Govt-Secrecy-Stone
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Iraq's WMD Capability
BRITISH AMERICAN SECURITY INFORMATION COUNCIL BASIC SPECIAL REPORT Unravelling the Known Unknowns: Why no Weapons of Mass Destruction have been found in Iraq By David Isenberg and Ian Davis BASIC Special Report 2004.1 January 2004 1 The British American Security Information Council The British American Security Information Council (BASIC) is an independent research organization that analyzes international security issues. BASIC works to promote awareness of security issues among the public, policy makers and the media in order to foster informed debate on both sides of the Atlantic. BASIC in the U.K. is a registered charity no. 1001081 BASIC in the U.S. is a non-profit organization constituted under Section 501(c)(3) of the U.S. Internal Revenue Service Code David Isenberg, Senior Analyst David Isenberg joined BASIC's Washington office in November 2002. He has a wide background in arms control and national security issues, and brings close to 20 years of experience in this field, including three years as a member of DynMeridian's Arms Control & Threat Reduction Division, and nine years as Senior Analyst at the Center for Defense Information. Ian Davis, Director Dr. Ian Davis is Executive Director of BASIC and has a rich background in government, academia, and the non-governmental organization (NGO) sector. He received both his Ph.D. and B.A. in Peace Studies from the University of Bradford. He was formerly Program Manager at Saferworld before being appointed as the new Executive Director of BASIC in October 2001. He has published widely on British defense and foreign policy, European security, the international arms trade, arms export controls, small arms and light weapons and defense diversification. -
The Public Life of Secrets: Deception, Disclosure, and Discursive Framing in the Policy Process
STXXXX10.1177/0735275115587388Sociological TheoryBail 587388research-article2015 Original Article Sociological Theory 2015, Vol. 33(2) 97 –124 The Public Life of Secrets: © American Sociological Association 2015 DOI: 10.1177/0735275115587388 Deception, Disclosure, and stx.sagepub.com Discursive Framing in the Policy Process Christopher A. Bail1 Abstract While secrecy enables policy makers to escape public scrutiny, leaks of classified information reveal the social construction of reality by the state. I develop a theory that explains how leaks shape the discursive frames states create to communicate the causes of social problems to the public and corresponding solutions to redress them. Synthesizing cultural sociology, symbolic interactionism, and ethnomethodology, I argue that leaks enable non– state actors to amplify contradictions between the public and secret behavior of the state. States respond by “ad hoc–ing” new frames that normalize their secret transgressions as logical extensions of other policy agendas. While these syncretic responses resolve contradictions exposed by leaks, they gradually detach discursive frames from reality and therefore increase states’ need for secrecy—as well as the probability of future leaks—in turn. I illustrate this downward spiral of deception and disclosure via a case study of the British government’s discourse about terrorism between 2000 and 2008. Keywords cultural sociology, political sociology, secrecy, symbolic interactionism, comparative- historical sociology “For in the order of things it is found that one never seeks to avoid one inconvenience without running into another.” —Machiavelli (The Prince, chapter 21) A vast literature explains how policy makers shape public understandings of social problems in order to accomplish their agenda (e.g., Alexander and Smith 1993; Berezin 1997; Jacobs and Sobieraj 2007; Reed 2013; Skrentny 2004; Somers and Block 2005; Spillman 1997; Steensland 2007; Wagner-Pacifici 1994). -
American Bolsheviki: the Beginnings of the First Red Scare, 1917 to 1918
Steeplechase: An ORCA Student Journal Volume 3 Issue 2 Article 4 2019 American Bolsheviki: The Beginnings of the First Red Scare, 1917 to 1918 Jonathan Dunning Follow this and additional works at: https://digitalcommons.murraystate.edu/steeplechase Part of the European History Commons, Other History Commons, Political History Commons, and the United States History Commons Recommended Citation Dunning, Jonathan (2019) "American Bolsheviki: The Beginnings of the First Red Scare, 1917 to 1918," Steeplechase: An ORCA Student Journal: Vol. 3 : Iss. 2 , Article 4. Available at: https://digitalcommons.murraystate.edu/steeplechase/vol3/iss2/4 This Feature is brought to you for free and open access by the The Office of Research and Creative Activity at Murray State's