Last updated on March 16, 2026
"Nobody will ever know. We won’t even tell the companies we’re working with where this technology comes from. As far as the world will know, the history of the patent is the history of the invention."
Col. Phillip J. Corso, The Day After Roswell, p. 89
Secrecy does not rest on security classifications alone. It survives through a carefully orchestrated architecture. Over the last century, the United States national security apparatus has refined three primary methods to control information, evade disclosure, and blunt accountability: compartmentalization, privatization, and disinformation. Each serves a distinct function. Together, they form a resilient system that resists law, oversight, and memory.
I. Compartmentalization: Fragmented Knowledge
Compartmentalization restricts access to sensitive information to narrowly defined groups, each holding only a fragment of a larger project. The premise remains simple: no breach can expose what no single person possesses.
The Manhattan Project provides the clearest example. Scientists and engineers at Los Alamos, Oak Ridge, and Hanford worked in complete isolation from one another. Uranium enrichment teams lacked insight into the design of nuclear bombs. Implosion physicists lacked knowledge of material production. Even senior government officials remained largely uninformed. Vice President Harry S. Truman himself did not receive a full briefing until after Franklin Roosevelt’s death in April 1945.[1]
The structure achieved its objective. The atomic bomb emerged intact and ready for deployment. But it also produced moral distance. Many participants learned the true purpose of their labor only after the tragedy of Hiroshima and Nagasaki.
The same logic governed British intelligence operations during World War II. At Bletchley Park, cryptanalysts broke German Enigma codes without understanding how the intelligence would deploy. Military commanders received actionable conclusions stripped of source attribution. The secrecy surrounding the Ultra program persisted for decades after the war, enforced through compartmented access and lifetime silence.[2]
Compartmentalization did not end with World War II. It evolved. Modern Special Access Programs impose additional clearance layers beyond standard classifications. Program names remain classified. Congressional oversight occurs through restricted briefings. Courts accept executive affidavits in place of evidence. Authority flows upward. Understanding does not.
II. Privatization: FOIA’s Foil
Privatization transfers sensitive research, materials, or technologies from government agencies into private-sector custody. Once transferred, transparency collapses.
Private corporations do not answer Freedom of Information Act requests because they have no legal obligation to do so. Their records fall outside statutory reach and out of reach of the public. Contractual nondisclosure agreements replace public law. Proprietary claims bar inspection. The files disappear into corporate vaults, never to be seen again. The Lockheed Skunk Works pioneered this model during the Cold War. Advanced aircraft such as the U-2 and SR-71 were developed inside corporate facilities governed by secrecy agreements rather than civilian oversight. The government funded the work. Corporations controlled the records.[3]
This structure spread across the spectrum. The nuclear weapons complex transitioned to contractor-operated laboratories managed by universities and private firms. Although publicly funded, these facilities operated under the Atomic Energy Act, which imposed sweeping secrecy obligations and exemptions from disclosure.[4] The public paid for the research, but had no right to its documentation. Sensitive programs fragment across layers of subcontractors, each invoking proprietary protections. When controversies arise, agencies claim they lack possession. Corporations cite nondisclosure agreements. Oversight committees receive summaries cleansed of technical details.
Nowhere is this modus operandi more evident than in the case of UAP and NHI technology. Col. Phillip Corso outlined the process beautifully in his book, “The Day After Roswell.” Materials from the Roswell crash, and perhaps others, were distributed to private corporations for study. If they had a military application, the government had first dibs:
“Of course,” Trudeau realized. “If they own the patent, we will have completely reverse-engineered the technology.”
“Yes, sir, that’s right. Nobody will ever know. We won’t even tell the companies we’re working with where this technology comes from. As far as the world will know, the history of the patent is the history of the invention.”[5]
Nonetheless, privatization does not eliminate the risk of secrets being exposed. Rather, it places responsibility for the secrets in the hands of private corporations. This does nothing to help one sleep at night.
III. Disinformation: Confusion as a Weapon
Disinformation does not conceal the truth. It envelopes it. This method involves the deliberate spread of false or misleading information to distort perception, undermine trust, and exhaust inquiry. Contradiction replaces silence. Ridicule replaces rebuttal. Confusion pacifies.
The CIA’s MKUltra program relied on denial and narrative distortion to obscure itself for decades. Early reports of nonconsensual human experimentation drew official dismissal. Victims appeared unstable. Records vanished. Only accidental discovery during congressional investigations in the 1970s exposed the program’s scope. Even then, the agency acknowledged that many files had been destroyed.[6] Disinformation bought time. Time erased the evidence.
The Gulf of Tonkin incident offers another example. In 1964, senior officials asserted certainty regarding alleged North Vietnamese attacks on U.S. naval vessels. Internal records later revealed ambiguity and contradiction. Congress authorized war based on a narrative constructed for effect rather than accuracy.[7]⁶ The correction arrived too late.
The FBI’s COINTELPRO program weaponized disinformation against domestic political movements. The Bureau forged letters, planted false stories, and engineered internal distrust among civil rights organizations and antiwar groups. Targets appeared criminal or extremist. Public sympathy evaporated. Exposure occurred only after activists stole FBI documents and forced disclosure.[8]
Disinformation does not require public belief. Its goal is disengagement. When every claim appears suspect, inquiry collapses, and the truth escapes unrealized.
IV. A Unified System
These methods operate in tandem. Compartmentalization limits the number of people who know. Privatization eliminates public and government meddling. Disinformation obscures reality. A compartmented project outsourced to private industry and surrounded by false narratives resists exposure at every stage. Investigators encounter missing records, sealed contracts, and polluted information environments. Courts defer. Legislators lack access. The public loses interest and turns away. Secrecy survives through design, not silence.
[1] Richard Rhodes, The Making of the Atomic Bomb (New York: Simon & Schuster, 1986), 529–533.
[2] F.H. Hinsley et al., British Intelligence in the Second World War, Vol. 1 (London: HMSO, 1979), 55–60.
[3] Ben R. Rich and Leo Janos, Skunk Works: A Personal Memoir of My Years at Lockheed (Boston: Little, Brown and Company, 1994), 23–45.
[4] Atomic Energy Act of 1954, 42 U.S.C. §§ 2011–2297.
[5] Col. Phillip J. Corso with William J. Birnes, The Day After Roswell. (Pocket Books, 1997), 89.
[6] U.S. Senate, Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Final Report, Book I (1976), 389–414.
[7] Edwin E. Moïse, Tonkin Gulf and the Escalation of the Vietnam War (Chapel Hill: University of North Carolina Press, 1996), 85–112.
[8] Id.

Be First to Comment