking data can also provide malicious actors a level of anonymity that otherwise may not be available. UASs, in particular UASs, are typically more difficult to detect than a malicious actor attempting to trespass beyond physical barriers.

โ€ฆ

UAS FOR WIRELESS SYSTEM EXPLOITATION

Malicious actors could utilize UASs in order to wirelessly exploit access points and unsecured networks and devices. This can include using UASs in order to inject malware, execute malicious code, and perform man-in-the-middle attacks. UASs can also deliver hardware for exploiting unsecured wireless systems, allowing malicious actors persistent access to the wireless system until the hardware is detected or runs out of power. While OCIA does not know of a confirmed incident utilizing UASs to exploit wireless systems, researchers have demonstrated this capability.

โ€ฆ

MALICIOUS ACTORS CAN EXPLOIT COMPROMISED UAS

While UASs can be used as a tool for an attacker, they are also vulnerable to exploitation. Many commercial UAS variations, for example, currently communicate with ground stations and operators using unencrypted feeds. This can allow a malicious actor to intercept and review data sent to and from the UAS.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

SECRECY NEWS – THE REAL MINIMUM WAGE, CYBERSECURITY, AND MORE FROM CRS

The hourly minimum wage reached its peak value in 1968, when it was worth
$10.57 in real terms, the Congressional Research Service calculated in a
new report.  But although the nominal value of the minimum wage has
increased over the years, it has not kept pace with the increase in
consumer prices, and so its real value has fallen.  See Inflation and the
Real Minimum Wage: A Fact Sheet, February 26, 2013:

    http://www.fas.org/sgp/crs/misc/R42973.pdf

The recent executive order 13636 on cybersecurity was discussed in another
new CRS report, which reviewed the order's provisions, compared it to
pending legislation, and discussed the authority of the President to act
unilaterally in this area.  See "The 2013 Cybersecurity Executive Order:
Overview and Considerations for Congress," March 1, 2013:

    http://www.fas.org/sgp/crs/misc/R42984.pdf

A 1999 provision to provide public access to scientific data used in
federally funded research (known as the Shelby Amendment) has rarely been
invoked in Freedom of Information Act requests, and so neither the benefits
promised by its advocates nor the concerns of its critics have been
realized to any significant extent, a CRS study found.  See Public Access
to Data from Federally Funded Research: Provisions in OMB Circular A-110,
March 1, 2013:

    http://www.fas.org/sgp/crs/secrecy/R42983.pdf

The prospects for current negotiations between the government of Colombia
and the insurgent Revolutionary Armed Forces of Colombia (FARC) were
assessed in a new CRS report, which also provided background on the
conflict in that country.  See Peace Talks in Colombia, March 1, 2013:

    http://www.fas.org/sgp/crs/row/R42982.pdf

The U.S. Supreme Court has agreed to hear challenges to two state laws
that impose restrictions on same-sex marriage. The two pending cases were
discussed by CRS in Same-Sex Marriage and Supreme Court: United States v.
Windsor and Hollingsworth v. Perry, February 20, 2013:

    http://www.fas.org/sgp/crs/misc/R42976.pdf

The Equal Rights Amendment that was proposed in 1972 to prohibit
discrimination "on account of sex" was eventually ratified by 35 states,
three short of the 38 states required for adoption.  Those ratifications
have formally expired, but some supporters contend controversially that it
would possible "to restart the clock on ratification at the current level
of 35 states."  The issues were discussed by CRS in The Proposed Equal
Rights Amendment: Contemporary Ratification Issues, February 28, 2013:

    http://www.fas.org/sgp/crs/misc/R42979.pdf

The adequacy of official reporting of government expenditures is a
continuing concern among policy advocates.  "Two agencies -- the Department
of Homeland Security (DHS) and the Department of Defense (DOD) -- have
never received unqualified audit opinions, which signifies the persistence
of financial problems at these agencies," a new CRS report said.  See
Federal Financial Reporting: An Overview, February 27, 2013:

    http://www.fas.org/sgp/crs/misc/R42975.pdf

Other noteworthy new and updated CRS products that Congress has directed
CRS not to release to the public include the following.