Digital Commons. It has been accepted for inclusion in Steeplechase: An ORCA Student Journal by an authorized editor of Murray State's Digital Commons. For more information, please contact [email protected]. American Bolsheviki: The Beginnings of the First Red Scare, 1917 to 1918 Abstract A consensus has developed among historians that widespread panic consumed the American public and government as many came to fear a Bolshevik coup of the United States government and the undermining of the American way of life beginning in early 1919. Known as the First Red Scare, this period became one of the most well-known episodes of American fear of Communism in US history. With this focus on the events of 1919 to 1920, however, historians of the First Red Scare have often ignored the initial American reaction to the October Revolution in late 1917 and throughout 1918. -
American Strategic Policy and Iranian Political Development 1943-1979
University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Professional Papers Graduate School 1985 American strategic policy and Iranian political development 1943-1979 Mohsen Shabdar The University of Montana Follow this and additional works at: https://scholarworks.umt.edu/etd Let us know how access to this document benefits ou.y Recommended Citation Shabdar, Mohsen, "American strategic policy and Iranian political development 1943-1979" (1985). Graduate Student Theses, Dissertations, & Professional Papers. 5189. https://scholarworks.umt.edu/etd/5189 This Thesis is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. COPYRIGHT ACT OF 1976 Th is is an unpublished manuscript in which copyright sub s is t s , Any further r epr in tin g of it s contents must be approved BY THE AUTHOR, Man sfield L ibrary Un iv e r s it y of Montana Date : •*' 1 8 AMERICAN STRATEGIC POLICY AND IRANIAN POLITICAL DEVELOPMENT 1943-1979 By Mohsen Shabdar B.A., Rocky Mountain College, 1983 Presented in partial fu lfillm e n t of the requirements for the degree of Master of Arts UNIVERSITY OF MONTANA 1985 Approved by: ‘ Chairman, Board of Examir\efs Dean, Graduate School UMI Number: EP40653 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. -
Writing About Espionage Secrets
Secrecy and Society ISSN: 2377-6188 Volume 2 Number 1 Secrecy and Intelligence Article 7 September 2018 Writing About Espionage Secrets Kristie Macrakis Georgia Tech, Atlanta, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the History of Science, Technology, and Medicine Commons, and the Other History Commons Recommended Citation Macrakis, Kristie. 2018. "Writing About Espionage Secrets." Secrecy and Society 2(1). https://doi.org/10.31979/2377-6188.2018.020107 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss1/7 This Special Issue Article is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Writing About Espionage Secrets Abstract This article describes the author’s experiences researching three books on espionage history in three different countries and on three different topics. The article describes the foreign intelligence arm of the Ministry for State Security; a global history of secret writing from ancient to modern times; and finally, my current project on U.S. intelligence and technology from the Cold War to the War on Terror. The article also discusses the tensions between national security and openness and reflects on the results of this research and its implications for history and for national security. Keywords Central Intelligence Agency, CIA, -
POLITICO, John Harris and Carrie Budoff Brown
STATEMENTS FROM NEWS ORGS EXCLUDED – POLITICO, John Harris and Carrie Budoff Brown: “We’ve reached out to the White House, and rest assured that we plan to very vigorously assert and defend an independent media’s right to cover the institution of the Presidency. Selectively excluding news organizations from White House briefings is misguided and our expectation is that this action will not be repeated. We have one of the largest teams in Washington covering this White House—a major editorial and financial commitment on behalf of our audience. This commitment is an enduring one, and our coverage of the Trump Administration will of course continue without interruption.” --WASHPOST, Marty Baron: “It’s appalling that the White House would exclude news outlets like the New York Times, CNN, Politico, the Los Angeles Times, and BuzzFeed from its publicly announced briefings. This is an undemocratic path that the administration is traveling. There is nothing to be gained from the White House restricting the public’s access to information. We are currently evaluating what our response will be if this sort of thing happens again." – Marty Baron, Washington Post. --NYT, Dean Baquet: “Nothing like this has ever happened at the White House in our long history of covering multiple administrations of different parties. We strongly protest the exclusion of The New York Times and the other news organizations. Free media access to a transparent government is obviously of crucial national interest.” --BUZZFEED: “While we strongly object to the White House’s apparent attempt to punish news outlets whose coverage it does not like, we won’t let these latest antics distract us from continuing to cover this administration fairly and aggressively.” --CNN: “This is an unacceptable development by the Trump White House. -
Trials Under the Espionage and Sedition Acts During World War I
Where was the First Amendment? Trials Under the Espionage and Sedition Acts During WWI by Kathryn Horrocks HST 499 June 2, 2005 First Reader: Dr. Jensen Second Reader: Dr. Lowe Before the passage of the Espionage and Sedition Acts of 1917 and 1918, the United States government sought to curb anti-war efforts with prosecutions under remaining Civil War conspiracy statutes. However, these statutes were not effective on persons acting or speaking out against the war alone because by definition a conspiracy requires more than one person. 1 To close these loopholes and successfully control public discussions and actions that may have harmed the war effort, Congress passed the Espionage Act in June of 1917 2. This Act censored speech, behavior and publication of information that intended to undermine the US war effort, or aid her enemies.3 However, this element of intent allowed some anti-war speech to go unpunished. Occasional acquittals under the Espionage Act, and violence against political dissidents prompted congress to pass the Sedition Act almost a year later. The Sedition Act was very similar to the Espionage Act, except for the inclusion of a section which forbid the utterance or publication of “disloyal, scurrilous or abusive language” regarding the US, her flag, her military or her government. 4 This closed the loophole created by the element of intent, and its effect was to “ban dissent of any kind.”5 These Acts and their effects came into direct conflict with the First Amendment of the Constitution which clearly prevents congress from “abridging 1 Shirley J Burton, “The Espionage and Sedition Acts of 1917 and 1918: Sectional Interpretations in the United States District Courts of Illinois,” Illinois Historical Journal 87(1) (1994), 41. -
National Security Secrecy: How the Limits Change
Steven Aftergood National Security Secrecy: How the Limits Change as a nation, we seem to be of two minds about secrecy. we know that government secrecy is incompatible with democratic decision-making in obvious ways. By definition, secrecy limits access to official information, thereby impeding public participation in the deliberative process and inhibiting or preventing the accountability of government officials for their actions. Yet there is a near universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities, such as intelligence gathering and military operations, to permit confidential deliberations in the course of policy development, to secure personal privacy, and for other reasons. Reconciling these conflicting interests is an ongoing challenge. A stable secrecy policy is hard to achieve since the proper boundaries of offi- cial secrecy cannot be clearly articulated in the abstract and tend to shift over time. In practice, decisions to restrict information seem to depend on prevailing security considerations (secrecy is more pronounced in time of war), official predispositions (some political leaders favor secrecy more than others), and public attitudes and expectations. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government secrecy, identifying it as an obstacle to achieving their own objectives. In fact, there are at least two entire coalitions of organiza- tions devoted to combating secrecy: Openthegovernment.org and the Research for this paper was supported by grants from the Foundation to Promote Open Society, the HKH Foundation, the CS Fund, the Stewart R. Mott Foundation, and the Rockefeller Family Fund. -
The Train in Spain Fell Mainly Off the Rail (With Apologies to "My Fair Lady")