Issues in Homeland Security Policy for the 113th Congress, February 27,
2013:

    http://www.fas.org/sgp/crs/homesec/R42985.pdf

Comparison of Rights in Military Commission Trials and Trials in Federal
Criminal Court, February 28, 2013:

    http://www.fas.org/sgp/crs/natsec/R40932.pdf

International Law and Agreements: Their Effect Upon U.S. Law, March 1,
2013:

    http://www.fas.org/sgp/crs/misc/RL32528.pdf

Cybersecurity: Authoritative Reports and Resources, February 28, 2013:

    http://www.fas.org/sgp/crs/misc/R42507.pdf

U.S. Crude Oil and Natural Gas Production in Federal and Non-Federal
Areas, February 28, 2013:

    http://www.fas.org/sgp/crs/misc/R42432.pdf

Securing America's Borders: The Role of the Military, February 25, 2013:

    http://www.fas.org/sgp/crs/homesec/R41286.pdf

Army Drawdown and Restructuring: Background and Issues for Congress, March
5, 2013:

    http://www.fas.org/sgp/crs/natsec/R42493.pdf

U.S. Trade and Investment in the Middle East and North Africa: Overview
and Issues for Congress, February 28, 2013:

    http://www.fas.org/sgp/crs/misc/R42153.pdf

Southwest Border Violence: Issues in Identifying and Measuring Spillover
Violence, February 28, 2013:

    http://www.fas.org/sgp/crs/homesec/R41075.pdf

Base Realignment and Closure (BRAC): Transfer and Disposal of Military
Property, February 28, 2013:

    http://www.fas.org/sgp/crs/natsec/R40476.pdf

Department of Defense Trends in Overseas Contract Obligations, March 1,
2013:

    http://www.fas.org/sgp/crs/natsec/R41820.pdf

Sequestration as a Budget Enforcement Process: Frequently Asked Questions,
February 27, 2013:

    http://www.fas.org/sgp/crs/misc/R42972.pdf

Sessions, Adjournments, and Recesses of Congress, February 27, 2013:

    http://www.fas.org/sgp/crs/misc/R42977.pdf

Kenya: Current Issues and U.S. Policy, February 26, 2013:

    http://www.fas.org/sgp/crs/row/R42967.pdf

Comparing Medicaid and Exchanges: Benefits and Costs for Individuals and
Families, February 28, 2013:

    http://www.fas.org/sgp/crs/misc/R42978.pdf

Brief History of Comprehensive Immigration Reform Efforts in the 109th and
110th Congresses to Inform Policy Discussions in the 113th Congress,
February 27, 2013:

    http://www.fas.org/sgp/crs/homesec/R42980.pdf

U.S. Trade and Investment in the Middle East and North Africa: Overview
and Issues for Congress, February 28, 2013:

        http://www.fas.org/sgp/crs/misc/R42153.pdf

China's Economic Conditions, March 4, 2013:

    http://www.fas.org/sgp/crs/row/RL33534.pdf

_______________________________________________
Secrecy News is written by Steven Aftergood and published by the
Federation of American Scientists.

The Secrecy News Blog is at:
     http://www.fas.org/blog/secrecy/

To SUBSCRIBE to Secrecy News, go to:
     http://www.fas.org/sgp/news/secrecy/subscribe.html

To UNSUBSCRIBE, go to
     http://www.fas.org/sgp/news/secrecy/unsubscribe.html

OR email your request to saftergood@fas.org

Secrecy News is archived at:
     http://www.fas.org/sgp/news/secrecy/index.html

Support the FAS Project on Government Secrecy with a donation:
     http://www.fas.org/member/donate_today.html

_______________________
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web:    www.fas.org/sgp/index.html
email:  saftergood@fas.org
voice:  (202) 454-4691
twitter: @saftergood

Pentagon unveils cybersecurity guidelines