The Train in Spain Fell Mainly off the Rail (with apologies to "My Fair Lady") March 13, 2004 By Robbie Friedmann The horrendous terror atrocity that murdered about 200 and injured some 1600 on Madrid trains has already become Spain's 9-11, acquiring its own symbol of 3-11, and is seen by some as a "reminder" that the war on terrorism has not ended ("Spain's 3/11: A horrifying reminder that the war on terror is not over," Editorial, Wall Street Journal, 12 March 2004). As if reminders are needed. Initial reports from Spain blamed the multiple blasts on the Basque separatist group ETA and reports suggest that the Spanish foreign minister instructed all Spanish ambassadors to push this notion no matter what other evidence comes up (while keeping all investigation avenues "open"). This is partly because in Spain an act by ETA will be perceived as a unifying factor, while terrorism by Islamist groups may tilt the sentiment against the Spanish involvement in the war on terror. Given the elections slated for next week, the stakes are indeed very high. Even the U.N. Security Council rushed to condemn ETA even as it had no proof ETA was involved (see U.N. Resolution 1530). Nevertheless, initial non-Spanish reports suspected al-Qaeda involvement and shortly thereafter ETA denied any responsibility and al-Qaeda indeed quickly declared it ("Al-Qaeda Took Responsibility for Thursday's Madrid Bombings: 190 people killed, 1,400 injured in Madrid train bombings. Stolen car with detonators and tapes in Arabic found near Madrid," Ma'ariv Online, 11 March 2004), and respected Israeli analysts tended to accept it at face value. -
Swire. “The Declining Half-Life of Secrets”
CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address. -
N Ieman Reports
NIEMAN REPORTS Nieman Reports One Francis Avenue Cambridge, Massachusetts 02138 Nieman Reports THE NIEMAN FOUNDATION FOR JOURNALISM AT HARVARD UNIVERSITY VOL. 62 NO. 1 SPRING 2008 VOL. 62 NO. 1 SPRING 2008 21 ST CENTURY MUCKRAKERS THE NIEMAN FOUNDATION HARVARDAT UNIVERSITY 21st Century Muckrakers Who Are They? How Do They Do Their Work? Words & Reflections: Secrets, Sources and Silencing Watchdogs Journalism 2.0 End Note went to the Carnegie Endowment in New York but of the Oakland Tribune, and Maynard was throw- found times to return to Cambridge—like many, ing out questions fast and furiously about my civil I had “withdrawal symptoms” after my Harvard rights coverage. I realized my interview was lasting ‘to promote and elevate the year—and would meet with Tenney. She came to longer than most, and I wondered, “Is he trying to my wedding in Toronto in 1984, and we tried to knock me out of competition?” Then I happened to keep in touch regularly. Several of our class, Peggy glance over at Tenney and got the only smile from standards of journalism’ Simpson, Peggy Engel, Kat Harting, and Nancy the group—and a warm, welcoming one it was. I Day visited Tenney in her assisted living facility felt calmer. Finally, when the interview ended, I in Cambridge some years ago, during a Nieman am happy to say, Maynard leaped out of his chair reunion. She cared little about her own problems and hugged me. Agnes Wahl Nieman and was always interested in others. Curator Jim Tenney was a unique woman, and I thoroughly Thomson was the public and intellectual face of enjoyed her friendship. -
Anonymous Sources: More Or Less and Why and Where?
Southwestern Mass Communication Journal A journal of the Southwest Education Council for Journalism & Mass Communication ISSN 0891-9186 | Vol. 30, No. 2 | Spring 2015 Anonymous Sources: More or less and why and where? Hoyt Purvis University of Arkansas Anonymous sources have been important factors in some of the major news stories of our time. But does this reliance on unnamed sources to too far? The use and possible abuse of anonymous sources is a matter of continuing controversy in the media and can have a direct bearing on the credibility of the media. Questions related to the use of such sources are examined in a study of the use of anonymous sources in 14 daily editions of three daily newspapers, focusing on the quantity of articles using anonymous sources, their subject matter, location, and rationale for using unnamed sources. This is done within the context of the ongoing controversy about the reliance on such sources in major news organizations. Results of this study are reported and analyzed and provide some clear indications about the extent and nature of the use of anonymous sources, and point to a possible over-dependence and problematic trend. Suggested citation: Purvis, H. (2015). Anonymous sources: More or less and why and where?. Southwestern Mass Communication Journal, 30(2). Retrieved from http://swecjmc.wp.txstate.edu. The Southwestern Mass Communication Journal Spring 2015 V. 30, No. 2 The Southwestern Mass Communication Journal (ISSN 0891-9186) is published semi-annually by the Southwest Education Council for Journalism and Mass Communication. http://swmcjournal.com Also In This Issue: Anonymous Sources: More or less and why and where? Hoyt Purvis, University of Arkansas Are You Talking To Me? The Social-Political Visual Rhetoric of the Syrian Presidency’s Instagram Account Steven Holiday & Matthew J.